[INFO] cloning repository https://github.com/CGQAQ/rust_astar [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/CGQAQ/rust_astar" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FCGQAQ%2Frust_astar", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FCGQAQ%2Frust_astar'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 715609425f5816ed2235bbb1518256219e9e3b2e [INFO] checking CGQAQ/rust_astar against try#b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8 for pr-78363 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FCGQAQ%2Frust_astar" "/workspace/builds/worker-3/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-3/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/CGQAQ/rust_astar on toolchain b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/CGQAQ/rust_astar [INFO] finished tweaking git repo https://github.com/CGQAQ/rust_astar [INFO] tweaked toml for git repo https://github.com/CGQAQ/rust_astar written to /workspace/builds/worker-3/source/Cargo.toml [INFO] crate git repo https://github.com/CGQAQ/rust_astar already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] a777bb9f3a592d2fef42a9a68617e282a0bfc8b5f217f2e4abcfaa70700e9655 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "a777bb9f3a592d2fef42a9a68617e282a0bfc8b5f217f2e4abcfaa70700e9655", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "a777bb9f3a592d2fef42a9a68617e282a0bfc8b5f217f2e4abcfaa70700e9655", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "a777bb9f3a592d2fef42a9a68617e282a0bfc8b5f217f2e4abcfaa70700e9655", kill_on_drop: false }` [INFO] [stdout] a777bb9f3a592d2fef42a9a68617e282a0bfc8b5f217f2e4abcfaa70700e9655 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] a7cb8baf757ca2256fac9f4fa31357990cf48f7e9525b06b5e701937d7746f8f [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "a7cb8baf757ca2256fac9f4fa31357990cf48f7e9525b06b5e701937d7746f8f", kill_on_drop: false }` [INFO] [stderr] Checking astar v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variable `openSet` should have a snake case name [INFO] [stdout] --> src/main.rs:33:13 [INFO] [stdout] | [INFO] [stdout] 33 | let mut openSet: Vec>> = vec![start.clone()]; [INFO] [stdout] | ^^^^^^^ help: convert the identifier to snake case: `open_set` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `openSet` should have a snake case name [INFO] [stdout] --> src/main.rs:67:25 [INFO] [stdout] | [INFO] [stdout] 67 | let mut openSet = openSet.clone(); [INFO] [stdout] | ^^^^^^^ help: convert the identifier to snake case: `open_set` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `tentative_gScore` should have a snake case name [INFO] [stdout] --> src/main.rs:68:21 [INFO] [stdout] | [INFO] [stdout] 68 | let tentative_gScore = current.upgrade().unwrap().borrow().gscore + 1; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `tentative_g_score` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `openSet` should have a snake case name [INFO] [stdout] --> src/main.rs:33:13 [INFO] [stdout] | [INFO] [stdout] 33 | let mut openSet: Vec>> = vec![start.clone()]; [INFO] [stdout] | ^^^^^^^ help: convert the identifier to snake case: `open_set` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `openSet` should have a snake case name [INFO] [stdout] --> src/main.rs:67:25 [INFO] [stdout] | [INFO] [stdout] 67 | let mut openSet = openSet.clone(); [INFO] [stdout] | ^^^^^^^ help: convert the identifier to snake case: `open_set` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `tentative_gScore` should have a snake case name [INFO] [stdout] --> src/main.rs:68:21 [INFO] [stdout] | [INFO] [stdout] 68 | let tentative_gScore = current.upgrade().unwrap().borrow().gscore + 1; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `tentative_g_score` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 0.20s [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "a7cb8baf757ca2256fac9f4fa31357990cf48f7e9525b06b5e701937d7746f8f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "a7cb8baf757ca2256fac9f4fa31357990cf48f7e9525b06b5e701937d7746f8f", kill_on_drop: false }` [INFO] [stdout] a7cb8baf757ca2256fac9f4fa31357990cf48f7e9525b06b5e701937d7746f8f