[INFO] fetching crate myanimelist-rs 0.1.0... [INFO] checking myanimelist-rs-0.1.0 against master#39b841dfe36f90a7cd111e7f0c55f32594f6e578 for pr-77035 [INFO] extracting crate myanimelist-rs 0.1.0 into /workspace/builds/worker-8/source [INFO] validating manifest of crates.io crate myanimelist-rs 0.1.0 on toolchain 39b841dfe36f90a7cd111e7f0c55f32594f6e578 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+39b841dfe36f90a7cd111e7f0c55f32594f6e578" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking crates.io crate myanimelist-rs 0.1.0 [INFO] finished tweaking crates.io crate myanimelist-rs 0.1.0 [INFO] tweaked toml for crates.io crate myanimelist-rs 0.1.0 written to /workspace/builds/worker-8/source/Cargo.toml [INFO] crate crates.io crate myanimelist-rs 0.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+39b841dfe36f90a7cd111e7f0c55f32594f6e578" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: file found to be present in multiple build targets: /workspace/builds/worker-8/source/examples/auth.rs [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:c8ac004eab7d63a0ad09a2dde3d3353ba464f767bee4de425dc8f74c46a1905e" "/opt/rustwide/cargo-home/bin/cargo" "+39b841dfe36f90a7cd111e7f0c55f32594f6e578" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] eb5e7b03fdf0b2bd48acc4aa88016108da5b5a4594f4b12c1978b09243c13f91 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "eb5e7b03fdf0b2bd48acc4aa88016108da5b5a4594f4b12c1978b09243c13f91", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "eb5e7b03fdf0b2bd48acc4aa88016108da5b5a4594f4b12c1978b09243c13f91", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "eb5e7b03fdf0b2bd48acc4aa88016108da5b5a4594f4b12c1978b09243c13f91", kill_on_drop: false }` [INFO] [stdout] eb5e7b03fdf0b2bd48acc4aa88016108da5b5a4594f4b12c1978b09243c13f91 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:c8ac004eab7d63a0ad09a2dde3d3353ba464f767bee4de425dc8f74c46a1905e" "/opt/rustwide/cargo-home/bin/cargo" "+39b841dfe36f90a7cd111e7f0c55f32594f6e578" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 8ed5df61c8e3aec3bf8070b5ddefa4f9d1da6f59b5da5d4d19aa38c47dd114d3 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "8ed5df61c8e3aec3bf8070b5ddefa4f9d1da6f59b5da5d4d19aa38c47dd114d3", kill_on_drop: false }` [INFO] [stderr] warning: file found to be present in multiple build targets: /opt/rustwide/workdir/examples/auth.rs [INFO] [stderr] Compiling libc v0.2.72 [INFO] [stderr] Checking cfg-if v0.1.10 [INFO] [stderr] Compiling proc-macro2 v1.0.18 [INFO] [stderr] Compiling unicode-xid v0.2.1 [INFO] [stderr] Compiling syn v1.0.33 [INFO] [stderr] Compiling log v0.4.8 [INFO] [stderr] Checking lazy_static v1.4.0 [INFO] [stderr] Compiling cc v1.0.58 [INFO] [stderr] Checking slab v0.4.2 [INFO] [stderr] Checking bytes v0.5.5 [INFO] [stderr] Checking futures-core v0.3.5 [INFO] [stderr] Compiling pin-project-internal v0.4.22 [INFO] [stderr] Checking pin-project-lite v0.1.7 [INFO] [stderr] Checking foreign-types-shared v0.1.1 [INFO] [stderr] Compiling getrandom v0.1.14 [INFO] [stderr] Compiling httparse v1.3.4 [INFO] [stderr] Checking futures-sink v0.3.5 [INFO] [stderr] Checking matches v0.1.8 [INFO] [stderr] Checking openssl-probe v0.1.2 [INFO] [stderr] Checking try-lock v0.2.2 [INFO] [stderr] Compiling encoding_rs v0.8.23 [INFO] [stderr] Checking percent-encoding v2.1.0 [INFO] [stderr] Compiling proc-macro-hack v0.5.16 [INFO] [stderr] Compiling serde_json v1.0.56 [INFO] [stderr] Checking ppv-lite86 v0.2.8 [INFO] [stderr] Checking mime v0.3.16 [INFO] [stderr] Compiling unicase v2.6.0 [INFO] [stderr] Compiling standback v0.2.9 [INFO] [stderr] Compiling indexmap v1.4.0 [INFO] [stderr] Compiling time v0.2.16 [INFO] [stderr] Checking foreign-types v0.3.2 [INFO] [stderr] Checking thread_local v1.0.1 [INFO] [stderr] Checking futures-channel v0.3.5 [INFO] [stderr] Checking unicode-bidi v0.3.4 [INFO] [stderr] Checking http v0.2.1 [INFO] [stderr] Checking regex v1.3.9 [INFO] [stderr] Checking unicode-normalization v0.1.9 [INFO] [stderr] Checking want v0.3.0 [INFO] [stderr] Compiling mime_guess v2.0.3 [INFO] [stderr] Compiling openssl-sys v0.9.58 [INFO] [stderr] Compiling quote v1.0.7 [INFO] [stderr] Checking net2 v0.2.34 [INFO] [stderr] Checking iovec v0.1.4 [INFO] [stderr] Checking num_cpus v1.13.0 [INFO] [stderr] Checking time v0.1.43 [INFO] [stderr] Checking socket2 v0.3.12 [INFO] [stderr] Checking idna v0.2.0 [INFO] [stderr] Checking mio v0.6.22 [INFO] [stderr] Checking rand_core v0.5.1 [INFO] [stderr] Checking rand_chacha v0.2.2 [INFO] [stderr] Compiling openssl v0.10.30 [INFO] [stderr] Compiling native-tls v0.2.4 [INFO] [stderr] Checking rand v0.7.3 [INFO] [stderr] Checking tokio v0.2.21 [INFO] [stderr] Checking url v2.1.1 [INFO] [stderr] Checking http-body v0.3.1 [INFO] [stderr] Checking tokio-util v0.3.1 [INFO] [stderr] Checking tokio-tls v0.3.1 [INFO] [stderr] Compiling serde_derive v1.0.114 [INFO] [stderr] Compiling time-macros-impl v0.1.1 [INFO] [stderr] Compiling strum_macros v0.18.0 [INFO] [stderr] Checking time-macros v0.1.0 [INFO] [stderr] Checking pin-project v0.4.22 [INFO] [stderr] Checking futures-util v0.3.5 [INFO] [stderr] Checking serde v1.0.114 [INFO] [stderr] Checking h2 v0.2.5 [INFO] [stderr] Checking hyper v0.13.6 [INFO] [stderr] Checking serde_urlencoded v0.6.1 [INFO] [stderr] Checking hyper-tls v0.4.3 [INFO] [stderr] Checking reqwest v0.10.6 [INFO] [stderr] Checking myanimelist-rs v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_network_general`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | / fn test_network_general() { [INFO] [stdout] 205 | | let request = reqwest::blocking::ClientBuilder::new() [INFO] [stdout] 206 | | .user_agent("ACC") [INFO] [stdout] 207 | | .build() [INFO] [stdout] ... | [INFO] [stdout] 211 | | assert!(response.status().is_success()); [INFO] [stdout] 212 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_mal_general`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:216:5 [INFO] [stdout] | [INFO] [stdout] 216 | / fn test_mal_general() { [INFO] [stdout] 217 | | let request = reqwest::blocking::ClientBuilder::new() [INFO] [stdout] 218 | | .user_agent("ACC") [INFO] [stdout] 219 | | .build() [INFO] [stdout] ... | [INFO] [stdout] 223 | | assert!(response.status().is_success()); [INFO] [stdout] 224 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_old_auth`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:228:5 [INFO] [stdout] | [INFO] [stdout] 228 | / fn test_old_auth() { [INFO] [stdout] 229 | | let credentials = get_env_credentials(); [INFO] [stdout] 230 | | Auth::new("AnimeCommandCenter", credentials.client_id, credentials.username, credentials.password).request().unwrap(); [INFO] [stdout] 231 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_old_auth_bad_credentials`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | / fn test_old_auth_bad_credentials() { [INFO] [stdout] 236 | | let client_id = std::env::var("MAL_TEST_CLIENT_ID").unwrap(); [INFO] [stdout] 237 | | let username = "thisisnotarealusernameihope"; [INFO] [stdout] 238 | | let password = "butthisisdefinitelynotitspassword"; [INFO] [stdout] ... | [INFO] [stdout] 248 | | } [INFO] [stdout] 249 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 4 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 1m 19s [INFO] running `Command { std: "docker" "inspect" "8ed5df61c8e3aec3bf8070b5ddefa4f9d1da6f59b5da5d4d19aa38c47dd114d3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "8ed5df61c8e3aec3bf8070b5ddefa4f9d1da6f59b5da5d4d19aa38c47dd114d3", kill_on_drop: false }` [INFO] [stdout] 8ed5df61c8e3aec3bf8070b5ddefa4f9d1da6f59b5da5d4d19aa38c47dd114d3