[INFO] fetching crate myanimelist-rs 0.1.0... [INFO] checking myanimelist-rs-0.1.0 against try#81275a1445c7502a974118e0c69b795ab60be991 for pr-80243 [INFO] extracting crate myanimelist-rs 0.1.0 into /workspace/builds/worker-3/source [INFO] validating manifest of crates.io crate myanimelist-rs 0.1.0 on toolchain 81275a1445c7502a974118e0c69b795ab60be991 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+81275a1445c7502a974118e0c69b795ab60be991" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking crates.io crate myanimelist-rs 0.1.0 [INFO] finished tweaking crates.io crate myanimelist-rs 0.1.0 [INFO] tweaked toml for crates.io crate myanimelist-rs 0.1.0 written to /workspace/builds/worker-3/source/Cargo.toml [INFO] crate crates.io crate myanimelist-rs 0.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+81275a1445c7502a974118e0c69b795ab60be991" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: file found to be present in multiple build targets: /workspace/builds/worker-3/source/examples/sync.rs [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded strum_macros v0.18.0 [INFO] [stderr] Downloaded cc v1.0.58 [INFO] [stderr] Downloaded reqwest v0.10.6 [INFO] [stderr] Downloaded unicode-normalization v0.1.9 [INFO] [stderr] Downloaded encoding_rs v0.8.23 [INFO] [stderr] Downloaded strum v0.18.0 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:c8ac004eab7d63a0ad09a2dde3d3353ba464f767bee4de425dc8f74c46a1905e" "/opt/rustwide/cargo-home/bin/cargo" "+81275a1445c7502a974118e0c69b795ab60be991" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 32ae24cd17ca00e01ecd440b845b6a2791493269271e60f94b1f8c90ca1dd2f7 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "32ae24cd17ca00e01ecd440b845b6a2791493269271e60f94b1f8c90ca1dd2f7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "32ae24cd17ca00e01ecd440b845b6a2791493269271e60f94b1f8c90ca1dd2f7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "32ae24cd17ca00e01ecd440b845b6a2791493269271e60f94b1f8c90ca1dd2f7", kill_on_drop: false }` [INFO] [stdout] 32ae24cd17ca00e01ecd440b845b6a2791493269271e60f94b1f8c90ca1dd2f7 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:c8ac004eab7d63a0ad09a2dde3d3353ba464f767bee4de425dc8f74c46a1905e" "/opt/rustwide/cargo-home/bin/cargo" "+81275a1445c7502a974118e0c69b795ab60be991" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 216c589e292b956eccc36b1f160a91bb29ae8d6526d8b37293bc853bc3146716 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "216c589e292b956eccc36b1f160a91bb29ae8d6526d8b37293bc853bc3146716", kill_on_drop: false }` [INFO] [stderr] warning: file found to be present in multiple build targets: /opt/rustwide/workdir/examples/sync.rs [INFO] [stderr] Compiling libc v0.2.72 [INFO] [stderr] Compiling proc-macro2 v1.0.18 [INFO] [stderr] Compiling syn v1.0.33 [INFO] [stderr] Compiling version_check v0.9.2 [INFO] [stderr] Compiling cc v1.0.58 [INFO] [stderr] Checking fnv v1.0.7 [INFO] [stderr] Checking bytes v0.5.5 [INFO] [stderr] Checking futures-core v0.3.5 [INFO] [stderr] Compiling pin-project-internal v0.4.22 [INFO] [stderr] Checking itoa v0.4.6 [INFO] [stderr] Checking pin-project-lite v0.1.7 [INFO] [stderr] Compiling serde_derive v1.0.114 [INFO] [stderr] Checking once_cell v1.4.0 [INFO] [stderr] Compiling openssl v0.10.30 [INFO] [stderr] Checking pin-utils v0.1.0 [INFO] [stderr] Compiling serde v1.0.114 [INFO] [stderr] Compiling httparse v1.3.4 [INFO] [stderr] Checking futures-sink v0.3.5 [INFO] [stderr] Compiling getrandom v0.1.14 [INFO] [stderr] Checking futures-io v0.3.5 [INFO] [stderr] Checking tower-service v0.3.0 [INFO] [stderr] Compiling encoding_rs v0.8.23 [INFO] [stderr] Compiling proc-macro-hack v0.5.16 [INFO] [stderr] Compiling serde_json v1.0.56 [INFO] [stderr] Checking dtoa v0.4.6 [INFO] [stderr] Checking mime v0.3.16 [INFO] [stderr] Compiling unicode-segmentation v1.6.0 [INFO] [stderr] Checking ppv-lite86 v0.2.8 [INFO] [stderr] Checking base64 v0.12.3 [INFO] [stderr] Checking strum v0.18.0 [INFO] [stderr] Compiling indexmap v1.4.0 [INFO] [stderr] Checking futures-channel v0.3.5 [INFO] [stderr] Checking futures-task v0.3.5 [INFO] [stderr] Checking http v0.2.1 [INFO] [stderr] Checking want v0.3.0 [INFO] [stderr] Checking aho-corasick v0.7.13 [INFO] [stderr] Compiling unicase v2.6.0 [INFO] [stderr] Compiling standback v0.2.9 [INFO] [stderr] Compiling time v0.2.16 [INFO] [stderr] Checking unicode-normalization v0.1.9 [INFO] [stderr] Compiling heck v0.3.1 [INFO] [stderr] Compiling mime_guess v2.0.3 [INFO] [stderr] Compiling quote v1.0.7 [INFO] [stderr] Checking net2 v0.2.34 [INFO] [stderr] Checking iovec v0.1.4 [INFO] [stderr] Checking num_cpus v1.13.0 [INFO] [stderr] Checking time v0.1.43 [INFO] [stderr] Checking socket2 v0.3.12 [INFO] [stderr] Checking regex v1.3.9 [INFO] [stderr] Checking mio v0.6.22 [INFO] [stderr] Compiling openssl-sys v0.9.58 [INFO] [stderr] Checking rand_core v0.5.1 [INFO] [stderr] Checking idna v0.2.0 [INFO] [stderr] Checking rand_chacha v0.2.2 [INFO] [stderr] Checking rand v0.7.3 [INFO] [stderr] Checking tokio v0.2.21 [INFO] [stderr] Checking url v2.1.1 [INFO] [stderr] Compiling native-tls v0.2.4 [INFO] [stderr] Checking http-body v0.3.1 [INFO] [stderr] Checking tokio-util v0.3.1 [INFO] [stderr] Checking tokio-tls v0.3.1 [INFO] [stderr] Compiling time-macros-impl v0.1.1 [INFO] [stderr] Compiling strum_macros v0.18.0 [INFO] [stderr] Checking time-macros v0.1.0 [INFO] [stderr] Checking pin-project v0.4.22 [INFO] [stderr] Checking futures-util v0.3.5 [INFO] [stderr] Checking h2 v0.2.5 [INFO] [stderr] Checking hyper v0.13.6 [INFO] [stderr] Checking serde_urlencoded v0.6.1 [INFO] [stderr] Checking hyper-tls v0.4.3 [INFO] [stderr] Checking reqwest v0.10.6 [INFO] [stderr] Checking myanimelist-rs v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_network_general`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | / fn test_network_general() { [INFO] [stdout] 205 | | let request = reqwest::blocking::ClientBuilder::new() [INFO] [stdout] 206 | | .user_agent("ACC") [INFO] [stdout] 207 | | .build() [INFO] [stdout] ... | [INFO] [stdout] 211 | | assert!(response.status().is_success()); [INFO] [stdout] 212 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_mal_general`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:216:5 [INFO] [stdout] | [INFO] [stdout] 216 | / fn test_mal_general() { [INFO] [stdout] 217 | | let request = reqwest::blocking::ClientBuilder::new() [INFO] [stdout] 218 | | .user_agent("ACC") [INFO] [stdout] 219 | | .build() [INFO] [stdout] ... | [INFO] [stdout] 223 | | assert!(response.status().is_success()); [INFO] [stdout] 224 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_old_auth`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:228:5 [INFO] [stdout] | [INFO] [stdout] 228 | / fn test_old_auth() { [INFO] [stdout] 229 | | let credentials = get_env_credentials(); [INFO] [stdout] 230 | | Auth::new("AnimeCommandCenter", credentials.client_id, credentials.username, credentials.password).request().unwrap(); [INFO] [stdout] 231 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_old_auth_bad_credentials`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | / fn test_old_auth_bad_credentials() { [INFO] [stdout] 236 | | let client_id = std::env::var("MAL_TEST_CLIENT_ID").unwrap(); [INFO] [stdout] 237 | | let username = "thisisnotarealusernameihope"; [INFO] [stdout] 238 | | let password = "butthisisdefinitelynotitspassword"; [INFO] [stdout] ... | [INFO] [stdout] 248 | | } [INFO] [stdout] 249 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 4 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 1m 41s [INFO] running `Command { std: "docker" "inspect" "216c589e292b956eccc36b1f160a91bb29ae8d6526d8b37293bc853bc3146716", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "216c589e292b956eccc36b1f160a91bb29ae8d6526d8b37293bc853bc3146716", kill_on_drop: false }` [INFO] [stdout] 216c589e292b956eccc36b1f160a91bb29ae8d6526d8b37293bc853bc3146716