[INFO] fetching crate vulfy 0.1.0... [INFO] testing vulfy-0.1.0 against master#caccb4d0368bd918ef6668af8e13834d07040417 for pr-146098-1 [INFO] extracting crate vulfy 0.1.0 into /workspace/builds/worker-5-tc1/source [INFO] started tweaking crates.io crate vulfy 0.1.0 [INFO] finished tweaking crates.io crate vulfy 0.1.0 [INFO] tweaked toml for crates.io crate vulfy 0.1.0 written to /workspace/builds/worker-5-tc1/source/Cargo.toml [INFO] validating manifest of crates.io crate vulfy 0.1.0 on toolchain caccb4d0368bd918ef6668af8e13834d07040417 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+caccb4d0368bd918ef6668af8e13834d07040417" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate vulfy 0.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+caccb4d0368bd918ef6668af8e13834d07040417" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded cron v0.12.1 [INFO] [stderr] Downloaded tokio-cron-scheduler v0.10.2 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+caccb4d0368bd918ef6668af8e13834d07040417" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] b9b56ca0ecdc5c5f0272a5a5979289b365d0a7557571da6c7d953fe7d96aec1c [INFO] running `Command { std: "docker" "start" "-a" "b9b56ca0ecdc5c5f0272a5a5979289b365d0a7557571da6c7d953fe7d96aec1c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "b9b56ca0ecdc5c5f0272a5a5979289b365d0a7557571da6c7d953fe7d96aec1c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "b9b56ca0ecdc5c5f0272a5a5979289b365d0a7557571da6c7d953fe7d96aec1c", kill_on_drop: false }` [INFO] [stdout] b9b56ca0ecdc5c5f0272a5a5979289b365d0a7557571da6c7d953fe7d96aec1c [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+caccb4d0368bd918ef6668af8e13834d07040417" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] d1b4b562ba470b639be47cd57d89e450e0b738d01a461626b6e5c5b5537bc3c6 [INFO] running `Command { std: "docker" "start" "-a" "d1b4b562ba470b639be47cd57d89e450e0b738d01a461626b6e5c5b5537bc3c6", kill_on_drop: false }` [INFO] [stderr] Compiling jobserver v0.1.33 [INFO] [stderr] Compiling serde v1.0.219 [INFO] [stderr] Compiling signal-hook-registry v1.4.5 [INFO] [stderr] Compiling tracing-core v0.1.34 [INFO] [stderr] Compiling futures-channel v0.3.31 [INFO] [stderr] Compiling futures-macro v0.3.31 [INFO] [stderr] Compiling log v0.4.27 [INFO] [stderr] Compiling hashbrown v0.15.4 [INFO] [stderr] Compiling bitflags v2.9.1 [INFO] [stderr] Compiling openssl v0.10.73 [INFO] [stderr] Compiling cc v1.2.27 [INFO] [stderr] Compiling tokio v1.45.1 [INFO] [stderr] Compiling indexmap v2.9.0 [INFO] [stderr] Compiling http v0.2.12 [INFO] [stderr] Compiling openssl-macros v0.1.1 [INFO] [stderr] Compiling tracing v0.1.41 [INFO] [stderr] Compiling futures-util v0.3.31 [INFO] [stderr] Compiling native-tls v0.2.14 [INFO] [stderr] Compiling aho-corasick v1.1.3 [INFO] [stderr] Compiling httpdate v1.0.3 [INFO] [stderr] Compiling iana-time-zone v0.1.63 [INFO] [stderr] Compiling getrandom v0.3.3 [INFO] [stderr] Compiling url v2.5.4 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Compiling openssl-sys v0.9.109 [INFO] [stderr] Compiling libz-sys v1.1.22 [INFO] [stderr] Compiling libssh2-sys v0.3.1 [INFO] [stderr] Compiling libgit2-sys v0.16.2+1.7.2 [INFO] [stderr] Compiling http-body v0.4.6 [INFO] [stderr] Compiling regex-automata v0.4.9 [INFO] [stderr] Compiling toml_datetime v0.6.11 [INFO] [stderr] Compiling chrono v0.4.41 [INFO] [stderr] Compiling serde_spanned v0.6.9 [INFO] [stderr] Compiling tokio-cron-scheduler v0.10.2 [INFO] [stderr] Compiling winnow v0.7.11 [INFO] [stderr] Compiling anyhow v1.0.98 [INFO] [stderr] Compiling futures-executor v0.3.31 [INFO] [stderr] Compiling rustls-pemfile v1.0.4 [INFO] [stderr] Compiling clap_builder v4.5.40 [INFO] [stderr] Compiling clap_derive v4.5.40 [INFO] [stderr] Compiling regex v1.11.1 [INFO] [stderr] Compiling tokio-util v0.7.15 [INFO] [stderr] Compiling toml_edit v0.22.27 [INFO] [stderr] Compiling h2 v0.3.26 [INFO] [stderr] Compiling tokio-native-tls v0.3.1 [INFO] [stderr] Compiling cron v0.12.1 [INFO] [stderr] Compiling num-derive v0.3.3 [INFO] [stderr] Compiling serde_urlencoded v0.7.1 [INFO] [stderr] Compiling uuid v1.17.0 [INFO] [stderr] Compiling serde_json v1.0.140 [INFO] [stderr] Compiling tracing-log v0.2.0 [INFO] [stderr] Compiling thiserror-impl v1.0.69 [INFO] [stderr] Compiling thread_local v1.1.9 [INFO] [stderr] Compiling encoding_rs v0.8.35 [INFO] [stderr] Compiling sync_wrapper v0.1.2 [INFO] [stderr] Compiling tracing-subscriber v0.3.19 [INFO] [stderr] Compiling toml v0.8.23 [INFO] [stderr] Compiling thiserror v1.0.69 [INFO] [stderr] Compiling clap v4.5.40 [INFO] [stderr] Compiling futures v0.3.31 [INFO] [stderr] Compiling hyper v0.14.32 [INFO] [stderr] Compiling quick-xml v0.36.2 [INFO] [stderr] Compiling hyper-tls v0.5.0 [INFO] [stderr] Compiling reqwest v0.11.27 [INFO] [stderr] Compiling git2 v0.18.3 [INFO] [stderr] Compiling vulfy v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variant `PackageParsing` is never constructed [INFO] [stdout] --> src/error.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 6 | pub enum VulfyError { [INFO] [stdout] | ---------- variant in this enum [INFO] [stdout] ... [INFO] [stdout] 29 | PackageParsing { message: String }, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used [INFO] [stdout] --> src/scanner/mod.rs:284:14 [INFO] [stdout] | [INFO] [stdout] 97 | impl Scanner { [INFO] [stdout] | ------------ methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 284 | async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 315 | async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `matches` is never used [INFO] [stdout] --> src/automation/mod.rs:221:12 [INFO] [stdout] | [INFO] [stdout] 219 | impl ScanPolicy { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] 220 | /// Check if a vulnerability matches this policy [INFO] [stdout] 221 | pub fn matches(&self, vulnerability: &Vulnerability) -> bool { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `is_running` is never used [INFO] [stdout] --> src/automation/scheduler.rs:146:18 [INFO] [stdout] | [INFO] [stdout] 24 | impl AutomationScheduler { [INFO] [stdout] | ------------------------ method in this implementation [INFO] [stdout] ... [INFO] [stdout] 146 | pub async fn is_running(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read [INFO] [stdout] --> src/automation/policy.rs:13:9 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct PolicyMatch { [INFO] [stdout] | ----------- fields in this struct [INFO] [stdout] 13 | pub policy_name: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 14 | pub vulnerability_id: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] 15 | pub package_name: String, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] 16 | pub actions: PolicyActions, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read [INFO] [stdout] --> src/automation/policy.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct FilteredScanResult { [INFO] [stdout] | ------------------ fields in this struct [INFO] [stdout] 21 | pub scan_result: ScanResult, [INFO] [stdout] 22 | pub policy_matches: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] 23 | pub ignored_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] 24 | pub prioritized_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `get_policy_stats` is never used [INFO] [stdout] --> src/automation/policy.rs:291:12 [INFO] [stdout] | [INFO] [stdout] 27 | impl PolicyEngine { [INFO] [stdout] | ----------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 291 | pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `PolicyStats` is never constructed [INFO] [stdout] --> src/automation/policy.rs:315:12 [INFO] [stdout] | [INFO] [stdout] 315 | pub struct PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 2m 35s [INFO] running `Command { std: "docker" "inspect" "d1b4b562ba470b639be47cd57d89e450e0b738d01a461626b6e5c5b5537bc3c6", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d1b4b562ba470b639be47cd57d89e450e0b738d01a461626b6e5c5b5537bc3c6", kill_on_drop: false }` [INFO] [stdout] d1b4b562ba470b639be47cd57d89e450e0b738d01a461626b6e5c5b5537bc3c6 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+caccb4d0368bd918ef6668af8e13834d07040417" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 69b4fa4266814824891c532be05c57f6de753fd9b7cde64a52bb75d793ac53fd [INFO] running `Command { std: "docker" "start" "-a" "69b4fa4266814824891c532be05c57f6de753fd9b7cde64a52bb75d793ac53fd", kill_on_drop: false }` [INFO] [stderr] Compiling tokio v1.45.1 [INFO] [stderr] Compiling openssl v0.10.73 [INFO] [stderr] Compiling rustix v1.0.7 [INFO] [stderr] Compiling async-stream-impl v0.3.6 [INFO] [stderr] Compiling git2 v0.18.3 [INFO] [stderr] Compiling async-stream v0.3.6 [INFO] [stderr] Compiling tempfile v3.20.0 [INFO] [stderr] Compiling native-tls v0.2.14 [INFO] [stderr] Compiling tokio-util v0.7.15 [INFO] [stderr] Compiling tokio-native-tls v0.3.1 [INFO] [stderr] Compiling tokio-stream v0.1.17 [INFO] [stderr] Compiling tokio-cron-scheduler v0.10.2 [INFO] [stderr] Compiling tokio-test v0.4.4 [INFO] [stderr] Compiling h2 v0.3.26 [INFO] [stderr] Compiling hyper v0.14.32 [INFO] [stderr] Compiling hyper-tls v0.5.0 [INFO] [stderr] Compiling reqwest v0.11.27 [INFO] [stderr] Compiling vulfy v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variant `PackageParsing` is never constructed [INFO] [stdout] --> src/error.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 6 | pub enum VulfyError { [INFO] [stdout] | ---------- variant in this enum [INFO] [stdout] ... [INFO] [stdout] 29 | PackageParsing { message: String }, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used [INFO] [stdout] --> src/scanner/mod.rs:284:14 [INFO] [stdout] | [INFO] [stdout] 97 | impl Scanner { [INFO] [stdout] | ------------ methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 284 | async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 315 | async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `matches` is never used [INFO] [stdout] --> src/automation/mod.rs:221:12 [INFO] [stdout] | [INFO] [stdout] 219 | impl ScanPolicy { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] 220 | /// Check if a vulnerability matches this policy [INFO] [stdout] 221 | pub fn matches(&self, vulnerability: &Vulnerability) -> bool { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `is_running` is never used [INFO] [stdout] --> src/automation/scheduler.rs:146:18 [INFO] [stdout] | [INFO] [stdout] 24 | impl AutomationScheduler { [INFO] [stdout] | ------------------------ method in this implementation [INFO] [stdout] ... [INFO] [stdout] 146 | pub async fn is_running(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read [INFO] [stdout] --> src/automation/policy.rs:13:9 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct PolicyMatch { [INFO] [stdout] | ----------- fields in this struct [INFO] [stdout] 13 | pub policy_name: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 14 | pub vulnerability_id: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] 15 | pub package_name: String, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] 16 | pub actions: PolicyActions, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read [INFO] [stdout] --> src/automation/policy.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct FilteredScanResult { [INFO] [stdout] | ------------------ fields in this struct [INFO] [stdout] 21 | pub scan_result: ScanResult, [INFO] [stdout] 22 | pub policy_matches: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] 23 | pub ignored_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] 24 | pub prioritized_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `get_policy_stats` is never used [INFO] [stdout] --> src/automation/policy.rs:291:12 [INFO] [stdout] | [INFO] [stdout] 27 | impl PolicyEngine { [INFO] [stdout] | ----------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 291 | pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `PolicyStats` is never constructed [INFO] [stdout] --> src/automation/policy.rs:315:12 [INFO] [stdout] | [INFO] [stdout] 315 | pub struct PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 45.44s [INFO] running `Command { std: "docker" "inspect" "69b4fa4266814824891c532be05c57f6de753fd9b7cde64a52bb75d793ac53fd", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "69b4fa4266814824891c532be05c57f6de753fd9b7cde64a52bb75d793ac53fd", kill_on_drop: false }` [INFO] [stdout] 69b4fa4266814824891c532be05c57f6de753fd9b7cde64a52bb75d793ac53fd [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+caccb4d0368bd918ef6668af8e13834d07040417" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] 3d2c1737765adc8886482e73ec96300c589854c2c250c1ed99ef1b2dcca58538 [INFO] running `Command { std: "docker" "start" "-a" "3d2c1737765adc8886482e73ec96300c589854c2c250c1ed99ef1b2dcca58538", kill_on_drop: false }` [INFO] [stderr] warning: variant `PackageParsing` is never constructed [INFO] [stderr] --> src/error.rs:29:5 [INFO] [stderr] | [INFO] [stderr] 6 | pub enum VulfyError { [INFO] [stderr] | ---------- variant in this enum [INFO] [stderr] ... [INFO] [stderr] 29 | PackageParsing { message: String }, [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stderr] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stderr] [INFO] [stderr] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used [INFO] [stderr] --> src/scanner/mod.rs:284:14 [INFO] [stderr] | [INFO] [stderr] 97 | impl Scanner { [INFO] [stderr] | ------------ methods in this implementation [INFO] [stderr] ... [INFO] [stderr] 284 | async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 315 | async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: method `matches` is never used [INFO] [stderr] --> src/automation/mod.rs:221:12 [INFO] [stderr] | [INFO] [stderr] 219 | impl ScanPolicy { [INFO] [stderr] | --------------- method in this implementation [INFO] [stderr] 220 | /// Check if a vulnerability matches this policy [INFO] [stderr] 221 | pub fn matches(&self, vulnerability: &Vulnerability) -> bool { [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: method `is_running` is never used [INFO] [stderr] --> src/automation/scheduler.rs:146:18 [INFO] [stderr] | [INFO] [stderr] 24 | impl AutomationScheduler { [INFO] [stderr] | ------------------------ method in this implementation [INFO] [stderr] ... [INFO] [stderr] 146 | pub async fn is_running(&self) -> bool { [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read [INFO] [stderr] --> src/automation/policy.rs:13:9 [INFO] [stderr] | [INFO] [stderr] 12 | pub struct PolicyMatch { [INFO] [stderr] | ----------- fields in this struct [INFO] [stderr] 13 | pub policy_name: String, [INFO] [stderr] | ^^^^^^^^^^^ [INFO] [stderr] 14 | pub vulnerability_id: String, [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] 15 | pub package_name: String, [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] 16 | pub actions: PolicyActions, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stderr] [INFO] [stderr] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read [INFO] [stderr] --> src/automation/policy.rs:22:9 [INFO] [stderr] | [INFO] [stderr] 20 | pub struct FilteredScanResult { [INFO] [stderr] | ------------------ fields in this struct [INFO] [stderr] 21 | pub scan_result: ScanResult, [INFO] [stderr] 22 | pub policy_matches: Vec, [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] 23 | pub ignored_vulnerabilities: Vec, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] 24 | pub prioritized_vulnerabilities: Vec, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stderr] [INFO] [stderr] warning: method `get_policy_stats` is never used [INFO] [stderr] --> src/automation/policy.rs:291:12 [INFO] [stderr] | [INFO] [stderr] 27 | impl PolicyEngine { [INFO] [stderr] | ----------------- method in this implementation [INFO] [stderr] ... [INFO] [stderr] 291 | pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: struct `PolicyStats` is never constructed [INFO] [stderr] --> src/automation/policy.rs:315:12 [INFO] [stderr] | [INFO] [stderr] 315 | pub struct PolicyStats { [INFO] [stderr] | ^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: `vulfy` (bin "vulfy" test) generated 8 warnings [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.33s [INFO] [stderr] Running unittests src/main.rs (/opt/rustwide/target/debug/deps/vulfy-6ceeb01e2ac5bf98) [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "3d2c1737765adc8886482e73ec96300c589854c2c250c1ed99ef1b2dcca58538", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3d2c1737765adc8886482e73ec96300c589854c2c250c1ed99ef1b2dcca58538", kill_on_drop: false }` [INFO] [stdout] 3d2c1737765adc8886482e73ec96300c589854c2c250c1ed99ef1b2dcca58538