[INFO] cloning repository https://github.com/slai11/goto [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/slai11/goto" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fslai11%2Fgoto", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fslai11%2Fgoto'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 5d6d60ddf0d094e2ac1e08f4e4847ce403242891 [INFO] testing slai11/goto against try#eafdee2dfae8c2233b74f98b123308be7ccefcc6 for pr-79296 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fslai11%2Fgoto" "/workspace/builds/worker-6/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-6/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/slai11/goto on toolchain eafdee2dfae8c2233b74f98b123308be7ccefcc6 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+eafdee2dfae8c2233b74f98b123308be7ccefcc6" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/slai11/goto [INFO] finished tweaking git repo https://github.com/slai11/goto [INFO] tweaked toml for git repo https://github.com/slai11/goto written to /workspace/builds/worker-6/source/Cargo.toml [INFO] crate git repo https://github.com/slai11/goto already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+eafdee2dfae8c2233b74f98b123308be7ccefcc6" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:c8ac004eab7d63a0ad09a2dde3d3353ba464f767bee4de425dc8f74c46a1905e" "/opt/rustwide/cargo-home/bin/cargo" "+eafdee2dfae8c2233b74f98b123308be7ccefcc6" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 8d14ea015480d6d49e2dacb4a976dbbdbc3c3bcf7d75abee41e491e97ccc4ea7 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "8d14ea015480d6d49e2dacb4a976dbbdbc3c3bcf7d75abee41e491e97ccc4ea7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "8d14ea015480d6d49e2dacb4a976dbbdbc3c3bcf7d75abee41e491e97ccc4ea7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "8d14ea015480d6d49e2dacb4a976dbbdbc3c3bcf7d75abee41e491e97ccc4ea7", kill_on_drop: false }` [INFO] [stdout] 8d14ea015480d6d49e2dacb4a976dbbdbc3c3bcf7d75abee41e491e97ccc4ea7 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:c8ac004eab7d63a0ad09a2dde3d3353ba464f767bee4de425dc8f74c46a1905e" "/opt/rustwide/cargo-home/bin/cargo" "+eafdee2dfae8c2233b74f98b123308be7ccefcc6" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] bd6470e65d3c61f1cf5345bcbb094f1ee917aaa5f8c8bc984288d0a8496cd5c8 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "bd6470e65d3c61f1cf5345bcbb094f1ee917aaa5f8c8bc984288d0a8496cd5c8", kill_on_drop: false }` [INFO] [stderr] Compiling byteorder v1.3.4 [INFO] [stderr] Compiling memchr v2.3.3 [INFO] [stderr] Compiling libc v0.2.69 [INFO] [stderr] Compiling serde v1.0.106 [INFO] [stderr] Compiling ryu v1.0.3 [INFO] [stderr] Compiling bitflags v1.2.1 [INFO] [stderr] Compiling lazy_static v1.4.0 [INFO] [stderr] Compiling unicode-width v0.1.7 [INFO] [stderr] Compiling anyhow v1.0.28 [INFO] [stderr] Compiling vec_map v0.8.1 [INFO] [stderr] Compiling itoa v0.4.5 [INFO] [stderr] Compiling either v1.5.3 [INFO] [stderr] Compiling strsim v0.8.0 [INFO] [stderr] Compiling ansi_term v0.11.0 [INFO] [stderr] Compiling termcolor v1.1.0 [INFO] [stderr] Compiling textwrap v0.11.0 [INFO] [stderr] Compiling itertools v0.9.0 [INFO] [stderr] Compiling csv-core v0.1.10 [INFO] [stderr] Compiling regex-automata v0.1.9 [INFO] [stderr] Compiling atty v0.2.14 [INFO] [stderr] Compiling clap v2.33.0 [INFO] [stderr] Compiling bstr v0.2.12 [INFO] [stderr] Compiling csv v1.1.3 [INFO] [stderr] Compiling goto-rs v0.3.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated function `std::env::home_dir`: This function's behavior is unexpected and probably not what you want. Consider using a crate from crates.io instead. [INFO] [stdout] --> src/db.rs:17:11 [INFO] [stdout] | [INFO] [stdout] 17 | match env::home_dir().map(|p| format!("{}/{}", p.display(), ".config/goto")) { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated function `std::env::home_dir`: This function's behavior is unexpected and probably not what you want. Consider using a crate from crates.io instead. [INFO] [stdout] --> src/db.rs:41:11 [INFO] [stdout] | [INFO] [stdout] 41 | match env::home_dir().map(|p| format!("{}/{}", p.display(), ".config/goto/db.txt")) { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: irrefutable while-let pattern [INFO] [stdout] --> src/switch.rs:68:9 [INFO] [stdout] | [INFO] [stdout] 68 | / while let opt_char = alias_ptr.next() { [INFO] [stdout] 69 | | match opt_char { [INFO] [stdout] 70 | | None => return vec, [INFO] [stdout] 71 | | Some(alias_c) => { [INFO] [stdout] ... | [INFO] [stdout] 79 | | idx += 1; [INFO] [stdout] 80 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(irrefutable_let_patterns)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: cannot borrow `*db` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/indexer.rs:101:17 [INFO] [stdout] | [INFO] [stdout] 95 | match db.get(&k) { [INFO] [stdout] | -- immutable borrow occurs here [INFO] [stdout] ... [INFO] [stdout] 101 | db.insert(existing, v_existing.to_string()); [INFO] [stdout] | ^^ ---------- immutable borrow later used here [INFO] [stdout] | | [INFO] [stdout] | mutable borrow occurs here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 4 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 34.75s [INFO] running `Command { std: "docker" "inspect" "bd6470e65d3c61f1cf5345bcbb094f1ee917aaa5f8c8bc984288d0a8496cd5c8", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "bd6470e65d3c61f1cf5345bcbb094f1ee917aaa5f8c8bc984288d0a8496cd5c8", kill_on_drop: false }` [INFO] [stdout] bd6470e65d3c61f1cf5345bcbb094f1ee917aaa5f8c8bc984288d0a8496cd5c8 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:c8ac004eab7d63a0ad09a2dde3d3353ba464f767bee4de425dc8f74c46a1905e" "/opt/rustwide/cargo-home/bin/cargo" "+eafdee2dfae8c2233b74f98b123308be7ccefcc6" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 5209996247d6fa903b3bd2a6dfa0456def4672b06465b260aaefab59db8676d4 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "5209996247d6fa903b3bd2a6dfa0456def4672b06465b260aaefab59db8676d4", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Compiling goto-rs v0.3.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated function `std::env::home_dir`: This function's behavior is unexpected and probably not what you want. Consider using a crate from crates.io instead. [INFO] [stdout] --> src/db.rs:17:11 [INFO] [stdout] | [INFO] [stdout] 17 | match env::home_dir().map(|p| format!("{}/{}", p.display(), ".config/goto")) { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated function `std::env::home_dir`: This function's behavior is unexpected and probably not what you want. Consider using a crate from crates.io instead. [INFO] [stdout] --> src/db.rs:41:11 [INFO] [stdout] | [INFO] [stdout] 41 | match env::home_dir().map(|p| format!("{}/{}", p.display(), ".config/goto/db.txt")) { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: irrefutable while-let pattern [INFO] [stdout] --> src/switch.rs:68:9 [INFO] [stdout] | [INFO] [stdout] 68 | / while let opt_char = alias_ptr.next() { [INFO] [stdout] 69 | | match opt_char { [INFO] [stdout] 70 | | None => return vec, [INFO] [stdout] 71 | | Some(alias_c) => { [INFO] [stdout] ... | [INFO] [stdout] 79 | | idx += 1; [INFO] [stdout] 80 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(irrefutable_let_patterns)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: cannot borrow `*db` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/indexer.rs:101:17 [INFO] [stdout] | [INFO] [stdout] 95 | match db.get(&k) { [INFO] [stdout] | -- immutable borrow occurs here [INFO] [stdout] ... [INFO] [stdout] 101 | db.insert(existing, v_existing.to_string()); [INFO] [stdout] | ^^ ---------- immutable borrow later used here [INFO] [stdout] | | [INFO] [stdout] | mutable borrow occurs here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 4 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 2.57s [INFO] running `Command { std: "docker" "inspect" "5209996247d6fa903b3bd2a6dfa0456def4672b06465b260aaefab59db8676d4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "5209996247d6fa903b3bd2a6dfa0456def4672b06465b260aaefab59db8676d4", kill_on_drop: false }` [INFO] [stdout] 5209996247d6fa903b3bd2a6dfa0456def4672b06465b260aaefab59db8676d4 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:c8ac004eab7d63a0ad09a2dde3d3353ba464f767bee4de425dc8f74c46a1905e" "/opt/rustwide/cargo-home/bin/cargo" "+eafdee2dfae8c2233b74f98b123308be7ccefcc6" "test" "--frozen", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 33639bc8a1fb80517d7cde0280fcf2f026f2fd75ef0f575bac60fe688e98639b [INFO] running `Command { std: "docker" "start" "-a" "33639bc8a1fb80517d7cde0280fcf2f026f2fd75ef0f575bac60fe688e98639b", kill_on_drop: false }` [INFO] [stderr] warning: use of deprecated function `std::env::home_dir`: This function's behavior is unexpected and probably not what you want. Consider using a crate from crates.io instead. [INFO] [stderr] --> src/db.rs:17:11 [INFO] [stderr] | [INFO] [stderr] 17 | match env::home_dir().map(|p| format!("{}/{}", p.display(), ".config/goto")) { [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated function `std::env::home_dir`: This function's behavior is unexpected and probably not what you want. Consider using a crate from crates.io instead. [INFO] [stderr] --> src/db.rs:41:11 [INFO] [stderr] | [INFO] [stderr] 41 | match env::home_dir().map(|p| format!("{}/{}", p.display(), ".config/goto/db.txt")) { [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: irrefutable while-let pattern [INFO] [stderr] --> src/switch.rs:68:9 [INFO] [stderr] | [INFO] [stderr] 68 | / while let opt_char = alias_ptr.next() { [INFO] [stderr] 69 | | match opt_char { [INFO] [stderr] 70 | | None => return vec, [INFO] [stderr] 71 | | Some(alias_c) => { [INFO] [stderr] ... | [INFO] [stderr] 79 | | idx += 1; [INFO] [stderr] 80 | | } [INFO] [stderr] | |_________^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(irrefutable_let_patterns)]` on by default [INFO] [stderr] [INFO] [stderr] warning: cannot borrow `*db` as mutable because it is also borrowed as immutable [INFO] [stderr] --> src/indexer.rs:101:17 [INFO] [stderr] | [INFO] [stderr] 95 | match db.get(&k) { [INFO] [stderr] | -- immutable borrow occurs here [INFO] [stderr] ... [INFO] [stderr] 101 | db.insert(existing, v_existing.to_string()); [INFO] [stderr] | ^^ ---------- immutable borrow later used here [INFO] [stderr] | | [INFO] [stderr] | mutable borrow occurs here [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stderr] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stderr] = note: for more information, see issue #59159 [INFO] [stderr] [INFO] [stderr] warning: 4 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.13s [INFO] [stderr] Running /opt/rustwide/target/debug/deps/goto_rs-228f07d51a8e9e17 [INFO] [stdout] [INFO] [stdout] running 4 tests [INFO] [stdout] test indexer::test_diff_length ... ok [INFO] [stdout] test indexer::test_same_length ... ok [INFO] [stdout] test switch::fuzzy_test_takes_most_relevant ... ok [INFO] [stdout] test switch::fuzzy_test_takes_shortest ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 4 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "33639bc8a1fb80517d7cde0280fcf2f026f2fd75ef0f575bac60fe688e98639b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "33639bc8a1fb80517d7cde0280fcf2f026f2fd75ef0f575bac60fe688e98639b", kill_on_drop: false }` [INFO] [stdout] 33639bc8a1fb80517d7cde0280fcf2f026f2fd75ef0f575bac60fe688e98639b