[INFO] cloning repository https://github.com/trvon/pcap-sleuth [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/trvon/pcap-sleuth" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Ftrvon%2Fpcap-sleuth", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Ftrvon%2Fpcap-sleuth'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 33b60bc7d5189e9a2f05ad53139266f2a32708f0 [INFO] checking trvon/pcap-sleuth against try#b10dae361a61486cfbdcd3aae3877ee17e00d192 for pr-153912 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Ftrvon%2Fpcap-sleuth" "/workspace/builds/worker-4-tc2/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-4-tc2/source'... [INFO] [stderr] done. [INFO] started tweaking git repo https://github.com/trvon/pcap-sleuth [INFO] finished tweaking git repo https://github.com/trvon/pcap-sleuth [INFO] tweaked toml for git repo https://github.com/trvon/pcap-sleuth written to /workspace/builds/worker-4-tc2/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/trvon/pcap-sleuth on toolchain b10dae361a61486cfbdcd3aae3877ee17e00d192 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b10dae361a61486cfbdcd3aae3877ee17e00d192" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/trvon/pcap-sleuth already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b10dae361a61486cfbdcd3aae3877ee17e00d192" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Blocking waiting for file lock on package cache [ERROR] error running command: no output for 300 seconds [INFO] checking trvon/pcap-sleuth against try#b10dae361a61486cfbdcd3aae3877ee17e00d192 for pr-153912 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Ftrvon%2Fpcap-sleuth" "/workspace/builds/worker-4-tc2/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-4-tc2/source'... [INFO] [stderr] done. [INFO] started tweaking git repo https://github.com/trvon/pcap-sleuth [INFO] finished tweaking git repo https://github.com/trvon/pcap-sleuth [INFO] tweaked toml for git repo https://github.com/trvon/pcap-sleuth written to /workspace/builds/worker-4-tc2/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/trvon/pcap-sleuth on toolchain b10dae361a61486cfbdcd3aae3877ee17e00d192 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b10dae361a61486cfbdcd3aae3877ee17e00d192" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/trvon/pcap-sleuth already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b10dae361a61486cfbdcd3aae3877ee17e00d192" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded tempfile v3.19.1 [INFO] [stderr] Downloaded pnet_sys v0.34.0 [INFO] [stderr] Downloaded pnet_transport v0.34.0 [INFO] [stderr] Downloaded pnet_macros_support v0.34.0 [INFO] [stderr] Downloaded pnet_base v0.34.0 [INFO] [stderr] Downloaded toml_write v0.1.0 [INFO] [stderr] Downloaded csv-core v0.1.12 [INFO] [stderr] Downloaded pnet v0.34.0 [INFO] [stderr] Downloaded assert_cmd v2.0.17 [INFO] [stderr] Downloaded pnet_macros v0.34.0 [INFO] [stderr] Downloaded pnet_datalink v0.34.0 [INFO] [stderr] Downloaded pnet_packet v0.34.0 [INFO] [stderr] Downloaded toml v0.8.21 [INFO] [stderr] Downloaded clap v4.5.37 [INFO] [stderr] Downloaded jiff-static v0.2.10 [INFO] [stderr] Downloaded cc v1.2.20 [INFO] [stderr] Downloaded toml_edit v0.22.25 [INFO] [stderr] Downloaded winnow v0.7.7 [INFO] [stderr] Downloaded clap_builder v4.5.37 [INFO] [stderr] Downloaded pcap v1.3.0 [INFO] [stderr] Downloaded rustix v1.0.5 [INFO] [stderr] Downloaded jiff v0.2.10 [INFO] [stderr] Downloaded csv v1.3.1 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+b10dae361a61486cfbdcd3aae3877ee17e00d192" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 69a738f3a3c2156d14c7be4c43559fb6b193312e14cd1c7a292166d5940de625 [INFO] running `Command { std: "docker" "start" "-a" "69a738f3a3c2156d14c7be4c43559fb6b193312e14cd1c7a292166d5940de625", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "69a738f3a3c2156d14c7be4c43559fb6b193312e14cd1c7a292166d5940de625", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "69a738f3a3c2156d14c7be4c43559fb6b193312e14cd1c7a292166d5940de625", kill_on_drop: false }` [INFO] [stdout] 69a738f3a3c2156d14c7be4c43559fb6b193312e14cd1c7a292166d5940de625 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+b10dae361a61486cfbdcd3aae3877ee17e00d192" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 6290b1bf9d8ff9fc0c894077302b0fbb5bcab05bdaf9f23c5c6ab56171b25be4 [INFO] running `Command { std: "docker" "start" "-a" "6290b1bf9d8ff9fc0c894077302b0fbb5bcab05bdaf9f23c5c6ab56171b25be4", kill_on_drop: false }` [INFO] [stderr] Compiling proc-macro2 v1.0.95 [INFO] [stderr] Compiling serde v1.0.219 [INFO] [stderr] Compiling libc v0.2.172 [INFO] [stderr] Checking memchr v2.7.4 [INFO] [stderr] Compiling regex-syntax v0.8.5 [INFO] [stderr] Compiling autocfg v1.4.0 [INFO] [stderr] Checking no-std-net v0.6.0 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling aho-corasick v1.1.3 [INFO] [stderr] Compiling quote v1.0.40 [INFO] [stderr] Checking pnet_base v0.34.0 [INFO] [stderr] Compiling syn v2.0.100 [INFO] [stderr] Compiling libloading v0.6.7 [INFO] [stderr] Checking pnet_sys v0.34.0 [INFO] [stderr] Checking pnet_macros_support v0.34.0 [INFO] [stderr] Checking hashbrown v0.15.2 [INFO] [stderr] Checking winnow v0.7.7 [INFO] [stderr] Compiling pnet v0.34.0 [INFO] [stderr] Compiling rustix v1.0.5 [INFO] [stderr] Compiling serde_json v1.0.140 [INFO] [stderr] Checking regex-automata v0.4.9 [INFO] [stderr] Checking toml_write v0.1.0 [INFO] [stderr] Checking indexmap v2.9.0 [INFO] [stderr] Compiling getrandom v0.3.2 [INFO] [stderr] Checking predicates-core v1.0.9 [INFO] [stderr] Compiling doc-comment v0.3.3 [INFO] [stderr] Checking clap_builder v4.5.37 [INFO] [stderr] Checking float-cmp v0.10.0 [INFO] [stderr] Checking rayon-core v1.12.1 [INFO] [stderr] Checking errno v0.2.8 [INFO] [stderr] Checking csv-core v0.1.12 [INFO] [stderr] Checking linux-raw-sys v0.9.4 [INFO] [stderr] Checking iana-time-zone v0.1.63 [INFO] [stderr] Compiling assert_cmd v2.0.17 [INFO] [stderr] Checking termtree v0.5.1 [INFO] [stderr] Checking bitflags v2.9.0 [INFO] [stderr] Checking jiff v0.2.10 [INFO] [stderr] Checking predicates-tree v1.0.12 [INFO] [stderr] Checking rayon v1.10.0 [INFO] [stderr] Checking wait-timeout v0.2.1 [INFO] [stderr] Checking once_cell v1.21.3 [INFO] [stderr] Checking regex v1.11.1 [INFO] [stderr] Checking bstr v1.12.0 [INFO] [stderr] Checking env_filter v0.1.3 [INFO] [stderr] Checking predicates v3.1.3 [INFO] [stderr] Checking tempfile v3.19.1 [INFO] [stderr] Compiling serde_derive v1.0.219 [INFO] [stderr] Compiling clap_derive v4.5.32 [INFO] [stderr] Compiling pnet_macros v0.34.0 [INFO] [stderr] Compiling pcap v1.3.0 [INFO] [stderr] Checking pnet_packet v0.34.0 [INFO] [stderr] Checking env_logger v0.11.8 [INFO] [stderr] Checking clap v4.5.37 [INFO] [stderr] Checking pnet_transport v0.34.0 [INFO] [stderr] Checking toml_datetime v0.6.9 [INFO] [stderr] Checking ipnetwork v0.20.0 [INFO] [stderr] Checking serde_spanned v0.6.8 [INFO] [stderr] Checking chrono v0.4.40 [INFO] [stderr] Checking csv v1.3.1 [INFO] [stderr] Checking toml_edit v0.22.25 [INFO] [stderr] Checking pnet_datalink v0.34.0 [INFO] [stderr] Checking toml v0.8.21 [INFO] [stderr] Checking pcap-sleuth v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused import: `BufRead` [INFO] [stdout] --> src/main.rs:25:15 [INFO] [stdout] | [INFO] [stdout] 25 | use std::io::{BufRead, BufReader, Read}; [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `BufRead` [INFO] [stdout] --> tests/../src/main.rs:25:15 [INFO] [stdout] | [INFO] [stdout] 25 | use std::io::{BufRead, BufReader, Read}; [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `BufRead` [INFO] [stdout] --> src/main.rs:25:15 [INFO] [stdout] | [INFO] [stdout] 25 | use std::io::{BufRead, BufReader, Read}; [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `flow_data` [INFO] [stdout] --> src/main.rs:1378:15 [INFO] [stdout] | [INFO] [stdout] 1378 | for (key, flow_data) in flows { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_flow_data` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `flow_data` [INFO] [stdout] --> tests/../src/main.rs:1378:15 [INFO] [stdout] | [INFO] [stdout] 1378 | for (key, flow_data) in flows { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_flow_data` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `flow_data` [INFO] [stdout] --> src/main.rs:1378:15 [INFO] [stdout] | [INFO] [stdout] 1378 | for (key, flow_data) in flows { [INFO] [stdout] | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_flow_data` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `SuricataConfig` is more private than the item `correlate_suricata_alerts` [INFO] [stdout] --> src/main.rs:1516:1 [INFO] [stdout] | [INFO] [stdout] 1516 | / pub fn correlate_suricata_alerts( [INFO] [stdout] 1517 | | flows: &mut HashMap, [INFO] [stdout] 1518 | | alerts: &[SuricataAlert], [INFO] [stdout] 1519 | | config: &SuricataConfig, [INFO] [stdout] 1520 | | ) -> usize { [INFO] [stdout] | |__________^ function `correlate_suricata_alerts` is reachable at visibility `pub` [INFO] [stdout] | [INFO] [stdout] note: but type `SuricataConfig` is only usable at visibility `pub(crate)` [INFO] [stdout] --> src/main.rs:435:1 [INFO] [stdout] | [INFO] [stdout] 435 | struct SuricataConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(private_interfaces)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `SuricataAlert` is never constructed [INFO] [stdout] --> src/main.rs:312:5 [INFO] [stdout] | [INFO] [stdout] 305 | enum AttackType { [INFO] [stdout] | ---------- variant in this enum [INFO] [stdout] ... [INFO] [stdout] 312 | SuricataAlert, [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `AttackType` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `SuricataConfig` is more private than the item `correlate_suricata_alerts` [INFO] [stdout] --> tests/../src/main.rs:1516:1 [INFO] [stdout] | [INFO] [stdout] 1516 | / pub fn correlate_suricata_alerts( [INFO] [stdout] 1517 | | flows: &mut HashMap, [INFO] [stdout] 1518 | | alerts: &[SuricataAlert], [INFO] [stdout] 1519 | | config: &SuricataConfig, [INFO] [stdout] 1520 | | ) -> usize { [INFO] [stdout] | |__________^ function `correlate_suricata_alerts` is reachable at visibility `pub(crate)` [INFO] [stdout] | [INFO] [stdout] note: but type `SuricataConfig` is only usable at visibility `pub(self)` [INFO] [stdout] --> tests/../src/main.rs:435:1 [INFO] [stdout] | [INFO] [stdout] 435 | struct SuricataConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(private_interfaces)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `last_seen` and `packets` are never read [INFO] [stdout] --> tests/../src/main.rs:173:9 [INFO] [stdout] | [INFO] [stdout] 170 | pub struct FlowData { [INFO] [stdout] | -------- fields in this struct [INFO] [stdout] ... [INFO] [stdout] 173 | pub last_seen: DateTime, [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 176 | pub packets: Vec, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FlowData` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `write_packet_csv` is never used [INFO] [stdout] --> tests/../src/main.rs:215:4 [INFO] [stdout] | [INFO] [stdout] 215 | fn write_packet_csv(packets: &[PacketInfo], output_path: &Path) -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `SourceStats` is never constructed [INFO] [stdout] --> tests/../src/main.rs:284:8 [INFO] [stdout] | [INFO] [stdout] 284 | struct SourceStats { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: enum `AttackType` is never used [INFO] [stdout] --> tests/../src/main.rs:305:6 [INFO] [stdout] | [INFO] [stdout] 305 | enum AttackType { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `to_string` is never used [INFO] [stdout] --> tests/../src/main.rs:316:8 [INFO] [stdout] | [INFO] [stdout] 315 | impl AttackType { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] 316 | fn to_string(&self) -> String { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `Config` is never constructed [INFO] [stdout] --> tests/../src/main.rs:331:8 [INFO] [stdout] | [INFO] [stdout] 331 | struct Config { [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `DetectionConfig` is never constructed [INFO] [stdout] --> tests/../src/main.rs:342:8 [INFO] [stdout] | [INFO] [stdout] 342 | struct DetectionConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `HeuristicConfig` is never constructed [INFO] [stdout] --> tests/../src/main.rs:352:8 [INFO] [stdout] | [INFO] [stdout] 352 | struct HeuristicConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `ScanConfig` is never constructed [INFO] [stdout] --> tests/../src/main.rs:393:8 [INFO] [stdout] | [INFO] [stdout] 393 | struct ScanConfig { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `SynFloodConfig` is never constructed [INFO] [stdout] --> tests/../src/main.rs:401:8 [INFO] [stdout] | [INFO] [stdout] 401 | struct SynFloodConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `PortSweepConfig` is never constructed [INFO] [stdout] --> tests/../src/main.rs:411:8 [INFO] [stdout] | [INFO] [stdout] 411 | struct PortSweepConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `LabelConfig` is never constructed [INFO] [stdout] --> tests/../src/main.rs:419:8 [INFO] [stdout] | [INFO] [stdout] 419 | struct LabelConfig { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `FlowConfig` is never constructed [INFO] [stdout] --> tests/../src/main.rs:425:8 [INFO] [stdout] | [INFO] [stdout] 425 | struct FlowConfig { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `enabled` is never read [INFO] [stdout] --> tests/../src/main.rs:437:5 [INFO] [stdout] | [INFO] [stdout] 435 | struct SuricataConfig { [INFO] [stdout] | -------------- field in this struct [INFO] [stdout] 436 | #[serde(default = "default_true")] [INFO] [stdout] 437 | enabled: bool, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `SuricataConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `default_scan_threshold` is never used [INFO] [stdout] --> tests/../src/main.rs:450:4 [INFO] [stdout] | [INFO] [stdout] 450 | fn default_scan_threshold() -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `default_udp_scan_threshold` is never used [INFO] [stdout] --> tests/../src/main.rs:453:4 [INFO] [stdout] | [INFO] [stdout] 453 | fn default_udp_scan_threshold() -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `default_attack_label_format` is never used [INFO] [stdout] --> tests/../src/main.rs:456:4 [INFO] [stdout] | [INFO] [stdout] 456 | fn default_attack_label_format() -> String { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `default_tcp_timeout` is never used [INFO] [stdout] --> tests/../src/main.rs:459:4 [INFO] [stdout] | [INFO] [stdout] 459 | fn default_tcp_timeout() -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `default_udp_timeout` is never used [INFO] [stdout] --> tests/../src/main.rs:462:4 [INFO] [stdout] | [INFO] [stdout] 462 | fn default_udp_timeout() -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `default_check_interval` is never used [INFO] [stdout] --> tests/../src/main.rs:465:4 [INFO] [stdout] | [INFO] [stdout] 465 | fn default_check_interval() -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `default_syn_flood_threshold` is never used [INFO] [stdout] --> tests/../src/main.rs:468:4 [INFO] [stdout] | [INFO] [stdout] 468 | fn default_syn_flood_threshold() -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `default_syn_flood_window` is never used [INFO] [stdout] --> tests/../src/main.rs:471:4 [INFO] [stdout] | [INFO] [stdout] 471 | fn default_syn_flood_window() -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `default_port_sweep_threshold` is never used [INFO] [stdout] --> tests/../src/main.rs:474:4 [INFO] [stdout] | [INFO] [stdout] 474 | fn default_port_sweep_threshold() -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `default_ping_sweep_threshold` is never used [INFO] [stdout] --> tests/../src/main.rs:477:4 [INFO] [stdout] | [INFO] [stdout] 477 | fn default_ping_sweep_threshold() -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `parse_packet` is never used [INFO] [stdout] --> tests/../src/main.rs:505:4 [INFO] [stdout] | [INFO] [stdout] 505 | fn parse_packet(data: &[u8], ts: DateTime, length: u32) -> PacketInfo { [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `main` is never used [INFO] [stdout] --> tests/../src/main.rs:607:4 [INFO] [stdout] | [INFO] [stdout] 607 | fn main() -> Result<(), Box> { [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `0` is never read [INFO] [stdout] --> tests/../src/main.rs:921:12 [INFO] [stdout] | [INFO] [stdout] 921 | FlowId(String), [INFO] [stdout] | ------ ^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | field in this variant [INFO] [stdout] | [INFO] [stdout] = note: `LabelType` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field [INFO] [stdout] | [INFO] [stdout] 921 - FlowId(String), [INFO] [stdout] 921 + FlowId(()), [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `0` is never read [INFO] [stdout] --> tests/../src/main.rs:922:12 [INFO] [stdout] | [INFO] [stdout] 922 | Subnet(IpNetwork), [INFO] [stdout] | ------ ^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | field in this variant [INFO] [stdout] | [INFO] [stdout] = note: `LabelType` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field [INFO] [stdout] | [INFO] [stdout] 922 - Subnet(IpNetwork), [INFO] [stdout] 922 + Subnet(()), [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `label` is never read [INFO] [stdout] --> tests/../src/main.rs:929:5 [INFO] [stdout] | [INFO] [stdout] 927 | struct LabelRule { [INFO] [stdout] | --------- field in this struct [INFO] [stdout] 928 | rule: LabelType, [INFO] [stdout] 929 | label: String, [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `LabelRule` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `run_attack_detection` is never used [INFO] [stdout] --> tests/../src/main.rs:1009:4 [INFO] [stdout] | [INFO] [stdout] 1009 | fn run_attack_detection( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `protocol_for_ip_pair` is never used [INFO] [stdout] --> tests/../src/main.rs:1325:4 [INFO] [stdout] | [INFO] [stdout] 1325 | fn protocol_for_ip_pair( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `find_flow_id_for_scan` is never used [INFO] [stdout] --> tests/../src/main.rs:1339:4 [INFO] [stdout] | [INFO] [stdout] 1339 | fn find_flow_id_for_scan( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `find_flow_id_for_service` is never used [INFO] [stdout] --> tests/../src/main.rs:1355:4 [INFO] [stdout] | [INFO] [stdout] 1355 | fn find_flow_id_for_service( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `find_flow_id_for_ping` is never used [INFO] [stdout] --> tests/../src/main.rs:1373:4 [INFO] [stdout] | [INFO] [stdout] 1373 | fn find_flow_id_for_ping( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: type `SuricataConfig` is more private than the item `correlate_suricata_alerts` [INFO] [stdout] --> src/main.rs:1516:1 [INFO] [stdout] | [INFO] [stdout] 1516 | / pub fn correlate_suricata_alerts( [INFO] [stdout] 1517 | | flows: &mut HashMap, [INFO] [stdout] 1518 | | alerts: &[SuricataAlert], [INFO] [stdout] 1519 | | config: &SuricataConfig, [INFO] [stdout] 1520 | | ) -> usize { [INFO] [stdout] | |__________^ function `correlate_suricata_alerts` is reachable at visibility `pub` [INFO] [stdout] | [INFO] [stdout] note: but type `SuricataConfig` is only usable at visibility `pub(crate)` [INFO] [stdout] --> src/main.rs:435:1 [INFO] [stdout] | [INFO] [stdout] 435 | struct SuricataConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(private_interfaces)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `SuricataAlert` is never constructed [INFO] [stdout] --> src/main.rs:312:5 [INFO] [stdout] | [INFO] [stdout] 305 | enum AttackType { [INFO] [stdout] | ---------- variant in this enum [INFO] [stdout] ... [INFO] [stdout] 312 | SuricataAlert, [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `AttackType` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 11.91s [INFO] running `Command { std: "docker" "inspect" "6290b1bf9d8ff9fc0c894077302b0fbb5bcab05bdaf9f23c5c6ab56171b25be4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "6290b1bf9d8ff9fc0c894077302b0fbb5bcab05bdaf9f23c5c6ab56171b25be4", kill_on_drop: false }` [INFO] [stdout] 6290b1bf9d8ff9fc0c894077302b0fbb5bcab05bdaf9f23c5c6ab56171b25be4