Console Output

Branch indexing
Looking up repository moparisthebest/rusty-keys
Querying the current revision of branch master...
Current revision of branch master is 270cdca14f74c28ae7c36ec2d23843398924116b
Obtained .ci/Jenkinsfile from 270cdca14f74c28ae7c36ec2d23843398924116b
[Pipeline] Start of Pipeline
[Pipeline] properties
[Pipeline] node
Running on Jenkins in /var/lib/jenkins/workspace/moparisthebest_rusty-keys_master
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] echo
My branch is: master
[Pipeline] checkout
The recommended git tool is: NONE
using credential c6ea0d71-5fe1-48ba-ad49-f6dd0c20363a
Cloning the remote Git repository
Cloning repository https://code.moparisthebest.com/moparisthebest/rusty-keys.git
 > git init /var/lib/jenkins/workspace/moparisthebest_rusty-keys_master # timeout=10
Fetching upstream changes from https://code.moparisthebest.com/moparisthebest/rusty-keys.git
 > git --version # timeout=10
 > git --version # 'git version 2.42.0'
using GIT_ASKPASS to set credentials jenkins @ code.moparisthebest.com
 > git fetch --tags --force --progress -- https://code.moparisthebest.com/moparisthebest/rusty-keys.git +refs/heads/*:refs/remotes/origin/* # timeout=10
 > git config remote.origin.url https://code.moparisthebest.com/moparisthebest/rusty-keys.git # timeout=10
 > git config --add remote.origin.fetch +refs/heads/*:refs/remotes/origin/* # timeout=10
Avoid second fetch
 > git rev-parse refs/remotes/origin/master^{commit} # timeout=10
Checking out Revision 270cdca14f74c28ae7c36ec2d23843398924116b (refs/remotes/origin/master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 270cdca14f74c28ae7c36ec2d23843398924116b # timeout=10
Commit message: "Add TOUCHPAD_TOGGLE for linux"
 > git rev-list --no-walk e9705db5bad9fec71615e6a7180d531bdd93f722 # timeout=10
[Gitea] Notifying branch build status: PENDING Build started...
[Gitea] Notified
[Pipeline] sh
+ set -euxo pipefail
+ git checkout master --
Switched to a new branch 'master'
branch 'master' set up to track 'origin/master'.
+ git reset --hard origin/master
HEAD is now at 270cdca Add TOUCHPAD_TOGGLE for linux
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Build + Deploy)
[Pipeline] sh
+ mkdir -p release
+ cp keymap.toml release
+ curl --compressed -sL https://code.moparisthebest.com/moparisthebest/self-ci/raw/branch/master/build-ci.sh
+ bash
build-ci.sh: BUILD_LANG=rust RELEASE_SCRIPT=.ci/release.sh BUILD_SCRIPT=.ci/build.sh remaining args:
+ mkdir -p bin
+ cd bin
+ curl --compressed -sL -O https://code.moparisthebest.com/moparisthebest/self-ci/raw/branch/master/ci-release-helper.sh -O https://code.moparisthebest.com/moparisthebest/self-ci/raw/branch/master/rust/build.sh
+ chmod +x ci-release-helper.sh build.sh
+ cd ..
++ pwd
+ export PATH=/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master/bin:/var/lib/jenkins/.cargo/bin:/var/lib/jenkins/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/usr/lib/rustup/bin
+ PATH=/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master/bin:/var/lib/jenkins/.cargo/bin:/var/lib/jenkins/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/usr/lib/rustup/bin
+ export BRANCH_NAME=master
+ BRANCH_NAME=master
+ export BUILD_UID=971
+ BUILD_UID=971
++ id -g
+ export BUILD_GID=971
+ BUILD_GID=971
+ build.sh .ci/build.sh
+ echo 'starting build for TARGET x86_64-unknown-linux-musl'
starting build for TARGET x86_64-unknown-linux-musl
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo x86_64-unknown-linux-musl
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' x86_64-unknown-linux-musl == riscv64gc-unknown-linux-gnu ']'
+ grep -E '(android|solaris$)'
+ echo x86_64-unknown-linux-musl
+ cross build --target x86_64-unknown-linux-musl --release
Trying to pull ghcr.io/cross-rs/x86_64-unknown-linux-musl:main...
Getting image source signatures
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:ed683d27bf0a0be4f5c3d4ea161efaa8fb6b6f48ab8397e8d3534cbf4e96abda
Copying blob sha256:51ca400f567ccb6fc022f86c2174fab26eaacf3187e3faf797576582c757bbf7
Copying blob sha256:8e17474b17aed4bec6445e525954225e5207c417af9d14febfa8581be9312a63
Copying blob sha256:ba787d27174d946af98221ac800c0679ad472a8eaf95a78cb439a4c53a84083c
Copying blob sha256:6e35177660695316f4dcd53b7049e3d20f160d32f9524cb29665375b3b7d3de0
Copying blob sha256:0f85d59bd2e942e52276aee5ada808dafbb17fe4ed01d7e8069a62b8812f3874
Copying blob sha256:dbd84595946d50e7a2d99ba646e097a74a2d5ac196d6b769232e799f4579a653
Copying blob sha256:c2e0ede37f69239146a43a93efaacd919d9c0d98ccbccc626001c1fe79933af1
Copying blob sha256:9b4f231e5f7731469dbdd0dced35a054e49e40b70617a2e5061ec7ea9e630da5
Copying blob sha256:db16b1df7c5cd55229ba7abf00d3f8bbe3c4ced56ed271e25748f5ad7c73fbcb
Copying blob sha256:abcd00d5e729c52d99e058df8f48dd00d82f98a9ca8d94aca89a44cb5d162650
Copying blob sha256:439e4f9bc4444bce9e9d3530749073e34e7f6fbfabfd4cec7d7991ded431dc8f
Copying blob sha256:58ae02c2497b9a673e505fb3a5879022c97426dd49adbacdd40159572a9a8522
Copying blob sha256:e792347b229139d641409595545a7e8cc7de325ed7052b9fb5f8650b739463cc
Copying config sha256:19c5a0422d520a205b4a87d0f8bf179ecd71d3a5cb50f7078f1a26eeb848d882
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling unicode-xid v0.2.2
   Compiling libc v0.2.103
   Compiling bitflags v1.2.1
   Compiling syn v1.0.80
   Compiling autocfg v1.0.1
   Compiling serde_derive v1.0.130
   Compiling memoffset v0.6.4
   Compiling quote v1.0.10
   Compiling serde v1.0.130
   Compiling cfg-if v1.0.0
   Compiling unicode-width v0.1.9
   Compiling getopts v0.2.21
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling nix v0.22.2
   Compiling epoll v4.3.1
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 19.79s
+ file target/x86_64-unknown-linux-musl/release/rusty-keys
target/x86_64-unknown-linux-musl/release/rusty-keys: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), static-pie linked, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target x86_64-unknown-linux-musl --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.20s
     Running `/qemu-runner x86_64 /target/x86_64-unknown-linux-musl/release/rusty-keys -h`
Usage: /target/x86_64-unknown-linux-musl/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/x86_64-unknown-linux-musl/release/rusty-keys
+ mkdir -p release
+ mv target/x86_64-unknown-linux-musl/release/rusty-keys release/rusty-keys-x86_64-unknown-linux-musl
+ '[' x86_64-unknown-linux-musl == x86_64-unknown-linux-musl ']'
+ cross build --target x86_64-unknown-linux-musl --release --no-default-features
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
warning: field `config_file` is never read
  --> src/linux/mod.rs:89:5
   |
87 | struct Config {
   |        ------ field in this struct
88 |     device_files: Vec<String>,
89 |     config_file: String
   |     ^^^^^^^^^^^
   |
   = note: `Config` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
   = note: `#[warn(dead_code)]` on by default

warning: `rusty-keys` (lib) generated 1 warning
    Finished release [optimized] target(s) in 2.15s
+ cross build --target x86_64-unknown-linux-musl --release --no-default-features --features epoll_inotify
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
warning: field `config_file` is never read
  --> src/linux/mod.rs:89:5
   |
87 | struct Config {
   |        ------ field in this struct
88 |     device_files: Vec<String>,
89 |     config_file: String
   |     ^^^^^^^^^^^
   |
   = note: `Config` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
   = note: `#[warn(dead_code)]` on by default

warning: `rusty-keys` (lib) generated 1 warning
    Finished release [optimized] target(s) in 2.25s
+ cross build --target x86_64-unknown-linux-musl --release --no-default-features --features toml_serde
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 2.78s
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET x86_64-unknown-linux-gnu'
starting build for TARGET x86_64-unknown-linux-gnu
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo x86_64-unknown-linux-gnu
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' x86_64-unknown-linux-gnu == riscv64gc-unknown-linux-gnu ']'
+ echo x86_64-unknown-linux-gnu
+ grep -E '(android|solaris$)'
+ cross build --target x86_64-unknown-linux-gnu --release
Trying to pull ghcr.io/cross-rs/x86_64-unknown-linux-gnu:main...
Getting image source signatures
Copying blob sha256:8b1d4c95c4a4c95ffea77d53b2b2f46052ec00be5b80ef3d1757d50c7b6a57d1
Copying blob sha256:3ba6a39e216bb5b135f4946ce8ce56b2c9bb3901f815d9de319d257dba492cc4
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:ceb9f63710c996027893c7218f69225a1ec871a37b5a5da2ba118e4b5d1777a6
Copying blob sha256:6c70d1c0e806235748b31ea4750b6bb7eb473fa8fe23e1bf3c14a52f2857d87a
Copying blob sha256:b0963480052130093be7a51ff87b7763b7884dff047dfd50e215a1fd5886e052
Copying blob sha256:c710eb4c7c4b806e343d9ffb7539cf56eb1994cc654d927835e02b5b6840feae
Copying blob sha256:da0191c7c407ece2754a54ed1b4ad856a89d483dc984f0487772729ee2d312a2
Copying blob sha256:0e1376e6048d342c2304609c1dad512e138d6347b5365027ef61e5a98052b4c4
Copying blob sha256:fb5bccee428c3b2412e33761c1c069f053246e0dfdbccdbcbf1ba0c68c94acc0
Copying blob sha256:913a127e772e5b7290a034e09c7876c8069a438f90e57a0d7d8563186dbc30d9
Copying blob sha256:44e47dfe46b9257831d48ff4629586c0f41889438d5ee0cfa540520253323467
Copying blob sha256:2a23a22cb021ae899cb792d404cd2d45e65118836603fb6a18b32f8d43f1928a
Copying blob sha256:f204b95440519982d28e1a17d054e6cc9a414ac968db3f526a86caf74f85c99a
Copying config sha256:396b4022475377f616a9903100659a790adab3207f001108d207fb1547648aca
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling libc v0.2.103
   Compiling unicode-xid v0.2.2
   Compiling bitflags v1.2.1
   Compiling syn v1.0.80
   Compiling serde_derive v1.0.130
   Compiling autocfg v1.0.1
   Compiling serde v1.0.130
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling unicode-width v0.1.9
   Compiling cfg-if v1.0.0
   Compiling getopts v0.2.21
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling nix v0.22.2
   Compiling epoll v4.3.1
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 17.95s
+ file target/x86_64-unknown-linux-gnu/release/rusty-keys
target/x86_64-unknown-linux-gnu/release/rusty-keys: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=eccae00720f1e7466c0775c8c39e3f122068874f, for GNU/Linux 3.2.0, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target x86_64-unknown-linux-gnu --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.19s
     Running `/native-linux-runner /target/x86_64-unknown-linux-gnu/release/rusty-keys -h`
Usage: /target/x86_64-unknown-linux-gnu/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/x86_64-unknown-linux-gnu/release/rusty-keys
+ mkdir -p release
+ mv target/x86_64-unknown-linux-gnu/release/rusty-keys release/rusty-keys-x86_64-unknown-linux-gnu
+ '[' x86_64-unknown-linux-gnu == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET i686-unknown-linux-musl'
starting build for TARGET i686-unknown-linux-musl
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo i686-unknown-linux-musl
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' i686-unknown-linux-musl == riscv64gc-unknown-linux-gnu ']'
+ echo i686-unknown-linux-musl
+ grep -E '(android|solaris$)'
+ cross build --target i686-unknown-linux-musl --release
Trying to pull ghcr.io/cross-rs/i686-unknown-linux-musl:main...
Getting image source signatures
Copying blob sha256:848ba6a6b5847b9f3c0b7895b51c7408645009a87913855a27577e71de7ba622
Copying blob sha256:75f0599411e7d7c2072cccf099e1b320ff04fe28f293f37a81fbebb0b3936f93
Copying blob sha256:b37da1c4644c2c88d95fcf7b35fb537ab8bf5cc881ee9f0be8005f6f8ecbb9ac
Copying blob sha256:a74fd675204cff2ca3da4b84c306cb896b78f5c0ca7cd1fc48f48efd36ce8512
Copying blob sha256:4d4cd3e03ad3dfde249cceeaf5c8ff764e11de469c5d0edf8d008975b9cce85f
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:75c031beee2cedb097b8c0abb12299e3706b24fddc2c0e4225751276176f0ff5
Copying blob sha256:bd448405084edabd9889cd76bcfbed3bb25ffe259d7a0b3d08859672dc550643
Copying blob sha256:5030db3799eb8ee859df0e724f689ddc1832fc28bb496670e24008e2a0a2f029
Copying blob sha256:cd2d13bb20263b0c20566b64d16d2de479b8608cde246f714442c8036b030237
Copying blob sha256:2e67daffb4aa5b632a1565e998f204081ef3086053602d26551a0e090f67cc26
Copying blob sha256:293866d9eb2cf91966def6ab341d07d21727136f0c41d98071ea347a80e59721
Copying blob sha256:66f6ffbb139909bb28058aeaf5bc02090e1886a7e76f7bcc4ad736f6a32f610d
Copying blob sha256:ed4a2f9eb6a84e5331e0703cbb6dbc6192a22c9ed73f908e8a9604cfe190c322
Copying blob sha256:a2eeda65b22f7a28f67dcacf64c1273079fec634734092be0062e9efe87cfc37
Copying config sha256:90e3c5f1d84d8eb4f38bca19f5154d8e175f892557b986683bbb6b7d80a6b3f2
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling unicode-xid v0.2.2
   Compiling libc v0.2.103
   Compiling bitflags v1.2.1
   Compiling syn v1.0.80
   Compiling autocfg v1.0.1
   Compiling serde_derive v1.0.130
   Compiling memoffset v0.6.4
   Compiling quote v1.0.10
   Compiling serde v1.0.130
   Compiling inotify-sys v0.1.5
   Compiling unicode-width v0.1.9
   Compiling cfg-if v1.0.0
   Compiling getopts v0.2.21
   Compiling nix v0.22.2
   Compiling inotify v0.9.5
   Compiling epoll v4.3.1
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 17.79s
+ file target/i686-unknown-linux-musl/release/rusty-keys
target/i686-unknown-linux-musl/release/rusty-keys: ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target i686-unknown-linux-musl --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.18s
     Running `/qemu-runner i686 /target/i686-unknown-linux-musl/release/rusty-keys -h`
Usage: /target/i686-unknown-linux-musl/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/i686-unknown-linux-musl/release/rusty-keys
+ mkdir -p release
+ mv target/i686-unknown-linux-musl/release/rusty-keys release/rusty-keys-i686-unknown-linux-musl
+ '[' i686-unknown-linux-musl == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET i686-unknown-linux-gnu'
starting build for TARGET i686-unknown-linux-gnu
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo i686-unknown-linux-gnu
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' i686-unknown-linux-gnu == riscv64gc-unknown-linux-gnu ']'
+ echo i686-unknown-linux-gnu
+ grep -E '(android|solaris$)'
+ cross build --target i686-unknown-linux-gnu --release
Trying to pull ghcr.io/cross-rs/i686-unknown-linux-gnu:main...
Getting image source signatures
Copying blob sha256:3c050708cf651d7fd5a87bf7b1d9b300a5b6330c9c3247d5cd7c8e9c7a92af5c
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:233cc251fe2e71a905fecea10c75b6b16e6590dc8e85df57ecbe65820b8f8bd6
Copying blob sha256:c1023fba3a78b4abc6db0fd9b36bc6d3e4a0cea8f2b8ae220688f058e10c6c06
Copying blob sha256:e5410b808d663a8a68699d1d841fc65e074abbd830f466258730fb7effe0ffb5
Copying blob sha256:428ad0dcd35f291045814ef574f1ad03d59bd9cab5fc9510f469f65b9d611aa4
Copying blob sha256:c2e04fab7782cf76d6012b59a3852c847cadb8cfae0f4b70b073d8c986af7e38
Copying blob sha256:31ec8020c2b251309d751b92264f5a3770def0abffd0da17fff8edd6df19b1f2
Copying blob sha256:2f208305490baaec7f99e95ab44418745c34c858551e56997787bd728e6ef79b
Copying blob sha256:e95dbb40d0178534116d99e89cb0260715a076389627537e38eb4cf81ad0bbd1
Copying blob sha256:4c96b25a1f76d7e6dcf296d78d000cbc9328aff8ddec233a3de0bbc8d6563f1f
Copying blob sha256:f4a0852f1e60588d7f150f7b65ff0344be0c8fb90eab3ec79475ade1ee1b38c6
Copying blob sha256:0267dd31ca0e01da3db47c982d835daccee50343b4ec9d316e7b0572dd5ff8ef
Copying blob sha256:0d983fe03e26459f18023f7e27d4319b07a06e9dd1007cc557ecd57518558c98
Copying blob sha256:6c47b3026f5fbd67fea444dfe442f4b0fefcb05a7e37514db772eb6b213f61dd
Copying blob sha256:be071c996711058d2dab84568d7a223958faffe49d8bed02cdac94546f7cc2ae
Copying blob sha256:a41edcde9ca4aa0ac947d3f3f4b845d7fcb71d84fd5a36088f812f6514c0b730
Copying blob sha256:2d8b314128fa8c495cb7f5667bbe1782c4d5b6c402dc61df844faf5ae933c57a
Copying config sha256:27a181d89a155b5680eb81ca5cbffc895388841ae43629c5d0fc3287be5e8b4b
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling unicode-xid v0.2.2
   Compiling libc v0.2.103
   Compiling bitflags v1.2.1
   Compiling syn v1.0.80
   Compiling autocfg v1.0.1
   Compiling serde_derive v1.0.130
   Compiling memoffset v0.6.4
   Compiling quote v1.0.10
   Compiling serde v1.0.130
   Compiling cfg-if v1.0.0
   Compiling unicode-width v0.1.9
   Compiling getopts v0.2.21
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling nix v0.22.2
   Compiling epoll v4.3.1
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 17.99s
+ file target/i686-unknown-linux-gnu/release/rusty-keys
target/i686-unknown-linux-gnu/release/rusty-keys: ELF 32-bit LSB pie executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, BuildID[sha1]=e1b9b19f3f6befede206ffb56ffdc1312fd05d29, for GNU/Linux 3.2.0, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target i686-unknown-linux-gnu --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.19s
     Running `/linux-runner i686 /target/i686-unknown-linux-gnu/release/rusty-keys -h`
Usage: /target/i686-unknown-linux-gnu/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/i686-unknown-linux-gnu/release/rusty-keys
+ mkdir -p release
+ mv target/i686-unknown-linux-gnu/release/rusty-keys release/rusty-keys-i686-unknown-linux-gnu
+ '[' i686-unknown-linux-gnu == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET i586-unknown-linux-musl'
starting build for TARGET i586-unknown-linux-musl
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo i586-unknown-linux-musl
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' i586-unknown-linux-musl == riscv64gc-unknown-linux-gnu ']'
+ echo i586-unknown-linux-musl
+ grep -E '(android|solaris$)'
+ cross build --target i586-unknown-linux-musl --release
Trying to pull ghcr.io/cross-rs/i586-unknown-linux-musl:main...
Getting image source signatures
Copying blob sha256:4ad3ab49626b53ed3c221db9cb38d81b87ec976e1c18b48bbcfb485ce2d44afb
Copying blob sha256:32a89684c33a51ec375317a9ee4b22702801d343307bd41f81e7cd35532c24b5
Copying blob sha256:18a7a9e741ae32c9267adc5f6eec9fd147a38025f6ccf78195d3933bffdc4c54
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:36dd3343cd8f973028eac39d813160dab8f13fbbed93faacfd86803f716a1c01
Copying blob sha256:d12db9854c39bfe0b87070c9c223cd350f64d05c68efe24857d69df8731abcb8
Copying blob sha256:29408e9ad9e9476b581d63e3b0c5e861357997668a21bd68b39f78d1725a3a3e
Copying blob sha256:a9fced43409f132b46f304d3e9cac74694d07814bec206d2f890f04c6aca472c
Copying blob sha256:e86b25acf7e9944a3cc85f0c7ff504f67bb94663f5366a879e3442e4e3736db2
Copying blob sha256:754d00e68c8e0c959b3d5c106d689456449c3f48e30bb0b711a6f531ac379d7d
Copying blob sha256:616171da93a83ef139d337190b118dcb721a5ac1e2681937686a7ac30b467df5
Copying blob sha256:b8a4291868a159055ef3c2a2c84f1c5ff7644cdcfcb51ba88f21531acb8e4ac8
Copying blob sha256:cef3987915a8e9c39b3e098cb5b9c872256e97e1cc755cd42cdcee578eb17ad5
Copying blob sha256:104fedaa704d01c04168c96db97946021fd159e50c93de166ce7672bf427f6a0
Copying blob sha256:04d800fb3ed063369fcdbed18b20a6f2ff419dd4f72209485911b81fc5e2b54e
Copying config sha256:4e6df4a04b08fec48bfc833613e2d06bee5af841b1f0d9412a0cb0f66d054cd6
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling libc v0.2.103
   Compiling unicode-xid v0.2.2
   Compiling bitflags v1.2.1
   Compiling syn v1.0.80
   Compiling serde_derive v1.0.130
   Compiling autocfg v1.0.1
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling serde v1.0.130
   Compiling inotify-sys v0.1.5
   Compiling unicode-width v0.1.9
   Compiling cfg-if v1.0.0
   Compiling nix v0.22.2
   Compiling getopts v0.2.21
   Compiling inotify v0.9.5
   Compiling epoll v4.3.1
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 17.27s
+ file target/i586-unknown-linux-musl/release/rusty-keys
target/i586-unknown-linux-musl/release/rusty-keys: ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target i586-unknown-linux-musl --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.18s
     Running `/qemu-runner i586 /target/i586-unknown-linux-musl/release/rusty-keys -h`
Usage: /target/i586-unknown-linux-musl/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/i586-unknown-linux-musl/release/rusty-keys
+ mkdir -p release
+ mv target/i586-unknown-linux-musl/release/rusty-keys release/rusty-keys-i586-unknown-linux-musl
+ '[' i586-unknown-linux-musl == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET i586-unknown-linux-gnu'
starting build for TARGET i586-unknown-linux-gnu
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo i586-unknown-linux-gnu
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' i586-unknown-linux-gnu == riscv64gc-unknown-linux-gnu ']'
+ echo i586-unknown-linux-gnu
+ grep -E '(android|solaris$)'
+ cross build --target i586-unknown-linux-gnu --release
Trying to pull ghcr.io/cross-rs/i586-unknown-linux-gnu:main...
Getting image source signatures
Copying blob sha256:e679a718e7e4554ad017347439649cb5dbaec718a9738ad8f161f26ca17e87f8
Copying blob sha256:5657a7800b3c99de6be7ff21bafdb1785824232c23ee90a287f699e3a84f6ad2
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:9545fe407eaff6a5eb698c61754db2b9b430d0c140c4f52056acaceb10ebc03f
Copying blob sha256:d580bade62eda646ed29402e5b005d734a63fe1869dda37db669b6e1cc645a88
Copying blob sha256:96fe4a8da32098979f17a43d1aeb0f0e143ef1033a740849d82570414b600f7e
Copying blob sha256:8921c9e374b15ace4f7a453e5bc3f1dc1fdf2ec6f7224727fcbcd7f8a34ad1f6
Copying blob sha256:b86d1b5c66ec9f39a5d4387f9f7888e3621ae6255f446290ab03d0f4b9de64e6
Copying blob sha256:2616d4dafdea04359dc8281660a36b59280ccc9d9378b7eab05b157d10046307
Copying blob sha256:a3b8da888b454c433fc9c9208ea19cdc8ae0dbdc8a9bf036055f2394e0efee18
Copying blob sha256:fb4415d098b8a7376eae15c2c4296c020f334f1e853916823b5f22fe3662bcad
Copying blob sha256:a96a972fc876d254b247af223a70200ff64e0a1151c81ddfc6c29242c5499f24
Copying blob sha256:0e9ff032a6c0260b9d94efc1cf1f4ca8e94779595a40125a1db7dfc20a44fc1b
Copying blob sha256:343773132c407c5e2623331e22e6a460ff91252b73801c7b645bd99c3d2734e1
Copying config sha256:3aff3166f3491b523a3cf9d26943381b27d125e327a4b9c62271eaaa693fe2df
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling libc v0.2.103
   Compiling unicode-xid v0.2.2
   Compiling syn v1.0.80
   Compiling bitflags v1.2.1
   Compiling serde_derive v1.0.130
   Compiling autocfg v1.0.1
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling serde v1.0.130
   Compiling cfg-if v1.0.0
   Compiling unicode-width v0.1.9
   Compiling getopts v0.2.21
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling epoll v4.3.1
   Compiling nix v0.22.2
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 16.84s
+ file target/i586-unknown-linux-gnu/release/rusty-keys
target/i586-unknown-linux-gnu/release/rusty-keys: ELF 32-bit LSB pie executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, BuildID[sha1]=99c16c9851a0f6de0b6e4ac8c6d7c6888f6afd0d, for GNU/Linux 3.2.0, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target i586-unknown-linux-gnu --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.18s
     Running `/qemu-runner i586 /target/i586-unknown-linux-gnu/release/rusty-keys -h`
Usage: /target/i586-unknown-linux-gnu/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/i586-unknown-linux-gnu/release/rusty-keys
+ mkdir -p release
+ mv target/i586-unknown-linux-gnu/release/rusty-keys release/rusty-keys-i586-unknown-linux-gnu
+ '[' i586-unknown-linux-gnu == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET aarch64-unknown-linux-musl'
starting build for TARGET aarch64-unknown-linux-musl
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo aarch64-unknown-linux-musl
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' aarch64-unknown-linux-musl == riscv64gc-unknown-linux-gnu ']'
+ echo aarch64-unknown-linux-musl
+ grep -E '(android|solaris$)'
+ cross build --target aarch64-unknown-linux-musl --release
Trying to pull ghcr.io/cross-rs/aarch64-unknown-linux-musl:main...
Getting image source signatures
Copying blob sha256:290b3c1a21fbbe5f7be9a4c9ccf64bea98435d12a0212ee8356b32d2609ce626
Copying blob sha256:163f8c34f95a123568c9841f8dc8a5986ff625bc5820810a28d582e495dcce28
Copying blob sha256:1c4f156aa3370c7d7776e63ffe0bd0a60ab802b15d66604483e3e4bf7c4adb3e
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:b8500a857cab3363162b469ba8a94644ce6583f738d70477375ec84163959552
Copying blob sha256:9ddaae1c6adbe158ab18ebe435480dd3cfb396b86eff64fee22f1bfadd9e9b03
Copying blob sha256:60bdc54aa4bd813dc4a2a07e75bea1231275c6b86679aecabd15b41a48feb4ca
Copying blob sha256:428d880f5ee96faaf2ae77d53e4b40c47bb91f6263a00a6facfeb4631cb0d8ad
Copying blob sha256:92cacdfbc91539ac63738b471e0915b782d898dfae4f69d1cd901083f6baa8a4
Copying blob sha256:adda725786d884ca4e6c948d3fc39ae44d6f3adf53240223e09360ab9f78b197
Copying blob sha256:ac27b2934726d187a083982a1771915da3ffb666f716214b76f008297c5d77bb
Copying blob sha256:9d8c17bb00989a359fe7676e73a7eb12fc449c78893b6871425cc95e79dfe0d8
Copying blob sha256:b9165aa98c0d89abff69cc7feb5cc3c4269a003553c8f52b0dbd8391cd0712fd
Copying blob sha256:2ed32e0d04cb608e85d6abe3862b1d7347b26bd2c5381e92ad5be0d256a2f9f0
Copying blob sha256:91fb472bd5c854d74cdc2797eb830f2ebb36735bc0e7b9d05665585e717a5532
Copying blob sha256:54adcd48871364d4e3bc372c91a93344aaf4bf33ae692e0583b5e85c3fc5bcd6
Copying config sha256:c0d413f22c249b0c9b55a9ae7ee5e8ba424a2a456d73b80d1873053f750735d9
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling unicode-xid v0.2.2
   Compiling libc v0.2.103
   Compiling bitflags v1.2.1
   Compiling syn v1.0.80
   Compiling autocfg v1.0.1
   Compiling serde_derive v1.0.130
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling serde v1.0.130
   Compiling unicode-width v0.1.9
   Compiling inotify-sys v0.1.5
   Compiling cfg-if v1.0.0
   Compiling inotify v0.9.5
   Compiling nix v0.22.2
   Compiling getopts v0.2.21
   Compiling epoll v4.3.1
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 18.19s
+ file target/aarch64-unknown-linux-musl/release/rusty-keys
target/aarch64-unknown-linux-musl/release/rusty-keys: ELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target aarch64-unknown-linux-musl --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.20s
     Running `/qemu-runner aarch64 /target/aarch64-unknown-linux-musl/release/rusty-keys -h`
Usage: /target/aarch64-unknown-linux-musl/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/aarch64-unknown-linux-musl/release/rusty-keys
strip: Unable to recognise the format of the input file `target/aarch64-unknown-linux-musl/release/rusty-keys'
+ true
+ mkdir -p release
+ mv target/aarch64-unknown-linux-musl/release/rusty-keys release/rusty-keys-aarch64-unknown-linux-musl
+ '[' aarch64-unknown-linux-musl == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET aarch64-unknown-linux-gnu'
starting build for TARGET aarch64-unknown-linux-gnu
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo aarch64-unknown-linux-gnu
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' aarch64-unknown-linux-gnu == riscv64gc-unknown-linux-gnu ']'
+ echo aarch64-unknown-linux-gnu
+ grep -E '(android|solaris$)'
+ cross build --target aarch64-unknown-linux-gnu --release
Trying to pull ghcr.io/cross-rs/aarch64-unknown-linux-gnu:main...
Getting image source signatures
Copying blob sha256:7e06247f5b2eb20d50b75c3066d8494227e53b9a0d5ca5171c4f62fc4197c8d5
Copying blob sha256:969a1b0e0d679ce38a5512742b5ac0c3bdd2f12807cb4404502a33bd845f028b
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:eababf1af8eb8603e1fd6ac31ebcb6d73d8b69cae77c91dc78c6a2a7b5f5baa2
Copying blob sha256:fdc88c9f57aed0957af38f70b61a165a2d4cd834bad61146bac407ff61cd42d5
Copying blob sha256:79e412e601ea3f3ef5729f34dbf9533c489a3263e484371563ad09df418877f2
Copying blob sha256:1ca331e2da9f3e9c7a05539af6f3016fecabd67198299af122fea2699ab50b17
Copying blob sha256:929180b246b3a77c5baab07d8f5b61079465dc620b2443f2409489c6374795e4
Copying blob sha256:66506e11f80443bb0cf33563342ceb2c0a9761b42cba1150c867fb716194d29d
Copying blob sha256:dc37c9d15f2538ce7d7baee9af82ea499aa6d3f0759fdddee33bbb5cf71b8457
Copying blob sha256:0e875d753afab7dac585bad3ef72840004d13c405670a8025122c7118d29092c
Copying blob sha256:4726f5862b7b7b4324e0c649094d412cfb2e1ab8b85afdf9be260b4731259ab1
Copying blob sha256:c704637a2cf80626a7b94ba59eec8a8849b62db7a909b308f1aa56d59188ee7d
Copying blob sha256:cde9e76f11c8e75052e5279ec89c2d5ec4e6ee1e9821c78eb98e1c7da19502a9
Copying blob sha256:5f59b0fdb45183b777fce88d8d4df59742d2fb4ebc838fe4b1dea046fc2419af
Copying blob sha256:e230a5b0c4ecd316f9acc553faded296a20892c86956ab97879fd27459447593
Copying blob sha256:bf420da05210cc934f697ad23d423b096e2984a523dbfbec4862c328de251252
Copying blob sha256:211eac2d596e7b81f6f8a379c1ca93b747ce4e063388cd28949156bc7fcaed85
Copying config sha256:e5404a7b687fa27b9a7c78b4e9564d10710335f2328bc7d6336a9faf4029b96a
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling libc v0.2.103
   Compiling unicode-xid v0.2.2
   Compiling syn v1.0.80
   Compiling bitflags v1.2.1
   Compiling serde_derive v1.0.130
   Compiling autocfg v1.0.1
   Compiling memoffset v0.6.4
   Compiling serde v1.0.130
   Compiling quote v1.0.10
   Compiling cfg-if v1.0.0
   Compiling unicode-width v0.1.9
   Compiling getopts v0.2.21
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling epoll v4.3.1
   Compiling nix v0.22.2
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 18.74s
+ file target/aarch64-unknown-linux-gnu/release/rusty-keys
target/aarch64-unknown-linux-gnu/release/rusty-keys: ELF 64-bit LSB pie executable, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=bbf8a5f45bf3448254e83c378ad430bbbc78da87, for GNU/Linux 3.7.0, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target aarch64-unknown-linux-gnu --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.16s
     Running `/linux-runner aarch64 /target/aarch64-unknown-linux-gnu/release/rusty-keys -h`
Usage: /target/aarch64-unknown-linux-gnu/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/aarch64-unknown-linux-gnu/release/rusty-keys
strip: Unable to recognise the format of the input file `target/aarch64-unknown-linux-gnu/release/rusty-keys'
+ true
+ mkdir -p release
+ mv target/aarch64-unknown-linux-gnu/release/rusty-keys release/rusty-keys-aarch64-unknown-linux-gnu
+ '[' aarch64-unknown-linux-gnu == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
Deleted Images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 reclaimed space: 14.51GB
+ echo 'starting build for TARGET armv7-unknown-linux-gnueabihf'
starting build for TARGET armv7-unknown-linux-gnueabihf
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo armv7-unknown-linux-gnueabihf
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' armv7-unknown-linux-gnueabihf == riscv64gc-unknown-linux-gnu ']'
+ echo armv7-unknown-linux-gnueabihf
+ grep -E '(android|solaris$)'
+ cross build --target armv7-unknown-linux-gnueabihf --release
Trying to pull ghcr.io/cross-rs/armv7-unknown-linux-gnueabihf:main...
Getting image source signatures
Copying blob sha256:290b3c1a21fbbe5f7be9a4c9ccf64bea98435d12a0212ee8356b32d2609ce626
Copying blob sha256:1c4f156aa3370c7d7776e63ffe0bd0a60ab802b15d66604483e3e4bf7c4adb3e
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:fcab2614b82db2d6e34558c13d202dd27c8e0509395ed927da02ab99c54747a0
Copying blob sha256:163f8c34f95a123568c9841f8dc8a5986ff625bc5820810a28d582e495dcce28
Copying blob sha256:04c80b14675853f82674c1c70390d5c57c0bbba4c06eefdfc56fb38b29fe155e
Copying blob sha256:ba807f483f186f3cdec7b4af18e7499e6ddec183b223eee47e12de3280768907
Copying blob sha256:fdb26389e06c6c666c0091a10a40c1910aa7d0437e046cc92faff4ef8c80b323
Copying blob sha256:38a9f96dcef65a950ae3421cfbfac504121c2765918b89ecf09879d5610cfc93
Copying blob sha256:fd139a2b3d8c4c6d5f9c26c594c406aad79d2f970b933bb7052cc6475c8256b7
Copying blob sha256:428d880f5ee96faaf2ae77d53e4b40c47bb91f6263a00a6facfeb4631cb0d8ad
Copying blob sha256:97eeef7a6945facecd5bf49c504c748d5007503bb20a6bbdc26edc7d6833c646
Copying blob sha256:b8dd13342d25f3873982cae24d936939d85d56ed11ec2b69a0e6994275808d97
Copying blob sha256:d4f0f19a5f36a2397512f5e51ff19be27be57d34a76a03356bad1dfa987da695
Copying blob sha256:da6e130638d59ca4772e9659cdacfd38299283eb7a5df14b0077071b459c2187
Copying blob sha256:9f356d27b6546908faa4d1e3e05661d3b530ae4a35326d3bb67196339ebe5d7a
Copying blob sha256:5c074d9955f8dec86de57023fa33bf87a69e3496296fc88bdfb86bff0dd11756
Copying blob sha256:c4bf1c9b2546f1daf79809eba66736bd99c0ee75ba3131fa0765dceab26d0e0b
Copying config sha256:363f22e2bc33ad441cf7b58a32743c8e14326f766e76ab33204f81132e6669ea
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling unicode-xid v0.2.2
   Compiling libc v0.2.103
   Compiling syn v1.0.80
   Compiling bitflags v1.2.1
   Compiling serde_derive v1.0.130
   Compiling autocfg v1.0.1
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling serde v1.0.130
   Compiling inotify-sys v0.1.5
   Compiling unicode-width v0.1.9
   Compiling cfg-if v1.0.0
   Compiling nix v0.22.2
   Compiling getopts v0.2.21
   Compiling inotify v0.9.5
   Compiling epoll v4.3.1
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 18.09s
+ file target/armv7-unknown-linux-gnueabihf/release/rusty-keys
target/armv7-unknown-linux-gnueabihf/release/rusty-keys: ELF 32-bit LSB pie executable, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-armhf.so.3, BuildID[sha1]=d824b230095fed6fc91d67adab4d65a0a7f271b0, for GNU/Linux 3.2.0, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target armv7-unknown-linux-gnueabihf --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.19s
     Running `/linux-runner armv7hf /target/armv7-unknown-linux-gnueabihf/release/rusty-keys -h`
Usage: /target/armv7-unknown-linux-gnueabihf/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/armv7-unknown-linux-gnueabihf/release/rusty-keys
strip: Unable to recognise the format of the input file `target/armv7-unknown-linux-gnueabihf/release/rusty-keys'
+ true
+ mkdir -p release
+ mv target/armv7-unknown-linux-gnueabihf/release/rusty-keys release/rusty-keys-armv7-unknown-linux-gnueabihf
+ '[' armv7-unknown-linux-gnueabihf == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET armv7-unknown-linux-musleabihf'
starting build for TARGET armv7-unknown-linux-musleabihf
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ grep -E '^x86_64-pc-windows-gnu$'
+ echo armv7-unknown-linux-musleabihf
+ '[' armv7-unknown-linux-musleabihf == riscv64gc-unknown-linux-gnu ']'
+ grep -E '(android|solaris$)'
+ echo armv7-unknown-linux-musleabihf
+ cross build --target armv7-unknown-linux-musleabihf --release
Trying to pull ghcr.io/cross-rs/armv7-unknown-linux-musleabihf:main...
Getting image source signatures
Copying blob sha256:c9ef30156f586d3f006bc3d3f4794b7e0cde712d23842a906ed36ecf227e4f92
Copying blob sha256:138fee576ba8ae10d19b4615d351e6c1f0bf4d51cab71f29ab1de08ec2818d31
Copying blob sha256:3b0276da973391d79fce31dbada1445f307acc472e901656830b230b32728b84
Copying blob sha256:1fcd5eafe5247bd0d84b602503b42eb8c97a809a000e8aa5e2293c9814a022d6
Copying blob sha256:d552f12774d9859217b6d69196f9649d4afa7f2e23086967c648eb2a7cfaf9d0
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:591633fb54a9c253c9da57b4ea10e3c1eb0215ee7840e21cacbcfbc1b3a522c7
Copying blob sha256:62953ba8047e89f6b8f467f5e30248c87f4a8512aca08e5071da9872bb3e71d7
Copying blob sha256:f4c038e4e3a661cd34b6ca9f3a4f589517d98b9729df49ba0f7cd5481cc80a56
Copying blob sha256:cda53d448d4a51bb244be07fd5c43f1c454cc0ef7a8d845511fd42956cd3bc9c
Copying blob sha256:692bdb68b1f35f87a4da8c73110baeece92477c151390292fb37b815340c7f0e
Copying blob sha256:b0ca7a765cb9ca6d25b957d873f04af8e9ee3e79a6bf57cc25411ca7ff2608ae
Copying blob sha256:d87b9a3db33895a0c274ce371d57a2455b980ca4237a9bbd8dccbdc4e125edc9
Copying blob sha256:4558059883cd383b5426c0631803fd645fee143f7aab46ef19b6828dae64ac01
Copying blob sha256:4c11f1553774f6d70a41203424856e5b1696719e6c8537d1a1aa26a47cbbcd17
Copying config sha256:43a7306c1df5dd30a80402223c4489ecb7c46e306d9eae542494d1105c35e9b7
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling unicode-xid v0.2.2
   Compiling libc v0.2.103
   Compiling syn v1.0.80
   Compiling bitflags v1.2.1
   Compiling autocfg v1.0.1
   Compiling serde_derive v1.0.130
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling serde v1.0.130
   Compiling unicode-width v0.1.9
   Compiling cfg-if v1.0.0
   Compiling getopts v0.2.21
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling epoll v4.3.1
   Compiling nix v0.22.2
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 17.10s
+ file target/armv7-unknown-linux-musleabihf/release/rusty-keys
target/armv7-unknown-linux-musleabihf/release/rusty-keys: ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), statically linked, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target armv7-unknown-linux-musleabihf --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.19s
     Running `/qemu-runner armv7hf /target/armv7-unknown-linux-musleabihf/release/rusty-keys -h`
Usage: /target/armv7-unknown-linux-musleabihf/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/armv7-unknown-linux-musleabihf/release/rusty-keys
strip: Unable to recognise the format of the input file `target/armv7-unknown-linux-musleabihf/release/rusty-keys'
+ true
+ mkdir -p release
+ mv target/armv7-unknown-linux-musleabihf/release/rusty-keys release/rusty-keys-armv7-unknown-linux-musleabihf
+ '[' armv7-unknown-linux-musleabihf == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET arm-unknown-linux-gnueabi'
starting build for TARGET arm-unknown-linux-gnueabi
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo arm-unknown-linux-gnueabi
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' arm-unknown-linux-gnueabi == riscv64gc-unknown-linux-gnu ']'
+ echo arm-unknown-linux-gnueabi
+ grep -E '(android|solaris$)'
+ cross build --target arm-unknown-linux-gnueabi --release
Trying to pull ghcr.io/cross-rs/arm-unknown-linux-gnueabi:main...
Getting image source signatures
Copying blob sha256:a34350b821e9190e4525250fb9ee3b32bdbe43feef1a9517dab1ed6c120bb370
Copying blob sha256:d3e1e99e84a374667c5a2cac6e23eb7e96f6a4daf3318e29af93a92e62ef1a60
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:ffcf0ada9b7860f388de14f1ea56b123225dcd88c71cc6f23904a845d0931e0f
Copying blob sha256:598a2770b52c843bfa4b2bd50762ee5c6cb98671b10b3155e72949b813859c92
Copying blob sha256:730c940ba650d1c83dacbb9044c0ceb704f7573b18800e832870f5cf0ccaee4d
Copying blob sha256:011e22fe8f84fd1a5022c86082f6271a8f1daf08b7e7736dbba65076e8e9bc30
Copying blob sha256:66ce92dc48f450086d8089e0ac24ab8edd62e69d6f18f9e675e0e75b838e29df
Copying blob sha256:f1f5797fd73d9aea92683a87ab2c7a8fc2ea32873bbf159205b383915fd0c1b7
Copying blob sha256:55dbacc612ea3cd572008c8333c95ab163bf2867a77ac5340247f9eb90f2ab17
Copying blob sha256:610f77117dcd2ac96ceb39457bc7ba21af0e92a882e48881f331fa4c8406123f
Copying blob sha256:12a9e278aa546d7bc003a4445eb4b70b7ef84fd057eb53e2520c17a2633c70f6
Copying blob sha256:28745266b0556c8adac4b05601cf560213236cf049b5559c88fc12194f7886dc
Copying blob sha256:b56374ca40cfdb4547d6f6dbdfff9efaf9d7fcb4641e0b6c02ecf0a1716001a5
Copying config sha256:a456a37c30a000a7e68452756a06c1611b855690e11789843b4ee19322a0b716
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling libc v0.2.103
   Compiling unicode-xid v0.2.2
   Compiling bitflags v1.2.1
   Compiling syn v1.0.80
   Compiling serde_derive v1.0.130
   Compiling autocfg v1.0.1
   Compiling serde v1.0.130
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling unicode-width v0.1.9
   Compiling cfg-if v1.0.0
   Compiling getopts v0.2.21
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling nix v0.22.2
   Compiling epoll v4.3.1
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 17.40s
+ file target/arm-unknown-linux-gnueabi/release/rusty-keys
target/arm-unknown-linux-gnueabi/release/rusty-keys: ELF 32-bit LSB pie executable, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.3, BuildID[sha1]=8ae4cd9c9171495d5240b021c0eb3ac114db002e, for GNU/Linux 3.2.0, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target arm-unknown-linux-gnueabi --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.21s
     Running `/qemu-runner arm /target/arm-unknown-linux-gnueabi/release/rusty-keys -h`
Usage: /target/arm-unknown-linux-gnueabi/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/arm-unknown-linux-gnueabi/release/rusty-keys
strip: Unable to recognise the format of the input file `target/arm-unknown-linux-gnueabi/release/rusty-keys'
+ true
+ mkdir -p release
+ mv target/arm-unknown-linux-gnueabi/release/rusty-keys release/rusty-keys-arm-unknown-linux-gnueabi
+ '[' arm-unknown-linux-gnueabi == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET arm-unknown-linux-gnueabihf'
starting build for TARGET arm-unknown-linux-gnueabihf
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo arm-unknown-linux-gnueabihf
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' arm-unknown-linux-gnueabihf == riscv64gc-unknown-linux-gnu ']'
+ echo arm-unknown-linux-gnueabihf
+ grep -E '(android|solaris$)'
+ cross build --target arm-unknown-linux-gnueabihf --release
Trying to pull ghcr.io/cross-rs/arm-unknown-linux-gnueabihf:main...
Getting image source signatures
Copying blob sha256:e679a718e7e4554ad017347439649cb5dbaec718a9738ad8f161f26ca17e87f8
Copying blob sha256:5657a7800b3c99de6be7ff21bafdb1785824232c23ee90a287f699e3a84f6ad2
Copying blob sha256:9545fe407eaff6a5eb698c61754db2b9b430d0c140c4f52056acaceb10ebc03f
Copying blob sha256:613fbfc739d690c6502ebb03f522397799b7b500defedb855fac31f8908cda06
Copying blob sha256:d5e749219ca1e8cfbe8209632c6f9fc97daa9a2d982154835f8596bbad88f867
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:96cd24ee9881f1081b2dc2dee6f96b0d10b0afb9f36decc890b1186535d97a9d
Copying blob sha256:a77d2080e7fda93ebc8fb8fc5ea5f2c5a37b52d0a983a899c0f1cd4a0e48252d
Copying blob sha256:284bb6a59d227b567ced52907d3e02c3c1cbc748668e89f6c6b342f48ea2aefa
Copying blob sha256:4c403ca476e154a51651713001e59f79bc79bd198dc4daa268ad490dfdcc0ce5
Copying blob sha256:2616d4dafdea04359dc8281660a36b59280ccc9d9378b7eab05b157d10046307
Copying blob sha256:d50bcc3a4a31a9de99bcbaf43730f142a74294161cf08cc11e131a3a0a3307ac
Copying blob sha256:fb4415d098b8a7376eae15c2c4296c020f334f1e853916823b5f22fe3662bcad
Copying blob sha256:7347a681504cec7e7192f0dfc1f04b74258cc798c387f525b799bf9011e4b32e
Copying blob sha256:0e9ff032a6c0260b9d94efc1cf1f4ca8e94779595a40125a1db7dfc20a44fc1b
Copying blob sha256:c5e817f3322d93d12cf02f34317aa3a009f22fa7e78fec81a0635c30901d2766
Copying config sha256:4c280d5ec42e716626c8f12757e252cbc468420add2d50800f080dafd160bc30
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling libc v0.2.103
   Compiling unicode-xid v0.2.2
   Compiling bitflags v1.2.1
   Compiling syn v1.0.80
   Compiling autocfg v1.0.1
   Compiling serde_derive v1.0.130
   Compiling memoffset v0.6.4
   Compiling quote v1.0.10
   Compiling serde v1.0.130
   Compiling cfg-if v1.0.0
   Compiling unicode-width v0.1.9
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling getopts v0.2.21
   Compiling nix v0.22.2
   Compiling epoll v4.3.1
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 17.48s
+ file target/arm-unknown-linux-gnueabihf/release/rusty-keys
target/arm-unknown-linux-gnueabihf/release/rusty-keys: ELF 32-bit LSB pie executable, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-armhf.so.3, for GNU/Linux 4.19.21, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target arm-unknown-linux-gnueabihf --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.19s
     Running `/qemu-runner armhf /target/arm-unknown-linux-gnueabihf/release/rusty-keys -h`
Usage: /target/arm-unknown-linux-gnueabihf/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/arm-unknown-linux-gnueabihf/release/rusty-keys
strip: Unable to recognise the format of the input file `target/arm-unknown-linux-gnueabihf/release/rusty-keys'
+ true
+ mkdir -p release
+ mv target/arm-unknown-linux-gnueabihf/release/rusty-keys release/rusty-keys-arm-unknown-linux-gnueabihf
+ '[' arm-unknown-linux-gnueabihf == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET arm-unknown-linux-musleabi'
starting build for TARGET arm-unknown-linux-musleabi
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo arm-unknown-linux-musleabi
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' arm-unknown-linux-musleabi == riscv64gc-unknown-linux-gnu ']'
+ echo arm-unknown-linux-musleabi
+ grep -E '(android|solaris$)'
+ cross build --target arm-unknown-linux-musleabi --release
Trying to pull ghcr.io/cross-rs/arm-unknown-linux-musleabi:main...
Getting image source signatures
Copying blob sha256:18fe0cca13ac20d052bf9aff4a886029f72c61d225d8af3b105a2b3522b3a711
Copying blob sha256:2d0cc597c61ea008814d7892f129f0e6aecbf8d44fd7e809112b873400da33dc
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:3a148e7e2a17c52a632c6ed8a74a57d5a0e29a1a7fdeeb5a68bc3cd599ba4df3
Copying blob sha256:e679a718e7e4554ad017347439649cb5dbaec718a9738ad8f161f26ca17e87f8
Copying blob sha256:3df34d28c127c8a20c299d20273f1a435705bcb45957e1b7bd4f929c7a8b3704
Copying blob sha256:42c280309d5cb58a9cbb8199c47c353230b3efe6e6b6822f3ff6393fec2f7994
Copying blob sha256:fb4415d098b8a7376eae15c2c4296c020f334f1e853916823b5f22fe3662bcad
Copying blob sha256:5231b9a2b05e8340257dc29b4f86a773b677915ff2eb4c8e3387a53f90200c5e
Copying blob sha256:bd05c1a3339271d4107ad0c8a29e94ff79f45fab1f4630c8eb8be151d771f41f
Copying blob sha256:45371b9ed95cfd70a71fc8532ecadb04577fb5c02c210858348038b70c1faec7
Copying blob sha256:0f39ed92e239282139e1c8bd585a4479957ccc35f4a221cc8a6bf8797b972922
Copying blob sha256:c2fd9743290af6dc06ca135982ad519de36259b81b46ec1a982b275a8a833fcc
Copying blob sha256:d2deebbe672354f1be3f0fd735c76d38b25f549cfafdab35313906402db56375
Copying blob sha256:f4d19f2ff2dd057a0f75c519a46209961a1be53dc3ff41fd3da09f986691833b
Copying config sha256:171a3ff2c89926a37554e4d00cee256d7e1361558bc9683dc8465839541844bd
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling unicode-xid v0.2.2
   Compiling libc v0.2.103
   Compiling syn v1.0.80
   Compiling bitflags v1.2.1
   Compiling serde_derive v1.0.130
   Compiling autocfg v1.0.1
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling serde v1.0.130
   Compiling cfg-if v1.0.0
   Compiling unicode-width v0.1.9
   Compiling inotify-sys v0.1.5
   Compiling epoll v4.3.1
   Compiling inotify v0.9.5
   Compiling nix v0.22.2
   Compiling getopts v0.2.21
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 17.40s
+ file target/arm-unknown-linux-musleabi/release/rusty-keys
target/arm-unknown-linux-musleabi/release/rusty-keys: ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), statically linked, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target arm-unknown-linux-musleabi --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.18s
     Running `/qemu-runner arm /target/arm-unknown-linux-musleabi/release/rusty-keys -h`
Usage: /target/arm-unknown-linux-musleabi/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/arm-unknown-linux-musleabi/release/rusty-keys
strip: Unable to recognise the format of the input file `target/arm-unknown-linux-musleabi/release/rusty-keys'
+ true
+ mkdir -p release
+ mv target/arm-unknown-linux-musleabi/release/rusty-keys release/rusty-keys-arm-unknown-linux-musleabi
+ '[' arm-unknown-linux-musleabi == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET arm-unknown-linux-musleabihf'
starting build for TARGET arm-unknown-linux-musleabihf
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo arm-unknown-linux-musleabihf
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' arm-unknown-linux-musleabihf == riscv64gc-unknown-linux-gnu ']'
+ echo arm-unknown-linux-musleabihf
+ grep -E '(android|solaris$)'
+ cross build --target arm-unknown-linux-musleabihf --release
Trying to pull ghcr.io/cross-rs/arm-unknown-linux-musleabihf:main...
Getting image source signatures
Copying blob sha256:a34350b821e9190e4525250fb9ee3b32bdbe43feef1a9517dab1ed6c120bb370
Copying blob sha256:ffcf0ada9b7860f388de14f1ea56b123225dcd88c71cc6f23904a845d0931e0f
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:d3e1e99e84a374667c5a2cac6e23eb7e96f6a4daf3318e29af93a92e62ef1a60
Copying blob sha256:bee5248a2483524ed77b9aec19ddcdd9e11c427e7a049ac261269a17cf56ee34
Copying blob sha256:94a04cb263436276b1f8201eed8c79cec3029e9db90de1056827e469398338da
Copying blob sha256:2938dca832c64d23762299631521bf487e7ae0407b4b940cf6582e885bc8d304
Copying blob sha256:610f77117dcd2ac96ceb39457bc7ba21af0e92a882e48881f331fa4c8406123f
Copying blob sha256:a662ee0195758a359f6266296a6f089a2c302f2a1b3038d49393f5ca607131e1
Copying blob sha256:590fcd00fb466079b69cd18e0534baafcc65a30fa7298cdf83f8b16c777f76b5
Copying blob sha256:f7edb6d6512f3f79f3c500af4079dca9a51756ca3519760dc0223ff51c98998e
Copying blob sha256:32699585623d90de018aece7f4601defe9743b086afba5c90f72023480dd374c
Copying blob sha256:2981f49547dcf9f5bae48b5ec14893aa145c6f0d3597635d9652f92582b84093
Copying blob sha256:28745266b0556c8adac4b05601cf560213236cf049b5559c88fc12194f7886dc
Copying blob sha256:f7e9a291c0362e2b10b0e52207ebc51395ecec1a25f5821a6b43fe35404b0b41
Copying config sha256:5f4501a2043458dc0101d117414897cdea86ea7834d809ebf1f41b21c22c7329
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling unicode-xid v0.2.2
   Compiling libc v0.2.103
   Compiling syn v1.0.80
   Compiling bitflags v1.2.1
   Compiling serde_derive v1.0.130
   Compiling autocfg v1.0.1
   Compiling serde v1.0.130
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling unicode-width v0.1.9
   Compiling cfg-if v1.0.0
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling nix v0.22.2
   Compiling epoll v4.3.1
   Compiling getopts v0.2.21
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 17.64s
+ file target/arm-unknown-linux-musleabihf/release/rusty-keys
target/arm-unknown-linux-musleabihf/release/rusty-keys: ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), statically linked, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target arm-unknown-linux-musleabihf --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.20s
     Running `/qemu-runner armhf /target/arm-unknown-linux-musleabihf/release/rusty-keys -h`
Usage: /target/arm-unknown-linux-musleabihf/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/arm-unknown-linux-musleabihf/release/rusty-keys
strip: Unable to recognise the format of the input file `target/arm-unknown-linux-musleabihf/release/rusty-keys'
+ true
+ mkdir -p release
+ mv target/arm-unknown-linux-musleabihf/release/rusty-keys release/rusty-keys-arm-unknown-linux-musleabihf
+ '[' arm-unknown-linux-musleabihf == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET armv5te-unknown-linux-gnueabi'
starting build for TARGET armv5te-unknown-linux-gnueabi
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ grep -E '^x86_64-pc-windows-gnu$'
+ echo armv5te-unknown-linux-gnueabi
+ '[' armv5te-unknown-linux-gnueabi == riscv64gc-unknown-linux-gnu ']'
+ echo armv5te-unknown-linux-gnueabi
+ grep -E '(android|solaris$)'
+ cross build --target armv5te-unknown-linux-gnueabi --release
Trying to pull ghcr.io/cross-rs/armv5te-unknown-linux-gnueabi:main...
Getting image source signatures
Copying blob sha256:c9ef30156f586d3f006bc3d3f4794b7e0cde712d23842a906ed36ecf227e4f92
Copying blob sha256:138fee576ba8ae10d19b4615d351e6c1f0bf4d51cab71f29ab1de08ec2818d31
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:1fcd5eafe5247bd0d84b602503b42eb8c97a809a000e8aa5e2293c9814a022d6
Copying blob sha256:058dc50047f8c2d1d54324ee78c0ec16c58127814e495b622799a81299b63224
Copying blob sha256:3c48c31b40a18f97dd55f21c0413f831058aef80d434ddfa6f2c6a48192e80ed
Copying blob sha256:5df45d39f34f5d45b507f5d12d79b30c6b2edff059ab5eec7a98519708413d64
Copying blob sha256:2072b2dd5418dd4d5d95d54e2f908ca793b1303887d640ddc573e35b553fbe71
Copying blob sha256:103ad41d6b1b08eb828b3d8abf57eb8aa0ac237f1e56cff522ffa5958e0e90fe
Copying blob sha256:88706502c618074afb94b5591ac14023dc2a4ac57d9349dffec4a36b4ac7499d
Copying blob sha256:62953ba8047e89f6b8f467f5e30248c87f4a8512aca08e5071da9872bb3e71d7
Copying blob sha256:b1a08dc211a3e7b2d7624bf24d33d617f0f1fbc5423bb1aa03471e479df2ba63
Copying blob sha256:4558059883cd383b5426c0631803fd645fee143f7aab46ef19b6828dae64ac01
Copying blob sha256:eb998d1a407136e98bea9a7f7842589f0069d64cc80195c4193e439ecec59af1
Copying config sha256:8254f76b06ec8e49bf969335eaac0f92a2062d7e006e50bc6cc2c6f62b45f844
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling unicode-xid v0.2.2
   Compiling libc v0.2.103
   Compiling syn v1.0.80
   Compiling bitflags v1.2.1
   Compiling autocfg v1.0.1
   Compiling serde_derive v1.0.130
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling serde v1.0.130
   Compiling unicode-width v0.1.9
   Compiling cfg-if v1.0.0
   Compiling getopts v0.2.21
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling epoll v4.3.1
   Compiling nix v0.22.2
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 18.24s
+ file target/armv5te-unknown-linux-gnueabi/release/rusty-keys
target/armv5te-unknown-linux-gnueabi/release/rusty-keys: ELF 32-bit LSB pie executable, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.3, BuildID[sha1]=56f2718778bfbc6c8373c9555630efda88efed4d, for GNU/Linux 3.2.0, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target armv5te-unknown-linux-gnueabi --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.14s
     Running `/qemu-runner arm /target/armv5te-unknown-linux-gnueabi/release/rusty-keys -h`
Usage: /target/armv5te-unknown-linux-gnueabi/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/armv5te-unknown-linux-gnueabi/release/rusty-keys
strip: Unable to recognise the format of the input file `target/armv5te-unknown-linux-gnueabi/release/rusty-keys'
+ true
+ mkdir -p release
+ mv target/armv5te-unknown-linux-gnueabi/release/rusty-keys release/rusty-keys-armv5te-unknown-linux-gnueabi
+ '[' armv5te-unknown-linux-gnueabi == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET armv5te-unknown-linux-musleabi'
starting build for TARGET armv5te-unknown-linux-musleabi
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo armv5te-unknown-linux-musleabi
+ grep -E '^x86_64-pc-windows-gnu$'
+ '[' armv5te-unknown-linux-musleabi == riscv64gc-unknown-linux-gnu ']'
+ echo armv5te-unknown-linux-musleabi
+ grep -E '(android|solaris$)'
+ cross build --target armv5te-unknown-linux-musleabi --release
Trying to pull ghcr.io/cross-rs/armv5te-unknown-linux-musleabi:main...
Getting image source signatures
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:a7912964a4f9502adc01392e3cc58bb59647aeeb64e48b8bd57ffcf70ef0bbdc
Copying blob sha256:3df34d28c127c8a20c299d20273f1a435705bcb45957e1b7bd4f929c7a8b3704
Copying blob sha256:d9454162847aee38ce5d6120191fe329ff6657a6929b7d95930e46f1d09b5e81
Copying blob sha256:564783089534ba7b8437958e34dadcf1ff7d1d283da4b7a38a886b1a3306de8f
Copying blob sha256:3a52727ac80fbe036440d776119d1b90675f7f59935f0d04afac46c954fad325
Copying blob sha256:64128f799b2da0f87d248a99606b2cec410ca06b6114673dd9bad5b59ce82d5a
Copying blob sha256:a93b06352996f7bc684162eebed352c07e565e301dd64770671fee17b9aa25ab
Copying blob sha256:7f8130357523e85fb9f07fde9622884e7abdbde9bcc15638d3e0ec94b6932cb6
Copying blob sha256:5a2d93851d12b083b5547c17a6aa80b2cda138cc336eafbd34caf3fb7ea6a9f1
Copying blob sha256:b6f72df5c6c620ced36b25daed02243efd0d3e912a07df0816d38da80325e334
Copying blob sha256:1521713e32cd0b768e5e1a859a92e238efdfdf1a934e81e914ea22ea0495ce19
Copying blob sha256:d5076c6e1039e9bd122d6f99889928e20326728cb84ed4fac8f369edea1dcb3b
Copying blob sha256:b174805a57a923efdf1264cc2e8d366a40c268b7e14ec2dce8fe0aa96a7e8f63
Copying blob sha256:ba1177f41015dcea6b2cdc5967aae280e57e0ca44dbdf9a708f4b34311fcf9ea
Copying blob sha256:756a6e0321cfbedbfcb8dae95d739ddc1b495d70f5754a846cbfd44e57a9ba81
Copying config sha256:b0b2750bde9b8a0bf118ecdb7ae5da42e640685efd3e84f2c9887f91b0a4855a
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling libc v0.2.103
   Compiling unicode-xid v0.2.2
   Compiling bitflags v1.2.1
   Compiling syn v1.0.80
   Compiling autocfg v1.0.1
   Compiling serde_derive v1.0.130
   Compiling quote v1.0.10
   Compiling memoffset v0.6.4
   Compiling serde v1.0.130
   Compiling cfg-if v1.0.0
   Compiling unicode-width v0.1.9
   Compiling getopts v0.2.21
   Compiling inotify-sys v0.1.5
   Compiling inotify v0.9.5
   Compiling nix v0.22.2
   Compiling epoll v4.3.1
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
    Finished release [optimized] target(s) in 18.06s
+ file target/armv5te-unknown-linux-musleabi/release/rusty-keys
target/armv5te-unknown-linux-musleabi/release/rusty-keys: ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), statically linked, with debug_info, not stripped
+ '[' 0 -ne 1 ']'
+ cross run --target armv5te-unknown-linux-musleabi --release --bin rusty-keys -- -h
    Finished release [optimized] target(s) in 0.17s
     Running `/qemu-runner arm /target/armv5te-unknown-linux-musleabi/release/rusty-keys -h`
Usage: /target/armv5te-unknown-linux-musleabi/release/rusty-keys [options] [device_files...]

Options:
    -h, --help          prints this help message
    -v, --version       prints the version
    -c, --config FILE   specify the keymap config file to use (default:
                        /etc/rusty-keys/keymap.toml)

+ strip target/armv5te-unknown-linux-musleabi/release/rusty-keys
strip: Unable to recognise the format of the input file `target/armv5te-unknown-linux-musleabi/release/rusty-keys'
+ true
+ mkdir -p release
+ mv target/armv5te-unknown-linux-musleabi/release/rusty-keys release/rusty-keys-armv5te-unknown-linux-musleabi
+ '[' armv5te-unknown-linux-musleabi == x86_64-unknown-linux-musl ']'
+ echo 'build success!'
build success!
+ exit 0
+ echo 'starting build for TARGET x86_64-pc-windows-gnu'
starting build for TARGET x86_64-pc-windows-gnu
+ export CRATE_NAME=rusty-keys
+ CRATE_NAME=rusty-keys
+ DISABLE_TESTS=0
+ SUFFIX=
+ echo x86_64-pc-windows-gnu
+ grep -E '^x86_64-pc-windows-gnu$'
+ SUFFIX=.exe
+ '[' x86_64-pc-windows-gnu == riscv64gc-unknown-linux-gnu ']'
+ echo x86_64-pc-windows-gnu
+ grep -E '(android|solaris$)'
+ cross build --target x86_64-pc-windows-gnu --release
Trying to pull ghcr.io/cross-rs/x86_64-pc-windows-gnu:main...
Getting image source signatures
Copying blob sha256:39382cb6db54d2f433b1a7a79929a8d8d1e70f9e22faa0205f5512f2e01e2bc5
Copying blob sha256:7ba75ee308693c0795bbdb7fb8f31e7fbc54880356f37b2d89f590e11185f725
Copying blob sha256:3be1be435e002473f873c03e6a38a942917bede2952d06dd78671c685f350b2c
Copying blob sha256:edaedc954fb53f42a7754a6e2d1b57f091bc9b11063bc445c2e325ea448f8f68
Copying blob sha256:5cfd7f40c17a051adaed13dc3ba604f510c1f68becba897a68b1954f2df363ee
Copying blob sha256:d4f9972c745270b98e6ce611373ca4733672b5c65d7e13a44f478303978964ee
Copying blob sha256:efb9c6a01198c60fa6ffff8c3c02a5b417931109944ff3690cc4d83512be005c
Copying blob sha256:4f27572f315f74302f2a3f03b9d9bf32ee151cfd0371dbbccc254d0118abe3c5
Copying blob sha256:d839d3509c21fa948dd19f8c095036e8ef2706e1a4e40c8c2926615050f3d923
Copying blob sha256:07466f92edf9ec56e9e2647e640732e30a7739b24194c21ec3e78a888cded7b9
Copying blob sha256:8a7d3d08e345b83f2ce78d700befb6dfee76fabc2b159cad9c5654bdf0dceae7
Copying blob sha256:ab8b1f8508d7b95c6a8e5ae1a9f166d0a18b8883badcf09bc2a88235928f69b4
Copying blob sha256:dc9a6b4c46bf8eeb707912c31f74c5abebf6060a30e9b0989d174365c7b3bf16
Copying blob sha256:6c8381d78cf1f9b29bd1e77be84753755f5c3811bd0627fe46ae30c4fc70832f
Copying config sha256:9f819b9a2d3e8abe82448995d48c55f2ddc604e0d485686b5e67cede73f8d655
Writing manifest to image destination
   Compiling proc-macro2 v1.0.29
   Compiling unicode-xid v0.2.2
   Compiling syn v1.0.80
   Compiling serde_derive v1.0.130
   Compiling winapi-x86_64-pc-windows-gnu v0.4.0
   Compiling serde v1.0.130
   Compiling winapi v0.3.9
   Compiling unicode-width v0.1.9
   Compiling getopts v0.2.21
   Compiling lazy_static v1.4.0
   Compiling quote v1.0.10
   Compiling toml v0.5.8
   Compiling rusty-keys v0.0.3 (/var/lib/jenkins/workspace/moparisthebest_rusty-keys_master)
warning: crate-level attribute should be in the root module
 --> src/windows/mod.rs:1:1
  |
1 | #![windows_subsystem = "windows"]
  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  |
  = note: `#[warn(unused_attributes)]` on by default

warning: cross-crate traits with a default impl, like `Send`, should not be specialized
   --> src/windows/mod.rs:100:1
    |
100 | unsafe impl Send for WindowsKeyMaps {
    | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    |
    = warning: this will change its meaning in a future release!
    = note: for more information, see issue #93367 <https://github.com/rust-lang/rust/issues/93367>
    = note: `Device` is not a generic parameter
note: try using the same sequence of generic parameters as the struct definition
   --> src/keymapper.rs:98:1
    |
98  | pub struct KeyMaps<K, T, E, R = ()>
    | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    = note: `#[warn(suspicious_auto_trait_impls)]` on by default

error: non-binding let on a synchronization lock
   --> src/windows/mod.rs:179:9
    |
179 |     let _ = KEY_MAPPER.lock().unwrap();
    |         ^   ^^^^^^^^^^^^^^^^^^^^^^^^^^ this binding will immediately drop the value assigned to it
    |         |
    |         this lock is not assigned to a binding and is immediately dropped
    |
    = note: `#[deny(let_underscore_lock)]` on by default
help: consider binding to an unused variable to avoid immediately dropping the value
    |
179 |     let _unused = KEY_MAPPER.lock().unwrap();
    |         ~~~~~~~
help: consider immediately dropping the value
    |
179 |     drop(KEY_MAPPER.lock().unwrap());
    |     ~~~~~                          +

warning: `rusty-keys` (lib) generated 2 warnings
error: could not compile `rusty-keys` (lib) due to previous error; 2 warnings emitted
warning: build failed, waiting for other jobs to finish...
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Email)
[Pipeline] step
Sending e-mails to: admin.jenkins@moparisthebest.com
[Pipeline] }
[Pipeline] // stage
[Pipeline] deleteDir
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
[Gitea] Notifying branch build status: FAILURE There was a failure building this commit
[Gitea] Notified
Finished: FAILURE