[INFO] fetching crate ockam_vault 0.3.2... [INFO] checking ockam_vault-0.3.2 against master#a836d9b6413d9d593be6c09463ff8c4c70e56599 for pr-84037 [INFO] extracting crate ockam_vault 0.3.2 into /workspace/builds/worker-4/source [INFO] validating manifest of crates.io crate ockam_vault 0.3.2 on toolchain a836d9b6413d9d593be6c09463ff8c4c70e56599 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+a836d9b6413d9d593be6c09463ff8c4c70e56599" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate ockam_vault 0.3.2 [INFO] finished tweaking crates.io crate ockam_vault 0.3.2 [INFO] tweaked toml for crates.io crate ockam_vault 0.3.2 written to /workspace/builds/worker-4/source/Cargo.toml [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+a836d9b6413d9d593be6c09463ff8c4c70e56599" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+a836d9b6413d9d593be6c09463ff8c4c70e56599" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:20528e8c29e4536546f0102ce88568b16ea7538393a33fcca951030f7af10457" "/opt/rustwide/cargo-home/bin/cargo" "+a836d9b6413d9d593be6c09463ff8c4c70e56599" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 824e523593a843378de4b0b418c35a5810d8ce468fc4d7cff64d5449aaf479d3 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "824e523593a843378de4b0b418c35a5810d8ce468fc4d7cff64d5449aaf479d3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "824e523593a843378de4b0b418c35a5810d8ce468fc4d7cff64d5449aaf479d3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "824e523593a843378de4b0b418c35a5810d8ce468fc4d7cff64d5449aaf479d3", kill_on_drop: false }` [INFO] [stdout] 824e523593a843378de4b0b418c35a5810d8ce468fc4d7cff64d5449aaf479d3 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:20528e8c29e4536546f0102ce88568b16ea7538393a33fcca951030f7af10457" "/opt/rustwide/cargo-home/bin/cargo" "+a836d9b6413d9d593be6c09463ff8c4c70e56599" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 19130caf0acc437ef2fccbf15d3ea2ab21db7583031e17f5a9d14ba2bf13c147 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "19130caf0acc437ef2fccbf15d3ea2ab21db7583031e17f5a9d14ba2bf13c147", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Compiling version_check v0.9.3 [INFO] [stderr] Checking subtle v2.4.0 [INFO] [stderr] Compiling getrandom v0.2.2 [INFO] [stderr] Compiling serde v1.0.125 [INFO] [stderr] Checking opaque-debug v0.3.0 [INFO] [stderr] Checking once_cell v1.7.2 [INFO] [stderr] Checking hex v0.4.3 [INFO] [stderr] Checking cpuid-bool v0.1.2 [INFO] [stderr] Checking signature v1.3.0 [INFO] [stderr] Checking getrandom v0.1.16 [INFO] [stderr] Compiling syn v1.0.71 [INFO] [stderr] Checking ed25519 v1.0.3 [INFO] [stderr] Checking rand_core v0.5.1 [INFO] [stderr] Compiling generic-array v0.14.4 [INFO] [stderr] Compiling ahash v0.7.2 [INFO] [stderr] Checking rand_chacha v0.2.2 [INFO] [stderr] Checking rand_core v0.6.2 [INFO] [stderr] Checking rand v0.7.3 [INFO] [stderr] Checking rand_chacha v0.3.0 [INFO] [stderr] Checking rand v0.8.3 [INFO] [stderr] Checking digest v0.9.0 [INFO] [stderr] Checking cipher v0.2.5 [INFO] [stderr] Checking universal-hash v0.4.0 [INFO] [stderr] Checking block-buffer v0.9.0 [INFO] [stderr] Checking crypto-mac v0.10.0 [INFO] [stderr] Checking aead v0.3.2 [INFO] [stderr] Checking hmac v0.10.1 [INFO] [stderr] Checking polyval v0.4.5 [INFO] [stderr] Checking sha2 v0.9.3 [INFO] [stderr] Checking aes-soft v0.6.4 [INFO] [stderr] Checking ctr v0.6.0 [INFO] [stderr] Checking hkdf v0.10.0 [INFO] [stderr] Checking ghash v0.3.1 [INFO] [stderr] Checking aes v0.6.0 [INFO] [stderr] Checking aes-gcm v0.8.0 [INFO] [stderr] Compiling synstructure v0.12.4 [INFO] [stderr] Compiling serde_derive v1.0.125 [INFO] [stderr] Compiling zeroize_derive v1.1.0 [INFO] [stderr] Compiling async-trait v0.1.50 [INFO] [stderr] Checking zeroize v1.3.0 [INFO] [stderr] Checking curve25519-dalek v3.1.0 [INFO] [stderr] Checking x25519-dalek v1.1.1 [INFO] [stderr] Checking hashbrown v0.11.2 [INFO] [stderr] Checking serde_bare v0.4.0 [INFO] [stderr] Checking serde-big-array v0.3.2 [INFO] [stderr] Checking ed25519-dalek v1.0.1 [INFO] [stderr] Checking ockam_core v0.11.1 [INFO] [stderr] Checking ockam_vault_core v0.5.1 [INFO] [stderr] Checking ockam_vault v0.3.2 (/opt/rustwide/workdir) [INFO] [stdout] error[E0053]: method `ec_diffie_hellman` has an incompatible type for trait [INFO] [stdout] --> src/asymmetric_impl.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | / fn ec_diffie_hellman( [INFO] [stdout] 45 | | &mut self, [INFO] [stdout] 46 | | context: &Secret, [INFO] [stdout] 47 | | peer_public_key: &[u8], [INFO] [stdout] ... | [INFO] [stdout] 55 | | self.secret_import(&dh, attributes) [INFO] [stdout] 56 | | } [INFO] [stdout] | |_____^ expected struct `ockam_vault_core::PublicKey`, found slice `[u8]` [INFO] [stdout] | [INFO] [stdout] = note: expected fn pointer `fn(&mut software_vault::SoftwareVault, &Secret, &ockam_vault_core::PublicKey) -> Result<_, _>` [INFO] [stdout] found fn pointer `fn(&mut software_vault::SoftwareVault, &Secret, &[u8]) -> Result<_, _>` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0053]: method `sha256` has an incompatible type for trait [INFO] [stdout] --> src/hasher_impl.rs:11:5 [INFO] [stdout] | [INFO] [stdout] 11 | fn sha256(&self, data: &[u8]) -> ockam_core::Result<[u8; 32]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ types differ in mutability [INFO] [stdout] | [INFO] [stdout] = note: expected fn pointer `fn(&mut software_vault::SoftwareVault, &[u8]) -> Result<_, _>` [INFO] [stdout] found fn pointer `fn(&software_vault::SoftwareVault, &[u8]) -> Result<_, _>` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0053]: method `get_secret_by_key_id` has an incompatible type for trait [INFO] [stdout] --> src/key_id_impl.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | fn get_secret_by_key_id(&self, key_id: &str) -> ockam_core::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ types differ in mutability [INFO] [stdout] | [INFO] [stdout] = note: expected fn pointer `fn(&mut software_vault::SoftwareVault, &str) -> Result<_, _>` [INFO] [stdout] found fn pointer `fn(&software_vault::SoftwareVault, &str) -> Result<_, _>` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0053]: method `compute_key_id_for_public_key` has an incompatible type for trait [INFO] [stdout] --> src/key_id_impl.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | fn compute_key_id_for_public_key(&self, public_key: &PublicKey) -> ockam_core::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ types differ in mutability [INFO] [stdout] | [INFO] [stdout] = note: expected fn pointer `fn(&mut software_vault::SoftwareVault, &ockam_vault_core::PublicKey) -> Result<_, _>` [INFO] [stdout] found fn pointer `fn(&software_vault::SoftwareVault, &ockam_vault_core::PublicKey) -> Result<_, _>` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0053]: method `verify` has an incompatible type for trait [INFO] [stdout] --> src/verifier_impl.rs:9:5 [INFO] [stdout] | [INFO] [stdout] 9 | / fn verify( [INFO] [stdout] 10 | | &mut self, [INFO] [stdout] 11 | | signature: &[u8; 64], [INFO] [stdout] 12 | | public_key: &[u8], [INFO] [stdout] ... | [INFO] [stdout] 26 | | } [INFO] [stdout] 27 | | } [INFO] [stdout] | |_____^ expected struct `ockam_vault_core::PublicKey`, found slice `[u8]` [INFO] [stdout] | [INFO] [stdout] = note: expected fn pointer `fn(&mut software_vault::SoftwareVault, &[u8; 64], &ockam_vault_core::PublicKey, &[u8]) -> Result` [INFO] [stdout] found fn pointer `fn(&mut software_vault::SoftwareVault, &[u8; 64], &[u8], &[u8]) -> Result<(), _>` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0053]: method `ec_diffie_hellman` has an incompatible type for trait [INFO] [stdout] --> src/asymmetric_impl.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | / fn ec_diffie_hellman( [INFO] [stdout] 45 | | &mut self, [INFO] [stdout] 46 | | context: &Secret, [INFO] [stdout] 47 | | peer_public_key: &[u8], [INFO] [stdout] ... | [INFO] [stdout] 55 | | self.secret_import(&dh, attributes) [INFO] [stdout] 56 | | } [INFO] [stdout] | |_____^ expected struct `ockam_vault_core::PublicKey`, found slice `[u8]` [INFO] [stdout] | [INFO] [stdout] = note: expected fn pointer `fn(&mut software_vault::SoftwareVault, &Secret, &ockam_vault_core::PublicKey) -> Result<_, _>` [INFO] [stdout] found fn pointer `fn(&mut software_vault::SoftwareVault, &Secret, &[u8]) -> Result<_, _>` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0053]: method `sha256` has an incompatible type for trait [INFO] [stdout] --> src/hasher_impl.rs:11:5 [INFO] [stdout] | [INFO] [stdout] 11 | fn sha256(&self, data: &[u8]) -> ockam_core::Result<[u8; 32]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ types differ in mutability [INFO] [stdout] | [INFO] [stdout] = note: expected fn pointer `fn(&mut software_vault::SoftwareVault, &[u8]) -> Result<_, _>` [INFO] [stdout] found fn pointer `fn(&software_vault::SoftwareVault, &[u8]) -> Result<_, _>` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0053]: method `get_secret_by_key_id` has an incompatible type for trait [INFO] [stdout] --> src/key_id_impl.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | fn get_secret_by_key_id(&self, key_id: &str) -> ockam_core::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ types differ in mutability [INFO] [stdout] | [INFO] [stdout] = note: expected fn pointer `fn(&mut software_vault::SoftwareVault, &str) -> Result<_, _>` [INFO] [stdout] found fn pointer `fn(&software_vault::SoftwareVault, &str) -> Result<_, _>` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0053]: method `compute_key_id_for_public_key` has an incompatible type for trait [INFO] [stdout] --> src/key_id_impl.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | fn compute_key_id_for_public_key(&self, public_key: &PublicKey) -> ockam_core::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ types differ in mutability [INFO] [stdout] | [INFO] [stdout] = note: expected fn pointer `fn(&mut software_vault::SoftwareVault, &ockam_vault_core::PublicKey) -> Result<_, _>` [INFO] [stdout] found fn pointer `fn(&software_vault::SoftwareVault, &ockam_vault_core::PublicKey) -> Result<_, _>` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0053]: method `verify` has an incompatible type for trait [INFO] [stdout] --> src/verifier_impl.rs:9:5 [INFO] [stdout] | [INFO] [stdout] 9 | / fn verify( [INFO] [stdout] 10 | | &mut self, [INFO] [stdout] 11 | | signature: &[u8; 64], [INFO] [stdout] 12 | | public_key: &[u8], [INFO] [stdout] ... | [INFO] [stdout] 26 | | } [INFO] [stdout] 27 | | } [INFO] [stdout] | |_____^ expected struct `ockam_vault_core::PublicKey`, found slice `[u8]` [INFO] [stdout] | [INFO] [stdout] = note: expected fn pointer `fn(&mut software_vault::SoftwareVault, &[u8; 64], &ockam_vault_core::PublicKey, &[u8]) -> Result` [INFO] [stdout] found fn pointer `fn(&mut software_vault::SoftwareVault, &[u8; 64], &[u8], &[u8]) -> Result<(), _>` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 5 previous errors [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0053`. [INFO] [stdout] [INFO] [stderr] error: could not compile `ockam_vault` [INFO] [stderr] [INFO] [stderr] To learn more, run the command again with --verbose. [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] error[E0308]: mismatched types [INFO] [stdout] --> src/asymmetric_impl.rs:80:55 [INFO] [stdout] | [INFO] [stdout] 80 | let res1 = vault.ec_diffie_hellman(&sk_ctx_1, pk_2.as_ref()); [INFO] [stdout] | ^^^^^^^^^^^^^ expected struct `ockam_vault_core::PublicKey`, found slice `[u8]` [INFO] [stdout] | [INFO] [stdout] = note: expected reference `&ockam_vault_core::PublicKey` [INFO] [stdout] found reference `&[u8]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0308]: mismatched types [INFO] [stdout] --> src/asymmetric_impl.rs:84:55 [INFO] [stdout] | [INFO] [stdout] 84 | let res2 = vault.ec_diffie_hellman(&sk_ctx_2, pk_1.as_ref()); [INFO] [stdout] | ^^^^^^^^^^^^^ expected struct `ockam_vault_core::PublicKey`, found slice `[u8]` [INFO] [stdout] | [INFO] [stdout] = note: expected reference `&ockam_vault_core::PublicKey` [INFO] [stdout] found reference `&[u8]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0308]: mismatched types [INFO] [stdout] --> src/signer_impl.rs:50:44 [INFO] [stdout] | [INFO] [stdout] 50 | let res = vault.verify(&signature, pubkey.as_ref(), b"hello world!"); [INFO] [stdout] | ^^^^^^^^^^^^^^^ expected struct `ockam_vault_core::PublicKey`, found slice `[u8]` [INFO] [stdout] | [INFO] [stdout] = note: expected reference `&ockam_vault_core::PublicKey` [INFO] [stdout] found reference `&[u8]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 8 previous errors [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] Some errors have detailed explanations: E0053, E0308. [INFO] [stdout] [INFO] [stdout] For more information about an error, try `rustc --explain E0053`. [INFO] [stdout] [INFO] [stderr] error: build failed [INFO] running `Command { std: "docker" "inspect" "19130caf0acc437ef2fccbf15d3ea2ab21db7583031e17f5a9d14ba2bf13c147", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "19130caf0acc437ef2fccbf15d3ea2ab21db7583031e17f5a9d14ba2bf13c147", kill_on_drop: false }` [INFO] [stdout] 19130caf0acc437ef2fccbf15d3ea2ab21db7583031e17f5a9d14ba2bf13c147