[INFO] fetching crate myanimelist-rs 0.1.0... [INFO] checking myanimelist-rs-0.1.0 against try#b09a3e9a7a0ff7efb269ec0c13dcc0fd3cedcf6b for pr-82781 [INFO] extracting crate myanimelist-rs 0.1.0 into /workspace/builds/worker-7/source [INFO] validating manifest of crates.io crate myanimelist-rs 0.1.0 on toolchain b09a3e9a7a0ff7efb269ec0c13dcc0fd3cedcf6b [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+b09a3e9a7a0ff7efb269ec0c13dcc0fd3cedcf6b" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate myanimelist-rs 0.1.0 [INFO] finished tweaking crates.io crate myanimelist-rs 0.1.0 [INFO] tweaked toml for crates.io crate myanimelist-rs 0.1.0 written to /workspace/builds/worker-7/source/Cargo.toml [INFO] crate crates.io crate myanimelist-rs 0.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+b09a3e9a7a0ff7efb269ec0c13dcc0fd3cedcf6b" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: file found to be present in multiple build targets: /workspace/builds/worker-7/source/examples/auth.rs [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded reqwest v0.10.6 [INFO] [stderr] Downloaded encoding_rs v0.8.23 [INFO] [stderr] Downloaded unicode-normalization v0.1.9 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:f2f6bcd4b43ebee4e173f653a26493129bdb64017c85f916b780ca7fbdbaa79d" "/opt/rustwide/cargo-home/bin/cargo" "+b09a3e9a7a0ff7efb269ec0c13dcc0fd3cedcf6b" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 57936d1b4210592fe95bdd50b834d23690e0e43a58535dc8a11f049956a907c4 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "57936d1b4210592fe95bdd50b834d23690e0e43a58535dc8a11f049956a907c4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "57936d1b4210592fe95bdd50b834d23690e0e43a58535dc8a11f049956a907c4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "57936d1b4210592fe95bdd50b834d23690e0e43a58535dc8a11f049956a907c4", kill_on_drop: false }` [INFO] [stdout] 57936d1b4210592fe95bdd50b834d23690e0e43a58535dc8a11f049956a907c4 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:f2f6bcd4b43ebee4e173f653a26493129bdb64017c85f916b780ca7fbdbaa79d" "/opt/rustwide/cargo-home/bin/cargo" "+b09a3e9a7a0ff7efb269ec0c13dcc0fd3cedcf6b" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 5aee4dea608107db8ddffa20567d4d49b8d23a4c983d8dec2fdbc1bdd57965f9 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "5aee4dea608107db8ddffa20567d4d49b8d23a4c983d8dec2fdbc1bdd57965f9", kill_on_drop: false }` [INFO] [stderr] warning: file found to be present in multiple build targets: /opt/rustwide/workdir/examples/auth.rs [INFO] [stderr] Checking cfg-if v0.1.10 [INFO] [stderr] Compiling unicode-xid v0.2.1 [INFO] [stderr] Compiling syn v1.0.33 [INFO] [stderr] Compiling log v0.4.8 [INFO] [stderr] Compiling memchr v2.3.3 [INFO] [stderr] Checking lazy_static v1.4.0 [INFO] [stderr] Checking slab v0.4.2 [INFO] [stderr] Checking fnv v1.0.7 [INFO] [stderr] Compiling bitflags v1.2.1 [INFO] [stderr] Checking once_cell v1.4.0 [INFO] [stderr] Checking foreign-types-shared v0.1.1 [INFO] [stderr] Checking pin-utils v0.1.0 [INFO] [stderr] Compiling httparse v1.3.4 [INFO] [stderr] Checking futures-io v0.3.5 [INFO] [stderr] Compiling getrandom v0.1.14 [INFO] [stderr] Checking matches v0.1.8 [INFO] [stderr] Checking try-lock v0.2.2 [INFO] [stderr] Checking openssl-probe v0.1.2 [INFO] [stderr] Compiling ryu v1.0.5 [INFO] [stderr] Checking percent-encoding v2.1.0 [INFO] [stderr] Compiling encoding_rs v0.8.23 [INFO] [stderr] Checking mime v0.3.16 [INFO] [stderr] Checking dtoa v0.4.6 [INFO] [stderr] Compiling unicode-segmentation v1.6.0 [INFO] [stderr] Checking ppv-lite86 v0.2.8 [INFO] [stderr] Checking strum v0.18.0 [INFO] [stderr] Compiling openssl-sys v0.9.58 [INFO] [stderr] Compiling unicase v2.6.0 [INFO] [stderr] Compiling standback v0.2.9 [INFO] [stderr] Compiling indexmap v1.4.0 [INFO] [stderr] Checking futures-channel v0.3.5 [INFO] [stderr] Compiling time v0.2.16 [INFO] [stderr] Checking thread_local v1.0.1 [INFO] [stderr] Checking unicode-bidi v0.3.4 [INFO] [stderr] Checking foreign-types v0.3.2 [INFO] [stderr] Checking http v0.2.1 [INFO] [stderr] Checking futures-task v0.3.5 [INFO] [stderr] Compiling proc-macro2 v1.0.18 [INFO] [stderr] Checking iovec v0.1.4 [INFO] [stderr] Checking net2 v0.2.34 [INFO] [stderr] Checking socket2 v0.3.12 [INFO] [stderr] Checking time v0.1.43 [INFO] [stderr] Checking smallvec v0.6.13 [INFO] [stderr] Compiling heck v0.3.1 [INFO] [stderr] Checking rand_core v0.5.1 [INFO] [stderr] Checking mio v0.6.22 [INFO] [stderr] Checking want v0.3.0 [INFO] [stderr] Checking unicode-normalization v0.1.9 [INFO] [stderr] Checking aho-corasick v0.7.13 [INFO] [stderr] Compiling quote v1.0.7 [INFO] [stderr] Checking rand_chacha v0.2.2 [INFO] [stderr] Compiling mime_guess v2.0.3 [INFO] [stderr] Compiling openssl v0.10.30 [INFO] [stderr] Compiling native-tls v0.2.4 [INFO] [stderr] Checking rand v0.7.3 [INFO] [stderr] Checking tokio v0.2.21 [INFO] [stderr] Checking regex v1.3.9 [INFO] [stderr] Checking http-body v0.3.1 [INFO] [stderr] Checking idna v0.2.0 [INFO] [stderr] Checking url v2.1.1 [INFO] [stderr] Checking tokio-util v0.3.1 [INFO] [stderr] Checking tokio-tls v0.3.1 [INFO] [stderr] Compiling pin-project-internal v0.4.22 [INFO] [stderr] Compiling serde_derive v1.0.114 [INFO] [stderr] Compiling time-macros-impl v0.1.1 [INFO] [stderr] Compiling strum_macros v0.18.0 [INFO] [stderr] Checking time-macros v0.1.0 [INFO] [stderr] Checking pin-project v0.4.22 [INFO] [stderr] Checking futures-util v0.3.5 [INFO] [stderr] Checking h2 v0.2.5 [INFO] [stderr] Checking serde v1.0.114 [INFO] [stderr] Checking hyper v0.13.6 [INFO] [stderr] Checking serde_urlencoded v0.6.1 [INFO] [stderr] Checking serde_json v1.0.56 [INFO] [stderr] Checking hyper-tls v0.4.3 [INFO] [stderr] Checking reqwest v0.10.6 [INFO] [stderr] Checking myanimelist-rs v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_network_general`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | / fn test_network_general() { [INFO] [stdout] 205 | | let request = reqwest::blocking::ClientBuilder::new() [INFO] [stdout] 206 | | .user_agent("ACC") [INFO] [stdout] 207 | | .build() [INFO] [stdout] ... | [INFO] [stdout] 211 | | assert!(response.status().is_success()); [INFO] [stdout] 212 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_mal_general`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:216:5 [INFO] [stdout] | [INFO] [stdout] 216 | / fn test_mal_general() { [INFO] [stdout] 217 | | let request = reqwest::blocking::ClientBuilder::new() [INFO] [stdout] 218 | | .user_agent("ACC") [INFO] [stdout] 219 | | .build() [INFO] [stdout] ... | [INFO] [stdout] 223 | | assert!(response.status().is_success()); [INFO] [stdout] 224 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_old_auth`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:228:5 [INFO] [stdout] | [INFO] [stdout] 228 | / fn test_old_auth() { [INFO] [stdout] 229 | | let credentials = get_env_credentials(); [INFO] [stdout] 230 | | Auth::new("AnimeCommandCenter", credentials.client_id, credentials.username, credentials.password).request().unwrap(); [INFO] [stdout] 231 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated constant `auth::old_style::tests::test_old_auth_bad_credentials`: The authorization flow used by these methods in insecure for general applications. It is no longer documented by MAL, and therefore assumed to be no longer supported and may stop working at any time. In addition, repeated authorization failure will block your API client_id for a while. [INFO] [stdout] --> src/auth/old_style.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | / fn test_old_auth_bad_credentials() { [INFO] [stdout] 236 | | let client_id = std::env::var("MAL_TEST_CLIENT_ID").unwrap(); [INFO] [stdout] 237 | | let username = "thisisnotarealusernameihope"; [INFO] [stdout] 238 | | let password = "butthisisdefinitelynotitspassword"; [INFO] [stdout] ... | [INFO] [stdout] 248 | | } [INFO] [stdout] 249 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in an attribute macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 4 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 1m 24s [INFO] running `Command { std: "docker" "inspect" "5aee4dea608107db8ddffa20567d4d49b8d23a4c983d8dec2fdbc1bdd57965f9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "5aee4dea608107db8ddffa20567d4d49b8d23a4c983d8dec2fdbc1bdd57965f9", kill_on_drop: false }` [INFO] [stdout] 5aee4dea608107db8ddffa20567d4d49b8d23a4c983d8dec2fdbc1bdd57965f9