[INFO] updating cached repository https://github.com/mjhd-devlion/json-in-rust [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "-c" "remote.origin.fetch=refs/heads/*:refs/heads/*" "fetch" "origin" "--force" "--prune", kill_on_drop: false }` [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 028b266bd3e146b81f1b31cc99962fe976255f07 [INFO] testing mjhd-devlion/json-in-rust against try#03a1ea71b075ab964b5278bc6e74cd6c52c36ee0 for pr-74409 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fmjhd-devlion%2Fjson-in-rust" "/workspace/builds/worker-8/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-8/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/mjhd-devlion/json-in-rust on toolchain 03a1ea71b075ab964b5278bc6e74cd6c52c36ee0 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/mjhd-devlion/json-in-rust [INFO] finished tweaking git repo https://github.com/mjhd-devlion/json-in-rust [INFO] tweaked toml for git repo https://github.com/mjhd-devlion/json-in-rust written to /workspace/builds/worker-8/source/Cargo.toml [INFO] crate git repo https://github.com/mjhd-devlion/json-in-rust already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:d9fbb4e2287ab3795bdefaf705efb7541a8875c13bce71e067d6b01dc5ed759b" "/opt/rustwide/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 18080a73a784ba0c4751821493b06955c5c90cae95f244fdebe3dc477dff717d [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "18080a73a784ba0c4751821493b06955c5c90cae95f244fdebe3dc477dff717d", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "18080a73a784ba0c4751821493b06955c5c90cae95f244fdebe3dc477dff717d", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "18080a73a784ba0c4751821493b06955c5c90cae95f244fdebe3dc477dff717d", kill_on_drop: false }` [INFO] [stdout] 18080a73a784ba0c4751821493b06955c5c90cae95f244fdebe3dc477dff717d [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:d9fbb4e2287ab3795bdefaf705efb7541a8875c13bce71e067d6b01dc5ed759b" "/opt/rustwide/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 7dc489712a7b869f6447f3a68847cb044889496193bf10ee60e8ccb74deffac2 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "7dc489712a7b869f6447f3a68847cb044889496193bf10ee60e8ccb74deffac2", kill_on_drop: false }` [INFO] [stderr] Compiling json-in-rust v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `ctx` [INFO] [stdout] --> src/main.rs:557:27 [INFO] [stdout] | [INFO] [stdout] 557 | fn value_start(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `ctx` [INFO] [stdout] --> src/main.rs:566:28 [INFO] [stdout] | [INFO] [stdout] 566 | fn member_start(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `ctx` [INFO] [stdout] --> src/main.rs:666:25 [INFO] [stdout] | [INFO] [stdout] 666 | fn value_end(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `ctx` [INFO] [stdout] --> src/main.rs:684:24 [INFO] [stdout] | [INFO] [stdout] 684 | fn json_end(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: cannot borrow `*ctx` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/main.rs:630:13 [INFO] [stdout] | [INFO] [stdout] 629 | if let Some(Value::ArrayValue(array)) = ctx.peek() { [INFO] [stdout] | --- immutable borrow occurs here [INFO] [stdout] 630 | ctx.push(Value::ArrayValue(vec![ [INFO] [stdout] | ^^^ mutable borrow occurs here [INFO] [stdout] 631 | array.clone(), [INFO] [stdout] | ----- immutable borrow later used here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant is never constructed: `ArrayValue` [INFO] [stdout] --> src/main.rs:489:5 [INFO] [stdout] | [INFO] [stdout] 489 | ArrayValue(Vec), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `parserCtx` should have a snake case name [INFO] [stdout] --> src/main.rs:708:13 [INFO] [stdout] | [INFO] [stdout] 708 | let mut parserCtx = ParserContext::new(&tokens); [INFO] [stdout] | ^^^^^^^^^ help: convert the identifier to snake case: `parser_ctx` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 7 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 0.66s [INFO] running `Command { std: "docker" "inspect" "7dc489712a7b869f6447f3a68847cb044889496193bf10ee60e8ccb74deffac2", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "7dc489712a7b869f6447f3a68847cb044889496193bf10ee60e8ccb74deffac2", kill_on_drop: false }` [INFO] [stdout] 7dc489712a7b869f6447f3a68847cb044889496193bf10ee60e8ccb74deffac2 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:d9fbb4e2287ab3795bdefaf705efb7541a8875c13bce71e067d6b01dc5ed759b" "/opt/rustwide/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 4247a57a014a9bc1105a41732a7e588a8782d18749305111cc8d88931f8d713c [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "4247a57a014a9bc1105a41732a7e588a8782d18749305111cc8d88931f8d713c", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Compiling json-in-rust v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `ctx` [INFO] [stdout] --> src/main.rs:557:27 [INFO] [stdout] | [INFO] [stdout] 557 | fn value_start(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `ctx` [INFO] [stdout] --> src/main.rs:566:28 [INFO] [stdout] | [INFO] [stdout] 566 | fn member_start(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `ctx` [INFO] [stdout] --> src/main.rs:666:25 [INFO] [stdout] | [INFO] [stdout] 666 | fn value_end(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `ctx` [INFO] [stdout] --> src/main.rs:684:24 [INFO] [stdout] | [INFO] [stdout] 684 | fn json_end(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: cannot borrow `*ctx` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/main.rs:630:13 [INFO] [stdout] | [INFO] [stdout] 629 | if let Some(Value::ArrayValue(array)) = ctx.peek() { [INFO] [stdout] | --- immutable borrow occurs here [INFO] [stdout] 630 | ctx.push(Value::ArrayValue(vec![ [INFO] [stdout] | ^^^ mutable borrow occurs here [INFO] [stdout] 631 | array.clone(), [INFO] [stdout] | ----- immutable borrow later used here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant is never constructed: `ArrayValue` [INFO] [stdout] --> src/main.rs:489:5 [INFO] [stdout] | [INFO] [stdout] 489 | ArrayValue(Vec), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `parserCtx` should have a snake case name [INFO] [stdout] --> src/main.rs:708:13 [INFO] [stdout] | [INFO] [stdout] 708 | let mut parserCtx = ParserContext::new(&tokens); [INFO] [stdout] | ^^^^^^^^^ help: convert the identifier to snake case: `parser_ctx` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 7 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.44s [INFO] running `Command { std: "docker" "inspect" "4247a57a014a9bc1105a41732a7e588a8782d18749305111cc8d88931f8d713c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "4247a57a014a9bc1105a41732a7e588a8782d18749305111cc8d88931f8d713c", kill_on_drop: false }` [INFO] [stdout] 4247a57a014a9bc1105a41732a7e588a8782d18749305111cc8d88931f8d713c [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:d9fbb4e2287ab3795bdefaf705efb7541a8875c13bce71e067d6b01dc5ed759b" "/opt/rustwide/cargo-home/bin/cargo" "+03a1ea71b075ab964b5278bc6e74cd6c52c36ee0" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] ce7f0f244c816d72b65e5fc864470e5fd8783269dfe760031f9e0b1bacc9afa9 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "ce7f0f244c816d72b65e5fc864470e5fd8783269dfe760031f9e0b1bacc9afa9", kill_on_drop: false }` [INFO] [stderr] warning: unused variable: `ctx` [INFO] [stderr] --> src/main.rs:557:27 [INFO] [stderr] | [INFO] [stderr] 557 | fn value_start(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `ctx` [INFO] [stderr] --> src/main.rs:566:28 [INFO] [stderr] | [INFO] [stderr] 566 | fn member_start(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `ctx` [INFO] [stderr] --> src/main.rs:666:25 [INFO] [stderr] | [INFO] [stderr] 666 | fn value_end(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `ctx` [INFO] [stderr] --> src/main.rs:684:24 [INFO] [stderr] | [INFO] [stderr] 684 | fn json_end(&self, ctx: &mut ParserContext) -> Result<(), String> { [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_ctx` [INFO] [stderr] [INFO] [stderr] warning: cannot borrow `*ctx` as mutable because it is also borrowed as immutable [INFO] [stderr] --> src/main.rs:630:13 [INFO] [stderr] | [INFO] [stderr] 629 | if let Some(Value::ArrayValue(array)) = ctx.peek() { [INFO] [stderr] | --- immutable borrow occurs here [INFO] [stderr] 630 | ctx.push(Value::ArrayValue(vec![ [INFO] [stderr] | ^^^ mutable borrow occurs here [INFO] [stderr] 631 | array.clone(), [INFO] [stderr] | ----- immutable borrow later used here [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stderr] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stderr] = note: for more information, see issue #59159 [INFO] [stderr] [INFO] [stderr] warning: variant is never constructed: `ArrayValue` [INFO] [stderr] --> src/main.rs:489:5 [INFO] [stderr] | [INFO] [stderr] 489 | ArrayValue(Vec), [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(dead_code)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable `parserCtx` should have a snake case name [INFO] [stderr] --> src/main.rs:708:13 [INFO] [stderr] | [INFO] [stderr] 708 | let mut parserCtx = ParserContext::new(&tokens); [INFO] [stderr] | ^^^^^^^^^ help: convert the identifier to snake case: `parser_ctx` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(non_snake_case)]` on by default [INFO] [stderr] [INFO] [stderr] warning: 7 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.02s [INFO] [stderr] Running /opt/rustwide/target/debug/deps/json_in_rust-75ba0dc4b16a60a4 [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "ce7f0f244c816d72b65e5fc864470e5fd8783269dfe760031f9e0b1bacc9afa9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ce7f0f244c816d72b65e5fc864470e5fd8783269dfe760031f9e0b1bacc9afa9", kill_on_drop: false }` [INFO] [stdout] ce7f0f244c816d72b65e5fc864470e5fd8783269dfe760031f9e0b1bacc9afa9