Closed orium closed 2 years ago
I've noticed this too (on Linux). Seems to be common after error messages, but it doesn't always happen.
are you able to reproduce this issue if you build with the command cargo build --release --features vendored-openssl
or cargo install --features vendored-openssl
?
are you able to reproduce this issue if you build with the command cargo build --release --features vendored-openssl or cargo install --features vendored-openssl?
Still have a segmentation fault.
It seems the issue goes away if I have a ~/.wrangler/version.toml
...
I could minify the bug to this:
fn main() {
std::thread::spawn(move || {
reqwest::blocking::Client::new()
.get("https://crates.io/api/v1/crates/wrangler")
.send().unwrap();
});
// Just so we write some memory to trigger the bug.
let mut v = Vec::new();
for i in 0..100000 {
v.push(i);
}
}
Still get the segmentation fault almost all the time. It looks like it might be cause by https://github.com/sfackler/rust-openssl/issues/1293.
That does seem to be the issue doesn't it - nice job tracking it down! If your PR gets merged upstream and a release is cut we'll be sure to update the dependency. Thanks a bunch @orium!
Hey @orium - I'm not able to reproduce this as is. Could you include your Cargo.toml
for the minified example?
I think I don't have it anymore, but IIRC it only had a dependency on reqwest
and nothing else. It is normal for some systems not to be able to reproduce this very easily. It's a non-deterministic race condition based on thread scheduling and timing.
In any case the issue is fixed upstream (https://github.com/sfackler/rust-openssl/issues/1293) and once we get a new release of rust-openssl (which is a transitive dependency of reqwest
) we should be good.
yes, reproduced with:
> cargo install wrangler
Ubuntu 20.04.1 LTS
> cargo --version
cargo 1.45.0 (744bd1fbb 2020-06-15)
> rustc --version
rustc 1.45.0 (5c1f21c3b 2020-07-13)
wait, when writing this comment, i got another error message when just executing wrangler
command
> wrangler
๐ท โจ wrangler 1.11.0
The Wrangler Team <wrangler@cloudflare.com>
USAGE:
wrangler [SUBCOMMAND]
FLAGS:
-h, --help Prints help information
-V, --version Prints version information
SUBCOMMANDS:
kv:namespace ๐๏ธ Interact with your Workers KV Namespaces
kv:key ๐ Individually manage Workers KV key-value pairs
kv:bulk ๐ช Interact with multiple Workers KV key-value pairs at once
route โก๏ธ List or delete worker routes.
secret ๐คซ Generate a secret that can be referenced in the worker script
generate ๐ฏ Generate a new worker project
init ๐ฅ Create a wrangler.toml for an existing project
build ๐ฆ Build your worker
preview ๐ฌ Preview your code temporarily on cloudflareworkers.com
dev ๐ Start a local server for developing your worker
publish ๐ Publish your worker to the orange cloud
config ๐ต๏ธ Authenticate Wrangler with a Cloudflare API Token or Global API Key
subdomain ๐ท Configure your workers.dev subdomain
whoami ๐ต๏ธ Retrieve your user info and test your auth config
tail ๐ฆ Aggregate logs from production worker
login ๐ Authenticate Wrangler with your Cloudflare username and password
help Prints this message or the help of the given subcommand(s)
thread '<unnamed>' panicked at 'Client::new(): reqwest::Error { kind: Builder, source: Normal(ErrorStack([])) }', /home/ken/.cargo/registry/src/github.com-1ecc6299db9ec823/reqwest-0.10.8/src/blocking/client.rs:575:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
okay, this weird
@codenoid I think the
thread '<unnamed>' panicked at 'Client::new(): reqwest::Error { kind: Builder, source: Normal(ErrorStack([])) }', /home/ken/.cargo/registry/src/github.com-1ecc6299db9ec823/reqwest-0.10.8/src/blocking/client.rs:575:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
is caused by the same issue, so the upstream fix in rust-openssl should fix that as well.
This is now fixed since we are using openssl v0.10.32, which has a fix for this.
this is still a problem on the latest version of wrangler (despite being on openssl v0.10.32), it can manifest as either a segfault or the panic at client::new()
I tried this hack (https://github.com/sfackler/rust-openssl/issues/1174#issuecomment-541345151) and it was unsuccessful, I can still replicate a segfault on fully statically linked binary every 1/10 invocations or so.
EDIT: backtrace
#0 0x00007f0eb7328916 in pthread_rwlock_trywrlock ()
#1 0x00007f0eb73288a7 in pthread_rwlock_timedwrlock ()
#2 0x00007f0eb779fd40 in tlsv1_3_server_method_data ()
#3 0x0000555555776f60 in ?? ()
#4 0x00007f0eb70c7ea9 in CRYPTO_THREAD_write_lock ()
#5 0x00007f0eb709a4b2 in RAND_get_rand_method ()
#6 0x00007f0eb709a59f in RAND_priv_bytes ()
#7 0x00007f0eb6ffe8a1 in SSL_CTX_new ()
#8 0x00007f0eb6feb30c in openssl::ssl::connector::ctx ()
#9 0x00007f0eb6feb3d4 in openssl::ssl::connector::SslConnector::builder ()
#10 0x00007f0eb6fe50ec in native_tls::imp::TlsConnector::new ()
#11 0x00007f0eb6fe58a5 in native_tls::TlsConnectorBuilder::build ()
#12 0x00007f0eb6f1f136 in reqwest::connect::Connector::new_default_tls ()
#13 0x00007f0eb6efc237 in reqwest::async_impl::client::ClientBuilder::build ()
#14 0x00007f0eb6f4fd28 in <core::future::from_generator::GenFuture<T> as core::future::future::Future>::poll ()
#15 0x00007f0eb6f9092f in tokio::macros::scoped_tls::ScopedKey<T>::set ()
#16 0x00007f0eb6fbaf54 in tokio::runtime::basic_scheduler::BasicScheduler<P>::block_on ()
#17 0x00007f0eb6ef29e9 in tokio::runtime::context::enter ()
#18 0x00007f0eb6f0e37c in tokio::runtime::handle::Handle::enter ()
#19 0x00007f0eb6eeb754 in std::sys_common::backtrace::__rust_begin_short_backtrace ()
#20 0x00007f0eb6f146c5 in core::ops::function::FnOnce::call_once{{vtable-shim}} ()
#21 0x00007f0eb72f875a in alloc::boxed::{{impl}}::call_once<(),FnOnce<()>> () at /rustc/18bf6b4f01a6feaf7259ba7cdae58031af1b7b39/library/alloc/src/boxed.rs:1042
#22 alloc::boxed::{{impl}}::call_once<(),alloc::boxed::Box<FnOnce<()>>> () at /rustc/18bf6b4f01a6feaf7259ba7cdae58031af1b7b39/library/alloc/src/boxed.rs:1042
#23 std::sys::unix::thread::{{impl}}::new::thread_start () at library/std/src/sys/unix/thread.rs:87
#24 0x00007f0eb73233be in start ()
#25 0x00007f0eb64d2b20 in ?? ()
#26 0x0000000000000000 in ?? ()
I just tried running wrangler generate --help
and it looks like I'm getting the same thing:
wrangler-generate 1.19.3
Generate a new worker project
USAGE:
wrangler generate [FLAGS] [OPTIONS] [ARGS]
FLAGS:
-h, --help Prints help information
-s, --site Initializes a Workers Sites project. Overrides 'type' and 'template'
--verbose Toggle verbose output (when applicable)
OPTIONS:
-c, --config <config> Path to configuration file [default: wrangler.toml]
-e, --env <env> Environment to perform a command on
-t, --type <type> The type of project you want generated
ARGS:
<name> The name of your worker! [default: worker]
<template> A link to a GitHub template! Defaults to https://github.com/cloudflare/worker-template
[1] 18492 segmentation fault wrangler generate --help
It seems like the segmentation fault is not systematic for me either. It doesn't always happen, about 50% of the time.
I GDB'd the error and this is what I got, not sure what to make out of it:
Reading symbols from /home/manen/.cargo/bin/wrangler...
(gdb) run generate server https://github.com/cloudflare/rustwasm-worker-template
Starting program: /home/manen/.cargo/bin/wrangler generate server https://github.com/cloudflare/rustwasm-worker-template
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/usr/lib/libthread_db.so.1".
[New Thread 0x7ffff72ff640 (LWP 30366)]
[Thread 0x7ffff72ff640 (LWP 30366) exited]
โฌ๏ธ Installing cargo-generate v0.5.0...
[New Thread 0x7ffff70fe640 (LWP 30367)]
[Thread 0x7ffff70fe640 (LWP 30367) exited]
Thread 1 "wrangler" received signal SIGSEGV, Segmentation fault.
0x00007ffff7aa02c3 in SSL_get_peer_certificate () from /usr/lib/libssl.so.1.1
Here's a backtrace from gdb
:
Starting program: /home/nick/.cargo/bin/wrangler generate --type=rust rate_limit_cloudflare_worker
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/usr/lib/libthread_db.so.1".
[New Thread 0x7ffff72fa640 (LWP 1109341)]
[New Thread 0x7ffff70f9640 (LWP 1109342)]
โฌ๏ธ Installing cargo-generate v0.5.0...
[New Thread 0x7ffff6ef8640 (LWP 1109343)]
[Thread 0x7ffff6ef8640 (LWP 1109343) exited]
[New Thread 0x7ffff6ef8640 (LWP 1109344)]
Thread 1 "wrangler" received signal SIGSEGV, Segmentation fault.
0x00007ffff7a9b2c3 in SSL_get_peer_certificate () from /usr/lib/libssl.so.1.1
(gdb) bt full
#0 0x00007ffff7a9b2c3 in SSL_get_peer_certificate () from /usr/lib/libssl.so.1.1
No symbol table info available.
#1 0x00007ffff7f6fd66 in ?? () from /usr/lib/libcurl.so.4
No symbol table info available.
#2 0x00007ffff7f73f05 in ?? () from /usr/lib/libcurl.so.4
No symbol table info available.
#3 0x00007ffff7f74fd7 in ?? () from /usr/lib/libcurl.so.4
No symbol table info available.
#4 0x00007ffff7f2c149 in ?? () from /usr/lib/libcurl.so.4
No symbol table info available.
#5 0x00007ffff7f45508 in ?? () from /usr/lib/libcurl.so.4
No symbol table info available.
#6 0x00007ffff7f46b06 in curl_multi_perform () from /usr/lib/libcurl.so.4
No symbol table info available.
#7 0x00007ffff7f1ed0c in curl_easy_perform () from /usr/lib/libcurl.so.4
No symbol table info available.
#8 0x0000555555bac2aa in curl::easy::handler::Easy2<H>::perform ()
No symbol table info available.
#9 0x0000555555baadb2 in curl::easy::handle::Transfer::perform ()
No symbol table info available.
#10 0x0000555555ba3162 in binary_install::curl ()
No symbol table info available.
#11 0x0000555555b9f741 in binary_install::Cache::_download ()
No symbol table info available.
#12 0x0000555555b9f32a in binary_install::Cache::download_version ()
No symbol table info available.
#13 0x0000000000000001 in ?? ()
No symbol table info available.
#14 0x00005555565c2180 in ?? ()
No symbol table info available.
#15 0x0000000000000070 in ?? ()
No symbol table info available.
#16 0x00005555565bd970 in ?? ()
No symbol table info available.
#17 0x0000000000000005 in ?? ()
No symbol table info available.
#18 0x0000000000000005 in ?? ()
No symbol table info available.
#19 0x000000000000000e in ?? ()
No symbol table info available.
#20 0x0000555555ab7d3f in wrangler::install::install ()
No symbol table info available.
#21 0x0000555555ab71ab in wrangler::install::install_cargo_generate ()
No symbol table info available.
#22 0x00007fffffffd688 in ?? ()
No symbol table info available.
#23 0x0000000000000000 in ?? ()
No symbol table info available.
(gdb)
> openssl version
OpenSSL 1.1.1l 24 Aug 2021
> cargo --version
cargo 1.56.0 (4ed5d137b 2021-10-04)
> wrangler --version
wrangler 1.19.5
I also confirmed the same behavior in a fresh arch linux install with minimal dependencies (vim
, grub
, dhcpcd
, base-devel
, rustup
in addition to base
, linux
, linux-firmware
):
It also happens even if I build wrangler
myself in debug
mode:
> wrangler/target/debug/wrangler generate --type=rust rate_limit_cloudflare_worker
โฌ๏ธ Installing cargo-generate v0.5.0...
fish: Job 1, 'wrangler/target/debug/wranglerโฆ' terminated by signal SIGSEGV (Address boundary error)
The server it talks to seems fine:
> curl -vvv https://workers.cloudflare.com/get-binary/ashleygwilliams/cargo-generate/v0.5.0/x86_64-unknown-linux-musl.tar.gz
* Trying 104.16.132.9:443...
* Connected to workers.cloudflare.com (104.16.132.9) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CApath: none
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
...
I don't understand why cargo isn't just used to pull in cargo-generate
and wasm-pack
. I'm not a fan of software downloading binaries from the internet and running them without even asking me.
I was able to modify src/install/mod.rs
to return a static PathBuf
pointing to my installed cargo-generate
(v0.11.0
) and wasm-pack
(v0.10.1
) binaries (change the paths as appropriate):
diff --git a/src/install/mod.rs b/src/install/mod.rs
index d7418ad..cc6f627 100644
--- a/src/install/mod.rs
+++ b/src/install/mod.rs
@@ -27,9 +27,7 @@ pub fn install_cargo_generate() -> Result<PathBuf> {
let tool_author = "ashleygwilliams";
let is_binary = true;
let version = Version::parse(dependencies::GENERATE_VERSION)?;
- install(tool_name, tool_author, is_binary, version)?
- .binary(tool_name)
- .map_err(|e| anyhow::Error::from(e.compat()))
+ Ok(PathBuf::from(r"/home/nick/.cargo/bin/cargo-generate"))
}
pub fn install_wasm_pack() -> Result<PathBuf> {
@@ -37,9 +35,7 @@ pub fn install_wasm_pack() -> Result<PathBuf> {
let tool_author = "rustwasm";
let is_binary = true;
let version = Version::parse(dependencies::WASM_PACK_VERSION)?;
- install(tool_name, tool_author, is_binary, version)?
- .binary(tool_name)
- .map_err(|e| anyhow!(e.compat()))
+ Ok(PathBuf::from(r"/home/nick/.cargo/bin/wasm-pack"))
}
pub fn install(
That let me run ~/wrangler/target/debug/wrangler generate --type=rust test
and ~/wrangler/target/debug/wrangler config
.
I then got a similar SIGSEGV
when using ~/wrangler/target/debug/wrangler build
. Once I downgraded wasm-pack
to 0.10.0
and ran rustup target add wasm32-unknown-unknown
, I was able to run RUST_STACKTRACE=1 ~/wrangler/target/debug/wrangler build
. It still segfaults, but now it manages to continue.
~/wrangler/target/debug/wrangler publish
fails during cargo install -q worker-build && worker-build --release
, and I haven't yet found a way to run worker-build --release
without it core dumping:
> ~/wrangler/target/debug/wrangler publish
๐ Running cargo install -q worker-build && worker-build --release
[INFO]: Checking for the Wasm target...
[INFO]: Compiling to Wasm...
Finished release [optimized] target(s) in 0.05s
[INFO]: Installing wasm-bindgen...
Error: wasm-pack exited with status signal: 11 (core dumped)
Error: Build failed! Status Code: 1
Downgrading to wasm-pack
v0.9.1
fixes the wrangler build
/wrangler publish
issue, so it looks like the only outstanding problem is how wrangler
downloads outdated binaries instead of using the already-installed versions (~and adding them as dependencies for cargo
~ blocked on https://github.com/rust-lang/cargo/issues/9096). My patch works, but it's ugly, and I'm not particularly inclined to submit a proper PR.
Hi all, I'm having a similar issue on Arch Linux. I installed the latest (v1.19.5) version of wrangler via cargo, but when I try to generate a new Rust project, I get this error.
โฏ wrangler generate wasm-test -t rust
โฌ๏ธ Installing cargo-generate v0.5.0...
[1] 3638 segmentation fault (core dumped) wrangler generate wasm-test -t rust
I was able to generate a new project when I installed the node version, but then when I try to run a development server, I get the following error:
> wrangler dev
[INFO]: Installing wasm-bindgen...
Error: wasm-pack exited with status signal: 11 (core dumped)
Is there any solution to this? I know that the above issue could be fixed by recompiling my own version with wasm-pack
v0.9.1 but that's not a very elegant solution. But what about the first issue? Is there any fix for that?
@xortive here's a backtrace with debug symbols if it helps (it cuts off after the tokio internals because they're not interesting):
Hmm, it looks like OpenSSL has installed its own exit handlers? I wonder if they don't interact well with multi-threading ... there's an open rust issue about this: https://github.com/rust-lang/rust/issues/83994
I also noticed that this is making network requests right at startup, which seems odd - it turns out wrangler is checking for updates in the background:
#4 0x00005607f777b1c3 in reqwest::blocking::wait::timeout (fut=..., timeout=...) at /home/jnelson/.local/lib/cargo/registry/src/github.com-1ecc6299db9ec823/reqwest-0.11.6/src/blocking/wait.rs:50
#5 0x00005607f775d6b2 in reqwest::blocking::client::ClientHandle::new (builder=...) at /home/jnelson/.local/lib/cargo/registry/src/github.com-1ecc6299db9ec823/reqwest-0.11.6/src/blocking/client.rs:983
#6 0x00005607f775ca5f in reqwest::blocking::client::ClientBuilder::build (self=...) at /home/jnelson/.local/lib/cargo/registry/src/github.com-1ecc6299db9ec823/reqwest-0.11.6/src/blocking/client.rs:102
#7 0x00005607f6875873 in wrangler::version::get_latest_version_from_api (installed_version=...) at src/version/mod.rs:138
#8 0x00005607f6875272 in wrangler::version::get_latest_version (installed_version=..., version_file=0x7f68d8000c30, current_time=...) at src/version/mod.rs:122
#9 0x00005607f6874c16 in wrangler::version::check_wrangler_versions () at src/version/mod.rs:92
#10 0x00005607f6a27a13 in wrangler::version::background_check_for_updates::{{closure}} () at src/version/mod.rs:20
Maybe we can wait to do that until the process exits / only do it if wrangler finishes successfully, so there's no other threads running at the same time?
I guess another alternative is to kill the thread looking for background updates before exiting, but that seems unnecessarily complicated when all it gets us is slightly faster latency when exiting the process.
Yet another alternative is to avoid constructing a reqwest::Client
for the background update checker and instead use an async executor; that should avoid launching a thread until the executor is initialized, which is after most of the process::exit
calls. That seems like the cleanest solution, but it's also the most work; wrangler has a bunch of executors internally already and it would be a pain to try and consolidate on one when we're already hoping to switch most users to Wrangler 2 sometime soon.
Hello dear colleagues, another happy Arch Linux user here.
I've faced core dumps too with both 1.19.5 and #2150 versions. Here my backtrace and what I've run:
> wrangler dev
โ ๏ธ
Your configuration file is missing compatibility_date, so a past date is assumed.
To get the latest possibly-breaking bug fixes, add this line to your wrangler.toml:
compatibility_date = "2021-12-10"
For more information, see: https://developers.cloudflare.com/workers/platform/compatibility-dates
โฌ๏ธ Installing wranglerjs v1.19.5...
zsh: segmentation fault (core dumped) wrangler dev
> coredumpctl debug 1013782
.....
Core was generated by `wrangler dev'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x00007f29f78b42c3 in SSL_get_peer_certificate () from /usr/lib/libssl.so.1.1
(gdb) bt
#0 0x00007f29f78b42c3 in SSL_get_peer_certificate () from /usr/lib/libssl.so.1.1
#1 0x00007f29f7d88d66 in ?? () from /usr/lib/libcurl.so.4
#2 0x00007f29f7d8cf05 in ?? () from /usr/lib/libcurl.so.4
#3 0x00007f29f7d8dfd7 in ?? () from /usr/lib/libcurl.so.4
#4 0x00007f29f7d45149 in ?? () from /usr/lib/libcurl.so.4
#5 0x00007f29f7d5e508 in ?? () from /usr/lib/libcurl.so.4
#6 0x00007f29f7d5fb06 in curl_multi_perform () from /usr/lib/libcurl.so.4
#7 0x00007f29f7d37d0c in curl_easy_perform () from /usr/lib/libcurl.so.4
#8 0x00005575ba17b3ba in curl::easy::handler::Easy2<H>::perform ()
#9 0x00005575ba179e72 in curl::easy::handle::Transfer::perform ()
#10 0x00005575ba171f82 in binary_install::curl ()
#11 0x00005575ba170a62 in binary_install::Cache::_download_artifact ()
#12 0x00005575ba1708a6 in binary_install::Cache::download_artifact_version ()
#13 0x00005575bc603c60 in ?? ()
#14 0x0000000000000006 in ?? ()
#15 0x000000000000000a in ?? ()
#16 0x00005575ba086b22 in wrangler::install::install ()
#17 0x00005575b9d8ac94 in wrangler::wranglerjs::setup_build ()
#18 0x00005575b9d898e7 in wrangler::wranglerjs::run_build ()
#19 0x00005575b9d83f82 in wrangler::build::build_target ()
#20 0x00005575b9f433f8 in wrangler::commands::dev::dev ()
#21 0x00005575b9e8137b in wrangler::cli::dev::dev ()
#22 0x00005575b9cf3212 in wrangler::main ()
#23 0x00005575b9cef8e3 in std::sys_common::backtrace::__rust_begin_short_backtrace ()
#24 0x00005575b9cf01dd in std::rt::lang_start::_$u7b$$u7b$closure$u7d$$u7d$::hc936eb6f11018442 ()
#25 0x00005575ba75282b in core::ops::function::impls::{impl#2}::call_once<(), (dyn core::ops::function::Fn<(), Output=i32> + core::marker::Sync + core::panic::unwind_safe::RefUnwindSafe)> (self=...,
args=<optimized out>) at /rustc/1.57.0/library/core/src/ops/function.rs:259
#26 std::panicking::try::do_call<&(dyn core::ops::function::Fn<(), Output=i32> + core::marker::Sync + core::panic::unwind_safe::RefUnwindSafe), i32> (data=<optimized out>) at library/std/src/panicking.rs:403
#27 std::panicking::try<i32, &(dyn core::ops::function::Fn<(), Output=i32> + core::marker::Sync + core::panic::unwind_safe::RefUnwindSafe)> (f=...) at library/std/src/panicking.rs:367
#28 std::panic::catch_unwind<&(dyn core::ops::function::Fn<(), Output=i32> + core::marker::Sync + core::panic::unwind_safe::RefUnwindSafe), i32> (f=...) at library/std/src/panic.rs:133
#29 std::rt::lang_start_internal::{closure#2} () at library/std/src/rt.rs:128
#30 std::panicking::try::do_call<std::rt::lang_start_internal::{closure#2}, isize> (
data=<optimized out>) at library/std/src/panicking.rs:403
#31 std::panicking::try<isize, std::rt::lang_start_internal::{closure#2}> (f=...)
at library/std/src/panicking.rs:367
#32 std::panic::catch_unwind<std::rt::lang_start_internal::{closure#2}, isize> (f=...)
at library/std/src/panic.rs:133
#33 std::rt::lang_start_internal (main=..., argc=<optimized out>, argv=<optimized out>)
at library/std/src/rt.rs:128
#34 0x00005575b9cf46d2 in main ()
Sadly, I can't provide more info unless one would ask me for something specific.
Closing as there is a new version of Wrangler built on node.js, which should not get such segmentation faults. If you can reproduce on the new Wrangler, please create a new issue at https://github.com/cloudflare/wrangler2/issues/new/choose.
๐ Bug Report
wrangler crashes with a segmentation fault after running the given command. This apparently only happens with release build and not with debug builds. Reproducible with wrangler version 1.10.3 as well as master (as of b601101); also reproducible with both rustc 1.45.0 (5c1f21c3b 2020-07-13) as well as rustc 1.46.0-nightly (346aec9b0 2020-07-11).
Environment
rustc -V
: I've tried multiple version, but including the currect stable: rustc 1.45.0 (5c1f21c3b 2020-07-13)node -v
: not installedwrangler -V
: repoducible in 1.10.3 and master (as of b601101)wrangler.toml
: emptySteps to reproduce
You can either
cargo install wrangler
from crates.io, or in master (as of b601101):Running inside lldb:
Also worth saying that valgrind doesn't see any invalid memory accesses.