[INFO] cloning repository https://github.com/MindPatch/Vulfy [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/MindPatch/Vulfy" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FMindPatch%2FVulfy", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FMindPatch%2FVulfy'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 2c5a4bf587f47ea57b0491ca15f5a0b25efb35a5 [INFO] checking MindPatch/Vulfy against master#779e19d8baa3e3625bd4fc5c85cbb2ad47b43155 for pr-147589-1 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FMindPatch%2FVulfy" "/workspace/builds/worker-7-tc1/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-7-tc1/source'... [INFO] [stderr] done. [INFO] started tweaking git repo https://github.com/MindPatch/Vulfy [INFO] finished tweaking git repo https://github.com/MindPatch/Vulfy [INFO] tweaked toml for git repo https://github.com/MindPatch/Vulfy written to /workspace/builds/worker-7-tc1/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/MindPatch/Vulfy on toolchain 779e19d8baa3e3625bd4fc5c85cbb2ad47b43155 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/MindPatch/Vulfy already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded cron v0.12.1 [INFO] [stderr] Downloaded tokio-cron-scheduler v0.10.2 [INFO] [stderr] Downloaded bumpalo v3.18.1 [INFO] [stderr] Downloaded git2 v0.18.3 [INFO] [stderr] Downloaded libssh2-sys v0.3.1 [INFO] [stderr] Downloaded libz-sys v1.1.22 [INFO] [stderr] Downloaded libgit2-sys v0.16.2+1.7.2 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 462cac3a6bf2483a92b37226379f89c80ca4bb8442d77ef5d11f6503668d1b24 [INFO] running `Command { std: "docker" "start" "-a" "462cac3a6bf2483a92b37226379f89c80ca4bb8442d77ef5d11f6503668d1b24", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "462cac3a6bf2483a92b37226379f89c80ca4bb8442d77ef5d11f6503668d1b24", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "462cac3a6bf2483a92b37226379f89c80ca4bb8442d77ef5d11f6503668d1b24", kill_on_drop: false }` [INFO] [stdout] 462cac3a6bf2483a92b37226379f89c80ca4bb8442d77ef5d11f6503668d1b24 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+779e19d8baa3e3625bd4fc5c85cbb2ad47b43155" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 7d072b705474f0a996059d1dd69c9d040f8501f963f1f38b8b442a3168bf9f71 [INFO] running `Command { std: "docker" "start" "-a" "7d072b705474f0a996059d1dd69c9d040f8501f963f1f38b8b442a3168bf9f71", kill_on_drop: false }` [INFO] [stderr] Compiling syn v2.0.104 [INFO] [stderr] Compiling libc v0.2.174 [INFO] [stderr] Checking cfg-if v1.0.1 [INFO] [stderr] Checking smallvec v1.15.1 [INFO] [stderr] Checking bitflags v2.9.1 [INFO] [stderr] Checking futures-io v0.3.31 [INFO] [stderr] Checking log v0.4.27 [INFO] [stderr] Checking slab v0.4.10 [INFO] [stderr] Checking hashbrown v0.15.4 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Checking anstyle-parse v0.2.7 [INFO] [stderr] Checking aho-corasick v1.1.3 [INFO] [stderr] Checking anstyle v1.0.11 [INFO] [stderr] Checking colorchoice v1.0.4 [INFO] [stderr] Checking anstyle-query v1.1.3 [INFO] [stderr] Checking regex-automata v0.1.10 [INFO] [stderr] Checking clap_lex v0.7.5 [INFO] [stderr] Checking toml_write v0.1.2 [INFO] [stderr] Compiling tokio-cron-scheduler v0.10.2 [INFO] [stderr] Compiling rustix v1.0.7 [INFO] [stderr] Checking overload v0.1.1 [INFO] [stderr] Checking winnow v0.7.11 [INFO] [stderr] Checking anstream v0.6.19 [INFO] [stderr] Compiling anyhow v1.0.98 [INFO] [stderr] Checking tracing-log v0.2.0 [INFO] [stderr] Checking nu-ansi-term v0.46.0 [INFO] [stderr] Checking encoding_rs v0.8.35 [INFO] [stderr] Checking thread_local v1.1.9 [INFO] [stderr] Checking linux-raw-sys v0.9.4 [INFO] [stderr] Checking indexmap v2.9.0 [INFO] [stderr] Checking same-file v1.0.6 [INFO] [stderr] Checking clap_builder v4.5.40 [INFO] [stderr] Checking walkdir v2.5.0 [INFO] [stderr] Checking quick-xml v0.36.2 [INFO] [stderr] Checking fastrand v2.3.0 [INFO] [stderr] Checking glob v0.3.2 [INFO] [stderr] Checking matchers v0.1.0 [INFO] [stderr] Checking parking_lot_core v0.9.11 [INFO] [stderr] Checking socket2 v0.5.10 [INFO] [stderr] Checking mio v1.0.4 [INFO] [stderr] Checking signal-hook-registry v1.4.5 [INFO] [stderr] Checking getrandom v0.3.3 [INFO] [stderr] Checking regex-automata v0.4.9 [INFO] [stderr] Checking parking_lot v0.12.4 [INFO] [stderr] Compiling jobserver v0.1.33 [INFO] [stderr] Compiling num-derive v0.3.3 [INFO] [stderr] Compiling cc v1.2.27 [INFO] [stderr] Checking tempfile v3.20.0 [INFO] [stderr] Compiling openssl-sys v0.9.109 [INFO] [stderr] Compiling libz-sys v1.1.22 [INFO] [stderr] Compiling libssh2-sys v0.3.1 [INFO] [stderr] Compiling libgit2-sys v0.16.2+1.7.2 [INFO] [stderr] Checking regex v1.11.1 [INFO] [stderr] Compiling openssl v0.10.73 [INFO] [stderr] Compiling native-tls v0.2.14 [INFO] [stderr] Compiling synstructure v0.13.2 [INFO] [stderr] Compiling zerofrom-derive v0.1.6 [INFO] [stderr] Compiling yoke-derive v0.8.0 [INFO] [stderr] Compiling zerovec-derive v0.11.1 [INFO] [stderr] Compiling displaydoc v0.2.5 [INFO] [stderr] Compiling serde_derive v1.0.219 [INFO] [stderr] Compiling tokio-macros v2.5.0 [INFO] [stderr] Compiling futures-macro v0.3.31 [INFO] [stderr] Compiling tracing-attributes v0.1.30 [INFO] [stderr] Compiling openssl-macros v0.1.1 [INFO] [stderr] Compiling async-stream-impl v0.3.6 [INFO] [stderr] Compiling thiserror-impl v1.0.69 [INFO] [stderr] Compiling clap_derive v4.5.40 [INFO] [stderr] Checking async-stream v0.3.6 [INFO] [stderr] Checking tokio v1.45.1 [INFO] [stderr] Checking futures-util v0.3.31 [INFO] [stderr] Checking tracing v0.1.41 [INFO] [stderr] Checking thiserror v1.0.69 [INFO] [stderr] Checking tracing-subscriber v0.3.19 [INFO] [stderr] Checking zerofrom v0.1.6 [INFO] [stderr] Checking yoke v0.8.0 [INFO] [stderr] Checking zerovec v0.11.2 [INFO] [stderr] Checking zerotrie v0.2.2 [INFO] [stderr] Checking clap v4.5.40 [INFO] [stderr] Checking tinystr v0.8.1 [INFO] [stderr] Checking potential_utf v0.1.2 [INFO] [stderr] Checking serde v1.0.219 [INFO] [stderr] Checking icu_collections v2.0.0 [INFO] [stderr] Checking icu_locale_core v2.0.0 [INFO] [stderr] Checking icu_provider v2.0.0 [INFO] [stderr] Checking icu_properties v2.0.1 [INFO] [stderr] Checking icu_normalizer v2.0.0 [INFO] [stderr] Checking futures-executor v0.3.31 [INFO] [stderr] Checking idna_adapter v1.2.1 [INFO] [stderr] Checking futures v0.3.31 [INFO] [stderr] Checking idna v1.0.3 [INFO] [stderr] Checking url v2.5.4 [INFO] [stderr] Checking git2 v0.18.3 [INFO] [stderr] Checking tokio-util v0.7.15 [INFO] [stderr] Checking tokio-native-tls v0.3.1 [INFO] [stderr] Checking tokio-stream v0.1.17 [INFO] [stderr] Checking tokio-test v0.4.4 [INFO] [stderr] Checking h2 v0.3.26 [INFO] [stderr] Checking chrono v0.4.41 [INFO] [stderr] Checking serde_spanned v0.6.9 [INFO] [stderr] Checking toml_datetime v0.6.11 [INFO] [stderr] Checking serde_urlencoded v0.7.1 [INFO] [stderr] Checking serde_json v1.0.140 [INFO] [stderr] Checking uuid v1.17.0 [INFO] [stderr] Checking toml_edit v0.22.27 [INFO] [stderr] Checking cron v0.12.1 [INFO] [stderr] Checking toml v0.8.23 [INFO] [stderr] Checking hyper v0.14.32 [INFO] [stderr] Checking hyper-tls v0.5.0 [INFO] [stderr] Checking reqwest v0.11.27 [INFO] [stderr] Checking vulfy v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variants `PackageParsing` and `VersionParsing` are never constructed [INFO] [stdout] --> src/error.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 6 | pub enum VulfyError { [INFO] [stdout] | ---------- variants in this enum [INFO] [stdout] ... [INFO] [stdout] 29 | PackageParsing { message: String }, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 32 | VersionParsing { message: String }, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used [INFO] [stdout] --> src/scanner/mod.rs:284:14 [INFO] [stdout] | [INFO] [stdout] 97 | impl Scanner { [INFO] [stdout] | ------------ methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 284 | async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 315 | async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `format_json_report` is never used [INFO] [stdout] --> src/reporter.rs:252:14 [INFO] [stdout] | [INFO] [stdout] 12 | impl Reporter { [INFO] [stdout] | ------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 252 | async fn format_json_report(&self, scan_result: &ScanResult) -> VulfyResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `matches` is never used [INFO] [stdout] --> src/automation/mod.rs:226:12 [INFO] [stdout] | [INFO] [stdout] 224 | impl ScanPolicy { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] 225 | /// Check if a vulnerability matches this policy [INFO] [stdout] 226 | pub fn matches(&self, vulnerability: &Vulnerability) -> bool { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `is_running` is never used [INFO] [stdout] --> src/automation/scheduler.rs:146:18 [INFO] [stdout] | [INFO] [stdout] 24 | impl AutomationScheduler { [INFO] [stdout] | ------------------------ method in this implementation [INFO] [stdout] ... [INFO] [stdout] 146 | pub async fn is_running(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read [INFO] [stdout] --> src/automation/policy.rs:13:9 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct PolicyMatch { [INFO] [stdout] | ----------- fields in this struct [INFO] [stdout] 13 | pub policy_name: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 14 | pub vulnerability_id: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] 15 | pub package_name: String, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] 16 | pub actions: PolicyActions, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read [INFO] [stdout] --> src/automation/policy.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct FilteredScanResult { [INFO] [stdout] | ------------------ fields in this struct [INFO] [stdout] 21 | pub scan_result: ScanResult, [INFO] [stdout] 22 | pub policy_matches: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] 23 | pub ignored_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] 24 | pub prioritized_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `get_policy_stats` is never used [INFO] [stdout] --> src/automation/policy.rs:436:12 [INFO] [stdout] | [INFO] [stdout] 27 | impl PolicyEngine { [INFO] [stdout] | ----------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 436 | pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `PolicyStats` is never constructed [INFO] [stdout] --> src/automation/policy.rs:460:12 [INFO] [stdout] | [INFO] [stdout] 460 | pub struct PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variants `PackageParsing` and `VersionParsing` are never constructed [INFO] [stdout] --> src/error.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 6 | pub enum VulfyError { [INFO] [stdout] | ---------- variants in this enum [INFO] [stdout] ... [INFO] [stdout] 29 | PackageParsing { message: String }, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 32 | VersionParsing { message: String }, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used [INFO] [stdout] --> src/scanner/mod.rs:284:14 [INFO] [stdout] | [INFO] [stdout] 97 | impl Scanner { [INFO] [stdout] | ------------ methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 284 | async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 315 | async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `format_json_report` is never used [INFO] [stdout] --> src/reporter.rs:252:14 [INFO] [stdout] | [INFO] [stdout] 12 | impl Reporter { [INFO] [stdout] | ------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 252 | async fn format_json_report(&self, scan_result: &ScanResult) -> VulfyResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `matches` is never used [INFO] [stdout] --> src/automation/mod.rs:226:12 [INFO] [stdout] | [INFO] [stdout] 224 | impl ScanPolicy { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] 225 | /// Check if a vulnerability matches this policy [INFO] [stdout] 226 | pub fn matches(&self, vulnerability: &Vulnerability) -> bool { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `is_running` is never used [INFO] [stdout] --> src/automation/scheduler.rs:146:18 [INFO] [stdout] | [INFO] [stdout] 24 | impl AutomationScheduler { [INFO] [stdout] | ------------------------ method in this implementation [INFO] [stdout] ... [INFO] [stdout] 146 | pub async fn is_running(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read [INFO] [stdout] --> src/automation/policy.rs:13:9 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct PolicyMatch { [INFO] [stdout] | ----------- fields in this struct [INFO] [stdout] 13 | pub policy_name: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 14 | pub vulnerability_id: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] 15 | pub package_name: String, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] 16 | pub actions: PolicyActions, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read [INFO] [stdout] --> src/automation/policy.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct FilteredScanResult { [INFO] [stdout] | ------------------ fields in this struct [INFO] [stdout] 21 | pub scan_result: ScanResult, [INFO] [stdout] 22 | pub policy_matches: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] 23 | pub ignored_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] 24 | pub prioritized_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `get_policy_stats` is never used [INFO] [stdout] --> src/automation/policy.rs:436:12 [INFO] [stdout] | [INFO] [stdout] 27 | impl PolicyEngine { [INFO] [stdout] | ----------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 436 | pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `PolicyStats` is never constructed [INFO] [stdout] --> src/automation/policy.rs:460:12 [INFO] [stdout] | [INFO] [stdout] 460 | pub struct PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 58.30s [INFO] running `Command { std: "docker" "inspect" "7d072b705474f0a996059d1dd69c9d040f8501f963f1f38b8b442a3168bf9f71", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "7d072b705474f0a996059d1dd69c9d040f8501f963f1f38b8b442a3168bf9f71", kill_on_drop: false }` [INFO] [stdout] 7d072b705474f0a996059d1dd69c9d040f8501f963f1f38b8b442a3168bf9f71