starting build "12cc6984-6cbc-4fec-bb85-7ee23055269d" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca" Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Sending build context to Docker daemon 5.12kB Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b549f31133a9: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 07b81fa61654: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 6e80bf8be6a2: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 928dab461205: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3830bb4e3ade: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": abd887670f5e: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 44388c1eb217: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 973a66094540: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b19a466c4e1f: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 4bd513bdf95e: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a1c1bf0634d7: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": be4c30c77154: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 2d8a8910b28f: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c4c92998f357: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3d25df2109db: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": f6a4ee1a0119: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a546a0c29f8c: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": f7c7cd874401: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": e5d257d49244: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3f8049840189: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b2036cadfbed: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": aae2f51396a0: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b19169204329: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": e20350b95f30: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 7494b389c90a: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ae65c6966314: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 364d65be5b56: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c20bfbc91410: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a07d2ace2f2b: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": eb591459e282: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 23912b320ff3: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 28a31c8f11c8: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 5f806632ef77: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 242279ed83ef: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3831f9a49834: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": bfdbcebc60ac: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c86ee2efc9a9: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": d6d53a0aff62: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 67794f598c19: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 973a66094540: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 57f92e28313b: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3f8049840189: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 373ad28db756: Pulling fs layer Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b19a466c4e1f: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b2036cadfbed: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": aae2f51396a0: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 4bd513bdf95e: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b19169204329: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c20bfbc91410: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a1c1bf0634d7: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a07d2ace2f2b: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": e20350b95f30: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 364d65be5b56: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": eb591459e282: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 23912b320ff3: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 7494b389c90a: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": be4c30c77154: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 28a31c8f11c8: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 5f806632ef77: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a546a0c29f8c: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 2d8a8910b28f: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": f7c7cd874401: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c4c92998f357: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 242279ed83ef: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": e5d257d49244: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3831f9a49834: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ae65c6966314: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": bfdbcebc60ac: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3d25df2109db: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 373ad28db756: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": f6a4ee1a0119: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c86ee2efc9a9: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": d6d53a0aff62: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 67794f598c19: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 928dab461205: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3830bb4e3ade: Waiting Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b549f31133a9: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b549f31133a9: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3830bb4e3ade: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3830bb4e3ade: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 928dab461205: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 928dab461205: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": abd887670f5e: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": abd887670f5e: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 973a66094540: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 973a66094540: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 07b81fa61654: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 07b81fa61654: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b19a466c4e1f: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b19a466c4e1f: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b549f31133a9: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a1c1bf0634d7: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a1c1bf0634d7: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": be4c30c77154: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": be4c30c77154: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 2d8a8910b28f: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 2d8a8910b28f: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c4c92998f357: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c4c92998f357: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3d25df2109db: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3d25df2109db: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 4bd513bdf95e: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 4bd513bdf95e: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": f6a4ee1a0119: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": f6a4ee1a0119: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a546a0c29f8c: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a546a0c29f8c: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": f7c7cd874401: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": f7c7cd874401: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": e5d257d49244: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3f8049840189: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3f8049840189: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b2036cadfbed: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b2036cadfbed: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": aae2f51396a0: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": aae2f51396a0: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": e20350b95f30: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b19169204329: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b19169204329: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 44388c1eb217: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 44388c1eb217: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 7494b389c90a: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 7494b389c90a: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 364d65be5b56: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ae65c6966314: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c20bfbc91410: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c20bfbc91410: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a07d2ace2f2b: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a07d2ace2f2b: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": eb591459e282: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": eb591459e282: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 23912b320ff3: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 23912b320ff3: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 28a31c8f11c8: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 5f806632ef77: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 5f806632ef77: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 242279ed83ef: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 242279ed83ef: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 07b81fa61654: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3831f9a49834: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3831f9a49834: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": bfdbcebc60ac: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": bfdbcebc60ac: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 6e80bf8be6a2: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 67794f598c19: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 67794f598c19: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c86ee2efc9a9: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c86ee2efc9a9: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": d6d53a0aff62: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": d6d53a0aff62: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 373ad28db756: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 373ad28db756: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 928dab461205: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3830bb4e3ade: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": abd887670f5e: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 57f92e28313b: Verifying Checksum Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 57f92e28313b: Download complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 44388c1eb217: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 973a66094540: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b19a466c4e1f: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 4bd513bdf95e: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a1c1bf0634d7: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": be4c30c77154: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 2d8a8910b28f: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c4c92998f357: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3d25df2109db: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": f6a4ee1a0119: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a546a0c29f8c: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": f7c7cd874401: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": e5d257d49244: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3f8049840189: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b2036cadfbed: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": aae2f51396a0: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": b19169204329: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": e20350b95f30: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 7494b389c90a: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ae65c6966314: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 364d65be5b56: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c20bfbc91410: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": a07d2ace2f2b: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": eb591459e282: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 23912b320ff3: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 28a31c8f11c8: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 5f806632ef77: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 242279ed83ef: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 3831f9a49834: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": bfdbcebc60ac: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": c86ee2efc9a9: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": d6d53a0aff62: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 67794f598c19: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 57f92e28313b: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": 373ad28db756: Pull complete Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Digest: sha256:d23f6c7411f2ba52258d8ad9e869c13c863097ea6fa349f7f07b217f4db84642 Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ---> 938a46e05353 Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Step 2/6 : RUN git clone --depth 1 https://github.com/sigstore/rekor Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ---> Running in 30c364132f2f Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Cloning into 'rekor'... Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Removing intermediate container 30c364132f2f Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ---> c7620be2316b Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Step 3/6 : RUN git clone --depth=1 https://github.com/AdamKorcz/instrumentation Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ---> Running in cc023fc6a4b8 Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Cloning into 'instrumentation'... Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Removing intermediate container cc023fc6a4b8 Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ---> fd92751ff3ed Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Step 4/6 : RUN git clone --depth=1 https://github.com/sassoftware/relic Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ---> Running in 8c302bfa6f44 Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Cloning into 'relic'... Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Removing intermediate container 8c302bfa6f44 Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ---> 91ff968d25c1 Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Step 5/6 : COPY build.sh $SRC Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ---> 79af6af29b29 Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Step 6/6 : WORKDIR $SRC/rekor/pkg Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ---> Running in 3a16b4e31e2b Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Removing intermediate container 3a16b4e31e2b Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": ---> 1bb123d97670 Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Successfully built 1bb123d97670 Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Successfully tagged gcr.io/oss-fuzz/rekor:latest Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/rekor:latest Finished Step #1 - "build-24642e2d-0ef1-4551-b00b-36f66bbe8bca" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/rekor Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileqLkJFP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/relic/.git Step #2 - "srcmap": + GIT_DIR=/src/relic Step #2 - "srcmap": + cd /src/relic Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sassoftware/relic Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bdc9acbfe6a439c79e51d931bccf4d0e9e49f233 Step #2 - "srcmap": + jq_inplace /tmp/fileqLkJFP '."/src/relic" = { type: "git", url: "https://github.com/sassoftware/relic", rev: "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filehdhf3b Step #2 - "srcmap": + cat /tmp/fileqLkJFP Step #2 - "srcmap": + jq '."/src/relic" = { type: "git", url: "https://github.com/sassoftware/relic", rev: "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" }' Step #2 - "srcmap": + mv /tmp/filehdhf3b /tmp/fileqLkJFP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d665541f9baa20fe5a9830608ccdec48dbd2e990 Step #2 - "srcmap": + jq_inplace /tmp/fileqLkJFP '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filekDJ56J Step #2 - "srcmap": + cat /tmp/fileqLkJFP Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": + mv /tmp/filekDJ56J /tmp/fileqLkJFP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/rekor/.git Step #2 - "srcmap": + GIT_DIR=/src/rekor Step #2 - "srcmap": + cd /src/rekor Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sigstore/rekor Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=04cf79c6e5512d51796c4fcfba0af05cea6d2db5 Step #2 - "srcmap": + jq_inplace /tmp/fileqLkJFP '."/src/rekor" = { type: "git", url: "https://github.com/sigstore/rekor", rev: "04cf79c6e5512d51796c4fcfba0af05cea6d2db5" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileCKU2jd Step #2 - "srcmap": + cat /tmp/fileqLkJFP Step #2 - "srcmap": + jq '."/src/rekor" = { type: "git", url: "https://github.com/sigstore/rekor", rev: "04cf79c6e5512d51796c4fcfba0af05cea6d2db5" }' Step #2 - "srcmap": + mv /tmp/fileCKU2jd /tmp/fileqLkJFP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileqLkJFP Step #2 - "srcmap": + rm /tmp/fileqLkJFP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/relic": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sassoftware/relic", Step #2 - "srcmap": "rev": "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "d665541f9baa20fe5a9830608ccdec48dbd2e990" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/rekor": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sigstore/rekor", Step #2 - "srcmap": "rev": "04cf79c6e5512d51796c4fcfba0af05cea6d2db5" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXX=clang++ -lresolv -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXX='clang++ -lresolv -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/rekor/tests/oss_fuzz.sh Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.24.5 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-sql-driver/mysql v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/redis/go-redis/v9 v9.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmoiron/sqlx v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/release-utils v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v1.20.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/errors v0.22.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jedisct1/go-minisign v0.0.0-20211028175153-1c139d1cc84b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/runtime v0.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-chi/chi/v5 v5.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/protobuf-specs v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/profiler v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/DATA-DOG/go-sqlmock v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.41.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/strfmt v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/loads v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-redis/redismock/v9 v9.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/go-homedir v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyberphone/json-canonicalization v0.0.0-20220623050100-57a0ce2678a7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230919221257-8b5d3ce2d11d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go v0.121.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rs/cors v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sassoftware/relic v7.2.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/trillian v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sassoftware/relic/v7 v7.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/validate v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20250620022241-b7579e27df2b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.43.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/spec v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/transparency-dev/merkle v0.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250804133106-a7a43d27e69b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.75.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/in-toto/in-toto-golang v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/veraison/go-cose v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/mock v1.7.0-rc.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20250603155806-513f23925822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/theupdateframework/go-tuf v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/secure-systems-lab/go-securesystemslib v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-sqlite3 v1.14.24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading filippo.io/edwards25519 v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/oklog/ulid v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.mongodb.org/mongo-driver v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver v3.5.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-viper/mapstructure/v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sagikazarmark/locafero v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/afero v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/ini.v1 v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/analysis v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry v0.20.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/letsencrypt/boulder v0.0.0-20240620165639-de9c06129bec Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.34.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/iam v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/pubsub/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/api v0.247.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/aws v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/gcp v1.9.6-0.20250729224751-181c5d3339b3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/azure v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/hashivault v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tink-crypto/tink-go-awskms/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tink-crypto/tink-go-gcpkms/v2 v2.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tink-crypto/tink-go/v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.step.sm/crypto v0.70.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20250602020802-c6617b811d0e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lib/pq v1.10.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.16.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.32.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-test/deep v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/pubsub v1.50.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/gax-go/v2 v2.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gocloud.dev v0.40.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cavaliercoder/go-rpm v0.0.0-20200122174316-8cb9fd9c31a8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/rpmpack v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.65.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bsm/ginkgo/v2 v2.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bsm/gomega v1.27.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opentracing/opentracing-go v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250721164621-a45f3dfb1074 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/codahale/rfc6979 v0.0.0-20141003034818-6a90f24967eb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shibumi/go-pathspec v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sourcegraph/conc v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/kms v1.44.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jellydator/ttlcache/v3 v3.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go v1.55.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/kms v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/vault/api v1.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.18.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azkeys v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-colorable v0.1.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-isatty v0.0.20 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/storage v1.55.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cavaliergopher/cpio v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/pgzip v1.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ulikunitz/xz v0.5.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cavaliercoder/badio v0.0.0-20160213150051-ce5280129e9e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/titanous/rocacheck v0.0.0-20171023193734-afe73141d399 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/howeyc/gopass v0.0.0-20210920133722-c8aef6fb66ef Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zalando/go-keyring v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/longrunning v0.6.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-rootcerts v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/parseutil v0.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/hcl v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/smithy-go v1.22.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.18.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.8.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.17.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/s3 v1.58.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/wire v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity/cache v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.einride.tech/aip v0.73.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nxadm/tail v1.4.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmhodges/clock v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alessio/shellescape v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/danieljoos/wincred v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.32.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ryanuber/go-glob v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-sockaddr v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth v0.16.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.51.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/detectors/gcp v1.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/xerrors v0.0.0-20240716161551-93cc26a95ae9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.13.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-replayers/grpcreplay v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-replayers/httpreplay v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.17 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/monitoring v1.24.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/resourcemapping v0.51.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/cloudmock v0.51.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20241210054802-24370beab758 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane/envoy v1.32.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gonum.org/v1/gonum v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/logging v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/trace v1.11.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20250501225837-2ac532fd4443 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane v0.13.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/martian/v3 v3.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/s2a-go v0.1.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spiffe/go-spiffe/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane/ratelimit v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cel.dev/expr v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zeebo/errs v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.61.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath v0.4.1-0.20220621161143-b0104c826a24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-extensions-for-go/cache v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/keybase/go-keychain v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find the function: func FuzzHashedRekord(f *testing.F) Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find the function: func FuzzJarUnmarshal(f *testing.F) Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ProtonMail/go-crypto v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudflare/circl v1.3.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/s3 v1.71.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zalando/go-keyring v0.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading al.essio.dev/pkg/shellescape v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/danieljoos/wincred v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.18.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.26 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/zipslicer Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/passprompt Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/pkcs7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/x509tools Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/signers/sigerrors Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/binpatch Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/pkcs9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/certloader Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/config Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/binpatch in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/x509tools in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/signers/sigerrors in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/passprompt in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/pkcs7 in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/pkcs9 in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/config in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/certloader in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/zipslicer in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/rekor/tests/fuzz-testdata/seeds/alpine/FuzzPackageUnmarshal/FuzzPackageUnmarshal_seed1 (deflated 98%) Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 07b81fa61654: Already exists Step #4: 6e80bf8be6a2: Already exists Step #4: a7aadeb99f37: Pulling fs layer Step #4: 9941e45d47b5: Pulling fs layer Step #4: c25dd6cbbd60: Pulling fs layer Step #4: 1f0d2fddaf3d: Pulling fs layer Step #4: 2d065db4c97d: Pulling fs layer Step #4: c3339aa15c47: Pulling fs layer Step #4: 8209db57e755: Pulling fs layer Step #4: ba851c8faad7: Pulling fs layer Step #4: 00696c915222: Pulling fs layer Step #4: b41d7e94c5b2: Pulling fs layer Step #4: aa70268cadac: Pulling fs layer Step #4: c0a768b6c3a5: Pulling fs layer Step #4: 429ecdd9caf6: Pulling fs layer Step #4: 615915d1d211: Pulling fs layer Step #4: b9ecb9f90b18: Pulling fs layer Step #4: ed67a1304af3: Pulling fs layer Step #4: 071c45a44d97: Pulling fs layer Step #4: 91686fb3a9ce: Pulling fs layer Step #4: d165a9bf228b: Pulling fs layer Step #4: 53726fb23665: Pulling fs layer Step #4: 0b3976d4b25a: Pulling fs layer Step #4: 2c57a68fe209: Pulling fs layer Step #4: f7bf4d67b0cc: Pulling fs layer Step #4: aa70268cadac: Waiting Step #4: 91686fb3a9ce: Waiting Step #4: b9ecb9f90b18: Waiting Step #4: ed67a1304af3: Waiting Step #4: c0a768b6c3a5: Waiting Step #4: d165a9bf228b: Waiting Step #4: 429ecdd9caf6: Waiting Step #4: 071c45a44d97: Waiting Step #4: 615915d1d211: Waiting Step #4: 0b3976d4b25a: Waiting Step #4: 2c57a68fe209: Waiting Step #4: f7bf4d67b0cc: Waiting Step #4: 8209db57e755: Waiting Step #4: 2d065db4c97d: Waiting Step #4: 00696c915222: Waiting Step #4: ba851c8faad7: Waiting Step #4: b41d7e94c5b2: Waiting Step #4: c3339aa15c47: Waiting Step #4: c25dd6cbbd60: Download complete Step #4: a7aadeb99f37: Download complete Step #4: 9941e45d47b5: Verifying Checksum Step #4: 9941e45d47b5: Download complete Step #4: 2d065db4c97d: Verifying Checksum Step #4: 2d065db4c97d: Download complete Step #4: a7aadeb99f37: Pull complete Step #4: 1f0d2fddaf3d: Verifying Checksum Step #4: 1f0d2fddaf3d: Download complete Step #4: 8209db57e755: Verifying Checksum Step #4: 8209db57e755: Download complete Step #4: ba851c8faad7: Verifying Checksum Step #4: ba851c8faad7: Download complete Step #4: 9941e45d47b5: Pull complete Step #4: 00696c915222: Verifying Checksum Step #4: 00696c915222: Download complete Step #4: c25dd6cbbd60: Pull complete Step #4: aa70268cadac: Verifying Checksum Step #4: aa70268cadac: Download complete Step #4: c3339aa15c47: Verifying Checksum Step #4: c3339aa15c47: Download complete Step #4: c0a768b6c3a5: Verifying Checksum Step #4: c0a768b6c3a5: Download complete Step #4: 1f0d2fddaf3d: Pull complete Step #4: 429ecdd9caf6: Verifying Checksum Step #4: 429ecdd9caf6: Download complete Step #4: 2d065db4c97d: Pull complete Step #4: b9ecb9f90b18: Verifying Checksum Step #4: b9ecb9f90b18: Download complete Step #4: b41d7e94c5b2: Download complete Step #4: 071c45a44d97: Verifying Checksum Step #4: 071c45a44d97: Download complete Step #4: 91686fb3a9ce: Verifying Checksum Step #4: 91686fb3a9ce: Download complete Step #4: d165a9bf228b: Download complete Step #4: ed67a1304af3: Verifying Checksum Step #4: ed67a1304af3: Download complete Step #4: 615915d1d211: Verifying Checksum Step #4: 615915d1d211: Download complete Step #4: c3339aa15c47: Pull complete Step #4: 2c57a68fe209: Verifying Checksum Step #4: 2c57a68fe209: Download complete Step #4: 8209db57e755: Pull complete Step #4: ba851c8faad7: Pull complete Step #4: f7bf4d67b0cc: Download complete Step #4: 0b3976d4b25a: Verifying Checksum Step #4: 0b3976d4b25a: Download complete Step #4: 00696c915222: Pull complete Step #4: 53726fb23665: Verifying Checksum Step #4: 53726fb23665: Download complete Step #4: b41d7e94c5b2: Pull complete Step #4: aa70268cadac: Pull complete Step #4: c0a768b6c3a5: Pull complete Step #4: 429ecdd9caf6: Pull complete Step #4: 615915d1d211: Pull complete Step #4: b9ecb9f90b18: Pull complete Step #4: ed67a1304af3: Pull complete Step #4: 071c45a44d97: Pull complete Step #4: 91686fb3a9ce: Pull complete Step #4: d165a9bf228b: Pull complete Step #4: 53726fb23665: Pull complete Step #4: 0b3976d4b25a: Pull complete Step #4: 2c57a68fe209: Pull complete Step #4: f7bf4d67b0cc: Pull complete Step #4: Digest: sha256:de26cef137b82a22e93b8ec53f5bcd714dcfbd7d9700bf4f963a977f1e24c787 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target FuzzTreeID Step #5: Running go target FuzzTufCreateProposedEntry Step #5: Error occured while running FuzzTufCreateProposedEntry: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:79: unexpected error Step #5: entry_test.go:83: unexpected error Step #5: entry_test.go:87: unexpected error Step #5: --- FAIL: TestCrossFieldValidation/root_with_manifest_&_content (0.00s) Step #5: entry_test.go:231: unexpected result from Canonicalize for 'root with manifest & content': tuf: data has no signatures Step #5: entry_test.go:260: root with manifest & content: unexpected error, got tuf: data has no signatures Step #5: --- FAIL: TestCrossFieldValidation/root_with_manifest_&_content_base64-encoded (0.00s) Step #5: entry_test.go:231: unexpected result from Canonicalize for 'root with manifest & content base64-encoded': unexpected end of JSON input Step #5: entry_test.go:260: root with manifest & content base64-encoded: unexpected error, got unexpected end of JSON input Step #5: --- FAIL: TestCrossFieldValidation/public_key_with_key_content_&_with_invalid_data_with_content (0.00s) Step #5: entry_test.go:260: public key with key content & with invalid data with content: unexpected error, got tuf: data has no signatures Step #5: FAIL Step #5: coverage: 42.2% of statements Step #5: Running go target FuzzHashedRekordUnmarshalAndCanonicalize Step #5: Running go target FuzzRekordCreateProposedEntry Step #5: Error occured while running FuzzRekordCreateProposedEntry: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:231: unexpected result in 'signature with invalid sig content, key content & with data with content': 'content' must be specified for signature Step #5: FAIL Step #5: coverage: 20.4% of statements Step #5: Running go target FuzzJarUnmarshalAndCanonicalize Step #5: Error occured while running FuzzJarUnmarshalAndCanonicalize: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:113: unexpected result in 'archive with inline content': 'content' must be specified for package Step #5: entry_test.go:121: unexpected error calling Insertable on valid proposed entry: missing archive content Step #5: entry_test.go:126: unexpected result from Canonicalize for 'archive with inline content': 'content' must be specified for package Step #5: entry_test.go:156: archive with inline content: unexpected error, got jar v0.0.1 entry not initialized Step #5: --- FAIL: TestJarMetadataSize (0.00s) Step #5: entry_test.go:192: unexpected unmarshal failure: 'content' must be specified for package Step #5: entry_test.go:200: unexpected error 'content' must be specified for package Step #5: FAIL Step #5: coverage: 17.0% of statements Step #5: Running go target FuzzCoseUnmarshalAndCanonicalize Step #5: Running go target FuzzTufUnmarshalAndCanonicalize Step #5: Error occured while running FuzzTufUnmarshalAndCanonicalize: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:79: unexpected error Step #5: entry_test.go:83: unexpected error Step #5: entry_test.go:87: unexpected error Step #5: --- FAIL: TestCrossFieldValidation/root_with_manifest_&_content (0.00s) Step #5: entry_test.go:231: unexpected result from Canonicalize for 'root with manifest & content': tuf: data has no signatures Step #5: entry_test.go:260: root with manifest & content: unexpected error, got tuf: data has no signatures Step #5: --- FAIL: TestCrossFieldValidation/root_with_manifest_&_content_base64-encoded (0.00s) Step #5: entry_test.go:231: unexpected result from Canonicalize for 'root with manifest & content base64-encoded': unexpected end of JSON input Step #5: entry_test.go:260: root with manifest & content base64-encoded: unexpected error, got unexpected end of JSON input Step #5: --- FAIL: TestCrossFieldValidation/public_key_with_key_content_&_with_invalid_data_with_content (0.00s) Step #5: entry_test.go:260: public key with key content & with invalid data with content: unexpected error, got tuf: data has no signatures Step #5: FAIL Step #5: coverage: 42.2% of statements Step #5: Running go target FuzzHelmProvenanceUnmarshal Step #5: Error occured while running FuzzHelmProvenanceUnmarshal: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: --- FAIL: TestCrossFieldValidation/public_key_without_provenance_file (0.00s) Step #5: entry_test.go:225: public key without provenance file: unexpected error, got unable to read PGP public key: EOF Step #5: --- FAIL: TestCrossFieldValidation/public_key_with_empty_provenance_file (0.00s) Step #5: entry_test.go:225: public key with empty provenance file: unexpected error, got unable to read PGP public key: EOF Step #5: --- FAIL: TestCrossFieldValidation/public_key_and_invalid_provenance_content (0.00s) Step #5: entry_test.go:167: unexpected result in 'public key and invalid provenance content': 'content' must be specified for publicKey Step #5: entry_test.go:183: unexpected result in 'public key and invalid provenance content': 'content' must be specified for publicKey Step #5: entry_test.go:189: unexpected error calling Insertable on valid proposed entry: missing public key content Step #5: entry_test.go:225: public key and invalid provenance content: unexpected error, got unable to read PGP public key: EOF Step #5: --- FAIL: TestCrossFieldValidation/provenance_content_with_invalid_public_key (0.00s) Step #5: entry_test.go:167: unexpected result in 'provenance content with invalid public key': 'content' must be specified for publicKey Step #5: entry_test.go:183: unexpected result in 'provenance content with invalid public key': 'content' must be specified for publicKey Step #5: entry_test.go:189: unexpected error calling Insertable on valid proposed entry: missing public key content Step #5: --- FAIL: TestCrossFieldValidation/provenance_content_with_valid_public_key (0.00s) Step #5: entry_test.go:167: unexpected result in 'provenance content with valid public key': 'content' must be specified for publicKey Step #5: entry_test.go:183: unexpected result in 'provenance content with valid public key': 'content' must be specified for publicKey Step #5: entry_test.go:189: unexpected error calling Insertable on valid proposed entry: missing public key content Step #5: entry_test.go:195: unexpected result from Canonicalize for 'provenance content with valid public key': 'content' must be specified for publicKey Step #5: entry_test.go:225: provenance content with valid public key: unexpected error, got unable to read PGP public key: EOF Step #5: FAIL Step #5: coverage: 19.7% of statements Step #5: Running go target FuzzValidateUUID Step #5: Running go target FuzzHelmCreateProposedEntry Step #5: Error occured while running FuzzHelmCreateProposedEntry: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: --- FAIL: TestCrossFieldValidation/public_key_without_provenance_file (0.00s) Step #5: entry_test.go:225: public key without provenance file: unexpected error, got unable to read PGP public key: EOF Step #5: --- FAIL: TestCrossFieldValidation/public_key_with_empty_provenance_file (0.00s) Step #5: entry_test.go:225: public key with empty provenance file: unexpected error, got unable to read PGP public key: EOF Step #5: --- FAIL: TestCrossFieldValidation/public_key_and_invalid_provenance_content (0.00s) Step #5: entry_test.go:167: unexpected result in 'public key and invalid provenance content': 'content' must be specified for publicKey Step #5: entry_test.go:183: unexpected result in 'public key and invalid provenance content': 'content' must be specified for publicKey Step #5: entry_test.go:189: unexpected error calling Insertable on valid proposed entry: missing public key content Step #5: entry_test.go:225: public key and invalid provenance content: unexpected error, got unable to read PGP public key: EOF Step #5: --- FAIL: TestCrossFieldValidation/provenance_content_with_invalid_public_key (0.00s) Step #5: entry_test.go:167: unexpected result in 'provenance content with invalid public key': 'content' must be specified for publicKey Step #5: entry_test.go:183: unexpected result in 'provenance content with invalid public key': 'content' must be specified for publicKey Step #5: entry_test.go:189: unexpected error calling Insertable on valid proposed entry: missing public key content Step #5: --- FAIL: TestCrossFieldValidation/provenance_content_with_valid_public_key (0.00s) Step #5: entry_test.go:167: unexpected result in 'provenance content with valid public key': 'content' must be specified for publicKey Step #5: entry_test.go:183: unexpected result in 'provenance content with valid public key': 'content' must be specified for publicKey Step #5: entry_test.go:189: unexpected error calling Insertable on valid proposed entry: missing public key content Step #5: entry_test.go:195: unexpected result from Canonicalize for 'provenance content with valid public key': 'content' must be specified for publicKey Step #5: entry_test.go:225: provenance content with valid public key: unexpected error, got unable to read PGP public key: EOF Step #5: FAIL Step #5: coverage: 19.7% of statements Step #5: Running go target FuzzKeys Step #5: Error occured while running FuzzKeys: Step #5: --- FAIL: TestFactoryNewKey (0.00s) Step #5: --- FAIL: TestFactoryNewKey/valid_pgp (0.00s) Step #5: factory_test.go:111: unexpected error generating public key unable to read PGP public key: invalid argument or signature unable to read PGP signature: invalid argument Step #5: --- FAIL: TestFactoryNewKey/valid_minisign (0.00s) Step #5: factory_test.go:111: unexpected error generating public key unable to read minisign public key: invalid argument or signature unable to read minisign signature: invalid argument Step #5: --- FAIL: TestFactoryNewKey/valid_x509 (0.00s) Step #5: factory_test.go:111: unexpected error generating public key invalid argument or signature invalid argument Step #5: --- FAIL: TestFactoryNewKey/valid_ssh (0.00s) Step #5: factory_test.go:111: unexpected error generating public key invalid argument or signature invalid argument Step #5: FAIL Step #5: coverage: 63.6% of statements Step #5: Running go target FuzzCoseCreateProposedEntry Step #5: Running go target FuzzCreateEntryIDFromParts Step #5: Running go target FuzzIntotoUnmarshalAndCanonicalize_v001 Step #5: Running go target FuzzRpmUnmarshalAndCanonicalize Step #5: Error occured while running FuzzRpmUnmarshalAndCanonicalize: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:210: public key without package: unexpected error, got unable to read PGP public key: EOF Step #5: entry_test.go:210: public key with empty package: unexpected error, got unable to read PGP public key: EOF Step #5: entry_test.go:152: unexpected result in 'public key with invalid key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:168: unexpected result in 'public key with invalid key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:173: unexpected error calling Insertable on valid proposed entry: missing publicKey content Step #5: entry_test.go:152: unexpected result in 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:168: unexpected result in 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:173: unexpected error calling Insertable on valid proposed entry: missing publicKey content Step #5: entry_test.go:179: unexpected result from Canonicalize for 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:210: public key with key content & with data with content: unexpected error, got unable to read PGP public key: EOF Step #5: entry_test.go:152: unexpected result in 'public key with key content & with invalid data with content': 'content' must be specified for publicKey Step #5: entry_test.go:168: unexpected result in 'public key with key content & with invalid data with content': 'content' must be specified for publicKey Step #5: entry_test.go:173: unexpected error calling Insertable on valid proposed entry: missing publicKey content Step #5: entry_test.go:210: public key with key content & with invalid data with content: unexpected error, got unable to read PGP public key: EOF Step #5: FAIL Step #5: coverage: 16.8% of statements Step #5: Running go target FuzzValidateTreeID Step #5: Running go target FuzzRpmCreateProposedEntry Step #5: Error occured while running FuzzRpmCreateProposedEntry: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:210: public key without package: unexpected error, got unable to read PGP public key: EOF Step #5: entry_test.go:210: public key with empty package: unexpected error, got unable to read PGP public key: EOF Step #5: entry_test.go:152: unexpected result in 'public key with invalid key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:168: unexpected result in 'public key with invalid key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:173: unexpected error calling Insertable on valid proposed entry: missing publicKey content Step #5: entry_test.go:152: unexpected result in 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:168: unexpected result in 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:173: unexpected error calling Insertable on valid proposed entry: missing publicKey content Step #5: entry_test.go:179: unexpected result from Canonicalize for 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:210: public key with key content & with data with content: unexpected error, got unable to read PGP public key: EOF Step #5: entry_test.go:152: unexpected result in 'public key with key content & with invalid data with content': 'content' must be specified for publicKey Step #5: entry_test.go:168: unexpected result in 'public key with key content & with invalid data with content': 'content' must be specified for publicKey Step #5: entry_test.go:173: unexpected error calling Insertable on valid proposed entry: missing publicKey content Step #5: entry_test.go:210: public key with key content & with invalid data with content: unexpected error, got unable to read PGP public key: EOF Step #5: FAIL Step #5: coverage: 16.8% of statements Step #5: Running go target FuzzRekordUnmarshalAndCanonicalize Step #5: Error occured while running FuzzRekordUnmarshalAndCanonicalize: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:231: unexpected result in 'signature with invalid sig content, key content & with data with content': 'content' must be specified for signature Step #5: FAIL Step #5: coverage: 20.4% of statements Step #5: Running go target FuzzPadToTreeIDLen Step #5: Running go target FuzzRfc3161CreateProposedEntry Step #5: Error occured while running FuzzRfc3161CreateProposedEntry: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:222: asn1: syntax error: sequence truncated Step #5: FAIL Step #5: coverage: 10.1% of statements Step #5: Running go target FuzzRfc3161UnmarshalAndCanonicalize Step #5: Error occured while running FuzzRfc3161UnmarshalAndCanonicalize: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:222: asn1: syntax error: sequence truncated Step #5: FAIL Step #5: coverage: 10.1% of statements Step #5: Running go target FuzzJarCreateProposedEntry Step #5: Error occured while running FuzzJarCreateProposedEntry: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:113: unexpected result in 'archive with inline content': 'content' must be specified for package Step #5: entry_test.go:121: unexpected error calling Insertable on valid proposed entry: missing archive content Step #5: entry_test.go:126: unexpected result from Canonicalize for 'archive with inline content': 'content' must be specified for package Step #5: entry_test.go:156: archive with inline content: unexpected error, got jar v0.0.1 entry not initialized Step #5: --- FAIL: TestJarMetadataSize (0.00s) Step #5: entry_test.go:192: unexpected unmarshal failure: 'content' must be specified for package Step #5: entry_test.go:200: unexpected error 'content' must be specified for package Step #5: FAIL Step #5: coverage: 17.0% of statements Step #5: Running go target FuzzHelmUnmarshalAndCanonicalize Step #5: Error occured while running FuzzHelmUnmarshalAndCanonicalize: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: --- FAIL: TestCrossFieldValidation/public_key_without_provenance_file (0.00s) Step #5: entry_test.go:225: public key without provenance file: unexpected error, got unable to read PGP public key: EOF Step #5: --- FAIL: TestCrossFieldValidation/public_key_with_empty_provenance_file (0.00s) Step #5: entry_test.go:225: public key with empty provenance file: unexpected error, got unable to read PGP public key: EOF Step #5: --- FAIL: TestCrossFieldValidation/public_key_and_invalid_provenance_content (0.00s) Step #5: entry_test.go:167: unexpected result in 'public key and invalid provenance content': 'content' must be specified for publicKey Step #5: entry_test.go:183: unexpected result in 'public key and invalid provenance content': 'content' must be specified for publicKey Step #5: entry_test.go:189: unexpected error calling Insertable on valid proposed entry: missing public key content Step #5: entry_test.go:225: public key and invalid provenance content: unexpected error, got unable to read PGP public key: EOF Step #5: --- FAIL: TestCrossFieldValidation/provenance_content_with_invalid_public_key (0.00s) Step #5: entry_test.go:167: unexpected result in 'provenance content with invalid public key': 'content' must be specified for publicKey Step #5: entry_test.go:183: unexpected result in 'provenance content with invalid public key': 'content' must be specified for publicKey Step #5: entry_test.go:189: unexpected error calling Insertable on valid proposed entry: missing public key content Step #5: --- FAIL: TestCrossFieldValidation/provenance_content_with_valid_public_key (0.00s) Step #5: entry_test.go:167: unexpected result in 'provenance content with valid public key': 'content' must be specified for publicKey Step #5: entry_test.go:183: unexpected result in 'provenance content with valid public key': 'content' must be specified for publicKey Step #5: entry_test.go:189: unexpected error calling Insertable on valid proposed entry: missing public key content Step #5: entry_test.go:195: unexpected result from Canonicalize for 'provenance content with valid public key': 'content' must be specified for publicKey Step #5: entry_test.go:225: provenance content with valid public key: unexpected error, got unable to read PGP public key: EOF Step #5: FAIL Step #5: coverage: 19.7% of statements Step #5: Running go target FuzzNewFile Step #5: Running go target FuzzJarutilsVerify Step #5: Error occured while running FuzzJarutilsVerify: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:113: unexpected result in 'archive with inline content': 'content' must be specified for package Step #5: entry_test.go:121: unexpected error calling Insertable on valid proposed entry: missing archive content Step #5: entry_test.go:126: unexpected result from Canonicalize for 'archive with inline content': 'content' must be specified for package Step #5: entry_test.go:156: archive with inline content: unexpected error, got jar v0.0.1 entry not initialized Step #5: --- FAIL: TestJarMetadataSize (0.00s) Step #5: entry_test.go:192: unexpected unmarshal failure: 'content' must be specified for package Step #5: entry_test.go:200: unexpected error 'content' must be specified for package Step #5: FAIL Step #5: coverage: 17.0% of statements Step #5: Running go target FuzzAlpineUnmarshalAndCanonicalize Step #5: Error occured while running FuzzAlpineUnmarshalAndCanonicalize: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:196: public key without package: unexpected error, got invalid public key: failure decoding PEM Step #5: entry_test.go:196: public key with empty package: unexpected error, got invalid public key: failure decoding PEM Step #5: entry_test.go:138: unexpected result in 'public key with invalid key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:154: unexpected result in 'public key with invalid key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:159: unexpected result in calling Insertable on valid proposed entry: missing package content Step #5: entry_test.go:138: unexpected result in 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:154: unexpected result in 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:159: unexpected result in calling Insertable on valid proposed entry: missing package content Step #5: entry_test.go:165: unexpected result from Canonicalize for 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:196: public key with key content & with data with content: unexpected error, got invalid public key: failure decoding PEM Step #5: FAIL Step #5: coverage: 18.1% of statements Step #5: Running go target FuzzGetTreeIDFromIDString Step #5: Running go target FuzzAlpineCreateProposedEntry Step #5: Error occured while running FuzzAlpineCreateProposedEntry: Step #5: --- FAIL: TestCrossFieldValidation (0.00s) Step #5: entry_test.go:196: public key without package: unexpected error, got invalid public key: failure decoding PEM Step #5: entry_test.go:196: public key with empty package: unexpected error, got invalid public key: failure decoding PEM Step #5: entry_test.go:138: unexpected result in 'public key with invalid key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:154: unexpected result in 'public key with invalid key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:159: unexpected result in calling Insertable on valid proposed entry: missing package content Step #5: entry_test.go:138: unexpected result in 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:154: unexpected result in 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:159: unexpected result in calling Insertable on valid proposed entry: missing package content Step #5: entry_test.go:165: unexpected result from Canonicalize for 'public key with key content & with data with content': 'content' must be specified for publicKey Step #5: entry_test.go:196: public key with key content & with data with content: unexpected error, got invalid public key: failure decoding PEM Step #5: FAIL Step #5: coverage: 18.1% of statements Step #5: Running go target FuzzValidateEntryID Step #5: Running go target FuzzDSSECreateProposedEntry Step #5: Running go target FuzzHashedRekordCreateProposedEntry Step #5: Running go target FuzzIntotoCreateProposedEntry_v001 Step #5: Running go target FuzzIntotoUnmarshalAndCanonicalize_v002 Step #5: Running go target FuzzGetUUIDFromIDString Step #5: Running go target FuzzReturnEntryIDString Step #5: Running go target FuzzDSSEUnmarshalAndCanonicalize Step #5: Running go target FuzzIntotoCreateProposedEntry_v002 Step #5: Running go target FuzzPackageUnmarshal Step #5: Error occured while running FuzzPackageUnmarshal: Step #5: 2025-08-29T06:58:27.318Z ERROR types/versionmap.go:83 Could not get version from string: "not" Step #5: github.com/sigstore/rekor/pkg/types.(*SemVerEntryFactoryMap).SetEntryFactory Step #5: /src/rekor/pkg/types/versionmap.go:83 Step #5: github.com/sigstore/rekor/pkg/types/alpine.TestAlpineType Step #5: /src/rekor/pkg/types/alpine/alpine_test.go:63 Step #5: testing.tRunner Step #5: /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.24.5.linux-amd64/src/testing/testing.go:1792 Step #5: 2025-08-29T06:58:27.318Z ERROR types/versionmap.go:59 No Major.Minor.Patch elements found Step #5: github.com/sigstore/rekor/pkg/types.(*SemVerEntryFactoryMap).GetEntryFactory Step #5: /src/rekor/pkg/types/versionmap.go:59 Step #5: github.com/sigstore/rekor/pkg/types.(*RekorType).VersionedUnmarshal Step #5: /src/rekor/pkg/types/types.go:53 Step #5: github.com/sigstore/rekor/pkg/types/alpine.(*BaseAlpineType).UnmarshalEntry Step #5: /src/rekor/pkg/types/alpine/alpine.go:58 Step #5: github.com/sigstore/rekor/pkg/types/alpine.TestAlpineType Step #5: /src/rekor/pkg/types/alpine/alpine_test.go:98 Step #5: testing.tRunner Step #5: /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.24.5.linux-amd64/src/testing/testing.go:1792 Step #5: --- FAIL: TestAlpinePackage (0.00s) Step #5: apk_test.go:31: could not open archive open tests/test_alpine.apk: no such file or directory Step #5: --- FAIL: TestAlpineMetadataSize (0.00s) Step #5: apk_test.go:60: could not open archive open tests/test_alpine.apk: no such file or directory Step #5: FAIL Step #5: coverage: 7.2% of statements Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2025/08/29 06:58:27 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2025/08/29 06:58:27 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/566.8 KiB] 0% Done / [0/3 files][ 0.0 B/566.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/566.8 KiB] 0% Done / [1/3 files][566.8 KiB/566.8 KiB] 99% Done / [2/3 files][566.8 KiB/566.8 KiB] 99% Done / [3/3 files][566.8 KiB/566.8 KiB] 100% Done Step #7: Operation completed over 3 objects/566.8 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzTufUnmarshalAndCanonicalize.json [Content-Type=application/json]... Step #9: / [0/39 files][ 0.0 B/ 44.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzHelmProvenanceUnmarshal.json [Content-Type=application/json]... Step #9: / [0/39 files][ 0.0 B/ 44.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzJarutilsVerify.json [Content-Type=application/json]... Step #9: / [0/39 files][ 0.0 B/ 44.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzPackageUnmarshal.json [Content-Type=application/json]... Step #9: / [0/39 files][ 1.8 KiB/ 44.8 KiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDSSEUnmarshalAndCanonicalize.json [Content-Type=application/json]... Step #9: / [0/39 files][ 2.7 KiB/ 44.8 KiB] 6% Done / [1/39 files][ 4.9 KiB/ 44.8 KiB] 10% Done / [2/39 files][ 4.9 KiB/ 44.8 KiB] 10% Done / [3/39 files][ 4.9 KiB/ 44.8 KiB] 10% Done / [4/39 files][ 4.9 KiB/ 44.8 KiB] 10% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzTreeID.json [Content-Type=application/json]... Step #9: / [4/39 files][ 4.9 KiB/ 44.8 KiB] 10% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzHashedRekordCreateProposedEntry.json [Content-Type=application/json]... Step #9: / [4/39 files][ 4.9 KiB/ 44.8 KiB] 10% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzPadToTreeIDLen.json [Content-Type=application/json]... Step #9: / [4/39 files][ 4.9 KiB/ 44.8 KiB] 10% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzValidateUUID.json [Content-Type=application/json]... Step #9: / [4/39 files][ 4.9 KiB/ 44.8 KiB] 10% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKeys.json [Content-Type=application/json]... Step #9: / [5/39 files][ 4.9 KiB/ 44.8 KiB] 10% Done / [5/39 files][ 4.9 KiB/ 44.8 KiB] 10% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzNewFile.json [Content-Type=application/json]... Step #9: / [5/39 files][ 6.7 KiB/ 44.8 KiB] 14% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzHelmCreateProposedEntry.json [Content-Type=application/json]... Step #9: / [5/39 files][ 6.7 KiB/ 44.8 KiB] 14% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDSSECreateProposedEntry.json [Content-Type=application/json]... Step #9: / [5/39 files][ 6.7 KiB/ 44.8 KiB] 14% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzIntotoUnmarshalAndCanonicalize_v001.json [Content-Type=application/json]... Step #9: / [5/39 files][ 6.7 KiB/ 44.8 KiB] 14% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzJarUnmarshalAndCanonicalize.json [Content-Type=application/json]... Step #9: / [5/39 files][ 7.6 KiB/ 44.8 KiB] 16% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzAlpineUnmarshalAndCanonicalize.json [Content-Type=application/json]... Step #9: / [5/39 files][ 7.6 KiB/ 44.8 KiB] 16% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzGetTreeIDFromIDString.json [Content-Type=application/json]... Step #9: / [5/39 files][ 11.2 KiB/ 44.8 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzJarCreateProposedEntry.json [Content-Type=application/json]... Step #9: / [5/39 files][ 15.1 KiB/ 44.8 KiB] 33% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzValidateTreeID.json [Content-Type=application/json]... Step #9: / [5/39 files][ 15.1 KiB/ 44.8 KiB] 33% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCoseUnmarshalAndCanonicalize.json [Content-Type=application/json]... Step #9: / [5/39 files][ 15.1 KiB/ 44.8 KiB] 33% Done / [6/39 files][ 15.1 KiB/ 44.8 KiB] 33% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzIntotoUnmarshalAndCanonicalize_v002.json [Content-Type=application/json]... Step #9: / [6/39 files][ 15.1 KiB/ 44.8 KiB] 33% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzRfc3161CreateProposedEntry.json [Content-Type=application/json]... Step #9: / [6/39 files][ 16.0 KiB/ 44.8 KiB] 35% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzValidateEntryID.json [Content-Type=application/json]... Step #9: / [6/39 files][ 16.0 KiB/ 44.8 KiB] 35% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCoseCreateProposedEntry.json [Content-Type=application/json]... Step #9: / [6/39 files][ 16.0 KiB/ 44.8 KiB] 35% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzReturnEntryIDString.json [Content-Type=application/json]... Step #9: / [6/39 files][ 16.0 KiB/ 44.8 KiB] 35% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzAlpineCreateProposedEntry.json [Content-Type=application/json]... Step #9: / [6/39 files][ 16.0 KiB/ 44.8 KiB] 35% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzRekordCreateProposedEntry.json [Content-Type=application/json]... Step #9: / [6/39 files][ 16.9 KiB/ 44.8 KiB] 37% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzHashedRekordUnmarshalAndCanonicalize.json [Content-Type=application/json]... Step #9: / [7/39 files][ 16.9 KiB/ 44.8 KiB] 37% Done / [7/39 files][ 16.9 KiB/ 44.8 KiB] 37% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzRpmUnmarshalAndCanonicalize.json [Content-Type=application/json]... Step #9: / [7/39 files][ 17.8 KiB/ 44.8 KiB] 39% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCreateEntryIDFromParts.json [Content-Type=application/json]... Step #9: / [7/39 files][ 17.8 KiB/ 44.8 KiB] 39% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzGetUUIDFromIDString.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [7/39 files][ 17.8 KiB/ 44.8 KiB] 39% Done / [7/39 files][ 17.8 KiB/ 44.8 KiB] 39% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzRfc3161UnmarshalAndCanonicalize.json [Content-Type=application/json]... Step #9: / [7/39 files][ 18.7 KiB/ 44.8 KiB] 41% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzTufCreateProposedEntry.json [Content-Type=application/json]... Step #9: / [7/39 files][ 18.7 KiB/ 44.8 KiB] 41% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzRpmCreateProposedEntry.json [Content-Type=application/json]... Step #9: / [7/39 files][ 18.7 KiB/ 44.8 KiB] 41% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzHelmUnmarshalAndCanonicalize.json [Content-Type=application/json]... Step #9: / [7/39 files][ 18.7 KiB/ 44.8 KiB] 41% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzIntotoCreateProposedEntry_v002.json [Content-Type=application/json]... Step #9: / [7/39 files][ 18.7 KiB/ 44.8 KiB] 41% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzRekordUnmarshalAndCanonicalize.json [Content-Type=application/json]... Step #9: / [7/39 files][ 18.7 KiB/ 44.8 KiB] 41% Done / [8/39 files][ 25.9 KiB/ 44.8 KiB] 57% Done / [9/39 files][ 25.9 KiB/ 44.8 KiB] 57% Done / [10/39 files][ 25.9 KiB/ 44.8 KiB] 57% Done / [11/39 files][ 25.9 KiB/ 44.8 KiB] 57% Done / [12/39 files][ 25.9 KiB/ 44.8 KiB] 57% Done / [13/39 files][ 25.9 KiB/ 44.8 KiB] 57% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzIntotoCreateProposedEntry_v001.json [Content-Type=application/json]... Step #9: / [13/39 files][ 25.9 KiB/ 44.8 KiB] 57% Done / [14/39 files][ 25.9 KiB/ 44.8 KiB] 57% Done / [15/39 files][ 27.7 KiB/ 44.8 KiB] 61% Done / [16/39 files][ 28.6 KiB/ 44.8 KiB] 63% Done / [17/39 files][ 30.5 KiB/ 44.8 KiB] 68% Done / [18/39 files][ 30.5 KiB/ 44.8 KiB] 68% Done - - [19/39 files][ 30.5 KiB/ 44.8 KiB] 68% Done - [20/39 files][ 31.4 KiB/ 44.8 KiB] 70% Done - [21/39 files][ 31.4 KiB/ 44.8 KiB] 70% Done - [22/39 files][ 35.0 KiB/ 44.8 KiB] 77% Done - [23/39 files][ 35.0 KiB/ 44.8 KiB] 77% Done - [24/39 files][ 36.7 KiB/ 44.8 KiB] 81% Done - [25/39 files][ 38.5 KiB/ 44.8 KiB] 85% Done - [26/39 files][ 38.5 KiB/ 44.8 KiB] 85% Done - [27/39 files][ 40.3 KiB/ 44.8 KiB] 89% Done - [28/39 files][ 42.1 KiB/ 44.8 KiB] 93% Done - [29/39 files][ 42.1 KiB/ 44.8 KiB] 93% Done - [30/39 files][ 42.1 KiB/ 44.8 KiB] 93% Done - [31/39 files][ 43.0 KiB/ 44.8 KiB] 95% Done - [32/39 files][ 44.8 KiB/ 44.8 KiB] 99% Done - [33/39 files][ 44.8 KiB/ 44.8 KiB] 99% Done - [34/39 files][ 44.8 KiB/ 44.8 KiB] 99% Done - [35/39 files][ 44.8 KiB/ 44.8 KiB] 99% Done - [36/39 files][ 44.8 KiB/ 44.8 KiB] 99% Done - [37/39 files][ 44.8 KiB/ 44.8 KiB] 99% Done - [38/39 files][ 44.8 KiB/ 44.8 KiB] 99% Done - [39/39 files][ 44.8 KiB/ 44.8 KiB] 100% Done Step #9: Operation completed over 39 objects/44.8 KiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzGetUUIDFromIDString.log [Content-Type=application/octet-stream]... Step #11: / [0/38 files][ 0.0 B/ 44.2 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzHelmUnmarshalAndCanonicalize.log [Content-Type=application/octet-stream]... Step #11: / [0/38 files][ 0.0 B/ 44.2 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzHelmCreateProposedEntry.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzPackageUnmarshal.log [Content-Type=application/octet-stream]... Step #11: / [0/38 files][ 0.0 B/ 44.2 KiB] 0% Done / [0/38 files][ 0.0 B/ 44.2 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzRekordUnmarshalAndCanonicalize.log [Content-Type=application/octet-stream]... Step #11: / [0/38 files][ 0.0 B/ 44.2 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzIntotoCreateProposedEntry_v002.log [Content-Type=application/octet-stream]... Step #11: / [0/38 files][ 3.3 KiB/ 44.2 KiB] 7% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzPadToTreeIDLen.log [Content-Type=application/octet-stream]... Step #11: / [0/38 files][ 5.6 KiB/ 44.2 KiB] 12% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzRfc3161UnmarshalAndCanonicalize.log [Content-Type=application/octet-stream]... Step #11: / [0/38 files][ 7.2 KiB/ 44.2 KiB] 16% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzValidateUUID.log [Content-Type=application/octet-stream]... Step #11: / [0/38 files][ 7.2 KiB/ 44.2 KiB] 16% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzAlpineCreateProposedEntry.log [Content-Type=application/octet-stream]... Step #11: / [0/38 files][ 7.2 KiB/ 44.2 KiB] 16% Done / [1/38 files][ 7.2 KiB/ 44.2 KiB] 16% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCreateEntryIDFromParts.log [Content-Type=application/octet-stream]... Step #11: / [1/38 files][ 7.6 KiB/ 44.2 KiB] 17% Done / [2/38 files][ 7.6 KiB/ 44.2 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzJarCreateProposedEntry.log [Content-Type=application/octet-stream]... Step #11: / [2/38 files][ 7.6 KiB/ 44.2 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzJarUnmarshalAndCanonicalize.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzHashedRekordCreateProposedEntry.log [Content-Type=application/octet-stream]... Step #11: / [2/38 files][ 7.6 KiB/ 44.2 KiB] 17% Done / [2/38 files][ 7.6 KiB/ 44.2 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzTreeID.log [Content-Type=application/octet-stream]... Step #11: / [2/38 files][ 8.6 KiB/ 44.2 KiB] 19% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzIntotoCreateProposedEntry_v001.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzRpmUnmarshalAndCanonicalize.log [Content-Type=application/octet-stream]... Step #11: / [2/38 files][ 8.6 KiB/ 44.2 KiB] 19% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzValidateTreeID.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKeys.log [Content-Type=application/octet-stream]... Step #11: / [2/38 files][ 8.6 KiB/ 44.2 KiB] 19% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCoseCreateProposedEntry.log [Content-Type=application/octet-stream]... Step #11: / [2/38 files][ 8.6 KiB/ 44.2 KiB] 19% Done / [2/38 files][ 8.6 KiB/ 44.2 KiB] 19% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDSSECreateProposedEntry.log [Content-Type=application/octet-stream]... Step #11: / [2/38 files][ 8.6 KiB/ 44.2 KiB] 19% Done / [2/38 files][ 8.6 KiB/ 44.2 KiB] 19% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzGetTreeIDFromIDString.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzValidateEntryID.log [Content-Type=application/octet-stream]... Step #11: / [3/38 files][ 8.6 KiB/ 44.2 KiB] 19% Done / [3/38 files][ 8.6 KiB/ 44.2 KiB] 19% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzReturnEntryIDString.log [Content-Type=application/octet-stream]... Step #11: / [3/38 files][ 8.6 KiB/ 44.2 KiB] 19% Done / [3/38 files][ 8.7 KiB/ 44.2 KiB] 19% Done / [4/38 files][ 8.7 KiB/ 44.2 KiB] 19% Done / [5/38 files][ 11.2 KiB/ 44.2 KiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzRfc3161CreateProposedEntry.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzHashedRekordUnmarshalAndCanonicalize.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzRpmCreateProposedEntry.log [Content-Type=application/octet-stream]... Step #11: / [5/38 files][ 11.2 KiB/ 44.2 KiB] 25% Done / [5/38 files][ 11.2 KiB/ 44.2 KiB] 25% Done / [5/38 files][ 12.2 KiB/ 44.2 KiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzTufCreateProposedEntry.log [Content-Type=application/octet-stream]... Step #11: / [5/38 files][ 12.2 KiB/ 44.2 KiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDSSEUnmarshalAndCanonicalize.log [Content-Type=application/octet-stream]... Step #11: / [5/38 files][ 12.2 KiB/ 44.2 KiB] 27% Done / [6/38 files][ 12.2 KiB/ 44.2 KiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzAlpineUnmarshalAndCanonicalize.log [Content-Type=application/octet-stream]... Step #11: / [6/38 files][ 12.2 KiB/ 44.2 KiB] 27% Done / [7/38 files][ 12.9 KiB/ 44.2 KiB] 29% Done / [8/38 files][ 20.8 KiB/ 44.2 KiB] 46% Done / [9/38 files][ 20.8 KiB/ 44.2 KiB] 46% Done / [10/38 files][ 23.7 KiB/ 44.2 KiB] 53% Done / [11/38 files][ 24.7 KiB/ 44.2 KiB] 55% Done / [12/38 files][ 25.8 KiB/ 44.2 KiB] 58% Done / [13/38 files][ 26.8 KiB/ 44.2 KiB] 60% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCoseUnmarshalAndCanonicalize.log [Content-Type=application/octet-stream]... Step #11: / [13/38 files][ 26.8 KiB/ 44.2 KiB] 60% Done / [14/38 files][ 26.8 KiB/ 44.2 KiB] 60% Done / [15/38 files][ 27.7 KiB/ 44.2 KiB] 62% Done / [16/38 files][ 27.7 KiB/ 44.2 KiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzIntotoUnmarshalAndCanonicalize_v001.log [Content-Type=application/octet-stream]... Step #11: / [16/38 files][ 28.3 KiB/ 44.2 KiB] 63% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzTufUnmarshalAndCanonicalize.log [Content-Type=application/octet-stream]... Step #11: / [16/38 files][ 28.3 KiB/ 44.2 KiB] 63% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzIntotoUnmarshalAndCanonicalize_v002.log [Content-Type=application/octet-stream]... Step #11: / [17/38 files][ 28.3 KiB/ 44.2 KiB] 63% Done / [17/38 files][ 28.3 KiB/ 44.2 KiB] 63% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzJarutilsVerify.log [Content-Type=application/octet-stream]... Step #11: / [17/38 files][ 28.3 KiB/ 44.2 KiB] 63% Done / [18/38 files][ 28.3 KiB/ 44.2 KiB] 63% Done / [19/38 files][ 28.9 KiB/ 44.2 KiB] 65% Done / [20/38 files][ 28.9 KiB/ 44.2 KiB] 65% Done / [21/38 files][ 28.9 KiB/ 44.2 KiB] 65% Done / [22/38 files][ 34.2 KiB/ 44.2 KiB] 77% Done / [23/38 files][ 34.2 KiB/ 44.2 KiB] 77% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzNewFile.log [Content-Type=application/octet-stream]... Step #11: / [23/38 files][ 34.2 KiB/ 44.2 KiB] 77% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzRekordCreateProposedEntry.log [Content-Type=application/octet-stream]... Step #11: / [23/38 files][ 34.2 KiB/ 44.2 KiB] 77% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzHelmProvenanceUnmarshal.log [Content-Type=application/octet-stream]... Step #11: / [23/38 files][ 34.2 KiB/ 44.2 KiB] 77% Done / [24/38 files][ 34.2 KiB/ 44.2 KiB] 77% Done / [25/38 files][ 36.5 KiB/ 44.2 KiB] 82% Done / [26/38 files][ 36.6 KiB/ 44.2 KiB] 82% Done / [27/38 files][ 38.5 KiB/ 44.2 KiB] 87% Done - - [28/38 files][ 44.2 KiB/ 44.2 KiB] 99% Done - [29/38 files][ 44.2 KiB/ 44.2 KiB] 99% Done - [30/38 files][ 44.2 KiB/ 44.2 KiB] 99% Done - [31/38 files][ 44.2 KiB/ 44.2 KiB] 99% Done - [32/38 files][ 44.2 KiB/ 44.2 KiB] 99% Done - [33/38 files][ 44.2 KiB/ 44.2 KiB] 99% Done - [34/38 files][ 44.2 KiB/ 44.2 KiB] 99% Done - [35/38 files][ 44.2 KiB/ 44.2 KiB] 99% Done - [36/38 files][ 44.2 KiB/ 44.2 KiB] 99% Done - [37/38 files][ 44.2 KiB/ 44.2 KiB] 99% Done - [38/38 files][ 44.2 KiB/ 44.2 KiB] 100% Done Step #11: Operation completed over 38 objects/44.2 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 459.0 B] / [1 files][ 459.0 B/ 459.0 B] Step #12: Operation completed over 1 objects/459.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 303 0 0 100 303 0 1553 --:--:-- --:--:-- --:--:-- 1561 Finished Step #13 PUSH DONE