[INFO] fetching crate author 0.1.0...
[INFO] testing author-0.1.0 against master#c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38 for pr-146098-7
[INFO] extracting crate author 0.1.0 into /workspace/builds/worker-0-tc1/source
[INFO] started tweaking crates.io crate author 0.1.0
[INFO] finished tweaking crates.io crate author 0.1.0
[INFO] tweaked toml for crates.io crate author 0.1.0 written to /workspace/builds/worker-0-tc1/source/Cargo.toml
[INFO] validating manifest of crates.io crate author 0.1.0 on toolchain c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate author 0.1.0 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] ca58c74d6a5499c0760d75c28ce7e2fe5774667b29d44aff8bf7a231d33d2833
[INFO] running `Command { std: "docker" "start" "-a" "ca58c74d6a5499c0760d75c28ce7e2fe5774667b29d44aff8bf7a231d33d2833", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "ca58c74d6a5499c0760d75c28ce7e2fe5774667b29d44aff8bf7a231d33d2833", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "ca58c74d6a5499c0760d75c28ce7e2fe5774667b29d44aff8bf7a231d33d2833", kill_on_drop: false }`
[INFO] [stdout] ca58c74d6a5499c0760d75c28ce7e2fe5774667b29d44aff8bf7a231d33d2833
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] f28c27ff52335d22c3f193683fa3978d36434f900b76c7bae19eeeb393a56f05
[INFO] running `Command { std: "docker" "start" "-a" "f28c27ff52335d22c3f193683fa3978d36434f900b76c7bae19eeeb393a56f05", kill_on_drop: false }`
[INFO] [stderr]    Compiling thiserror v2.0.11
[INFO] [stderr]    Compiling syn v2.0.96
[INFO] [stderr]    Compiling thiserror-impl v2.0.11
[INFO] [stderr]    Compiling author v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused variable: `resource`
[INFO] [stdout]   --> src/rbac/mod.rs:25:35
[INFO] [stdout]    |
[INFO] [stdout] 25 |     fn resource_roles<Res>(&self, resource: &Res) -> HashSet<Res::Role>
[INFO] [stdout]    |                                   ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `action`
[INFO] [stdout]   --> src/rbac/mod.rs:38:29
[INFO] [stdout]    |
[INFO] [stdout] 38 |     fn allowed_roles(&self, action: &Self::Action) -> HashSet<Role> {
[INFO] [stdout]    |                             ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `resource`
[INFO] [stdout]   --> src/lib.rs:35:25
[INFO] [stdout]    |
[INFO] [stdout] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stdout]    |                         ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `subject`
[INFO] [stdout]   --> src/lib.rs:35:41
[INFO] [stdout]    |
[INFO] [stdout] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stdout]    |                                         ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_subject`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `action`
[INFO] [stdout]   --> src/lib.rs:35:57
[INFO] [stdout]    |
[INFO] [stdout] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stdout]    |                                                         ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `resource` is never read
[INFO] [stdout]   --> src/lib.rs:13:5
[INFO] [stdout]    |
[INFO] [stdout] 12 | pub struct ProtectedResource<R> {
[INFO] [stdout]    |            ----------------- field in this struct
[INFO] [stdout] 13 |     resource: R,
[INFO] [stdout]    |     ^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 4.63s
[INFO] running `Command { std: "docker" "inspect" "f28c27ff52335d22c3f193683fa3978d36434f900b76c7bae19eeeb393a56f05", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "f28c27ff52335d22c3f193683fa3978d36434f900b76c7bae19eeeb393a56f05", kill_on_drop: false }`
[INFO] [stdout] f28c27ff52335d22c3f193683fa3978d36434f900b76c7bae19eeeb393a56f05
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] e82521fc51a45a39ad14e0a18f21530dc6706ed21b246781e04de700f37f8708
[INFO] running `Command { std: "docker" "start" "-a" "e82521fc51a45a39ad14e0a18f21530dc6706ed21b246781e04de700f37f8708", kill_on_drop: false }`
[INFO] [stdout] warning: unused variable: `resource`
[INFO] [stdout]   --> src/rbac/mod.rs:25:35
[INFO] [stdout]    |
[INFO] [stdout] 25 |     fn resource_roles<Res>(&self, resource: &Res) -> HashSet<Res::Role>
[INFO] [stdout]    |                                   ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `action`
[INFO] [stdout]   --> src/rbac/mod.rs:38:29
[INFO] [stdout]    |
[INFO] [stdout] 38 |     fn allowed_roles(&self, action: &Self::Action) -> HashSet<Role> {
[INFO] [stdout]    |                             ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `resource`
[INFO] [stdout]   --> src/lib.rs:35:25
[INFO] [stdout]    |
[INFO] [stdout] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stdout]    |                         ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `subject`
[INFO] [stdout]   --> src/lib.rs:35:41
[INFO] [stdout]    |
[INFO] [stdout] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stdout]    |                                         ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_subject`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `action`
[INFO] [stdout]   --> src/lib.rs:35:57
[INFO] [stdout]    |
[INFO] [stdout] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stdout]    |                                                         ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `resource` is never read
[INFO] [stdout]   --> src/lib.rs:13:5
[INFO] [stdout]    |
[INFO] [stdout] 12 | pub struct ProtectedResource<R> {
[INFO] [stdout]    |            ----------------- field in this struct
[INFO] [stdout] 13 |     resource: R,
[INFO] [stdout]    |     ^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling author v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused variable: `config_yaml`
[INFO] [stdout]  --> src/rbac/config.rs:5:13
[INFO] [stdout]   |
[INFO] [stdout] 5 |         let config_yaml = r#"
[INFO] [stdout]   |             ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_config_yaml`
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `resource`
[INFO] [stdout]   --> src/rbac/mod.rs:25:35
[INFO] [stdout]    |
[INFO] [stdout] 25 |     fn resource_roles<Res>(&self, resource: &Res) -> HashSet<Res::Role>
[INFO] [stdout]    |                                   ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `action`
[INFO] [stdout]   --> src/rbac/mod.rs:38:29
[INFO] [stdout]    |
[INFO] [stdout] 38 |     fn allowed_roles(&self, action: &Self::Action) -> HashSet<Role> {
[INFO] [stdout]    |                             ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `resource`
[INFO] [stdout]   --> src/lib.rs:35:25
[INFO] [stdout]    |
[INFO] [stdout] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stdout]    |                         ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `subject`
[INFO] [stdout]   --> src/lib.rs:35:41
[INFO] [stdout]    |
[INFO] [stdout] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stdout]    |                                         ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_subject`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `action`
[INFO] [stdout]   --> src/lib.rs:35:57
[INFO] [stdout]    |
[INFO] [stdout] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stdout]    |                                                         ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `resource` is never read
[INFO] [stdout]   --> src/lib.rs:13:5
[INFO] [stdout]    |
[INFO] [stdout] 12 | pub struct ProtectedResource<R> {
[INFO] [stdout]    |            ----------------- field in this struct
[INFO] [stdout] 13 |     resource: R,
[INFO] [stdout]    |     ^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.49s
[INFO] running `Command { std: "docker" "inspect" "e82521fc51a45a39ad14e0a18f21530dc6706ed21b246781e04de700f37f8708", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "e82521fc51a45a39ad14e0a18f21530dc6706ed21b246781e04de700f37f8708", kill_on_drop: false }`
[INFO] [stdout] e82521fc51a45a39ad14e0a18f21530dc6706ed21b246781e04de700f37f8708
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] fee47be400fa1bc3647f6f952d4abb0e4fb3a9a23634d5705c4fe309551e04fc
[INFO] running `Command { std: "docker" "start" "-a" "fee47be400fa1bc3647f6f952d4abb0e4fb3a9a23634d5705c4fe309551e04fc", kill_on_drop: false }`
[INFO] [stderr] warning: unused variable: `resource`
[INFO] [stderr]   --> src/rbac/mod.rs:25:35
[INFO] [stderr]    |
[INFO] [stderr] 25 |     fn resource_roles<Res>(&self, resource: &Res) -> HashSet<Res::Role>
[INFO] [stderr]    |                                   ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource`
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `action`
[INFO] [stderr]   --> src/rbac/mod.rs:38:29
[INFO] [stderr]    |
[INFO] [stderr] 38 |     fn allowed_roles(&self, action: &Self::Action) -> HashSet<Role> {
[INFO] [stderr]    |                             ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action`
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `resource`
[INFO] [stderr]   --> src/lib.rs:35:25
[INFO] [stderr]    |
[INFO] [stderr] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stderr]    |                         ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource`
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `subject`
[INFO] [stderr]   --> src/lib.rs:35:41
[INFO] [stderr]    |
[INFO] [stderr] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stderr]    |                                         ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_subject`
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `action`
[INFO] [stderr]   --> src/lib.rs:35:57
[INFO] [stderr]    |
[INFO] [stderr] 35 |     fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> {
[INFO] [stderr]    |                                                         ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action`
[INFO] [stderr] 
[INFO] [stderr] warning: field `resource` is never read
[INFO] [stderr]   --> src/lib.rs:13:5
[INFO] [stderr]    |
[INFO] [stderr] 12 | pub struct ProtectedResource<R> {
[INFO] [stderr]    |            ----------------- field in this struct
[INFO] [stderr] 13 |     resource: R,
[INFO] [stderr]    |     ^^^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `config_yaml`
[INFO] [stderr]  --> src/rbac/config.rs:5:13
[INFO] [stderr]   |
[INFO] [stderr] 5 |         let config_yaml = r#"
[INFO] [stderr]   |             ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_config_yaml`
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `resource`
[INFO] [stderr]   --> src/rbac/mod.rs:25:35
[INFO] [stderr]    |
[INFO] [stderr] 25 |     fn resource_roles<Res>(&self, resource: &Res) -> HashSet<Res::Role>
[INFO] [stderr]    |                                   ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource`
[INFO] [stderr] 
[INFO] [stderr] warning: `author` (lib) generated 6 warnings (run `cargo fix --lib -p author` to apply 5 suggestions)
[INFO] [stderr] warning: `author` (lib test) generated 7 warnings (5 duplicates) (run `cargo fix --lib -p author --tests` to apply 2 suggestions)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.07s
[INFO] [stderr]      Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/author-88697e23f6640f95)
[INFO] [stdout] 
[INFO] [stdout] running 1 test
[INFO] [stdout] test rbac::config::tests::load_from_yaml ... ok
[INFO] [stdout] 
[INFO] [stdout] test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
[INFO] [stdout] 
[INFO] [stderr]    Doc-tests author
[INFO] [stdout] 
[INFO] [stdout] running 0 tests
[INFO] [stdout] 
[INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
[INFO] [stdout] 
[INFO] running `Command { std: "docker" "inspect" "fee47be400fa1bc3647f6f952d4abb0e4fb3a9a23634d5705c4fe309551e04fc", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "fee47be400fa1bc3647f6f952d4abb0e4fb3a9a23634d5705c4fe309551e04fc", kill_on_drop: false }`
[INFO] [stdout] fee47be400fa1bc3647f6f952d4abb0e4fb3a9a23634d5705c4fe309551e04fc
