[INFO] fetching crate v_authorization 0.5.1...
[INFO] testing v_authorization-0.5.1 against master#0d162b25edd5bf0dba9a22e83b614f1113e90474 for pr-150681
[INFO] extracting crate v_authorization 0.5.1 into /workspace/builds/worker-5-tc1/source
[INFO] started tweaking crates.io crate v_authorization 0.5.1
[INFO] removed 0 missing tests
[INFO] finished tweaking crates.io crate v_authorization 0.5.1
[INFO] tweaked toml for crates.io crate v_authorization 0.5.1 written to /workspace/builds/worker-5-tc1/source/Cargo.toml
[INFO] validating manifest of crates.io crate v_authorization 0.5.1 on toolchain 0d162b25edd5bf0dba9a22e83b614f1113e90474
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate v_authorization 0.5.1 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded string-builder v0.2.0
[INFO] [stderr]   Downloaded parse-zoneinfo v0.3.1
[INFO] [stderr]   Downloaded cc v1.2.29
[INFO] [stderr]   Downloaded chrono-tz v0.5.3
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] df294fa421eb3286cc53ee2369fc567d7a8130027d6c336bb6845ab4e4dc47dc
[INFO] running `Command { std: "docker" "start" "-a" "df294fa421eb3286cc53ee2369fc567d7a8130027d6c336bb6845ab4e4dc47dc", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "df294fa421eb3286cc53ee2369fc567d7a8130027d6c336bb6845ab4e4dc47dc", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "df294fa421eb3286cc53ee2369fc567d7a8130027d6c336bb6845ab4e4dc47dc", kill_on_drop: false }`
[INFO] [stdout] df294fa421eb3286cc53ee2369fc567d7a8130027d6c336bb6845ab4e4dc47dc
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] b24467de449fdd89cab2fd21fbd1abfd855c6e3ac8339d0d0082cb30fc04bcd7
[INFO] running `Command { std: "docker" "start" "-a" "b24467de449fdd89cab2fd21fbd1abfd855c6e3ac8339d0d0082cb30fc04bcd7", kill_on_drop: false }`
[INFO] [stderr]    Compiling regex-syntax v0.8.5
[INFO] [stderr]    Compiling num-traits v0.2.19
[INFO] [stderr]    Compiling serde v1.0.219
[INFO] [stderr]    Compiling iana-time-zone v0.1.63
[INFO] [stderr]    Compiling string-builder v0.2.0
[INFO] [stderr]    Compiling chrono v0.4.41
[INFO] [stderr]    Compiling regex-automata v0.4.9
[INFO] [stderr]    Compiling regex v1.11.1
[INFO] [stderr]    Compiling serde_json v1.0.140
[INFO] [stderr]    Compiling parse-zoneinfo v0.3.1
[INFO] [stderr]    Compiling chrono-tz v0.5.3
[INFO] [stderr]    Compiling v_authorization v0.5.1 (/opt/rustwide/workdir)
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 11.16s
[INFO] running `Command { std: "docker" "inspect" "b24467de449fdd89cab2fd21fbd1abfd855c6e3ac8339d0d0082cb30fc04bcd7", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "b24467de449fdd89cab2fd21fbd1abfd855c6e3ac8339d0d0082cb30fc04bcd7", kill_on_drop: false }`
[INFO] [stdout] b24467de449fdd89cab2fd21fbd1abfd855c6e3ac8339d0d0082cb30fc04bcd7
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 046a8879db28a5ce11718a25d1b19d47f6d3900155407dd824e0a80bd59a6964
[INFO] running `Command { std: "docker" "start" "-a" "046a8879db28a5ce11718a25d1b19d47f6d3900155407dd824e0a80bd59a6964", kill_on_drop: false }`
[INFO] [stderr]    Compiling v_authorization v0.5.1 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `CREATE`
[INFO] [stdout]   --> tests/permission_filters.rs:11:41
[INFO] [stdout]    |
[INFO] [stdout] 11 | use common::{MockStorage, READ, UPDATE, CREATE, DELETE, FULL_ACCESS};
[INFO] [stdout]    |                                         ^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `original_filters`
[INFO] [stdout]    --> tests/common/mod.rs:189:13
[INFO] [stdout]     |
[INFO] [stdout] 189 |         let original_filters = self.filters.clone();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `filter_resource` is never read
[INFO] [stdout]   --> tests/common/mod.rs:29:9
[INFO] [stdout]    |
[INFO] [stdout] 27 | pub struct PermissionFilter {
[INFO] [stdout]    |            ---------------- field in this struct
[INFO] [stdout] 28 |     pub resource: String,
[INFO] [stdout] 29 |     pub filter_resource: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used
[INFO] [stdout]   --> tests/common/mod.rs:44:12
[INFO] [stdout]    |
[INFO] [stdout] 34 | impl MockStorage {
[INFO] [stdout]    | ---------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 44 |     pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 55 |     pub fn delete_permission_filter(&mut self, filter_id: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 62 |     pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `original_filters`
[INFO] [stdout]    --> tests/common/mod.rs:189:13
[INFO] [stdout]     |
[INFO] [stdout] 189 |         let original_filters = self.filters.clone();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `filter_resource` is never read
[INFO] [stdout]   --> tests/common/mod.rs:29:9
[INFO] [stdout]    |
[INFO] [stdout] 27 | pub struct PermissionFilter {
[INFO] [stdout]    |            ---------------- field in this struct
[INFO] [stdout] 28 |     pub resource: String,
[INFO] [stdout] 29 |     pub filter_resource: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used
[INFO] [stdout]   --> tests/common/mod.rs:44:12
[INFO] [stdout]    |
[INFO] [stdout] 34 | impl MockStorage {
[INFO] [stdout]    | ---------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 44 |     pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 55 |     pub fn delete_permission_filter(&mut self, filter_id: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 62 |     pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `original_filters`
[INFO] [stdout]    --> tests/common/mod.rs:189:13
[INFO] [stdout]     |
[INFO] [stdout] 189 |         let original_filters = self.filters.clone();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `original_filters`
[INFO] [stdout]    --> tests/common/mod.rs:189:13
[INFO] [stdout]     |
[INFO] [stdout] 189 |         let original_filters = self.filters.clone();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `original_filters`
[INFO] [stdout]    --> tests/common/mod.rs:189:13
[INFO] [stdout]     |
[INFO] [stdout] 189 |         let original_filters = self.filters.clone();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `original_filters`
[INFO] [stdout]    --> tests/common/mod.rs:189:13
[INFO] [stdout]     |
[INFO] [stdout] 189 |         let original_filters = self.filters.clone();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `filter_resource` is never read
[INFO] [stdout]   --> tests/common/mod.rs:29:9
[INFO] [stdout]    |
[INFO] [stdout] 27 | pub struct PermissionFilter {
[INFO] [stdout]    |            ---------------- field in this struct
[INFO] [stdout] 28 |     pub resource: String,
[INFO] [stdout] 29 |     pub filter_resource: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `filter_resource` is never read
[INFO] [stdout]   --> tests/common/mod.rs:29:9
[INFO] [stdout]    |
[INFO] [stdout] 27 | pub struct PermissionFilter {
[INFO] [stdout]    |            ---------------- field in this struct
[INFO] [stdout] 28 |     pub resource: String,
[INFO] [stdout] 29 |     pub filter_resource: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used
[INFO] [stdout]   --> tests/common/mod.rs:44:12
[INFO] [stdout]    |
[INFO] [stdout] 34 | impl MockStorage {
[INFO] [stdout]    | ---------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 44 |     pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 55 |     pub fn delete_permission_filter(&mut self, filter_id: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 62 |     pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used
[INFO] [stdout]   --> tests/common/mod.rs:44:12
[INFO] [stdout]    |
[INFO] [stdout] 34 | impl MockStorage {
[INFO] [stdout]    | ---------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 44 |     pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 55 |     pub fn delete_permission_filter(&mut self, filter_id: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 62 |     pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `original_filters`
[INFO] [stdout]    --> tests/common/mod.rs:189:13
[INFO] [stdout]     |
[INFO] [stdout] 189 |         let original_filters = self.filters.clone();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `original_filters`
[INFO] [stdout]    --> tests/common/mod.rs:189:13
[INFO] [stdout]     |
[INFO] [stdout] 189 |         let original_filters = self.filters.clone();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `filter_resource` is never read
[INFO] [stdout]   --> tests/common/mod.rs:29:9
[INFO] [stdout]    |
[INFO] [stdout] 27 | pub struct PermissionFilter {
[INFO] [stdout]    |            ---------------- field in this struct
[INFO] [stdout] 28 |     pub resource: String,
[INFO] [stdout] 29 |     pub filter_resource: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used
[INFO] [stdout]   --> tests/common/mod.rs:44:12
[INFO] [stdout]    |
[INFO] [stdout] 34 | impl MockStorage {
[INFO] [stdout]    | ---------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 44 |     pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 55 |     pub fn delete_permission_filter(&mut self, filter_id: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 62 |     pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `filter_resource` is never read
[INFO] [stdout]   --> tests/common/mod.rs:29:9
[INFO] [stdout]    |
[INFO] [stdout] 27 | pub struct PermissionFilter {
[INFO] [stdout]    |            ---------------- field in this struct
[INFO] [stdout] 28 |     pub resource: String,
[INFO] [stdout] 29 |     pub filter_resource: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used
[INFO] [stdout]   --> tests/common/mod.rs:44:12
[INFO] [stdout]    |
[INFO] [stdout] 34 | impl MockStorage {
[INFO] [stdout]    | ---------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 44 |     pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 55 |     pub fn delete_permission_filter(&mut self, filter_id: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 62 |     pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `filter_resource` is never read
[INFO] [stdout]   --> tests/common/mod.rs:29:9
[INFO] [stdout]    |
[INFO] [stdout] 27 | pub struct PermissionFilter {
[INFO] [stdout]    |            ---------------- field in this struct
[INFO] [stdout] 28 |     pub resource: String,
[INFO] [stdout] 29 |     pub filter_resource: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `admin`
[INFO] [stdout]   --> tests/permission_filters.rs:22:9
[INFO] [stdout]    |
[INFO] [stdout] 22 |     let admin = MockStorage::get_admin_ticket();
[INFO] [stdout]    |         ^^^^^ help: if this is intentional, prefix it with an underscore: `_admin`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `filter_resource` is never read
[INFO] [stdout]   --> tests/common/mod.rs:29:9
[INFO] [stdout]    |
[INFO] [stdout] 27 | pub struct PermissionFilter {
[INFO] [stdout]    |            ---------------- field in this struct
[INFO] [stdout] 28 |     pub resource: String,
[INFO] [stdout] 29 |     pub filter_resource: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `delete_permission` is never used
[INFO] [stdout]   --> tests/common/mod.rs:90:12
[INFO] [stdout]    |
[INFO] [stdout] 34 | impl MockStorage {
[INFO] [stdout]    | ---------------- method in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `original_filters`
[INFO] [stdout]    --> tests/common/mod.rs:189:13
[INFO] [stdout]     |
[INFO] [stdout] 189 |         let original_filters = self.filters.clone();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `group`
[INFO] [stdout]    --> tests/authorize_obj_group_tests.rs:185:16
[INFO] [stdout]     |
[INFO] [stdout] 185 |     let (_acl, group, _info, mut trace) = create_test_trace();
[INFO] [stdout]     |                ^^^^^ help: if this is intentional, prefix it with an underscore: `_group`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> tests/authorize_obj_group_tests.rs:345:9
[INFO] [stdout]     |
[INFO] [stdout] 345 |     let mut storage = MockStorage::new();
[INFO] [stdout]     |         ----^^^^^^^
[INFO] [stdout]     |         |
[INFO] [stdout]     |         help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `storage`
[INFO] [stdout]    --> tests/authorize_obj_group_tests.rs:345:9
[INFO] [stdout]     |
[INFO] [stdout] 345 |     let mut storage = MockStorage::new();
[INFO] [stdout]     |         ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_storage`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `info`
[INFO] [stdout]    --> tests/authorize_obj_group_tests.rs:551:24
[INFO] [stdout]     |
[INFO] [stdout] 551 |     let (_acl, _group, info, mut trace) = create_test_trace();
[INFO] [stdout]     |                        ^^^^ help: if this is intentional, prefix it with an underscore: `_info`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `acl`
[INFO] [stdout]    --> tests/authorize_obj_group_tests.rs:601:10
[INFO] [stdout]     |
[INFO] [stdout] 601 |     let (acl, _group, _info, mut trace) = create_test_trace();
[INFO] [stdout]     |          ^^^ help: if this is intentional, prefix it with an underscore: `_acl`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `info`
[INFO] [stdout]    --> tests/authorize_obj_group_tests.rs:831:24
[INFO] [stdout]     |
[INFO] [stdout] 831 |     let (_acl, _group, info, mut trace) = create_test_trace();
[INFO] [stdout]     |                        ^^^^ help: if this is intentional, prefix it with an underscore: `_info`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `filter_resource` is never read
[INFO] [stdout]   --> tests/common/mod.rs:29:9
[INFO] [stdout]    |
[INFO] [stdout] 27 | pub struct PermissionFilter {
[INFO] [stdout]    |            ---------------- field in this struct
[INFO] [stdout] 28 |     pub resource: String,
[INFO] [stdout] 29 |     pub filter_resource: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used
[INFO] [stdout]   --> tests/common/mod.rs:44:12
[INFO] [stdout]    |
[INFO] [stdout] 34 | impl MockStorage {
[INFO] [stdout]    | ---------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 44 |     pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 55 |     pub fn delete_permission_filter(&mut self, filter_id: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 62 |     pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `original_filters`
[INFO] [stdout]    --> tests/common/mod.rs:189:13
[INFO] [stdout]     |
[INFO] [stdout] 189 |         let original_filters = self.filters.clone();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `filter_resource` is never read
[INFO] [stdout]   --> tests/common/mod.rs:29:9
[INFO] [stdout]    |
[INFO] [stdout] 27 | pub struct PermissionFilter {
[INFO] [stdout]    |            ---------------- field in this struct
[INFO] [stdout] 28 |     pub resource: String,
[INFO] [stdout] 29 |     pub filter_resource: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used
[INFO] [stdout]   --> tests/common/mod.rs:44:12
[INFO] [stdout]    |
[INFO] [stdout] 34 | impl MockStorage {
[INFO] [stdout]    | ---------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 44 |     pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 55 |     pub fn delete_permission_filter(&mut self, filter_id: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 62 |     pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 2.31s
[INFO] running `Command { std: "docker" "inspect" "046a8879db28a5ce11718a25d1b19d47f6d3900155407dd824e0a80bd59a6964", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "046a8879db28a5ce11718a25d1b19d47f6d3900155407dd824e0a80bd59a6964", kill_on_drop: false }`
[INFO] [stdout] 046a8879db28a5ce11718a25d1b19d47f6d3900155407dd824e0a80bd59a6964
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] 333ef26edb9ec4f046814acf3c63735643f962d624c195c8f7819e42701d4b25
[INFO] running `Command { std: "docker" "start" "-a" "333ef26edb9ec4f046814acf3c63735643f962d624c195c8f7819e42701d4b25", kill_on_drop: false }`
[INFO] [stderr] warning: unused variable: `original_filters`
[INFO] [stderr]    --> tests/common/mod.rs:189:13
[INFO] [stderr]     |
[INFO] [stderr] 189 |         let original_filters = self.filters.clone();
[INFO] [stderr]     |             ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: field `filter_resource` is never read
[INFO] [stderr]   --> tests/common/mod.rs:29:9
[INFO] [stderr]    |
[INFO] [stderr] 27 | pub struct PermissionFilter {
[INFO] [stderr]    |            ---------------- field in this struct
[INFO] [stderr] 28 |     pub resource: String,
[INFO] [stderr] 29 |     pub filter_resource: String,
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stderr]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used
[INFO] [stderr]   --> tests/common/mod.rs:44:12
[INFO] [stderr]    |
[INFO] [stderr] 34 | impl MockStorage {
[INFO] [stderr]    | ---------------- methods in this implementation
[INFO] [stderr] ...
[INFO] [stderr] 44 |     pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) {
[INFO] [stderr]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 55 |     pub fn delete_permission_filter(&mut self, filter_id: &str) {
[INFO] [stderr]    |            ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 62 |     pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) {
[INFO] [stderr]    |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stderr]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: `v_authorization` (test "group_management") generated 3 warnings (run `cargo fix --test "group_management" -p v_authorization` to apply 1 suggestion)
[INFO] [stderr] warning: unused variable: `group`
[INFO] [stderr]    --> tests/authorize_obj_group_tests.rs:185:16
[INFO] [stderr]     |
[INFO] [stderr] 185 |     let (_acl, group, _info, mut trace) = create_test_trace();
[INFO] [stderr]     |                ^^^^^ help: if this is intentional, prefix it with an underscore: `_group`
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> tests/authorize_obj_group_tests.rs:345:9
[INFO] [stderr]     |
[INFO] [stderr] 345 |     let mut storage = MockStorage::new();
[INFO] [stderr]     |         ----^^^^^^^
[INFO] [stderr]     |         |
[INFO] [stderr]     |         help: remove this `mut`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `storage`
[INFO] [stderr]    --> tests/authorize_obj_group_tests.rs:345:9
[INFO] [stderr]     |
[INFO] [stderr] 345 |     let mut storage = MockStorage::new();
[INFO] [stderr]     |         ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_storage`
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `info`
[INFO] [stderr]    --> tests/authorize_obj_group_tests.rs:551:24
[INFO] [stderr]     |
[INFO] [stderr] 551 |     let (_acl, _group, info, mut trace) = create_test_trace();
[INFO] [stderr]     |                        ^^^^ help: if this is intentional, prefix it with an underscore: `_info`
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `acl`
[INFO] [stderr]    --> tests/authorize_obj_group_tests.rs:601:10
[INFO] [stderr]     |
[INFO] [stderr] 601 |     let (acl, _group, _info, mut trace) = create_test_trace();
[INFO] [stderr]     |          ^^^ help: if this is intentional, prefix it with an underscore: `_acl`
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `info`
[INFO] [stderr]    --> tests/authorize_obj_group_tests.rs:831:24
[INFO] [stderr]     |
[INFO] [stderr] 831 |     let (_acl, _group, info, mut trace) = create_test_trace();
[INFO] [stderr]     |                        ^^^^ help: if this is intentional, prefix it with an underscore: `_info`
[INFO] [stderr] 
[INFO] [stderr] warning: `v_authorization` (test "authorize_obj_group_tests") generated 9 warnings (3 duplicates) (run `cargo fix --test "authorize_obj_group_tests" -p v_authorization` to apply 6 suggestions)
[INFO] [stderr] warning: `v_authorization` (test "integration_scenarios") generated 2 warnings (2 duplicates)
[INFO] [stderr] warning: `v_authorization` (test "prepare_obj_group_tests") generated 3 warnings (3 duplicates)
[INFO] [stderr] warning: `v_authorization` (test "specialized_authorization") generated 3 warnings (3 duplicates)
[INFO] [stderr] warning: `v_authorization` (test "advanced_patterns") generated 3 warnings (3 duplicates)
[INFO] [stderr] warning: `v_authorization` (test "authorization_patterns") generated 3 warnings (3 duplicates)
[INFO] [stderr] warning: `v_authorization` (test "edge_cases") generated 3 warnings (3 duplicates)
[INFO] [stderr] warning: unused import: `CREATE`
[INFO] [stderr]   --> tests/permission_filters.rs:11:41
[INFO] [stderr]    |
[INFO] [stderr] 11 | use common::{MockStorage, READ, UPDATE, CREATE, DELETE, FULL_ACCESS};
[INFO] [stderr]    |                                         ^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `admin`
[INFO] [stderr]   --> tests/permission_filters.rs:22:9
[INFO] [stderr]    |
[INFO] [stderr] 22 |     let admin = MockStorage::get_admin_ticket();
[INFO] [stderr]    |         ^^^^^ help: if this is intentional, prefix it with an underscore: `_admin`
[INFO] [stderr] 
[INFO] [stderr] warning: method `delete_permission` is never used
[INFO] [stderr]   --> tests/common/mod.rs:90:12
[INFO] [stderr]    |
[INFO] [stderr] 34 | impl MockStorage {
[INFO] [stderr]    | ---------------- method in this implementation
[INFO] [stderr] ...
[INFO] [stderr] 90 |     pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) {
[INFO] [stderr]    |            ^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: `v_authorization` (test "permission_filters") generated 5 warnings (2 duplicates) (run `cargo fix --test "permission_filters" -p v_authorization` to apply 2 suggestions)
[INFO] [stderr] warning: `v_authorization` (test "core_authorization") generated 3 warnings (3 duplicates)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.05s
[INFO] [stderr]      Running unittests src/authorization.rs (/opt/rustwide/target/debug/deps/v_authorization-b0b6bb5d4cc8f00d)
[INFO] [stdout] 
[INFO] [stdout] running 44 tests
[INFO] [stdout] test common::tests::test_access_constants ... ok
[INFO] [stdout] test common::tests::test_acl_record_debug ... ok
[INFO] [stdout] test common::tests::test_exclusive_markers ... ok
[INFO] [stdout] test common::tests::test_acl_record_creation ... ok
[INFO] [stdout] test common::tests::test_get_path ... ok
[INFO] [stdout] test common::tests::test_prefixes ... ok
[INFO] [stdout] test common::tests::test_trace_functions ... ok
[INFO] [stdout] test tests::test_acl_record_debug ... ok
[INFO] [stdout] test tests::test_acl_record_counters_edge_cases ... ok
[INFO] [stdout] test common::tests::test_access_to_pretty_string ... ok
[INFO] [stdout] test tests::test_acl_record_new_with_max_access ... ok
[INFO] [stdout] test tests::test_acl_record_new_with_zero_access ... ok
[INFO] [stdout] test tests::test_acl_record_new_with_access ... ok
[INFO] [stdout] test common::tests::test_get_path_empty ... ok
[INFO] [stdout] test tests::test_acl_record_new ... ok
[INFO] [stdout] test tests::test_acl_record_with_deletion ... ok
[INFO] [stdout] test tests::test_acl_record_with_ignore_exclusive_marker ... ok
[INFO] [stdout] test tests::test_acl_record_with_level ... ok
[INFO] [stdout] test trace::tests::test_add_found_group ... ok
[INFO] [stdout] test trace::tests::test_add_found_group_disabled ... ok
[INFO] [stdout] test trace::tests::test_add_group_disabled ... ok
[INFO] [stdout] test trace::tests::test_add_group_object ... ok
[INFO] [stdout] test trace::tests::test_add_group_subject ... ok
[INFO] [stdout] test trace::tests::test_add_info_disabled ... ok
[INFO] [stdout] test trace::tests::test_add_permission ... ok
[INFO] [stdout] test trace::tests::test_add_permission_disabled ... ok
[INFO] [stdout] test trace::tests::test_complex_trace_scenario ... ok
[INFO] [stdout] test tests::test_acl_record_with_counters_overlapping_rights ... ok
[INFO] [stdout] test trace::tests::test_finalize_disabled ... ok
[INFO] [stdout] test trace::tests::test_nested_steps ... ok
[INFO] [stdout] test trace::tests::test_finalize_enabled ... ok
[INFO] [stdout] test trace::tests::test_rights_to_string ... ok
[INFO] [stdout] test trace::tests::test_start_and_end_step ... ok
[INFO] [stdout] test trace::tests::test_start_and_end_step_disabled ... ok
[INFO] [stdout] test trace::tests::test_trace_info_new_detailed ... ok
[INFO] [stdout] test trace::tests::test_trace_info_new_disabled ... ok
[INFO] [stdout] test trace::tests::test_trace_info_new_enabled ... ok
[INFO] [stdout] test trace::tests::test_trace_info_with_details ... ok
[INFO] [stdout] test trace::tests::test_trace_info_with_details_disabled ... ok
[INFO] [stdout] test trace::tests::test_trace_mode_enum ... ok
[INFO] [stdout] test trace::tests::test_update_step_rights ... ok
[INFO] [stdout] test trace::tests::test_update_step_rights_disabled ... ok
[INFO] [stdout] test tests::test_acl_record_with_exclusive_marker ... ok
[INFO] [stdout] test trace::tests::test_add_info ... ok
[INFO] [stdout] 
[INFO] [stderr]      Running tests/advanced_patterns.rs (/opt/rustwide/target/debug/deps/advanced_patterns-0a88ba8f4cfb920a)
[INFO] [stdout] test result: ok. 44 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.20s
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] running 5 tests
[INFO] [stdout] test test_cascading_permissions_pattern ... ok
[INFO] [stdout] test test_conditional_access_pattern ... ok
[INFO] [stdout] test test_delegation_pattern ... ok
[INFO] [stdout] test test_resource_hierarchy_pattern ... ok
[INFO] [stdout] test test_temporal_access_pattern ... ok
[INFO] [stdout] 
[INFO] [stdout] test result: ok. 5 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
[INFO] [stdout] 
[INFO] [stderr]      Running tests/authorization_patterns.rs (/opt/rustwide/target/debug/deps/authorization_patterns-10c72a76ea443f82)
[INFO] [stdout] 
[INFO] [stdout] running 4 tests
[INFO] [stdout] test test_can_update_property_pattern ... ok
[INFO] [stdout] test test_group_membership_management ... ok
[INFO] [stdout] test test_permission_subject_pattern ... ok
[INFO] [stdout] test test_multi_level_authorization_with_restrictions ... ok
[INFO] [stdout] 
[INFO] [stdout] test result: ok. 4 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
[INFO] [stdout] 
[INFO] [stderr]      Running tests/authorize_obj_group_tests.rs (/opt/rustwide/target/debug/deps/authorize_obj_group_tests-962cfa6d4cf99252)
[INFO] [stdout] 
[INFO] [stdout] running 16 tests
[INFO] [stderr] error: test failed, to rerun pass `--test authorize_obj_group_tests`
[INFO] [stderr] 
[INFO] [stderr] Caused by:
[INFO] [stderr]   process didn't exit successfully: `/opt/rustwide/target/debug/deps/authorize_obj_group_tests-962cfa6d4cf99252` (signal: 11, SIGSEGV: invalid memory reference)
[INFO] running `Command { std: "docker" "inspect" "333ef26edb9ec4f046814acf3c63735643f962d624c195c8f7819e42701d4b25", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "333ef26edb9ec4f046814acf3c63735643f962d624c195c8f7819e42701d4b25", kill_on_drop: false }`
[INFO] [stdout] 333ef26edb9ec4f046814acf3c63735643f962d624c195c8f7819e42701d4b25
