[INFO] fetching crate cleartor 0.1.6... [INFO] checking cleartor-0.1.6 against beta for pr-78714 [INFO] extracting crate cleartor 0.1.6 into /workspace/builds/worker-14/source [INFO] validating manifest of crates.io crate cleartor 0.1.6 on toolchain beta [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking crates.io crate cleartor 0.1.6 [INFO] finished tweaking crates.io crate cleartor 0.1.6 [INFO] tweaked toml for crates.io crate cleartor 0.1.6 written to /workspace/builds/worker-14/source/Cargo.toml [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update", kill_on_drop: false }` [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:6eabd152ff4036248d66efda456a36cb33d24b7291b33f25f75140726c88da35" "/opt/rustwide/cargo-home/bin/cargo" "+beta" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 1e6379d640b901570f92b2b4a3df6128f99f727c1a5beb0ee66c8f352a15a7ae [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "1e6379d640b901570f92b2b4a3df6128f99f727c1a5beb0ee66c8f352a15a7ae", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "1e6379d640b901570f92b2b4a3df6128f99f727c1a5beb0ee66c8f352a15a7ae", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "1e6379d640b901570f92b2b4a3df6128f99f727c1a5beb0ee66c8f352a15a7ae", kill_on_drop: false }` [INFO] [stdout] 1e6379d640b901570f92b2b4a3df6128f99f727c1a5beb0ee66c8f352a15a7ae [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:6eabd152ff4036248d66efda456a36cb33d24b7291b33f25f75140726c88da35" "/opt/rustwide/cargo-home/bin/cargo" "+beta" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 7062a676cc5abcbdb84fc4861810403fc875db79a6412a5c39864e306a34ea29 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "7062a676cc5abcbdb84fc4861810403fc875db79a6412a5c39864e306a34ea29", kill_on_drop: false }` [INFO] [stderr] Checking want v0.2.0 [INFO] [stderr] Checking dirs v1.0.5 [INFO] [stderr] Checking socks v0.3.2 [INFO] [stderr] Checking native-tls v0.2.6 [INFO] [stderr] Checking tokio-io v0.1.13 [INFO] [stderr] Checking toml v0.4.10 [INFO] [stderr] Checking term v0.5.2 [INFO] [stderr] Checking simplelog v0.5.3 [INFO] [stderr] Checking tokio-reactor v0.1.12 [INFO] [stderr] Checking tokio-codec v0.1.2 [INFO] [stderr] Checking tokio-fs v0.1.7 [INFO] [stderr] Checking h2 v0.1.26 [INFO] [stderr] Checking tokio-tcp v0.1.4 [INFO] [stderr] Checking tokio-uds v0.2.7 [INFO] [stderr] Checking tokio-udp v0.1.6 [INFO] [stderr] Checking tokio v0.1.22 [INFO] [stderr] Checking hyper v0.12.35 [INFO] [stderr] Checking hyper-tls v0.3.2 [INFO] [stderr] Checking hyper-socks2 v0.2.1 [INFO] [stderr] Checking cleartor v0.1.6 (/opt/rustwide/workdir) [INFO] [stdout] warning: trait objects without an explicit `dyn` are deprecated [INFO] [stdout] --> src/main.rs:82:29 [INFO] [stdout] | [INFO] [stdout] 82 | fn main() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: use `dyn`: `dyn std::error::Error` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(bare_trait_objects)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: trait objects without an explicit `dyn` are deprecated [INFO] [stdout] --> src/main.rs:82:29 [INFO] [stdout] | [INFO] [stdout] 82 | fn main() -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: use `dyn`: `dyn std::error::Error` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(bare_trait_objects)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: cannot borrow `*headers` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/main.rs:182:21 [INFO] [stdout] | [INFO] [stdout] 180 | if let Some(location) = headers.get(header::LOCATION) { [INFO] [stdout] | ------- immutable borrow occurs here [INFO] [stdout] 181 | let location_str = location.to_str().unwrap(); [INFO] [stdout] 182 | headers.insert(header::LOCATION, location_str.replace(&*route.onion, &*route.domain).parse().unwrap()); [INFO] [stdout] | ^^^^^^^ ------------ immutable borrow later used here [INFO] [stdout] | | [INFO] [stdout] | mutable borrow occurs here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 2 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: cannot borrow `*headers` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/main.rs:182:21 [INFO] [stdout] | [INFO] [stdout] 180 | if let Some(location) = headers.get(header::LOCATION) { [INFO] [stdout] | ------- immutable borrow occurs here [INFO] [stdout] 181 | let location_str = location.to_str().unwrap(); [INFO] [stdout] 182 | headers.insert(header::LOCATION, location_str.replace(&*route.onion, &*route.domain).parse().unwrap()); [INFO] [stdout] | ^^^^^^^ ------------ immutable borrow later used here [INFO] [stdout] | | [INFO] [stdout] | mutable borrow occurs here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 2 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 13.20s [INFO] running `Command { std: "docker" "inspect" "7062a676cc5abcbdb84fc4861810403fc875db79a6412a5c39864e306a34ea29", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "7062a676cc5abcbdb84fc4861810403fc875db79a6412a5c39864e306a34ea29", kill_on_drop: false }` [INFO] [stdout] 7062a676cc5abcbdb84fc4861810403fc875db79a6412a5c39864e306a34ea29