[INFO] updating cached repository https://github.com/IvySeo/encrypt_file [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "-c" "remote.origin.fetch=refs/heads/*:refs/heads/*" "fetch" "origin" "--force" "--prune", kill_on_drop: false }` [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] d9bb51d13de55cf7513760d88ae0cf103c60a6b1 [INFO] testing IvySeo/encrypt_file against try#03a1ea71b075ab964b5278bc6e74cd6c52c36ee0 for pr-74409 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FIvySeo%2Fencrypt_file" "/workspace/builds/worker-13/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-13/source'... [INFO] [stderr] done. [INFO] [stderr] Checking out files: 38% (562/1468) Checking out files: 39% (573/1468) Checking out files: 40% (588/1468) Checking out files: 41% (602/1468) Checking out files: 42% (617/1468) Checking out files: 43% (632/1468) Checking out files: 44% (646/1468) Checking out files: 45% (661/1468) Checking out files: 46% (676/1468) Checking out files: 47% (690/1468) Checking out files: 48% (705/1468) Checking out files: 49% (720/1468) Checking out files: 50% (734/1468) Checking out files: 51% (749/1468) Checking out files: 52% (764/1468) Checking out files: 53% (779/1468) Checking out files: 54% (793/1468) Checking out files: 55% (808/1468) Checking out files: 56% (823/1468) Checking out files: 57% (837/1468) Checking out files: 58% (852/1468) Checking out files: 59% (867/1468) Checking out files: 60% (881/1468) Checking out files: 61% (896/1468) Checking out files: 62% (911/1468) Checking out files: 63% (925/1468) Checking out files: 64% (940/1468) Checking out files: 65% (955/1468) Checking out files: 66% (969/1468) Checking out files: 67% (984/1468) Checking out files: 68% (999/1468) Checking out files: 69% (1013/1468) Checking out files: 70% (1028/1468) Checking out files: 71% (1043/1468) Checking out files: 72% (1057/1468) Checking out files: 73% (1072/1468) Checking out files: 74% (1087/1468) Checking out files: 75% (1101/1468) Checking out files: 76% (1116/1468) Checking out files: 77% (1131/1468) Checking out files: 78% (1146/1468) Checking out files: 79% (1160/1468) Checking out files: 80% (1175/1468) Checking out files: 81% (1190/1468) Checking out files: 82% (1204/1468) Checking out files: 83% (1219/1468) Checking out files: 84% (1234/1468) Checking out files: 85% (1248/1468) Checking out files: 86% (1263/1468) Checking out files: 86% (1265/1468) Checking out files: 87% (1278/1468) Checking out files: 88% (1292/1468) Checking out files: 89% (1307/1468) Checking out files: 90% (1322/1468) Checking out files: 91% (1336/1468) Checking out files: 91% (1347/1468) Checking out files: 92% (1351/1468) Checking out files: 92% (1354/1468) Checking out files: 93% (1366/1468) Checking out files: 94% (1380/1468) Checking out files: 95% (1395/1468) Checking out files: 96% (1410/1468) Checking out files: 97% (1424/1468) Checking out files: 97% (1426/1468) Checking out files: 98% (1439/1468) Checking out files: 99% (1454/1468) Checking out files: 100% (1468/1468) Checking out files: 100% (1468/1468), done. [INFO] validating manifest of git repo https://github.com/IvySeo/encrypt_file on toolchain 03a1ea71b075ab964b5278bc6e74cd6c52c36ee0 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/IvySeo/encrypt_file [INFO] finished tweaking git repo https://github.com/IvySeo/encrypt_file [INFO] tweaked toml for git repo https://github.com/IvySeo/encrypt_file written to /workspace/builds/worker-13/source/Cargo.toml [INFO] crate git repo https://github.com/IvySeo/encrypt_file already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-13/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-13/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:d9fbb4e2287ab3795bdefaf705efb7541a8875c13bce71e067d6b01dc5ed759b" "/opt/rustwide/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] ed1cb62ab70a1573fe6a4aaa38364934fac90c35d2d1a7bc956125f161dfe711 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "ed1cb62ab70a1573fe6a4aaa38364934fac90c35d2d1a7bc956125f161dfe711", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "ed1cb62ab70a1573fe6a4aaa38364934fac90c35d2d1a7bc956125f161dfe711", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ed1cb62ab70a1573fe6a4aaa38364934fac90c35d2d1a7bc956125f161dfe711", kill_on_drop: false }` [INFO] [stdout] ed1cb62ab70a1573fe6a4aaa38364934fac90c35d2d1a7bc956125f161dfe711 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-13/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-13/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:d9fbb4e2287ab3795bdefaf705efb7541a8875c13bce71e067d6b01dc5ed759b" "/opt/rustwide/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 2b76809e32a1e540f8f6886a134dde6b1f3ad67dcb9ad43c75e0c59fcb0e0155 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "2b76809e32a1e540f8f6886a134dde6b1f3ad67dcb9ad43c75e0c59fcb0e0155", kill_on_drop: false }` [INFO] [stderr] Compiling pkg-config v0.3.17 [INFO] [stderr] Compiling autocfg v1.0.0 [INFO] [stderr] Compiling proc-macro2 v1.0.18 [INFO] [stderr] Compiling typenum v1.12.0 [INFO] [stderr] Compiling syn v1.0.31 [INFO] [stderr] Compiling crc32fast v1.2.0 [INFO] [stderr] Compiling nodrop v0.1.14 [INFO] [stderr] Compiling getrandom v0.1.14 [INFO] [stderr] Compiling serde v1.0.111 [INFO] [stderr] Compiling gimli v0.21.0 [INFO] [stderr] Compiling smallvec v1.4.0 [INFO] [stderr] Compiling ppv-lite86 v0.2.8 [INFO] [stderr] Compiling curl v0.4.29 [INFO] [stderr] Compiling object v0.19.0 [INFO] [stderr] Compiling constant_time_eq v0.1.5 [INFO] [stderr] Compiling anyhow v1.0.31 [INFO] [stderr] Compiling hex v0.2.0 [INFO] [stderr] Compiling xml-rs v0.3.6 [INFO] [stderr] Compiling log v0.4.8 [INFO] [stderr] Compiling filetime v0.2.10 [INFO] [stderr] Compiling xattr v0.2.2 [INFO] [stderr] Compiling socket2 v0.3.12 [INFO] [stderr] Compiling unicode-normalization v0.1.12 [INFO] [stderr] Compiling tar v0.4.28 [INFO] [stderr] Compiling log v0.3.9 [INFO] [stderr] Compiling rand_core v0.5.1 [INFO] [stderr] Compiling num-traits v0.2.11 [INFO] [stderr] Compiling num-integer v0.1.42 [INFO] [stderr] Compiling libflate v0.1.27 [INFO] [stderr] Compiling rand_chacha v0.2.2 [INFO] [stderr] Compiling libz-sys v1.0.25 [INFO] [stderr] Compiling openssl-sys v0.9.58 [INFO] [stderr] Compiling curl-sys v0.4.31+curl-7.70.0 [INFO] [stderr] Compiling quote v1.0.7 [INFO] [stderr] Compiling rand v0.7.3 [INFO] [stderr] Compiling idna v0.1.5 [INFO] [stderr] Compiling generic-array v0.8.3 [INFO] [stderr] Compiling libsodium-sys v0.2.5 [INFO] [stderr] Compiling digest v0.6.2 [INFO] [stderr] Compiling block-buffer v0.2.0 [INFO] [stderr] Compiling crypto-mac v0.4.0 [INFO] [stderr] Compiling url v1.7.2 [INFO] [stderr] Compiling hmac v0.4.2 [INFO] [stderr] Compiling sha2 v0.6.0 [INFO] [stderr] Compiling chrono v0.4.11 [INFO] [stderr] Compiling addr2line v0.12.1 [INFO] [stderr] Compiling backtrace v0.3.48 [INFO] [stderr] Compiling error-chain v0.10.0 [INFO] [stderr] Compiling serde_derive v1.0.111 [INFO] [stderr] Compiling serde-xml-rs v0.2.1 [INFO] [stderr] Compiling uuid v0.8.1 [INFO] [stderr] Compiling rust-s3 v0.8.2 [INFO] [stderr] Compiling sodiumoxide v0.2.5 [INFO] [stderr] Compiling encrypt_file v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variable `encrypted` is assigned to, but never used [INFO] [stdout] --> src/encrypt.rs:30:17 [INFO] [stdout] | [INFO] [stdout] 30 | let mut encrypted = "temp encrypted".to_string(); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] = note: consider using `_encrypted` instead [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `index` [INFO] [stdout] --> src/encrypt.rs:34:18 [INFO] [stdout] | [INFO] [stdout] 34 | for (index, line) in reader.lines().enumerate() { [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_index` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `encrypted` is never read [INFO] [stdout] --> src/encrypt.rs:50:17 [INFO] [stdout] | [INFO] [stdout] 50 | encrypted = format!("{:?}", encrypted_result); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_assignments)]` on by default [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `FILE_NAME_UUID` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:31:21 [INFO] [stdout] | [INFO] [stdout] 31 | let mut FILE_NAME_UUID: String = "filename_uuid".to_string(); [INFO] [stdout] | ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `file_name_uuid` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `UUID_` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:52:21 [INFO] [stdout] | [INFO] [stdout] 52 | let UUID_ = write_file::write_file(encrypted_result); [INFO] [stdout] | ^^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `UUID` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:54:24 [INFO] [stdout] | [INFO] [stdout] 54 | Ok(UUID) => { [INFO] [stdout] | ^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 6 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 3m 58s [INFO] running `Command { std: "docker" "inspect" "2b76809e32a1e540f8f6886a134dde6b1f3ad67dcb9ad43c75e0c59fcb0e0155", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "2b76809e32a1e540f8f6886a134dde6b1f3ad67dcb9ad43c75e0c59fcb0e0155", kill_on_drop: false }` [INFO] [stdout] 2b76809e32a1e540f8f6886a134dde6b1f3ad67dcb9ad43c75e0c59fcb0e0155 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-13/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-13/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:d9fbb4e2287ab3795bdefaf705efb7541a8875c13bce71e067d6b01dc5ed759b" "/opt/rustwide/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] d13ffa85b084a2742d6bdfeff1946a939fae92312aea78df7745c8a01df1b184 [INFO] running `Command { std: "docker" "start" "-a" "d13ffa85b084a2742d6bdfeff1946a939fae92312aea78df7745c8a01df1b184", kill_on_drop: false }` [INFO] [stderr] Compiling encrypt_file v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variable `encrypted` is assigned to, but never used [INFO] [stdout] --> src/encrypt.rs:30:17 [INFO] [stdout] | [INFO] [stdout] 30 | let mut encrypted = "temp encrypted".to_string(); [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] = note: consider using `_encrypted` instead [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `index` [INFO] [stdout] --> src/encrypt.rs:34:18 [INFO] [stdout] | [INFO] [stdout] 34 | for (index, line) in reader.lines().enumerate() { [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_index` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `encrypted` is never read [INFO] [stdout] --> src/encrypt.rs:50:17 [INFO] [stdout] | [INFO] [stdout] 50 | encrypted = format!("{:?}", encrypted_result); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_assignments)]` on by default [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `FILE_NAME_UUID` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:31:21 [INFO] [stdout] | [INFO] [stdout] 31 | let mut FILE_NAME_UUID: String = "filename_uuid".to_string(); [INFO] [stdout] | ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `file_name_uuid` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `UUID_` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:52:21 [INFO] [stdout] | [INFO] [stdout] 52 | let UUID_ = write_file::write_file(encrypted_result); [INFO] [stdout] | ^^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `UUID` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:54:24 [INFO] [stdout] | [INFO] [stdout] 54 | Ok(UUID) => { [INFO] [stdout] | ^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 6 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 1.72s [INFO] running `Command { std: "docker" "inspect" "d13ffa85b084a2742d6bdfeff1946a939fae92312aea78df7745c8a01df1b184", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d13ffa85b084a2742d6bdfeff1946a939fae92312aea78df7745c8a01df1b184", kill_on_drop: false }` [INFO] [stdout] d13ffa85b084a2742d6bdfeff1946a939fae92312aea78df7745c8a01df1b184 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-13/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-13/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:d9fbb4e2287ab3795bdefaf705efb7541a8875c13bce71e067d6b01dc5ed759b" "/opt/rustwide/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "test" "--frozen", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] cc19f5a220cbaaaf44a21d603ab79865a67d107da0c98ea679e6f74ef1423a87 [INFO] running `Command { std: "docker" "start" "-a" "cc19f5a220cbaaaf44a21d603ab79865a67d107da0c98ea679e6f74ef1423a87", kill_on_drop: false }` [INFO] [stderr] warning: variable `encrypted` is assigned to, but never used [INFO] [stderr] --> src/encrypt.rs:30:17 [INFO] [stderr] | [INFO] [stderr] 30 | let mut encrypted = "temp encrypted".to_string(); [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] = note: consider using `_encrypted` instead [INFO] [stderr] [INFO] [stderr] warning: unused variable: `index` [INFO] [stderr] --> src/encrypt.rs:34:18 [INFO] [stderr] | [INFO] [stderr] 34 | for (index, line) in reader.lines().enumerate() { [INFO] [stderr] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_index` [INFO] [stderr] [INFO] [stderr] warning: value assigned to `encrypted` is never read [INFO] [stderr] --> src/encrypt.rs:50:17 [INFO] [stderr] | [INFO] [stderr] 50 | encrypted = format!("{:?}", encrypted_result); [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_assignments)]` on by default [INFO] [stderr] = help: maybe it is overwritten before being read? [INFO] [stderr] [INFO] [stderr] warning: variable `FILE_NAME_UUID` should have a snake case name [INFO] [stderr] --> src/encrypt.rs:31:21 [INFO] [stderr] | [INFO] [stderr] 31 | let mut FILE_NAME_UUID: String = "filename_uuid".to_string(); [INFO] [stderr] | ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `file_name_uuid` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(non_snake_case)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable `UUID_` should have a snake case name [INFO] [stderr] --> src/encrypt.rs:52:21 [INFO] [stderr] | [INFO] [stderr] 52 | let UUID_ = write_file::write_file(encrypted_result); [INFO] [stderr] | ^^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stderr] [INFO] [stderr] warning: variable `UUID` should have a snake case name [INFO] [stderr] --> src/encrypt.rs:54:24 [INFO] [stderr] | [INFO] [stderr] 54 | Ok(UUID) => { [INFO] [stderr] | ^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stderr] [INFO] [stderr] warning: 6 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.25s [INFO] [stderr] Running /opt/rustwide/target/debug/deps/encrypt_file-8f041cec3f9ac4ab [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "cc19f5a220cbaaaf44a21d603ab79865a67d107da0c98ea679e6f74ef1423a87", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "cc19f5a220cbaaaf44a21d603ab79865a67d107da0c98ea679e6f74ef1423a87", kill_on_drop: false }` [INFO] [stdout] cc19f5a220cbaaaf44a21d603ab79865a67d107da0c98ea679e6f74ef1423a87