[INFO] crate rstest 0.2.2 is already in cache [INFO] extracting crate rstest 0.2.2 into work/ex/pr-61100/sources/master#8869ee03d7f258e1b76a11c6fbb01b5708a9f504/reg/rstest/0.2.2 [INFO] extracting crate rstest 0.2.2 into work/ex/pr-61100/sources/try#58b21121d0b447ceb3f1a655155d802191acf044/reg/rstest/0.2.2 [INFO] validating manifest of rstest-0.2.2 on toolchain master#8869ee03d7f258e1b76a11c6fbb01b5708a9f504 [INFO] running `"/mnt/crater-raid/crater/work/local/cargo-home/bin/cargo" "+8869ee03d7f258e1b76a11c6fbb01b5708a9f504-alt" "read-manifest" "--manifest-path" "Cargo.toml"` [INFO] validating manifest of rstest-0.2.2 on toolchain try#58b21121d0b447ceb3f1a655155d802191acf044 [INFO] running `"/mnt/crater-raid/crater/work/local/cargo-home/bin/cargo" "+58b21121d0b447ceb3f1a655155d802191acf044-alt" "read-manifest" "--manifest-path" "Cargo.toml"` [INFO] started frobbing rstest-0.2.2 [INFO] finished frobbing rstest-0.2.2 [INFO] frobbed toml for rstest-0.2.2 written to work/ex/pr-61100/sources/master#8869ee03d7f258e1b76a11c6fbb01b5708a9f504/reg/rstest/0.2.2/Cargo.toml [INFO] started frobbing rstest-0.2.2 [INFO] finished frobbing rstest-0.2.2 [INFO] frobbed toml for rstest-0.2.2 written to work/ex/pr-61100/sources/try#58b21121d0b447ceb3f1a655155d802191acf044/reg/rstest/0.2.2/Cargo.toml [INFO] running `"/mnt/crater-raid/crater/work/local/cargo-home/bin/cargo" "+8869ee03d7f258e1b76a11c6fbb01b5708a9f504-alt" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update"` [INFO] running `"/mnt/crater-raid/crater/work/local/cargo-home/bin/cargo" "+58b21121d0b447ceb3f1a655155d802191acf044-alt" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update"` [INFO] running `"/mnt/crater-raid/crater/work/local/cargo-home/bin/cargo" "+8869ee03d7f258e1b76a11c6fbb01b5708a9f504-alt" "fetch" "--locked" "--manifest-path" "Cargo.toml"` [INFO] running `"/mnt/crater-raid/crater/work/local/cargo-home/bin/cargo" "+58b21121d0b447ceb3f1a655155d802191acf044-alt" "fetch" "--locked" "--manifest-path" "Cargo.toml"` [INFO] checking rstest-0.2.2 against master#8869ee03d7f258e1b76a11c6fbb01b5708a9f504 for pr-61100 [INFO] running `"docker" "create" "-v" "/mnt/crater-raid/crater/work/local/target-dirs/pr-61100/worker-7/master#8869ee03d7f258e1b76a11c6fbb01b5708a9f504:/opt/crater/target:rw,Z" "-v" "/mnt/crater-raid/crater/work/ex/pr-61100/sources/master#8869ee03d7f258e1b76a11c6fbb01b5708a9f504/reg/rstest/0.2.2:/opt/crater/workdir:ro,Z" "-v" "/mnt/crater-raid/crater/work/local/cargo-home:/opt/crater/cargo-home:ro,Z" "-v" "/mnt/crater-raid/crater/work/local/rustup-home:/opt/crater/rustup-home:ro,Z" "-e" "USER_ID=1000" "-e" "SOURCE_DIR=/opt/crater/workdir" "-e" "MAP_USER_ID=1000" "-e" "CARGO_TARGET_DIR=/opt/crater/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/crater/cargo-home" "-e" "RUSTUP_HOME=/opt/crater/rustup-home" "-w" "/opt/crater/workdir" "-m" "1536M" "--network" "none" "rustops/crates-build-env" "/opt/crater/cargo-home/bin/cargo" "+8869ee03d7f258e1b76a11c6fbb01b5708a9f504-alt" "check" "--frozen" "--all" "--all-targets"` [INFO] [stdout] b9c9604067a3275ad0cb01e13d02e89b9015b7d2a0369b3a126d1585aa4dd2ea [INFO] running `"docker" "start" "-a" "b9c9604067a3275ad0cb01e13d02e89b9015b7d2a0369b3a126d1585aa4dd2ea"` [INFO] [stderr] Checking temp_testdir v0.2.2 [INFO] [stderr] Compiling syn v0.14.9 [INFO] [stderr] Checking toml_edit v0.1.3 [INFO] [stderr] warning[E0502]: cannot borrow `v` as immutable because it is also borrowed as mutable [INFO] [stderr] --> /opt/crater/cargo-home/registry/src/github.com-1ecc6299db9ec823/toml_edit-0.1.3/src/index.rs:55:65 [INFO] [stderr] | [INFO] [stderr] 44 | fn index_or_insert<'v>(&self, v: &'v mut Item) -> &'v mut Item { [INFO] [stderr] | -- lifetime `'v` defined here [INFO] [stderr] 45 | / match *v { [INFO] [stderr] 46 | | Item::ArrayOfTables(ref mut vec) => { [INFO] [stderr] 47 | | vec.values.get_mut(*self).expect("index out of bounds") [INFO] [stderr] 48 | | } [INFO] [stderr] 49 | | Item::Value(ref mut a) if a.is_array() => a [INFO] [stderr] | | --------- mutable borrow occurs here [INFO] [stderr] ... | [INFO] [stderr] 55 | | _ => panic!("cannot access index {} in {:?}", self, v), [INFO] [stderr] | | ^ immutable borrow occurs here [INFO] [stderr] 56 | | } [INFO] [stderr] | |_________- returning this value requires that `v.0` is borrowed for `'v` [INFO] [stderr] | [INFO] [stderr] = warning: this error has been downgraded to a warning for backwards compatibility with previous releases [INFO] [stderr] = warning: this represents potential undefined behavior in your code and this warning will become a hard error in the future [INFO] [stderr] = note: for more information, try `rustc --explain E0729` [INFO] [stderr] [INFO] [stderr] warning[E0502]: cannot borrow `v` as immutable because it is also borrowed as mutable [INFO] [stderr] --> /opt/crater/cargo-home/registry/src/github.com-1ecc6299db9ec823/toml_edit-0.1.3/src/index.rs:88:63 [INFO] [stderr] | [INFO] [stderr] 70 | fn index_or_insert<'v>(&self, v: &'v mut Item) -> &'v mut Item { [INFO] [stderr] | -- lifetime `'v` defined here [INFO] [stderr] ... [INFO] [stderr] 77 | / match *v { [INFO] [stderr] 78 | | Item::Table(ref mut t) => t.entry(self).or_insert(Item::None), [INFO] [stderr] 79 | | Item::Value(ref mut v) if v.is_inline_table() => { [INFO] [stderr] | | --------- mutable borrow occurs here [INFO] [stderr] 80 | | &mut v [INFO] [stderr] ... | [INFO] [stderr] 88 | | _ => panic!("cannot access key {} in {:?}", self, v), [INFO] [stderr] | | ^ immutable borrow occurs here [INFO] [stderr] 89 | | } [INFO] [stderr] | |_________- returning this value requires that `v.0` is borrowed for `'v` [INFO] [stderr] | [INFO] [stderr] = warning: this error has been downgraded to a warning for backwards compatibility with previous releases [INFO] [stderr] = warning: this represents potential undefined behavior in your code and this warning will become a hard error in the future [INFO] [stderr] = note: for more information, try `rustc --explain E0729` [INFO] [stderr] [INFO] [stderr] Checking rstest v0.2.2 (/opt/crater/workdir) [INFO] [stderr] warning: static variable `root_dir` should have an upper case name [INFO] [stderr] --> tests/fixture.rs:15:16 [INFO] [stderr] | [INFO] [stderr] 15 | static ref root_dir: TempDir = TempDir::default().permanent(); [INFO] [stderr] | ^^^^^^^^ help: convert the identifier to upper case: `ROOT_DIR` [INFO] [stderr] | [INFO] [stderr] = note: #[warn(non_upper_case_globals)] on by default [INFO] [stderr] [INFO] [stderr] warning: static variable `root_project` should have an upper case name [INFO] [stderr] --> tests/fixture.rs:16:16 [INFO] [stderr] | [INFO] [stderr] 16 | static ref root_project: Project = Project::new(root_dir.as_ref()).create(); [INFO] [stderr] | ^^^^^^^^^^^^ help: convert the identifier to upper case: `ROOT_PROJECT` [INFO] [stderr] [INFO] [stderr] warning: static variable `root_dir` should have an upper case name [INFO] [stderr] --> tests/parametrize.rs:15:16 [INFO] [stderr] | [INFO] [stderr] 15 | static ref root_dir: TempDir = TempDir::default().permanent(); [INFO] [stderr] | ^^^^^^^^ help: convert the identifier to upper case: `ROOT_DIR` [INFO] [stderr] | [INFO] [stderr] = note: #[warn(non_upper_case_globals)] on by default [INFO] [stderr] [INFO] [stderr] warning: static variable `root_project` should have an upper case name [INFO] [stderr] --> tests/parametrize.rs:16:16 [INFO] [stderr] | [INFO] [stderr] 16 | static ref root_project: Project = Project::new(root_dir.as_ref()).create(); [INFO] [stderr] | ^^^^^^^^^^^^ help: convert the identifier to upper case: `ROOT_PROJECT` [INFO] [stderr] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 20.92s [INFO] running `"docker" "inspect" "b9c9604067a3275ad0cb01e13d02e89b9015b7d2a0369b3a126d1585aa4dd2ea"` [INFO] running `"docker" "rm" "-f" "b9c9604067a3275ad0cb01e13d02e89b9015b7d2a0369b3a126d1585aa4dd2ea"` [INFO] [stdout] b9c9604067a3275ad0cb01e13d02e89b9015b7d2a0369b3a126d1585aa4dd2ea