[INFO] fetching crate author 0.1.0... [INFO] testing author-0.1.0 against master#c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38 for pr-146098-7 [INFO] extracting crate author 0.1.0 into /workspace/builds/worker-0-tc1/source [INFO] started tweaking crates.io crate author 0.1.0 [INFO] finished tweaking crates.io crate author 0.1.0 [INFO] tweaked toml for crates.io crate author 0.1.0 written to /workspace/builds/worker-0-tc1/source/Cargo.toml [INFO] validating manifest of crates.io crate author 0.1.0 on toolchain c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate author 0.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] ca58c74d6a5499c0760d75c28ce7e2fe5774667b29d44aff8bf7a231d33d2833 [INFO] running `Command { std: "docker" "start" "-a" "ca58c74d6a5499c0760d75c28ce7e2fe5774667b29d44aff8bf7a231d33d2833", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "ca58c74d6a5499c0760d75c28ce7e2fe5774667b29d44aff8bf7a231d33d2833", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ca58c74d6a5499c0760d75c28ce7e2fe5774667b29d44aff8bf7a231d33d2833", kill_on_drop: false }` [INFO] [stdout] ca58c74d6a5499c0760d75c28ce7e2fe5774667b29d44aff8bf7a231d33d2833 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] f28c27ff52335d22c3f193683fa3978d36434f900b76c7bae19eeeb393a56f05 [INFO] running `Command { std: "docker" "start" "-a" "f28c27ff52335d22c3f193683fa3978d36434f900b76c7bae19eeeb393a56f05", kill_on_drop: false }` [INFO] [stderr] Compiling thiserror v2.0.11 [INFO] [stderr] Compiling syn v2.0.96 [INFO] [stderr] Compiling thiserror-impl v2.0.11 [INFO] [stderr] Compiling author v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `resource` [INFO] [stdout] --> src/rbac/mod.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | fn resource_roles(&self, resource: &Res) -> HashSet [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `action` [INFO] [stdout] --> src/rbac/mod.rs:38:29 [INFO] [stdout] | [INFO] [stdout] 38 | fn allowed_roles(&self, action: &Self::Action) -> HashSet { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `resource` [INFO] [stdout] --> src/lib.rs:35:25 [INFO] [stdout] | [INFO] [stdout] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `subject` [INFO] [stdout] --> src/lib.rs:35:41 [INFO] [stdout] | [INFO] [stdout] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_subject` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `action` [INFO] [stdout] --> src/lib.rs:35:57 [INFO] [stdout] | [INFO] [stdout] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `resource` is never read [INFO] [stdout] --> src/lib.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct ProtectedResource { [INFO] [stdout] | ----------------- field in this struct [INFO] [stdout] 13 | resource: R, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 4.63s [INFO] running `Command { std: "docker" "inspect" "f28c27ff52335d22c3f193683fa3978d36434f900b76c7bae19eeeb393a56f05", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "f28c27ff52335d22c3f193683fa3978d36434f900b76c7bae19eeeb393a56f05", kill_on_drop: false }` [INFO] [stdout] f28c27ff52335d22c3f193683fa3978d36434f900b76c7bae19eeeb393a56f05 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] e82521fc51a45a39ad14e0a18f21530dc6706ed21b246781e04de700f37f8708 [INFO] running `Command { std: "docker" "start" "-a" "e82521fc51a45a39ad14e0a18f21530dc6706ed21b246781e04de700f37f8708", kill_on_drop: false }` [INFO] [stdout] warning: unused variable: `resource` [INFO] [stdout] --> src/rbac/mod.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | fn resource_roles(&self, resource: &Res) -> HashSet [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `action` [INFO] [stdout] --> src/rbac/mod.rs:38:29 [INFO] [stdout] | [INFO] [stdout] 38 | fn allowed_roles(&self, action: &Self::Action) -> HashSet { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `resource` [INFO] [stdout] --> src/lib.rs:35:25 [INFO] [stdout] | [INFO] [stdout] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `subject` [INFO] [stdout] --> src/lib.rs:35:41 [INFO] [stdout] | [INFO] [stdout] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_subject` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `action` [INFO] [stdout] --> src/lib.rs:35:57 [INFO] [stdout] | [INFO] [stdout] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `resource` is never read [INFO] [stdout] --> src/lib.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct ProtectedResource { [INFO] [stdout] | ----------------- field in this struct [INFO] [stdout] 13 | resource: R, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling author v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `config_yaml` [INFO] [stdout] --> src/rbac/config.rs:5:13 [INFO] [stdout] | [INFO] [stdout] 5 | let config_yaml = r#" [INFO] [stdout] | ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_config_yaml` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `resource` [INFO] [stdout] --> src/rbac/mod.rs:25:35 [INFO] [stdout] | [INFO] [stdout] 25 | fn resource_roles(&self, resource: &Res) -> HashSet [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `action` [INFO] [stdout] --> src/rbac/mod.rs:38:29 [INFO] [stdout] | [INFO] [stdout] 38 | fn allowed_roles(&self, action: &Self::Action) -> HashSet { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `resource` [INFO] [stdout] --> src/lib.rs:35:25 [INFO] [stdout] | [INFO] [stdout] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `subject` [INFO] [stdout] --> src/lib.rs:35:41 [INFO] [stdout] | [INFO] [stdout] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_subject` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `action` [INFO] [stdout] --> src/lib.rs:35:57 [INFO] [stdout] | [INFO] [stdout] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stdout] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `resource` is never read [INFO] [stdout] --> src/lib.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct ProtectedResource { [INFO] [stdout] | ----------------- field in this struct [INFO] [stdout] 13 | resource: R, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.49s [INFO] running `Command { std: "docker" "inspect" "e82521fc51a45a39ad14e0a18f21530dc6706ed21b246781e04de700f37f8708", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "e82521fc51a45a39ad14e0a18f21530dc6706ed21b246781e04de700f37f8708", kill_on_drop: false }` [INFO] [stdout] e82521fc51a45a39ad14e0a18f21530dc6706ed21b246781e04de700f37f8708 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] fee47be400fa1bc3647f6f952d4abb0e4fb3a9a23634d5705c4fe309551e04fc [INFO] running `Command { std: "docker" "start" "-a" "fee47be400fa1bc3647f6f952d4abb0e4fb3a9a23634d5705c4fe309551e04fc", kill_on_drop: false }` [INFO] [stderr] warning: unused variable: `resource` [INFO] [stderr] --> src/rbac/mod.rs:25:35 [INFO] [stderr] | [INFO] [stderr] 25 | fn resource_roles(&self, resource: &Res) -> HashSet [INFO] [stderr] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `action` [INFO] [stderr] --> src/rbac/mod.rs:38:29 [INFO] [stderr] | [INFO] [stderr] 38 | fn allowed_roles(&self, action: &Self::Action) -> HashSet { [INFO] [stderr] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `resource` [INFO] [stderr] --> src/lib.rs:35:25 [INFO] [stderr] | [INFO] [stderr] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stderr] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `subject` [INFO] [stderr] --> src/lib.rs:35:41 [INFO] [stderr] | [INFO] [stderr] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stderr] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_subject` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `action` [INFO] [stderr] --> src/lib.rs:35:57 [INFO] [stderr] | [INFO] [stderr] 35 | fn authorise(&self, resource: &Res, subject: &Subj, action: &Res::Action) -> Result<(), Error> { [INFO] [stderr] | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_action` [INFO] [stderr] [INFO] [stderr] warning: field `resource` is never read [INFO] [stderr] --> src/lib.rs:13:5 [INFO] [stderr] | [INFO] [stderr] 12 | pub struct ProtectedResource { [INFO] [stderr] | ----------------- field in this struct [INFO] [stderr] 13 | resource: R, [INFO] [stderr] | ^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `config_yaml` [INFO] [stderr] --> src/rbac/config.rs:5:13 [INFO] [stderr] | [INFO] [stderr] 5 | let config_yaml = r#" [INFO] [stderr] | ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_config_yaml` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `resource` [INFO] [stderr] --> src/rbac/mod.rs:25:35 [INFO] [stderr] | [INFO] [stderr] 25 | fn resource_roles(&self, resource: &Res) -> HashSet [INFO] [stderr] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_resource` [INFO] [stderr] [INFO] [stderr] warning: `author` (lib) generated 6 warnings (run `cargo fix --lib -p author` to apply 5 suggestions) [INFO] [stderr] warning: `author` (lib test) generated 7 warnings (5 duplicates) (run `cargo fix --lib -p author --tests` to apply 2 suggestions) [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.07s [INFO] [stderr] Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/author-88697e23f6640f95) [INFO] [stdout] [INFO] [stdout] running 1 test [INFO] [stdout] test rbac::config::tests::load_from_yaml ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] [stderr] Doc-tests author [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "fee47be400fa1bc3647f6f952d4abb0e4fb3a9a23634d5705c4fe309551e04fc", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "fee47be400fa1bc3647f6f952d4abb0e4fb3a9a23634d5705c4fe309551e04fc", kill_on_drop: false }` [INFO] [stdout] fee47be400fa1bc3647f6f952d4abb0e4fb3a9a23634d5705c4fe309551e04fc