[INFO] fetching crate vulfy 0.1.0...
[INFO] checking vulfy-0.1.0 against master#779e19d8baa3e3625bd4fc5c85cbb2ad47b43155 for pr-147589-1
[INFO] extracting crate vulfy 0.1.0 into /workspace/builds/worker-3-tc1/source
[INFO] started tweaking crates.io crate vulfy 0.1.0
[INFO] finished tweaking crates.io crate vulfy 0.1.0
[INFO] tweaked toml for crates.io crate vulfy 0.1.0 written to /workspace/builds/worker-3-tc1/source/Cargo.toml
[INFO] validating manifest of crates.io crate vulfy 0.1.0 on toolchain 779e19d8baa3e3625bd4fc5c85cbb2ad47b43155
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate vulfy 0.1.0 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded tokio-cron-scheduler v0.10.2
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 8af23e8aca22296a181bfd3a3f215dd1ecbaed48d5899fe7af0dbf44efbea8bc
[INFO] running `Command { std: "docker" "start" "-a" "8af23e8aca22296a181bfd3a3f215dd1ecbaed48d5899fe7af0dbf44efbea8bc", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "8af23e8aca22296a181bfd3a3f215dd1ecbaed48d5899fe7af0dbf44efbea8bc", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "8af23e8aca22296a181bfd3a3f215dd1ecbaed48d5899fe7af0dbf44efbea8bc", kill_on_drop: false }`
[INFO] [stdout] 8af23e8aca22296a181bfd3a3f215dd1ecbaed48d5899fe7af0dbf44efbea8bc
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 32fa2bd475ab982d816ca44366353362fceb11ca5ed16215d62cec5ea5380fa2
[INFO] running `Command { std: "docker" "start" "-a" "32fa2bd475ab982d816ca44366353362fceb11ca5ed16215d62cec5ea5380fa2", kill_on_drop: false }`
[INFO] [stderr]    Compiling libc v0.2.174
[INFO] [stderr]     Checking parking_lot_core v0.9.11
[INFO] [stderr]     Checking signal-hook-registry v1.4.5
[INFO] [stderr]     Checking zerovec v0.11.2
[INFO] [stderr]    Compiling tracing-attributes v0.1.30
[INFO] [stderr]     Checking slab v0.4.10
[INFO] [stderr]     Checking hashbrown v0.15.4
[INFO] [stderr]     Checking nom v7.1.3
[INFO] [stderr]     Checking futures-util v0.3.31
[INFO] [stderr]     Checking chrono v0.4.41
[INFO] [stderr]     Checking parking_lot v0.12.4
[INFO] [stderr]     Checking tokio v1.45.1
[INFO] [stderr]     Checking indexmap v2.9.0
[INFO] [stderr]    Compiling jobserver v0.1.33
[INFO] [stderr]     Checking tinystr v0.8.1
[INFO] [stderr]    Compiling cc v1.2.27
[INFO] [stderr]     Checking potential_utf v0.1.2
[INFO] [stderr]     Checking tracing v0.1.41
[INFO] [stderr]     Checking icu_locale_core v2.0.0
[INFO] [stderr]    Compiling syn v1.0.109
[INFO] [stderr]     Checking icu_collections v2.0.0
[INFO] [stderr]     Checking serde_spanned v0.6.9
[INFO] [stderr]     Checking toml_datetime v0.6.11
[INFO] [stderr]    Compiling tokio-cron-scheduler v0.10.2
[INFO] [stderr]     Checking winnow v0.7.11
[INFO] [stderr]     Checking cron v0.12.1
[INFO] [stderr]     Checking clap_builder v4.5.40
[INFO] [stderr]    Compiling clap_derive v4.5.40
[INFO] [stderr]     Checking icu_provider v2.0.0
[INFO] [stderr]     Checking icu_properties v2.0.1
[INFO] [stderr]    Compiling openssl-sys v0.9.109
[INFO] [stderr]    Compiling libz-sys v1.1.22
[INFO] [stderr]    Compiling libssh2-sys v0.3.1
[INFO] [stderr]     Checking icu_normalizer v2.0.0
[INFO] [stderr]    Compiling libgit2-sys v0.16.2+1.7.2
[INFO] [stderr]    Compiling openssl v0.10.73
[INFO] [stderr]    Compiling native-tls v0.2.14
[INFO] [stderr]     Checking toml_edit v0.22.27
[INFO] [stderr]     Checking futures-executor v0.3.31
[INFO] [stderr]     Checking serde_json v1.0.140
[INFO] [stderr]     Checking idna_adapter v1.2.1
[INFO] [stderr]    Compiling num-derive v0.3.3
[INFO] [stderr]     Checking uuid v1.17.0
[INFO] [stderr]     Checking idna v1.0.3
[INFO] [stderr]     Checking url v2.5.4
[INFO] [stderr]    Compiling thiserror-impl v1.0.69
[INFO] [stderr]    Compiling async-stream-impl v0.3.6
[INFO] [stderr]     Checking encoding_rs v0.8.35
[INFO] [stderr]     Checking tracing-subscriber v0.3.19
[INFO] [stderr]     Checking async-stream v0.3.6
[INFO] [stderr]     Checking tokio-util v0.7.15
[INFO] [stderr]     Checking tokio-stream v0.1.17
[INFO] [stderr]     Checking thiserror v1.0.69
[INFO] [stderr]     Checking futures v0.3.31
[INFO] [stderr]     Checking h2 v0.3.26
[INFO] [stderr]     Checking clap v4.5.40
[INFO] [stderr]     Checking quick-xml v0.36.2
[INFO] [stderr]     Checking toml v0.8.23
[INFO] [stderr]     Checking tempfile v3.20.0
[INFO] [stderr]     Checking tokio-test v0.4.4
[INFO] [stderr]     Checking hyper v0.14.32
[INFO] [stderr]     Checking tokio-native-tls v0.3.1
[INFO] [stderr]     Checking hyper-tls v0.5.0
[INFO] [stderr]     Checking reqwest v0.11.27
[INFO] [stderr]     Checking git2 v0.18.3
[INFO] [stderr]     Checking vulfy v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: variant `PackageParsing` is never constructed
[INFO] [stdout]   --> src/error.rs:29:5
[INFO] [stdout]    |
[INFO] [stdout]  6 | pub enum VulfyError {
[INFO] [stdout]    |          ---------- variant in this enum
[INFO] [stdout] ...
[INFO] [stdout] 29 |     PackageParsing { message: String },
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used
[INFO] [stdout]    --> src/scanner/mod.rs:284:14
[INFO] [stdout]     |
[INFO] [stdout]  97 | impl Scanner {
[INFO] [stdout]     | ------------ methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 284 |     async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 315 |     async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `matches` is never used
[INFO] [stdout]    --> src/automation/mod.rs:221:12
[INFO] [stdout]     |
[INFO] [stdout] 219 | impl ScanPolicy {
[INFO] [stdout]     | --------------- method in this implementation
[INFO] [stdout] 220 |     /// Check if a vulnerability matches this policy
[INFO] [stdout] 221 |     pub fn matches(&self, vulnerability: &Vulnerability) -> bool {
[INFO] [stdout]     |            ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `is_running` is never used
[INFO] [stdout]    --> src/automation/scheduler.rs:146:18
[INFO] [stdout]     |
[INFO] [stdout]  24 | impl AutomationScheduler {
[INFO] [stdout]     | ------------------------ method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 146 |     pub async fn is_running(&self) -> bool {
[INFO] [stdout]     |                  ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read
[INFO] [stdout]   --> src/automation/policy.rs:13:9
[INFO] [stdout]    |
[INFO] [stdout] 12 | pub struct PolicyMatch {
[INFO] [stdout]    |            ----------- fields in this struct
[INFO] [stdout] 13 |     pub policy_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^
[INFO] [stdout] 14 |     pub vulnerability_id: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^
[INFO] [stdout] 15 |     pub package_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^
[INFO] [stdout] 16 |     pub actions: PolicyActions,
[INFO] [stdout]    |         ^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read
[INFO] [stdout]   --> src/automation/policy.rs:22:9
[INFO] [stdout]    |
[INFO] [stdout] 20 | pub struct FilteredScanResult {
[INFO] [stdout]    |            ------------------ fields in this struct
[INFO] [stdout] 21 |     pub scan_result: ScanResult,
[INFO] [stdout] 22 |     pub policy_matches: Vec<PolicyMatch>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 23 |     pub ignored_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 24 |     pub prioritized_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `get_policy_stats` is never used
[INFO] [stdout]    --> src/automation/policy.rs:291:12
[INFO] [stdout]     |
[INFO] [stdout]  27 | impl PolicyEngine {
[INFO] [stdout]     | ----------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 291 |     pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: struct `PolicyStats` is never constructed
[INFO] [stdout]    --> src/automation/policy.rs:315:12
[INFO] [stdout]     |
[INFO] [stdout] 315 | pub struct PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variant `PackageParsing` is never constructed
[INFO] [stdout]   --> src/error.rs:29:5
[INFO] [stdout]    |
[INFO] [stdout]  6 | pub enum VulfyError {
[INFO] [stdout]    |          ---------- variant in this enum
[INFO] [stdout] ...
[INFO] [stdout] 29 |     PackageParsing { message: String },
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used
[INFO] [stdout]    --> src/scanner/mod.rs:284:14
[INFO] [stdout]     |
[INFO] [stdout]  97 | impl Scanner {
[INFO] [stdout]     | ------------ methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 284 |     async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 315 |     async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult<Vec<Package>> {
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `matches` is never used
[INFO] [stdout]    --> src/automation/mod.rs:221:12
[INFO] [stdout]     |
[INFO] [stdout] 219 | impl ScanPolicy {
[INFO] [stdout]     | --------------- method in this implementation
[INFO] [stdout] 220 |     /// Check if a vulnerability matches this policy
[INFO] [stdout] 221 |     pub fn matches(&self, vulnerability: &Vulnerability) -> bool {
[INFO] [stdout]     |            ^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `is_running` is never used
[INFO] [stdout]    --> src/automation/scheduler.rs:146:18
[INFO] [stdout]     |
[INFO] [stdout]  24 | impl AutomationScheduler {
[INFO] [stdout]     | ------------------------ method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 146 |     pub async fn is_running(&self) -> bool {
[INFO] [stdout]     |                  ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read
[INFO] [stdout]   --> src/automation/policy.rs:13:9
[INFO] [stdout]    |
[INFO] [stdout] 12 | pub struct PolicyMatch {
[INFO] [stdout]    |            ----------- fields in this struct
[INFO] [stdout] 13 |     pub policy_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^
[INFO] [stdout] 14 |     pub vulnerability_id: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^
[INFO] [stdout] 15 |     pub package_name: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^
[INFO] [stdout] 16 |     pub actions: PolicyActions,
[INFO] [stdout]    |         ^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read
[INFO] [stdout]   --> src/automation/policy.rs:22:9
[INFO] [stdout]    |
[INFO] [stdout] 20 | pub struct FilteredScanResult {
[INFO] [stdout]    |            ------------------ fields in this struct
[INFO] [stdout] 21 |     pub scan_result: ScanResult,
[INFO] [stdout] 22 |     pub policy_matches: Vec<PolicyMatch>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 23 |     pub ignored_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 24 |     pub prioritized_vulnerabilities: Vec<String>,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `get_policy_stats` is never used
[INFO] [stdout]    --> src/automation/policy.rs:291:12
[INFO] [stdout]     |
[INFO] [stdout]  27 | impl PolicyEngine {
[INFO] [stdout]     | ----------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 291 |     pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: struct `PolicyStats` is never constructed
[INFO] [stdout]    --> src/automation/policy.rs:315:12
[INFO] [stdout]     |
[INFO] [stdout] 315 | pub struct PolicyStats {
[INFO] [stdout]     |            ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 1m 39s
[INFO] running `Command { std: "docker" "inspect" "32fa2bd475ab982d816ca44366353362fceb11ca5ed16215d62cec5ea5380fa2", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "32fa2bd475ab982d816ca44366353362fceb11ca5ed16215d62cec5ea5380fa2", kill_on_drop: false }`
[INFO] [stdout] 32fa2bd475ab982d816ca44366353362fceb11ca5ed16215d62cec5ea5380fa2
