[INFO] fetching crate zip-extensions 0.6.1... [INFO] checking zip-extensions-0.6.1 against master#0599f3403366d9c57f0625e6de3af214b5042a90 for pr-87710 [INFO] extracting crate zip-extensions 0.6.1 into /workspace/builds/worker-26/source [INFO] validating manifest of crates.io crate zip-extensions 0.6.1 on toolchain 0599f3403366d9c57f0625e6de3af214b5042a90 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+0599f3403366d9c57f0625e6de3af214b5042a90" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate zip-extensions 0.6.1 [INFO] finished tweaking crates.io crate zip-extensions 0.6.1 [INFO] tweaked toml for crates.io crate zip-extensions 0.6.1 written to /workspace/builds/worker-26/source/Cargo.toml [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+0599f3403366d9c57f0625e6de3af214b5042a90" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+0599f3403366d9c57f0625e6de3af214b5042a90" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-26/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-26/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:34b6a614d2c27851fe6cbf88fbd1137609cefab8b10d0615aaeb6fd47975d74e" "/opt/rustwide/cargo-home/bin/cargo" "+0599f3403366d9c57f0625e6de3af214b5042a90" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] ff117039b4a6385fd5a0c86decdbbfc1f3eb23ac15a3645b59b79d7acdbc2b52 [INFO] running `Command { std: "docker" "start" "-a" "ff117039b4a6385fd5a0c86decdbbfc1f3eb23ac15a3645b59b79d7acdbc2b52", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "ff117039b4a6385fd5a0c86decdbbfc1f3eb23ac15a3645b59b79d7acdbc2b52", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ff117039b4a6385fd5a0c86decdbbfc1f3eb23ac15a3645b59b79d7acdbc2b52", kill_on_drop: false }` [INFO] [stdout] ff117039b4a6385fd5a0c86decdbbfc1f3eb23ac15a3645b59b79d7acdbc2b52 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-26/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-26/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:34b6a614d2c27851fe6cbf88fbd1137609cefab8b10d0615aaeb6fd47975d74e" "/opt/rustwide/cargo-home/bin/cargo" "+0599f3403366d9c57f0625e6de3af214b5042a90" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 037ea3cda01741a1cb635d2453267c1bca2f0c17cd0939e74c08d459c8a580aa [INFO] running `Command { std: "docker" "start" "-a" "037ea3cda01741a1cb635d2453267c1bca2f0c17cd0939e74c08d459c8a580aa", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Compiling libc v0.2.100 [INFO] [stderr] Compiling proc-macro2 v1.0.28 [INFO] [stderr] Compiling unicode-xid v0.2.2 [INFO] [stderr] Compiling cc v1.0.69 [INFO] [stderr] Compiling pkg-config v0.3.19 [INFO] [stderr] Compiling syn v1.0.75 [INFO] [stderr] Compiling autocfg v1.0.1 [INFO] [stderr] Compiling crc32fast v1.2.1 [INFO] [stderr] Checking cfg-if v1.0.0 [INFO] [stderr] Checking adler v1.0.2 [INFO] [stderr] Checking byteorder v1.4.3 [INFO] [stderr] Compiling miniz_oxide v0.4.4 [INFO] [stderr] Checking time v0.1.44 [INFO] [stderr] Compiling quote v1.0.9 [INFO] [stderr] Compiling bzip2-sys v0.1.11+1.0.8 [INFO] [stderr] Checking flate2 v1.0.20 [INFO] [stderr] Checking bzip2 v0.4.3 [INFO] [stderr] Compiling thiserror-impl v1.0.26 [INFO] [stderr] Checking thiserror v1.0.26 [INFO] [stderr] Checking zip v0.5.13 [INFO] [stderr] Checking zip-extensions v0.6.1 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated associated function `zip::read::ZipFile::<'a>::sanitized_name`: by stripping `..`s from the path, the meaning of paths can change. [INFO] [stdout] `mangled_name` can be used if this behaviour is desirable [INFO] [stdout] --> src/read.rs:111:39 [INFO] [stdout] | [INFO] [stdout] 111 | let sanitized_name = next.sanitized_name(); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated associated function `zip::read::ZipFile::<'a>::sanitized_name`: by stripping `..`s from the path, the meaning of paths can change. [INFO] [stdout] `mangled_name` can be used if this behaviour is desirable [INFO] [stdout] --> src/read.rs:160:17 [INFO] [stdout] | [INFO] [stdout] 160 | Ok(next.sanitized_name()) [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated associated function `zip::read::ZipFile::<'a>::sanitized_name`: by stripping `..`s from the path, the meaning of paths can change. [INFO] [stdout] `mangled_name` can be used if this behaviour is desirable [INFO] [stdout] --> src/read.rs:166:43 [INFO] [stdout] | [INFO] [stdout] 166 | let sanitized_name = next.sanitized_name(); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated associated function `zip::ZipWriter::::start_file_from_path`: by stripping `..`s from the path, the meaning of paths can change. Use `start_file` instead. [INFO] [stdout] --> src/write.rs:65:26 [INFO] [stdout] | [INFO] [stdout] 65 | self.start_file_from_path(&relative_path, options)?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated associated function `zip::ZipWriter::::add_directory_from_path`: by stripping `..`s from the path, the meaning of paths can change. Use `add_directory` instead. [INFO] [stdout] --> src/write.rs:70:26 [INFO] [stdout] | [INFO] [stdout] 70 | self.add_directory_from_path(&relative_path, options)?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated associated function `zip::read::ZipFile::<'a>::sanitized_name`: by stripping `..`s from the path, the meaning of paths can change. [INFO] [stdout] `mangled_name` can be used if this behaviour is desirable [INFO] [stdout] --> src/read.rs:111:39 [INFO] [stdout] | [INFO] [stdout] 111 | let sanitized_name = next.sanitized_name(); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated associated function `zip::read::ZipFile::<'a>::sanitized_name`: by stripping `..`s from the path, the meaning of paths can change. [INFO] [stdout] `mangled_name` can be used if this behaviour is desirable [INFO] [stdout] --> src/read.rs:160:17 [INFO] [stdout] | [INFO] [stdout] 160 | Ok(next.sanitized_name()) [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated associated function `zip::read::ZipFile::<'a>::sanitized_name`: by stripping `..`s from the path, the meaning of paths can change. [INFO] [stdout] `mangled_name` can be used if this behaviour is desirable [INFO] [stdout] --> src/read.rs:166:43 [INFO] [stdout] | [INFO] [stdout] 166 | let sanitized_name = next.sanitized_name(); [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated associated function `zip::ZipWriter::::start_file_from_path`: by stripping `..`s from the path, the meaning of paths can change. Use `start_file` instead. [INFO] [stdout] --> src/write.rs:65:26 [INFO] [stdout] | [INFO] [stdout] 65 | self.start_file_from_path(&relative_path, options)?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated associated function `zip::ZipWriter::::add_directory_from_path`: by stripping `..`s from the path, the meaning of paths can change. Use `add_directory` instead. [INFO] [stdout] --> src/write.rs:70:26 [INFO] [stdout] | [INFO] [stdout] 70 | self.add_directory_from_path(&relative_path, options)?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 5 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 5 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 13.45s [INFO] running `Command { std: "docker" "inspect" "037ea3cda01741a1cb635d2453267c1bca2f0c17cd0939e74c08d459c8a580aa", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "037ea3cda01741a1cb635d2453267c1bca2f0c17cd0939e74c08d459c8a580aa", kill_on_drop: false }` [INFO] [stdout] 037ea3cda01741a1cb635d2453267c1bca2f0c17cd0939e74c08d459c8a580aa