starting build "108810b7-4224-4414-b6ff-ce4ee884a57f" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 139edd167df6: Pulling fs layer Step #1: af444f75ae33: Pulling fs layer Step #1: e6d3ec2e6299: Pulling fs layer Step #1: 0e5e981f1005: Pulling fs layer Step #1: 0b3bd470dbd3: Pulling fs layer Step #1: 2b5ed893bb64: Pulling fs layer Step #1: 74889077656a: Pulling fs layer Step #1: 700d36a8274d: Pulling fs layer Step #1: e18854f9d817: Pulling fs layer Step #1: 3ed49702f576: Pulling fs layer Step #1: b973b87b24f2: Pulling fs layer Step #1: d7fc13bf93de: Pulling fs layer Step #1: c46aa8daf077: Pulling fs layer Step #1: 5a171253e1b6: Pulling fs layer Step #1: 647ce3bf137b: Pulling fs layer Step #1: 4c70efb85710: Pulling fs layer Step #1: 2b5ed893bb64: Waiting Step #1: f495792fc62a: Pulling fs layer Step #1: f23480a14c2a: Pulling fs layer Step #1: 74889077656a: Waiting Step #1: 6dc0ea81677c: Pulling fs layer Step #1: 3a75000db7d0: Pulling fs layer Step #1: 6fcf2ed1932e: Pulling fs layer Step #1: 700d36a8274d: Waiting Step #1: 6454523ca8fa: Pulling fs layer Step #1: 3ed49702f576: Waiting Step #1: c02b6d11f2a4: Pulling fs layer Step #1: e18854f9d817: Waiting Step #1: b8b61c90f622: Pulling fs layer Step #1: b973b87b24f2: Waiting Step #1: 780a27dda68f: Pulling fs layer Step #1: ac72d0b5d140: Pulling fs layer Step #1: e6d3ec2e6299: Waiting Step #1: 0b3bd470dbd3: Waiting Step #1: d7fc13bf93de: Waiting Step #1: 42018ae10617: Pulling fs layer Step #1: 6dc0ea81677c: Waiting Step #1: 9bca4c87f910: Pulling fs layer Step #1: c46aa8daf077: Waiting Step #1: 3a75000db7d0: Waiting Step #1: 44daa1eb8ff6: Pulling fs layer Step #1: b8b61c90f622: Waiting Step #1: 5a171253e1b6: Waiting Step #1: 780a27dda68f: Waiting Step #1: 6ce03dd10f80: Pulling fs layer Step #1: 6fcf2ed1932e: Waiting Step #1: c02b6d11f2a4: Waiting Step #1: 33ba8a9a84bf: Pulling fs layer Step #1: 647ce3bf137b: Waiting Step #1: 6454523ca8fa: Waiting Step #1: f495792fc62a: Waiting Step #1: f23480a14c2a: Waiting Step #1: 4c70efb85710: Waiting Step #1: ac72d0b5d140: Waiting Step #1: 42018ae10617: Waiting Step #1: 44daa1eb8ff6: Waiting Step #1: 23cac0448d82: Pulling fs layer Step #1: 6ce03dd10f80: Waiting Step #1: 33ba8a9a84bf: Waiting Step #1: ff481af09c79: Pulling fs layer Step #1: 9bca4c87f910: Waiting Step #1: 2c8b0cdacd5e: Pulling fs layer Step #1: 23cac0448d82: Waiting Step #1: ff481af09c79: Waiting Step #1: 2c8b0cdacd5e: Waiting Step #1: af444f75ae33: Verifying Checksum Step #1: af444f75ae33: Download complete Step #1: b549f31133a9: Download complete Step #1: 0e5e981f1005: Verifying Checksum Step #1: 0e5e981f1005: Download complete Step #1: e6d3ec2e6299: Verifying Checksum Step #1: e6d3ec2e6299: Download complete Step #1: 0b3bd470dbd3: Verifying Checksum Step #1: 0b3bd470dbd3: Download complete Step #1: 74889077656a: Verifying Checksum Step #1: 74889077656a: Download complete Step #1: 139edd167df6: Verifying Checksum Step #1: 139edd167df6: Download complete Step #1: 700d36a8274d: Verifying Checksum Step #1: 700d36a8274d: Download complete Step #1: b549f31133a9: Pull complete Step #1: 3ed49702f576: Verifying Checksum Step #1: 3ed49702f576: Download complete Step #1: b973b87b24f2: Verifying Checksum Step #1: b973b87b24f2: Download complete Step #1: d7fc13bf93de: Verifying Checksum Step #1: d7fc13bf93de: Download complete Step #1: c46aa8daf077: Verifying Checksum Step #1: c46aa8daf077: Download complete Step #1: 5a171253e1b6: Verifying Checksum Step #1: 5a171253e1b6: Download complete Step #1: 647ce3bf137b: Verifying Checksum Step #1: 647ce3bf137b: Download complete Step #1: 4c70efb85710: Verifying Checksum Step #1: 4c70efb85710: Download complete Step #1: e18854f9d817: Verifying Checksum Step #1: e18854f9d817: Download complete Step #1: f495792fc62a: Download complete Step #1: f23480a14c2a: Download complete Step #1: 6dc0ea81677c: Verifying Checksum Step #1: 6dc0ea81677c: Download complete Step #1: 3a75000db7d0: Verifying Checksum Step #1: 3a75000db7d0: Download complete Step #1: 6454523ca8fa: Verifying Checksum Step #1: 6454523ca8fa: Download complete Step #1: 6fcf2ed1932e: Verifying Checksum Step #1: 6fcf2ed1932e: Download complete Step #1: c02b6d11f2a4: Verifying Checksum Step #1: c02b6d11f2a4: Download complete Step #1: 2b5ed893bb64: Verifying Checksum Step #1: 2b5ed893bb64: Download complete Step #1: b8b61c90f622: Verifying Checksum Step #1: b8b61c90f622: Download complete Step #1: 780a27dda68f: Verifying Checksum Step #1: 780a27dda68f: Download complete Step #1: ac72d0b5d140: Verifying Checksum Step #1: ac72d0b5d140: Download complete Step #1: 42018ae10617: Verifying Checksum Step #1: 42018ae10617: Download complete Step #1: 44daa1eb8ff6: Verifying Checksum Step #1: 44daa1eb8ff6: Download complete Step #1: 6ce03dd10f80: Verifying Checksum Step #1: 6ce03dd10f80: Download complete Step #1: 9bca4c87f910: Verifying Checksum Step #1: 9bca4c87f910: Download complete Step #1: 33ba8a9a84bf: Download complete Step #1: 23cac0448d82: Download complete Step #1: 2c8b0cdacd5e: Download complete Step #1: 139edd167df6: Pull complete Step #1: af444f75ae33: Pull complete Step #1: e6d3ec2e6299: Pull complete Step #1: ff481af09c79: Verifying Checksum Step #1: 0e5e981f1005: Pull complete Step #1: 0b3bd470dbd3: Pull complete Step #1: 2b5ed893bb64: Pull complete Step #1: 74889077656a: Pull complete Step #1: 700d36a8274d: Pull complete Step #1: e18854f9d817: Pull complete Step #1: 3ed49702f576: Pull complete Step #1: b973b87b24f2: Pull complete Step #1: d7fc13bf93de: Pull complete Step #1: c46aa8daf077: Pull complete Step #1: 5a171253e1b6: Pull complete Step #1: 647ce3bf137b: Pull complete Step #1: 4c70efb85710: Pull complete Step #1: f495792fc62a: Pull complete Step #1: f23480a14c2a: Pull complete Step #1: 6dc0ea81677c: Pull complete Step #1: 3a75000db7d0: Pull complete Step #1: 6fcf2ed1932e: Pull complete Step #1: 6454523ca8fa: Pull complete Step #1: c02b6d11f2a4: Pull complete Step #1: b8b61c90f622: Pull complete Step #1: 780a27dda68f: Pull complete Step #1: ac72d0b5d140: Pull complete Step #1: 42018ae10617: Pull complete Step #1: 9bca4c87f910: Pull complete Step #1: 44daa1eb8ff6: Pull complete Step #1: 6ce03dd10f80: Pull complete Step #1: 33ba8a9a84bf: Pull complete Step #1: 23cac0448d82: Pull complete Step #1: ff481af09c79: Pull complete Step #1: 2c8b0cdacd5e: Pull complete Step #1: Digest: sha256:387d967ac8cbf04494cf968777f33207418a4e7a6c1e20a4f970cda550ce1cf7 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> fbb963b0d42c Step #1: Step 2/6 : RUN git clone --depth 1 https://github.com/notaryproject/notary Step #1: ---> Running in 55d9d1031df7 Step #1: Cloning into 'notary'... Step #1: Removing intermediate container 55d9d1031df7 Step #1: ---> 6abdf5582dca Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/notaryproject/notation-go Step #1: ---> Running in 40050f8ec44e Step #1: Cloning into 'notation-go'... Step #1: Removing intermediate container 40050f8ec44e Step #1: ---> 910951a31024 Step #1: Step 4/6 : RUN git clone --depth 1 https://github.com/cncf/cncf-fuzzing Step #1: ---> Running in d96f0da6bd38 Step #1: Cloning into 'cncf-fuzzing'... Step #1: Removing intermediate container d96f0da6bd38 Step #1: ---> 1caa2cf28320 Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> 2bc17d809b69 Step #1: Step 6/6 : WORKDIR $SRC/notary Step #1: ---> Running in 90b3118c52fd Step #1: Removing intermediate container 90b3118c52fd Step #1: ---> 47a4fd151a5a Step #1: Successfully built 47a4fd151a5a Step #1: Successfully tagged gcr.io/oss-fuzz/notary:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/notary Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileLPixrN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/cncf/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bcc768e35927b51f508e486ffa2606720d5e9b71 Step #2 - "srcmap": + jq_inplace /tmp/fileLPixrN '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "bcc768e35927b51f508e486ffa2606720d5e9b71" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filemmEQcd Step #2 - "srcmap": + cat /tmp/fileLPixrN Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "bcc768e35927b51f508e486ffa2606720d5e9b71" }' Step #2 - "srcmap": + mv /tmp/filemmEQcd /tmp/fileLPixrN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/notation-go/.git Step #2 - "srcmap": + GIT_DIR=/src/notation-go Step #2 - "srcmap": + cd /src/notation-go Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/notaryproject/notation-go Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=115509e2892e5218d7b0203420c1395ae5477a03 Step #2 - "srcmap": + jq_inplace /tmp/fileLPixrN '."/src/notation-go" = { type: "git", url: "https://github.com/notaryproject/notation-go", rev: "115509e2892e5218d7b0203420c1395ae5477a03" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileQ4IkpI Step #2 - "srcmap": + cat /tmp/fileLPixrN Step #2 - "srcmap": + jq '."/src/notation-go" = { type: "git", url: "https://github.com/notaryproject/notation-go", rev: "115509e2892e5218d7b0203420c1395ae5477a03" }' Step #2 - "srcmap": + mv /tmp/fileQ4IkpI /tmp/fileLPixrN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/notary/.git Step #2 - "srcmap": + GIT_DIR=/src/notary Step #2 - "srcmap": + cd /src/notary Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/notaryproject/notary Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=9d2b3b35929392c9945d976b8bdecbe2f53a299e Step #2 - "srcmap": + jq_inplace /tmp/fileLPixrN '."/src/notary" = { type: "git", url: "https://github.com/notaryproject/notary", rev: "9d2b3b35929392c9945d976b8bdecbe2f53a299e" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileBuQuOd Step #2 - "srcmap": + cat /tmp/fileLPixrN Step #2 - "srcmap": + jq '."/src/notary" = { type: "git", url: "https://github.com/notaryproject/notary", rev: "9d2b3b35929392c9945d976b8bdecbe2f53a299e" }' Step #2 - "srcmap": + mv /tmp/fileBuQuOd /tmp/fileLPixrN Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileLPixrN Step #2 - "srcmap": + rm /tmp/fileLPixrN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/cncf/cncf-fuzzing", Step #2 - "srcmap": "rev": "bcc768e35927b51f508e486ffa2606720d5e9b71" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/notation-go": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/notaryproject/notation-go", Step #2 - "srcmap": "rev": "115509e2892e5218d7b0203420c1395ae5477a03" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/notary": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/notaryproject/notary", Step #2 - "srcmap": "rev": "9d2b3b35929392c9945d976b8bdecbe2f53a299e" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/cncf-fuzzing/projects/notary/build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + sed 's/go 1.17/go 1.19/g' -i /src/notary/go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": + export CNCFFuzz=/src/cncf-fuzzing/projects/notary Step #3 - "compile-libfuzzer-coverage-x86_64": + CNCFFuzz=/src/cncf-fuzzing/projects/notary Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/cncf-fuzzing/projects/notary/fuzz_trustmanager_test.go /src/notary/trustmanager/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/cncf-fuzzing/projects/notary/fuzz_tuf_utils.go /src/notary/tuf/utils/ Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package trustmanager\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdaLogics/go-fuzz-headers=github.com/AdamKorcz/go-fuzz-headers-1@1f10f66a31bf0e5cc26a2f4a74bd3be5f6463b67 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-connections v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/rethinkdb/rethinkdb-go.v6 v6.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/distribution v2.7.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.47.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go v1.5.1-1.0.20160303222718-d30aec9fd63c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.0.0-20201021035429-f5854403a974 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/mux v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-sql-driver/mysql v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudflare/cfssl v0.0.0-20180223231731-4e2dcbde5004 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jinzhu/gorm v1.9.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Shopify/logrus-bugsnag v0.0.0-20170309145241-6dbc35f2c30d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.27.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lib/pq v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v0.0.0-20150530192845-be5ff3e4840c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/pkcs11 v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/bugsnag-go v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v0.9.0-pre1.0.20180209125602-c332b6f63c06 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dvsekhvalnov/jose2go v0.0.0-20200901110807-248326c1351b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.0.0-20201117144127-c1f2f97bffc9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.0.0-20201117132131-f5c789dd3221 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-sqlite3 v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/BurntSushi/toml v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/magiconair/properties v1.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v0.0.0-20150508191742-4d07383ffe94 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/jwalterweatherman v0.0.0-20141219030609-3d60171a6431 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jinzhu/inflection v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/erikstmartin/go-testdb v0.0.0-20160219214506-8d10e4a1bae5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jinzhu/now v1.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/panicwrap v0.0.0-20151223152923-e2c28503fcd0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bitly/go-simplejson v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/osext v0.0.0-20130617224835-0dd3f918b21b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/juju/loggo v0.0.0-20190526231331-6e530bcce5d8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20200227125254-8fa46927fb4f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.0.0-20180110214958-89604d197083 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.0.0-20180125133057-cb4147076ac7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hailocab/go-hostpool v0.0.0-20160125115350-e80d13ce29ed Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opentracing/opentracing-go v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/cenkalti/backoff.v2 v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/libtrust v0.0.0-20160708172513-aabc10ec26b7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/denisenkom/go-mssqldb v0.0.0-20191128021309-1d7a30a10f73 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bitly/go-hostpool v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bmizerany/assert v0.0.0-20160611221934-b7ed37b82869 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/certificate-transparency-go v1.0.10-0.20180222191210-5ab67e519c93 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-metrics v0.0.0-20180209012529-399ea8c73916 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-sql/civil v0.0.0-20190719163853-cb61b32ac6fe Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230111232327-1f10f66a31bf Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdaLogics/go-fuzz-headers in github.com/AdaLogics/go-fuzz-headers v0.0.0-00010101000000-000000000000 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/theupdateframework/notary/cryptoservice/fuzz Fuzz fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/theupdateframework/notary/cryptoservice/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/theupdateframework/notary/cryptoservice/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/theupdateframework/notary/cryptoservice/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/trustmanager/keys_test.go /src/notary/trustmanager/keys_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/trustmanager/keystore_test.go /src/notary/trustmanager/keystore_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/trustmanager FuzzImportKeysSimple FuzzImportKeysSimple Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/trustmanager FuzzImportKeysStructured FuzzImportKeysStructured Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/tuf/utils FuzzParsePEMPrivateKey FuzzParsePEMPrivateKey Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_handlers.go /src/notary/server/handlers/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzAtomicUpdateHandler FuzzAtomicUpdateHandler Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find the function: func FuzzAtomicUpdateHandler(f *testing.F) Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzAtomicUpdateHandlerMultipart FuzzAtomicUpdateHandlerMultipart Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzGetKeyHandler FuzzGetKeyHandler Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzChangefeed FuzzChangefeed Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzRotateKeyHandler FuzzRotateKeyHandler Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzDeleteHandler FuzzDeleteHandler Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_keydbstore.go /src/notary/signer/keydbstore/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/signer/keydbstore/keydbstore_test.go /src/notary/signer/keydbstore/keydbstore_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/signer/keydbstore/cachedcryptoservice_test.go /src/notary/signer/keydbstore/cachedcryptoservice_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/signer/keydbstore FuzzKeyDBStore FuzzKeyDBStore Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_server_storage.go /src/notary/server/storage/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/server/storage/storage_test.go /src/notary/server/storage/storage_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/storage FuzzServerStorageSQL FuzzServerStorage Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/storage FuzzServerStorageMemStorage FuzzServerStorageMemStorage Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/storage FuzzServerStorageTufStorage FuzzServerStorageTufStorage Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/notation-go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_verification.go /src/notation-go/verifier/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_pkix_test.go /src/notation-go/internal/pkix/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_notation_artifactref_parsing.go /src/notation-go/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_trustpolicy.go /src/notation-go/verifier/trustpolicy/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv ./verifier/helpers_test.go ./verifier/helpers_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package verifier\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdaLogics/go-fuzz-headers=github.com/AdamKorcz/go-fuzz-headers-1@12e09aba5ebdbc7ddb01b6203347a11c93015534 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/notation-core-go v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading oras.land/oras-go/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-ldap/ldap/v3 v3.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/notation-plugin-framework-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/veraison/go-cose v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/tspclient-go v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-asn1-ber/asn1-ber v1.5.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-ntlmssp v0.0.0-20221128193559-754e69321358 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gokrb5/v8 v8.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alexbrainman/sspi v0.0.0-20231016080023-1a75b4708caa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gofork v1.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/aescts/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-uuid v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/dnsutils/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/rpc/v2 v2.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/goidentity/v6 v6.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230329111138-12e09aba5ebd Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdaLogics/go-fuzz-headers in github.com/AdaLogics/go-fuzz-headers v0.0.0-00010101000000-000000000000 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/notaryproject/notation-go/verifier FuzzVerify FuzzVerify Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/notaryproject/notation-go/verifier [github.com/notaryproject/notation-go/verifier.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_verification.go:330:19: undefined: dummyPolicyDocument Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_verification.go:352:3: unknown field trustPolicyDoc in struct literal of type verifier Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_verification.go:489:38: vv.trustPolicyDoc undefined (type *verifier has no field or method trustPolicyDoc) Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image notary Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 notary Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1