[INFO] cloning repository https://github.com/sundarsub/sentra [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/sundarsub/sentra" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fsundarsub%2Fsentra", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fsundarsub%2Fsentra'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 9c438974f70f2a3c0d820e3b7c99fb2021fe4c44 [INFO] checking sundarsub/sentra against try#88b8a1c6e3a6f6f8a2ed6b6a9a74e0ef1862f72c for pr-154887 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fsundarsub%2Fsentra" "/workspace/builds/worker-1-tc2/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-1-tc2/source'... [INFO] [stderr] done. [INFO] started tweaking git repo https://github.com/sundarsub/sentra [INFO] finished tweaking git repo https://github.com/sundarsub/sentra [INFO] tweaked toml for git repo https://github.com/sundarsub/sentra written to /workspace/builds/worker-1-tc2/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/sundarsub/sentra on toolchain 88b8a1c6e3a6f6f8a2ed6b6a9a74e0ef1862f72c [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+88b8a1c6e3a6f6f8a2ed6b6a9a74e0ef1862f72c" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/sundarsub/sentra already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+88b8a1c6e3a6f6f8a2ed6b6a9a74e0ef1862f72c" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Updating crates.io index [INFO] [stderr] Blocking waiting for file lock on package cache [ERROR] error running command: no output for 300 seconds [INFO] checking sundarsub/sentra against try#88b8a1c6e3a6f6f8a2ed6b6a9a74e0ef1862f72c for pr-154887 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fsundarsub%2Fsentra" "/workspace/builds/worker-1-tc2/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-1-tc2/source'... [INFO] [stderr] done. [INFO] started tweaking git repo https://github.com/sundarsub/sentra [INFO] finished tweaking git repo https://github.com/sundarsub/sentra [INFO] tweaked toml for git repo https://github.com/sundarsub/sentra written to /workspace/builds/worker-1-tc2/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/sundarsub/sentra on toolchain 88b8a1c6e3a6f6f8a2ed6b6a9a74e0ef1862f72c [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+88b8a1c6e3a6f6f8a2ed6b6a9a74e0ef1862f72c" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/sundarsub/sentra already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+88b8a1c6e3a6f6f8a2ed6b6a9a74e0ef1862f72c" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded users v0.11.0 [INFO] [stderr] Downloaded sd-notify v0.4.5 [INFO] [stderr] Downloaded nibble_vec v0.1.0 [INFO] [stderr] Downloaded endian-type v0.1.2 [INFO] [stderr] Downloaded caps v0.5.6 [INFO] [stderr] Downloaded rustyline v14.0.0 [INFO] [stderr] Downloaded radix_trie v0.2.1 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+88b8a1c6e3a6f6f8a2ed6b6a9a74e0ef1862f72c" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] f7e687e7e40772e164b452869813b22722280fbb764b2256bcb4d35f137c17a9 [INFO] running `Command { std: "docker" "start" "-a" "f7e687e7e40772e164b452869813b22722280fbb764b2256bcb4d35f137c17a9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "f7e687e7e40772e164b452869813b22722280fbb764b2256bcb4d35f137c17a9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "f7e687e7e40772e164b452869813b22722280fbb764b2256bcb4d35f137c17a9", kill_on_drop: false }` [INFO] [stdout] f7e687e7e40772e164b452869813b22722280fbb764b2256bcb4d35f137c17a9 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+88b8a1c6e3a6f6f8a2ed6b6a9a74e0ef1862f72c" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 4b33648712fae8a138b325d611c7527dde1ada812352f80288e99b12c81092b4 [INFO] running `Command { std: "docker" "start" "-a" "4b33648712fae8a138b325d611c7527dde1ada812352f80288e99b12c81092b4", kill_on_drop: false }` [INFO] [stderr] Compiling libc v0.2.182 [INFO] [stderr] Checking bitflags v2.11.0 [INFO] [stderr] Compiling rustix v1.1.3 [INFO] [stderr] Checking memchr v2.8.0 [INFO] [stderr] Compiling getrandom v0.4.1 [INFO] [stderr] Compiling cfg_aliases v0.1.1 [INFO] [stderr] Compiling libseccomp-sys v0.2.1 [INFO] [stderr] Checking smallvec v1.15.1 [INFO] [stderr] Compiling syn v2.0.117 [INFO] [stderr] Compiling libseccomp v0.3.0 [INFO] [stderr] Checking clap_lex v1.0.0 [INFO] [stderr] Checking regex-syntax v0.8.9 [INFO] [stderr] Checking endian-type v0.1.2 [INFO] [stderr] Checking bytes v1.11.1 [INFO] [stderr] Checking home v0.5.9 [INFO] [stderr] Checking iana-time-zone v0.1.65 [INFO] [stderr] Checking ryu v1.0.23 [INFO] [stderr] Compiling nix v0.28.0 [INFO] [stderr] Checking clap_builder v4.5.60 [INFO] [stderr] Checking unsafe-libyaml v0.2.11 [INFO] [stderr] Checking unicode-width v0.1.14 [INFO] [stderr] Checking unicode-segmentation v1.12.0 [INFO] [stderr] Checking once_cell v1.21.3 [INFO] [stderr] Checking fastrand v2.3.0 [INFO] [stderr] Checking nibble_vec v0.1.0 [INFO] [stderr] Checking aho-corasick v1.1.4 [INFO] [stderr] Checking serde_json v1.0.149 [INFO] [stderr] Checking radix_trie v0.2.1 [INFO] [stderr] Checking errno v0.3.14 [INFO] [stderr] Checking mio v1.1.1 [INFO] [stderr] Checking socket2 v0.6.2 [INFO] [stderr] Checking caps v0.5.6 [INFO] [stderr] Checking sd-notify v0.4.5 [INFO] [stderr] Checking users v0.11.0 [INFO] [stderr] Checking hostname v0.4.2 [INFO] [stderr] Checking signal-hook-registry v1.4.8 [INFO] [stderr] Checking fd-lock v4.0.4 [INFO] [stderr] Checking uuid v1.21.0 [INFO] [stderr] Checking tempfile v3.25.0 [INFO] [stderr] Checking regex-automata v0.4.14 [INFO] [stderr] Compiling serde_derive v1.0.228 [INFO] [stderr] Compiling tokio-macros v2.6.0 [INFO] [stderr] Compiling clap_derive v4.5.55 [INFO] [stderr] Checking regex v1.12.3 [INFO] [stderr] Checking tokio v1.49.0 [INFO] [stderr] Checking rustyline v14.0.0 [INFO] [stderr] Checking clap v4.5.60 [INFO] [stderr] Checking serde v1.0.228 [INFO] [stderr] Checking chrono v0.4.43 [INFO] [stderr] Checking serde_yaml v0.9.34+deprecated [INFO] [stderr] Checking execwall v2.0.1 (/opt/rustwide/workdir) [INFO] [stdout] warning: unexpected `cfg` condition value: `caps` [INFO] [stdout] --> src/bin/python_runner.rs:234:11 [INFO] [stdout] | [INFO] [stdout] 234 | #[cfg(feature = "caps")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `caps` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::ffi::CString` [INFO] [stdout] --> src/bin/python_runner.rs:199:9 [INFO] [stdout] | [INFO] [stdout] 199 | use std::ffi::CString; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `caps` [INFO] [stdout] --> src/bin/python_runner.rs:234:11 [INFO] [stdout] | [INFO] [stdout] 234 | #[cfg(feature = "caps")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `caps` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::ffi::CString` [INFO] [stdout] --> src/bin/python_runner.rs:199:9 [INFO] [stdout] | [INFO] [stdout] 199 | use std::ffi::CString; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> tests/sandbox_integration.rs:766:9 [INFO] [stdout] | [INFO] [stdout] 766 | let mut request1 = make_request(code); [INFO] [stdout] | ----^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `write_sandbox_entry`, `log_sandbox_enter`, `log_sandbox_exit`, `log_sandbox_violation`, and `log_sandbox_execution` are never used [INFO] [stdout] --> src/audit.rs:332:8 [INFO] [stdout] | [INFO] [stdout] 157 | impl AuditLogger { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 332 | fn write_sandbox_entry(&self, entry: &SandboxAuditEntry) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 344 | pub fn log_sandbox_enter(&self, code_sha256: &str, profile: &str, details: Option) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 363 | pub fn log_sandbox_exit( [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 389 | pub fn log_sandbox_violation( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 415 | pub fn log_sandbox_execution( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `audit_mode` is never read [INFO] [stdout] --> src/policy.rs:236:9 [INFO] [stdout] | [INFO] [stdout] 228 | pub struct EvaluationResult { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] ... [INFO] [stdout] 236 | pub audit_mode: bool, [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `EvaluationResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `version` and `syscall_profiles` are never read [INFO] [stdout] --> src/policy.rs:297:9 [INFO] [stdout] | [INFO] [stdout] 293 | pub struct PolicyEngine { [INFO] [stdout] | ------------ fields in this struct [INFO] [stdout] ... [INFO] [stdout] 297 | pub version: String, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 303 | pub syscall_profiles: HashMap, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `get_profile`, `get_capability`, `profile_count`, and `list_profiles` are never used [INFO] [stdout] --> src/policy.rs:507:12 [INFO] [stdout] | [INFO] [stdout] 319 | impl PolicyEngine { [INFO] [stdout] | ----------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 507 | pub fn get_profile(&self, name: &str) -> Option<&SandboxProfile> { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 512 | pub fn get_capability(&self, name: &str) -> Option<&Capability> { [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 517 | pub fn profile_count(&self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 522 | pub fn list_profiles(&self) -> Vec<&str> { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: enum `SandboxEvent` is never used [INFO] [stdout] --> src/audit.rs:13:10 [INFO] [stdout] | [INFO] [stdout] 13 | pub enum SandboxEvent { [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: associated items `new` and `with_truncation` are never used [INFO] [stdout] --> src/audit.rs:41:12 [INFO] [stdout] | [INFO] [stdout] 39 | impl SandboxMetrics { [INFO] [stdout] | ------------------- associated items in this implementation [INFO] [stdout] 40 | /// Create new sandbox metrics from execution data [INFO] [stdout] 41 | pub fn new(wall_time_ms: u64, peak_mem_mb: u64, timed_out: bool) -> Self { [INFO] [stdout] | ^^^ [INFO] [stdout] ... [INFO] [stdout] 52 | pub fn with_truncation(mut self, stdout: bool, stderr: bool) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `SandboxAuditEntry` is never constructed [INFO] [stdout] --> src/audit.rs:119:12 [INFO] [stdout] | [INFO] [stdout] 119 | pub struct SandboxAuditEntry { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `write_sandbox_entry`, `log_sandbox_enter`, `log_sandbox_exit`, `log_sandbox_violation`, and `log_sandbox_execution` are never used [INFO] [stdout] --> src/audit.rs:332:8 [INFO] [stdout] | [INFO] [stdout] 157 | impl AuditLogger { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 332 | fn write_sandbox_entry(&self, entry: &SandboxAuditEntry) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 344 | pub fn log_sandbox_enter(&self, code_sha256: &str, profile: &str, details: Option) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 363 | pub fn log_sandbox_exit( [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 389 | pub fn log_sandbox_violation( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 415 | pub fn log_sandbox_execution( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `audit_mode` is never read [INFO] [stdout] --> src/policy.rs:236:9 [INFO] [stdout] | [INFO] [stdout] 228 | pub struct EvaluationResult { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] ... [INFO] [stdout] 236 | pub audit_mode: bool, [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `EvaluationResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `version`, `profiles`, `capabilities`, and `syscall_profiles` are never read [INFO] [stdout] --> src/policy.rs:297:9 [INFO] [stdout] | [INFO] [stdout] 293 | pub struct PolicyEngine { [INFO] [stdout] | ------------ fields in this struct [INFO] [stdout] ... [INFO] [stdout] 297 | pub version: String, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] 298 | /// v2.0: Sandbox profiles [INFO] [stdout] 299 | pub profiles: HashMap, [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] 300 | /// v2.0: Capability definitions [INFO] [stdout] 301 | pub capabilities: HashMap, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] 302 | /// v2.0: Syscall profiles [INFO] [stdout] 303 | pub syscall_profiles: HashMap, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: associated items `from_yaml`, `evaluate`, `get_profile`, `get_capability`, `profile_count`, and `list_profiles` are never used [INFO] [stdout] --> src/policy.rs:395:12 [INFO] [stdout] | [INFO] [stdout] 319 | impl PolicyEngine { [INFO] [stdout] | ----------------- associated items in this implementation [INFO] [stdout] ... [INFO] [stdout] 395 | pub fn from_yaml(yaml_content: &str) -> Result { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 405 | pub fn evaluate(&self, command: &str) -> EvaluationResult { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 507 | pub fn get_profile(&self, name: &str) -> Option<&SandboxProfile> { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 512 | pub fn get_capability(&self, name: &str) -> Option<&Capability> { [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 517 | pub fn profile_count(&self) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 522 | pub fn list_profiles(&self) -> Vec<&str> { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 27.07s [INFO] running `Command { std: "docker" "inspect" "4b33648712fae8a138b325d611c7527dde1ada812352f80288e99b12c81092b4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "4b33648712fae8a138b325d611c7527dde1ada812352f80288e99b12c81092b4", kill_on_drop: false }` [INFO] [stdout] 4b33648712fae8a138b325d611c7527dde1ada812352f80288e99b12c81092b4