[INFO] fetching crate myanimelist-rs 0.1.0... [INFO] checking myanimelist-rs-0.1.0 against try#b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8 for pr-78363 [INFO] extracting crate myanimelist-rs 0.1.0 into /workspace/builds/worker-5/source [INFO] validating manifest of crates.io crate myanimelist-rs 0.1.0 on toolchain b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking crates.io crate myanimelist-rs 0.1.0 [INFO] finished tweaking crates.io crate myanimelist-rs 0.1.0 [INFO] tweaked toml for crates.io crate myanimelist-rs 0.1.0 written to /workspace/builds/worker-5/source/Cargo.toml [INFO] crate crates.io crate myanimelist-rs 0.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: file found to be present in multiple build targets: /workspace/builds/worker-5/source/examples/sync.rs [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded reqwest v0.10.6 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 085afe83d10146600c25a341f57cef4d6ca1a03dc7ce35a6bf4933a0c3d9d0aa [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "085afe83d10146600c25a341f57cef4d6ca1a03dc7ce35a6bf4933a0c3d9d0aa", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "085afe83d10146600c25a341f57cef4d6ca1a03dc7ce35a6bf4933a0c3d9d0aa", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "085afe83d10146600c25a341f57cef4d6ca1a03dc7ce35a6bf4933a0c3d9d0aa", kill_on_drop: false }` [INFO] [stdout] 085afe83d10146600c25a341f57cef4d6ca1a03dc7ce35a6bf4933a0c3d9d0aa [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] b6cb612130de4db7aae2a3a338bfe5841bb3a8879cc5b68e60c12cffbc6a3f87 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "b6cb612130de4db7aae2a3a338bfe5841bb3a8879cc5b68e60c12cffbc6a3f87", kill_on_drop: false }` [INFO] [stderr] warning: file found to be present in multiple build targets: /opt/rustwide/workdir/examples/sync.rs [INFO] [stderr] Checking cfg-if v0.1.10 [INFO] [stderr] Compiling unicode-xid v0.2.1 [INFO] [stderr] Compiling syn v1.0.33 [INFO] [stderr] Compiling version_check v0.9.2 [INFO] [stderr] Checking lazy_static v1.4.0 [INFO] [stderr] Compiling pkg-config v0.3.17 [INFO] [stderr] Checking fnv v1.0.7 [INFO] [stderr] Checking itoa v0.4.6 [INFO] [stderr] Compiling bitflags v1.2.1 [INFO] [stderr] Compiling encoding_rs v0.8.23 [INFO] [stderr] Compiling ryu v1.0.5 [INFO] [stderr] Checking mime v0.3.16 [INFO] [stderr] Checking dtoa v0.4.6 [INFO] [stderr] Checking strum v0.18.0 [INFO] [stderr] Compiling indexmap v1.4.0 [INFO] [stderr] Checking futures-channel v0.3.5 [INFO] [stderr] Checking log v0.4.8 [INFO] [stderr] Checking thread_local v1.0.1 [INFO] [stderr] Checking net2 v0.2.34 [INFO] [stderr] Checking socket2 v0.3.12 [INFO] [stderr] Checking getrandom v0.1.14 [INFO] [stderr] Compiling proc-macro2 v1.0.18 [INFO] [stderr] Checking aho-corasick v0.7.13 [INFO] [stderr] Checking smallvec v0.6.13 [INFO] [stderr] Checking http v0.2.1 [INFO] [stderr] Checking want v0.3.0 [INFO] [stderr] Checking mio v0.6.22 [INFO] [stderr] Checking rand_core v0.5.1 [INFO] [stderr] Checking unicode-normalization v0.1.9 [INFO] [stderr] Compiling quote v1.0.7 [INFO] [stderr] Compiling unicase v2.6.0 [INFO] [stderr] Compiling standback v0.2.9 [INFO] [stderr] Compiling time v0.2.16 [INFO] [stderr] Checking rand_chacha v0.2.2 [INFO] [stderr] Compiling openssl-sys v0.9.58 [INFO] [stderr] Checking rand v0.7.3 [INFO] [stderr] Checking tokio v0.2.21 [INFO] [stderr] Compiling mime_guess v2.0.3 [INFO] [stderr] Checking idna v0.2.0 [INFO] [stderr] Checking regex v1.3.9 [INFO] [stderr] Compiling openssl v0.10.30 [INFO] [stderr] Compiling native-tls v0.2.4 [INFO] [stderr] Checking url v2.1.1 [INFO] [stderr] Checking http-body v0.3.1 [INFO] [stderr] Checking tokio-util v0.3.1 [INFO] [stderr] Checking tokio-tls v0.3.1 [INFO] [stderr] Compiling pin-project-internal v0.4.22 [INFO] [stderr] Compiling serde_derive v1.0.114 [INFO] [stderr] Compiling time-macros-impl v0.1.1 [INFO] [stderr] Compiling strum_macros v0.18.0 [INFO] [stderr] Checking time-macros v0.1.0 [INFO] [stderr] Checking pin-project v0.4.22 [INFO] [stderr] Checking futures-util v0.3.5 [INFO] [stderr] Checking serde v1.0.114 [INFO] [stderr] Checking h2 v0.2.5 [INFO] [stderr] Checking hyper v0.13.6 [INFO] [stderr] Checking serde_urlencoded v0.6.1 [INFO] [stderr] Checking serde_json v1.0.56 [INFO] [stderr] Checking hyper-tls v0.4.3 [INFO] [stderr] Checking reqwest v0.10.6 [INFO] [stderr] Checking myanimelist-rs v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_network_general`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | / fn test_network_general() { [INFO] [stdout] 205 | | let request = reqwest::blocking::ClientBuilder::new() [INFO] [stdout] 206 | | .user_agent("ACC") [INFO] [stdout] 207 | | .build() [INFO] [stdout] ... | [INFO] [stdout] 211 | | assert!(response.status().is_success()); [INFO] [stdout] 212 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_mal_general`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:216:5 [INFO] [stdout] | [INFO] [stdout] 216 | / fn test_mal_general() { [INFO] [stdout] 217 | | let request = reqwest::blocking::ClientBuilder::new() [INFO] [stdout] 218 | | .user_agent("ACC") [INFO] [stdout] 219 | | .build() [INFO] [stdout] ... | [INFO] [stdout] 223 | | assert!(response.status().is_success()); [INFO] [stdout] 224 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_old_auth`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:228:5 [INFO] [stdout] | [INFO] [stdout] 228 | / fn test_old_auth() { [INFO] [stdout] 229 | | let credentials = get_env_credentials(); [INFO] [stdout] 230 | | Auth::new("AnimeCommandCenter", credentials.client_id, credentials.username, credentials.password).request().unwrap(); [INFO] [stdout] 231 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_old_auth_bad_credentials`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | / fn test_old_auth_bad_credentials() { [INFO] [stdout] 236 | | let client_id = std::env::var("MAL_TEST_CLIENT_ID").unwrap(); [INFO] [stdout] 237 | | let username = "thisisnotarealusernameihope"; [INFO] [stdout] 238 | | let password = "butthisisdefinitelynotitspassword"; [INFO] [stdout] ... | [INFO] [stdout] 248 | | } [INFO] [stdout] 249 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 4 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 1m 00s [INFO] running `Command { std: "docker" "inspect" "b6cb612130de4db7aae2a3a338bfe5841bb3a8879cc5b68e60c12cffbc6a3f87", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "b6cb612130de4db7aae2a3a338bfe5841bb3a8879cc5b68e60c12cffbc6a3f87", kill_on_drop: false }` [INFO] [stdout] b6cb612130de4db7aae2a3a338bfe5841bb3a8879cc5b68e60c12cffbc6a3f87