starting build "1dc8e8c6-ec14-463c-8ff1-39db0c65b001" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/11 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: cf863423b736: Pulling fs layer Step #1: ce28af4871ad: Pulling fs layer Step #1: 7e07cc08bf6a: Pulling fs layer Step #1: 61f02e701d88: Pulling fs layer Step #1: cabf44af7586: Pulling fs layer Step #1: 4c6c0205f61d: Pulling fs layer Step #1: cfec7c6ccc30: Pulling fs layer Step #1: 2a71240ce0ea: Pulling fs layer Step #1: ab031c181d1a: Pulling fs layer Step #1: 9cf568902ac1: Pulling fs layer Step #1: b449cb17fc5c: Pulling fs layer Step #1: a4da7e0884e0: Pulling fs layer Step #1: 451a2156ad2a: Pulling fs layer Step #1: 7e07cc08bf6a: Waiting Step #1: 61f02e701d88: Waiting Step #1: ab031c181d1a: Waiting Step #1: a4da7e0884e0: Waiting Step #1: a55dfec91d06: Pulling fs layer Step #1: a87b8516d4f2: Pulling fs layer Step #1: c2c7383bfc44: Pulling fs layer Step #1: 9cf568902ac1: Waiting Step #1: a55dfec91d06: Waiting Step #1: aa734cfd189d: Pulling fs layer Step #1: 1abade1c3cc5: Pulling fs layer Step #1: d898513354a6: Pulling fs layer Step #1: ef11d9a84746: Pulling fs layer Step #1: 62525aaca5ea: Pulling fs layer Step #1: a458110b7dbb: Pulling fs layer Step #1: 923a5bb63ee3: Pulling fs layer Step #1: a968bba4c365: Pulling fs layer Step #1: 29b4e3fa9624: Pulling fs layer Step #1: d2a93e27645d: Pulling fs layer Step #1: 31fa6eb0773a: Pulling fs layer Step #1: f4d00e4c4073: Pulling fs layer Step #1: 8bc5d331f2b7: Pulling fs layer Step #1: b6dba0f21776: Pulling fs layer Step #1: 33425f0712a5: Pulling fs layer Step #1: c53c16d9c34f: Pulling fs layer Step #1: 4a9dcd08837b: Pulling fs layer Step #1: d5ec3bcf1431: Pulling fs layer Step #1: a458110b7dbb: Waiting Step #1: 923a5bb63ee3: Waiting Step #1: a968bba4c365: Waiting Step #1: 29b4e3fa9624: Waiting Step #1: d2a93e27645d: Waiting Step #1: 31fa6eb0773a: Waiting Step #1: f4d00e4c4073: Waiting Step #1: 8bc5d331f2b7: Waiting Step #1: b6dba0f21776: Waiting Step #1: d5ec3bcf1431: Waiting Step #1: 1abade1c3cc5: Waiting Step #1: 4a9dcd08837b: Waiting Step #1: cabf44af7586: Waiting Step #1: aa734cfd189d: Waiting Step #1: a87b8516d4f2: Waiting Step #1: 33425f0712a5: Waiting Step #1: 2a71240ce0ea: Waiting Step #1: ce28af4871ad: Verifying Checksum Step #1: ce28af4871ad: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 61f02e701d88: Verifying Checksum Step #1: 61f02e701d88: Download complete Step #1: cabf44af7586: Verifying Checksum Step #1: cabf44af7586: Download complete Step #1: 7e07cc08bf6a: Verifying Checksum Step #1: 7e07cc08bf6a: Download complete Step #1: cfec7c6ccc30: Download complete Step #1: cf863423b736: Verifying Checksum Step #1: cf863423b736: Download complete Step #1: 2a71240ce0ea: Verifying Checksum Step #1: 2a71240ce0ea: Download complete Step #1: b549f31133a9: Pull complete Step #1: 9cf568902ac1: Verifying Checksum Step #1: 9cf568902ac1: Download complete Step #1: b449cb17fc5c: Download complete Step #1: a4da7e0884e0: Verifying Checksum Step #1: a4da7e0884e0: Download complete Step #1: 451a2156ad2a: Verifying Checksum Step #1: 451a2156ad2a: Download complete Step #1: a55dfec91d06: Download complete Step #1: a87b8516d4f2: Verifying Checksum Step #1: a87b8516d4f2: Download complete Step #1: c2c7383bfc44: Verifying Checksum Step #1: c2c7383bfc44: Download complete Step #1: ab031c181d1a: Verifying Checksum Step #1: ab031c181d1a: Download complete Step #1: aa734cfd189d: Verifying Checksum Step #1: aa734cfd189d: Download complete Step #1: 1abade1c3cc5: Verifying Checksum Step #1: 1abade1c3cc5: Download complete Step #1: d898513354a6: Verifying Checksum Step #1: d898513354a6: Download complete Step #1: ef11d9a84746: Download complete Step #1: 62525aaca5ea: Verifying Checksum Step #1: 62525aaca5ea: Download complete Step #1: a458110b7dbb: Download complete Step #1: 923a5bb63ee3: Verifying Checksum Step #1: 923a5bb63ee3: Download complete Step #1: a968bba4c365: Verifying Checksum Step #1: a968bba4c365: Download complete Step #1: 4c6c0205f61d: Verifying Checksum Step #1: 4c6c0205f61d: Download complete Step #1: 29b4e3fa9624: Verifying Checksum Step #1: 29b4e3fa9624: Download complete Step #1: d2a93e27645d: Verifying Checksum Step #1: d2a93e27645d: Download complete Step #1: 31fa6eb0773a: Verifying Checksum Step #1: 31fa6eb0773a: Download complete Step #1: 8bc5d331f2b7: Verifying Checksum Step #1: 8bc5d331f2b7: Download complete Step #1: f4d00e4c4073: Verifying Checksum Step #1: f4d00e4c4073: Download complete Step #1: b6dba0f21776: Download complete Step #1: 33425f0712a5: Verifying Checksum Step #1: 33425f0712a5: Download complete Step #1: c53c16d9c34f: Verifying Checksum Step #1: c53c16d9c34f: Download complete Step #1: d5ec3bcf1431: Download complete Step #1: cf863423b736: Pull complete Step #1: ce28af4871ad: Pull complete Step #1: 7e07cc08bf6a: Pull complete Step #1: 4a9dcd08837b: Verifying Checksum Step #1: 4a9dcd08837b: Download complete Step #1: 61f02e701d88: Pull complete Step #1: cabf44af7586: Pull complete Step #1: 4c6c0205f61d: Pull complete Step #1: cfec7c6ccc30: Pull complete Step #1: 2a71240ce0ea: Pull complete Step #1: ab031c181d1a: Pull complete Step #1: 9cf568902ac1: Pull complete Step #1: b449cb17fc5c: Pull complete Step #1: a4da7e0884e0: Pull complete Step #1: 451a2156ad2a: Pull complete Step #1: a55dfec91d06: Pull complete Step #1: a87b8516d4f2: Pull complete Step #1: c2c7383bfc44: Pull complete Step #1: aa734cfd189d: Pull complete Step #1: 1abade1c3cc5: Pull complete Step #1: d898513354a6: Pull complete Step #1: ef11d9a84746: Pull complete Step #1: 62525aaca5ea: Pull complete Step #1: a458110b7dbb: Pull complete Step #1: 923a5bb63ee3: Pull complete Step #1: a968bba4c365: Pull complete Step #1: 29b4e3fa9624: Pull complete Step #1: d2a93e27645d: Pull complete Step #1: 31fa6eb0773a: Pull complete Step #1: f4d00e4c4073: Pull complete Step #1: 8bc5d331f2b7: Pull complete Step #1: b6dba0f21776: Pull complete Step #1: 33425f0712a5: Pull complete Step #1: c53c16d9c34f: Pull complete Step #1: 4a9dcd08837b: Pull complete Step #1: d5ec3bcf1431: Pull complete Step #1: Digest: sha256:37d560af1d31ae8d339902acaedb8eb6fdf3f04469706f39e3bbea44fa3fdeec Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 9992b1f39603 Step #1: Step 2/11 : RUN apt-get update && apt-get install -y wget zip Step #1: ---> Running in 70130e49921b Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (192 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: zip is already the newest version (3.0-11build1). Step #1: wget is already the newest version (1.20.3-1ubuntu2.1). Step #1: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #1: Removing intermediate container 70130e49921b Step #1: ---> 9d98066c23eb Step #1: Step 3/11 : RUN git clone --depth 1 https://github.com/argoproj/argo-cd Step #1: ---> Running in 7f414a1e9227 Step #1: Cloning into 'argo-cd'... Step #1: Removing intermediate container 7f414a1e9227 Step #1: ---> 3caa6baa2892 Step #1: Step 4/11 : RUN git clone --depth 1 https://github.com/argoproj/argo-workflows Step #1: ---> Running in 6120f7b2fe67 Step #1: Cloning into 'argo-workflows'... Step #1: Removing intermediate container 6120f7b2fe67 Step #1: ---> d175fa056326 Step #1: Step 5/11 : RUN git clone --depth 1 https://github.com/argoproj/argo-events Step #1: ---> Running in 8cf9d7bc07fd Step #1: Cloning into 'argo-events'... Step #1: Removing intermediate container 8cf9d7bc07fd Step #1: ---> 204774c5964d Step #1: Step 6/11 : RUN git clone --depth 1 https://github.com/argoproj/gitops-engine Step #1: ---> Running in ada4b672c371 Step #1: Cloning into 'gitops-engine'... Step #1: Removing intermediate container ada4b672c371 Step #1: ---> 6a152682ed33 Step #1: Step 7/11 : RUN git clone --depth 1 https://github.com/argoproj/argo-rollouts Step #1: ---> Running in d4d80328afca Step #1: Cloning into 'argo-rollouts'... Step #1: Removing intermediate container d4d80328afca Step #1: ---> 775a9036258e Step #1: Step 8/11 : RUN git clone --depth 1 https://github.com/cncf/cncf-fuzzing Step #1: ---> Running in 69083e882282 Step #1: Cloning into 'cncf-fuzzing'... Step #1: Removing intermediate container 69083e882282 Step #1: ---> e0098ce07d03 Step #1: Step 9/11 : RUN wget https://github.com/facebook/zstd/releases/download/v1.4.2/zstd-1.4.2.tar.gz && tar xzf zstd-1.4.2.tar.gz && cd zstd-1.4.2 && export CC=clang && export CXX=clang++ && export CXXFLAGS="-stdlib=libc++" && make -j$(nproc) Step #1: ---> Running in a13db0c72ded Step #1: --2024-09-19 06:13:07-- https://github.com/facebook/zstd/releases/download/v1.4.2/zstd-1.4.2.tar.gz Step #1: Resolving github.com (github.com)... 140.82.114.3 Step #1: Connecting to github.com (github.com)|140.82.114.3|:443... connected. Step #1: HTTP request sent, awaiting response... 302 Found Step #1: Location: https://objects.githubusercontent.com/github-production-release-asset-2e65be/29759715/be51eb80-aeee-11e9-9455-c17f2f8684ba?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240919%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240919T061307Z&X-Amz-Expires=300&X-Amz-Signature=4bc3e7c49ef0a4e18dc7be7265b4b874eef63403382f5ae6da30ae9a66bbf069&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=29759715&response-content-disposition=attachment%3B%20filename%3Dzstd-1.4.2.tar.gz&response-content-type=application%2Foctet-stream [following] Step #1: --2024-09-19 06:13:07-- https://objects.githubusercontent.com/github-production-release-asset-2e65be/29759715/be51eb80-aeee-11e9-9455-c17f2f8684ba?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240919%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240919T061307Z&X-Amz-Expires=300&X-Amz-Signature=4bc3e7c49ef0a4e18dc7be7265b4b874eef63403382f5ae6da30ae9a66bbf069&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=29759715&response-content-disposition=attachment%3B%20filename%3Dzstd-1.4.2.tar.gz&response-content-type=application%2Foctet-stream Step #1: Resolving objects.githubusercontent.com (objects.githubusercontent.com)... 185.199.110.133, 185.199.109.133, 185.199.108.133, ... Step #1: Connecting to objects.githubusercontent.com (objects.githubusercontent.com)|185.199.110.133|:443... connected. Step #1: HTTP request sent, awaiting response... 200 OK Step #1: Length: 1896786 (1.8M) [application/octet-stream] Step #1: Saving to: 'zstd-1.4.2.tar.gz' Step #1:  Step #1: 0K .......... .......... .......... .......... .......... 2% 4.61M 0s Step #1: 50K .......... .......... .......... .......... .......... 5% 5.04M 0s Step #1: 100K .......... .......... .......... .......... .......... 8% 19.4M 0s Step #1: 150K .......... .......... .......... .......... .......... 10% 29.3M 0s Step #1: 200K .......... .......... .......... .......... .......... 13% 8.37M 0s Step #1: 250K .......... .......... .......... .......... .......... 16% 31.6M 0s Step #1: 300K .......... .......... .......... .......... .......... 18% 35.1M 0s Step #1: 350K .......... .......... .......... .......... .......... 21% 76.1M 0s Step #1: 400K .......... .......... .......... .......... .......... 24% 32.1M 0s Step #1: 450K .......... .......... .......... .......... .......... 26% 9.98M 0s Step #1: 500K .......... .......... .......... .......... .......... 29% 84.8M 0s Step #1: 550K .......... .......... .......... .......... .......... 32% 37.7M 0s Step #1: 600K .......... .......... .......... .......... .......... 35% 53.2M 0s Step #1: 650K .......... .......... .......... .......... .......... 37% 165M 0s Step #1: 700K .......... .......... .......... .......... .......... 40% 71.4M 0s Step #1: 750K .......... .......... .......... .......... .......... 43% 234M 0s Step #1: 800K .......... .......... .......... .......... .......... 45% 79.4M 0s Step #1: 850K .......... .......... .......... .......... .......... 48% 74.6M 0s Step #1: 900K .......... .......... .......... .......... .......... 51% 105M 0s Step #1: 950K .......... .......... .......... .......... .......... 53% 216M 0s Step #1: 1000K .......... .......... .......... .......... .......... 56% 10.9M 0s Step #1: 1050K .......... .......... .......... .......... .......... 59% 240M 0s Step #1: 1100K .......... .......... .......... .......... .......... 62% 42.4M 0s Step #1: 1150K .......... .......... .......... .......... .......... 64% 89.3M 0s Step #1: 1200K .......... .......... .......... .......... .......... 67% 224M 0s Step #1: 1250K .......... .......... .......... .......... .......... 70% 75.9M 0s Step #1: 1300K .......... .......... .......... .......... .......... 72% 197M 0s Step #1: 1350K .......... .......... .......... .......... .......... 75% 245M 0s Step #1: 1400K .......... .......... .......... .......... .......... 78% 243M 0s Step #1: 1450K .......... .......... .......... .......... .......... 80% 222M 0s Step #1: 1500K .......... .......... .......... .......... .......... 83% 137M 0s Step #1: 1550K .......... .......... .......... .......... .......... 86% 227M 0s Step #1: 1600K .......... .......... .......... .......... .......... 89% 180M 0s Step #1: 1650K .......... .......... .......... .......... .......... 91% 239M 0s Step #1: 1700K .......... .......... .......... .......... .......... 94% 131M 0s Step #1: 1750K .......... .......... .......... .......... .......... 97% 186M 0s Step #1: 1800K .......... .......... .......... .......... .......... 99% 240M 0s Step #1: 1850K ..      100% 60.8M=0.06s Step #1: Step #1: 2024-09-19 06:13:08 (32.2 MB/s) - 'zstd-1.4.2.tar.gz' saved [1896786/1896786] Step #1: Step #1: make[1]: Entering directory '/src/zstd-1.4.2/lib' Step #1: make[1]: Entering directory '/src/zstd-1.4.2/programs' Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o common/debug.o common/debug.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o common/entropy_common.o common/entropy_common.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o common/error_private.o common/error_private.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o common/fse_decompress.o common/fse_decompress.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o common/pool.o common/pool.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o common/threading.o common/threading.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o common/xxhash.o common/xxhash.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o common/zstd_common.o common/zstd_common.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/fse_compress.o compress/fse_compress.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/hist.o compress/hist.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/huf_compress.o compress/huf_compress.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/zstd_compress.o compress/zstd_compress.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/zstd_compress_literals.o compress/zstd_compress_literals.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/zstd_compress_sequences.o compress/zstd_compress_sequences.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/zstd_double_fast.o compress/zstd_double_fast.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/zstd_fast.o compress/zstd_fast.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/zstd_lazy.o compress/zstd_lazy.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/zstd_ldm.o compress/zstd_ldm.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/zstd_opt.o compress/zstd_opt.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o compress/zstdmt_compress.o compress/zstdmt_compress.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o decompress/huf_decompress.o decompress/huf_decompress.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o decompress/zstd_ddict.o decompress/zstd_ddict.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o decompress/zstd_decompress.o decompress/zstd_decompress.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o decompress/zstd_decompress_block.o decompress/zstd_decompress_block.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o deprecated/zbuff_common.o deprecated/zbuff_common.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o deprecated/zbuff_compress.o deprecated/zbuff_compress.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o deprecated/zbuff_decompress.o deprecated/zbuff_decompress.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o dictBuilder/cover.o dictBuilder/cover.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o dictBuilder/divsufsort.o dictBuilder/divsufsort.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o dictBuilder/fastcover.o dictBuilder/fastcover.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o dictBuilder/zdict.o dictBuilder/zdict.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o legacy/zstd_v05.o legacy/zstd_v05.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o legacy/zstd_v06.o legacy/zstd_v06.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -I. -I./common -DXXH_NAMESPACE=ZSTD_ -I./legacy -DZSTD_LEGACY_SUPPORT=5 -c -o legacy/zstd_v07.o legacy/zstd_v07.c Step #1: compiling dynamic library 1.4.2 Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -DBACKTRACE_ENABLE=0 -I../lib -I../lib/common -I../lib/compress -I../lib/dictBuilder -DXXH_NAMESPACE=ZSTD_ -I../lib/legacy -DZSTD_MULTITHREAD -DZSTD_LEGACY_SUPPORT=5 -c -o zstdcli.o zstdcli.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -DBACKTRACE_ENABLE=0 -I../lib -I../lib/common -I../lib/compress -I../lib/dictBuilder -DXXH_NAMESPACE=ZSTD_ -I../lib/legacy -DZSTD_MULTITHREAD -DZSTD_LEGACY_SUPPORT=5 -c -o util.o util.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -DBACKTRACE_ENABLE=0 -I../lib -I../lib/common -I../lib/compress -I../lib/dictBuilder -DXXH_NAMESPACE=ZSTD_ -I../lib/legacy -DZSTD_MULTITHREAD -DZSTD_LEGACY_SUPPORT=5 -c -o timefn.o timefn.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -DBACKTRACE_ENABLE=0 -I../lib -I../lib/common -I../lib/compress -I../lib/dictBuilder -DXXH_NAMESPACE=ZSTD_ -I../lib/legacy -DZSTD_MULTITHREAD -DZSTD_LEGACY_SUPPORT=5 -c -o fileio.o fileio.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -DBACKTRACE_ENABLE=0 -I../lib -I../lib/common -I../lib/compress -I../lib/dictBuilder -DXXH_NAMESPACE=ZSTD_ -I../lib/legacy -DZSTD_MULTITHREAD -DZSTD_LEGACY_SUPPORT=5 -c -o benchfn.o benchfn.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -DBACKTRACE_ENABLE=0 -I../lib -I../lib/common -I../lib/compress -I../lib/dictBuilder -DXXH_NAMESPACE=ZSTD_ -I../lib/legacy -DZSTD_MULTITHREAD -DZSTD_LEGACY_SUPPORT=5 -c -o benchzstd.o benchzstd.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -DBACKTRACE_ENABLE=0 -I../lib -I../lib/common -I../lib/compress -I../lib/dictBuilder -DXXH_NAMESPACE=ZSTD_ -I../lib/legacy -DZSTD_MULTITHREAD -DZSTD_LEGACY_SUPPORT=5 -c -o datagen.o datagen.c Step #1: clang -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -DBACKTRACE_ENABLE=0 -I../lib -I../lib/common -I../lib/compress -I../lib/dictBuilder -DXXH_NAMESPACE=ZSTD_ -I../lib/legacy -DZSTD_MULTITHREAD -DZSTD_LEGACY_SUPPORT=5 -c -o dibio.o dibio.c Step #1: ==> building with threading support Step #1: ==> no zlib, building zstd without .gz support Step #1: ==> no liblzma, building zstd without .xz/.lzma support Step #1: ==> no liblz4, building zstd without .lz4 support Step #1: clang -I../lib -I../lib/common -I../lib/compress -I../lib/dictBuilder -DXXH_NAMESPACE=ZSTD_ -I../lib/legacy -DZSTD_MULTITHREAD -DZSTD_LEGACY_SUPPORT=5 -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -DBACKTRACE_ENABLE=0 -pthread ../lib/common/debug.c ../lib/common/entropy_common.c ../lib/common/error_private.c ../lib/common/fse_decompress.c ../lib/common/pool.c ../lib/common/threading.c ../lib/common/xxhash.c ../lib/common/zstd_common.c ../lib/compress/fse_compress.c ../lib/compress/hist.c ../lib/compress/huf_compress.c ../lib/compress/zstd_compress.c ../lib/compress/zstd_compress_literals.c ../lib/compress/zstd_compress_sequences.c ../lib/compress/zstd_double_fast.c ../lib/compress/zstd_fast.c ../lib/compress/zstd_lazy.c ../lib/compress/zstd_ldm.c ../lib/compress/zstd_opt.c ../lib/compress/zstdmt_compress.c ../lib/decompress/huf_decompress.c ../lib/decompress/zstd_ddict.c ../lib/decompress/zstd_decompress.c ../lib/decompress/zstd_decompress_block.c ../lib/dictBuilder/cover.c ../lib/dictBuilder/divsufsort.c ../lib/dictBuilder/fastcover.c ../lib/dictBuilder/zdict.c ../lib/legacy/zstd_v05.c ../lib/legacy/zstd_v06.c ../lib/legacy/zstd_v07.c zstdcli.o util.o timefn.o fileio.o benchfn.o benchzstd.o datagen.o dibio.o -o zstd -pthread Step #1: compiling static library Step #1: creating versioned links Step #1: make[1]: Leaving directory '/src/zstd-1.4.2/lib' Step #1: make[1]: Leaving directory '/src/zstd-1.4.2/programs' Step #1: cp programs/zstd . Step #1: Removing intermediate container a13db0c72ded Step #1: ---> dfc453a5780a Step #1: Step 10/11 : COPY build.sh $SRC/ Step #1: ---> 120961440856 Step #1: Step 11/11 : WORKDIR $SRC/argo-cd Step #1: ---> Running in 76d978bd182a Step #1: Removing intermediate container 76d978bd182a Step #1: ---> a7dc34c965ca Step #1: Successfully built a7dc34c965ca Step #1: Successfully tagged gcr.io/oss-fuzz/argo:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/argo Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filee3zTjN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/cncf/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=370b1fa1da1bdd05d0228d715872b26da1d9d301 Step #2 - "srcmap": + jq_inplace /tmp/filee3zTjN '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "370b1fa1da1bdd05d0228d715872b26da1d9d301" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filep3E0Qc Step #2 - "srcmap": + cat /tmp/filee3zTjN Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "370b1fa1da1bdd05d0228d715872b26da1d9d301" }' Step #2 - "srcmap": + mv /tmp/filep3E0Qc /tmp/filee3zTjN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/argo-rollouts/.git Step #2 - "srcmap": + GIT_DIR=/src/argo-rollouts Step #2 - "srcmap": + cd /src/argo-rollouts Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/argoproj/argo-rollouts Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=00e39b114849010dd96221a8db441d58e860d4d0 Step #2 - "srcmap": + jq_inplace /tmp/filee3zTjN '."/src/argo-rollouts" = { type: "git", url: "https://github.com/argoproj/argo-rollouts", rev: "00e39b114849010dd96221a8db441d58e860d4d0" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileBPrOdK Step #2 - "srcmap": + cat /tmp/filee3zTjN Step #2 - "srcmap": + jq '."/src/argo-rollouts" = { type: "git", url: "https://github.com/argoproj/argo-rollouts", rev: "00e39b114849010dd96221a8db441d58e860d4d0" }' Step #2 - "srcmap": + mv /tmp/fileBPrOdK /tmp/filee3zTjN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gitops-engine/.git Step #2 - "srcmap": + GIT_DIR=/src/gitops-engine Step #2 - "srcmap": + cd /src/gitops-engine Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/argoproj/gitops-engine Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=72bcdda3f0a5b80432d9f72e5b30827a530ac349 Step #2 - "srcmap": + jq_inplace /tmp/filee3zTjN '."/src/gitops-engine" = { type: "git", url: "https://github.com/argoproj/gitops-engine", rev: "72bcdda3f0a5b80432d9f72e5b30827a530ac349" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filel2cM7d Step #2 - "srcmap": + cat /tmp/filee3zTjN Step #2 - "srcmap": + jq '."/src/gitops-engine" = { type: "git", url: "https://github.com/argoproj/gitops-engine", rev: "72bcdda3f0a5b80432d9f72e5b30827a530ac349" }' Step #2 - "srcmap": + mv /tmp/filel2cM7d /tmp/filee3zTjN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/argo-events/.git Step #2 - "srcmap": + GIT_DIR=/src/argo-events Step #2 - "srcmap": + cd /src/argo-events Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/argoproj/argo-events Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d679728190135fedb1f09f68b14213d782b0a7f3 Step #2 - "srcmap": + jq_inplace /tmp/filee3zTjN '."/src/argo-events" = { type: "git", url: "https://github.com/argoproj/argo-events", rev: "d679728190135fedb1f09f68b14213d782b0a7f3" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filewGP1VJ Step #2 - "srcmap": + cat /tmp/filee3zTjN Step #2 - "srcmap": + jq '."/src/argo-events" = { type: "git", url: "https://github.com/argoproj/argo-events", rev: "d679728190135fedb1f09f68b14213d782b0a7f3" }' Step #2 - "srcmap": + mv /tmp/filewGP1VJ /tmp/filee3zTjN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/argo-workflows/.git Step #2 - "srcmap": + GIT_DIR=/src/argo-workflows Step #2 - "srcmap": + cd /src/argo-workflows Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/argoproj/argo-workflows Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=53e5461d9e98150e047004f7b63a958236b4176b Step #2 - "srcmap": + jq_inplace /tmp/filee3zTjN '."/src/argo-workflows" = { type: "git", url: "https://github.com/argoproj/argo-workflows", rev: "53e5461d9e98150e047004f7b63a958236b4176b" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileuRDWyi Step #2 - "srcmap": + cat /tmp/filee3zTjN Step #2 - "srcmap": + jq '."/src/argo-workflows" = { type: "git", url: "https://github.com/argoproj/argo-workflows", rev: "53e5461d9e98150e047004f7b63a958236b4176b" }' Step #2 - "srcmap": + mv /tmp/fileuRDWyi /tmp/filee3zTjN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/argo-cd/.git Step #2 - "srcmap": + GIT_DIR=/src/argo-cd Step #2 - "srcmap": + cd /src/argo-cd Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/argoproj/argo-cd Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=f64db6dba7aec61783b0a0d0e403f1a02b674635 Step #2 - "srcmap": + jq_inplace /tmp/filee3zTjN '."/src/argo-cd" = { type: "git", url: "https://github.com/argoproj/argo-cd", rev: "f64db6dba7aec61783b0a0d0e403f1a02b674635" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileMjT6PQ Step #2 - "srcmap": + cat /tmp/filee3zTjN Step #2 - "srcmap": + jq '."/src/argo-cd" = { type: "git", url: "https://github.com/argoproj/argo-cd", rev: "f64db6dba7aec61783b0a0d0e403f1a02b674635" }' Step #2 - "srcmap": + mv /tmp/fileMjT6PQ /tmp/filee3zTjN Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filee3zTjN Step #2 - "srcmap": + rm /tmp/filee3zTjN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/cncf/cncf-fuzzing", Step #2 - "srcmap": "rev": "370b1fa1da1bdd05d0228d715872b26da1d9d301" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/argo-rollouts": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/argoproj/argo-rollouts", Step #2 - "srcmap": "rev": "00e39b114849010dd96221a8db441d58e860d4d0" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/gitops-engine": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/argoproj/gitops-engine", Step #2 - "srcmap": "rev": "72bcdda3f0a5b80432d9f72e5b30827a530ac349" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/argo-events": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/argoproj/argo-events", Step #2 - "srcmap": "rev": "d679728190135fedb1f09f68b14213d782b0a7f3" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/argo-workflows": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/argoproj/argo-workflows", Step #2 - "srcmap": "rev": "53e5461d9e98150e047004f7b63a958236b4176b" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/argo-cd": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/argoproj/argo-cd", Step #2 - "srcmap": "rev": "f64db6dba7aec61783b0a0d0e403f1a02b674635" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/cncf-fuzzing/projects/argo/build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/gitops-engine/pkg/diff: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiextensions-apiserver v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubernetes v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubectl v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch v4.12.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.6.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.34.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/mock v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cli-runtime v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-aggregator v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/kustomize/api v0.17.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/kustomize/kyaml v0.17.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/term v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.33.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jonboulle/clockwork v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-helpers v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/imdario/mergo v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.22.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gregjones/httpcache v0.0.0-20180305231024-9cad4c3443a7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/creack/pty v1.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/chai2010/gettext-go v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/MakeNowJust/heredoc v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/go-wordwrap v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/exponent-io/jsonpath v0.0.0-20151013193312-d6023ce2651d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/camelcase v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lithammer/dedent v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.19.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/btree v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver/v4 v4.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-errors/errors v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sergi/go-diff v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/spdystream v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xlab/treeprint v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20240525223248-4bfdf5a9a2af Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.starlark.net v0.0.0-20230525235612-a134d8f9ddca Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiserver v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.19.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/reference v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.55.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-fuzz-headers Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers v0.0.0-20210319161527-f761c2329661 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-fuzz-headers in github.com/AdamKorcz/go-fuzz-headers v0.0.0-20210319161527-f761c2329661 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/gitops-engine/pkg/diff Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/gitops-engine/pkg/diff Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.22.2 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/argoproj/pkg v0.13.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubernetes v1.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20230726121419-3b25d923346b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/servicemeshinterface/smi-sdk-go v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver v3.5.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spaceapegames/go-wavefront v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/influxdata/influxdb-client-go/v2 v2.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway v1.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/code-generator v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiextensions-apiserver v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/newrelic/newrelic-client-go/v2 v2.45.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/machinebox/graphql v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tj/assert v0.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20231010175941-2dd684a91f00 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/smithy-go v1.20.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bombsimon/logrusr/v4 v4.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.27.33 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-plugin v1.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.30.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.110.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/cloudwatch v1.40.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/argoproj/notifications-engine v0.4.1-0.20240219110818-7a069766e954 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240604185151-ef581f913117 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cli-runtime v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.66.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20240227224415-6ceb2ff114de Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubectl v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.47.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common/sigv4 v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/antonmedv/expr v1.15.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/glog v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/juju/ansiterm v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch/v5 v5.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/elasticloadbalancingv2 v1.31.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch v5.6.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/influxdata/line-protocol v0.0.0-20210922203350-b1ad95c89adf Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/matryer/is v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240604185151-ef581f913117 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v0.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/yamux v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/go-testing-interface v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/oklog/run v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.17.32 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.22.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.26.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.30.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/oapi-codegen/runtime v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.17 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.22.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/valyala/fasttemplate v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiserver v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/imdario/mergo v0.3.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/PagerDuty/go-pagerduty v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/RocketChat/Rocket.Chat.Go.SDK v0.0.0-20220708192748-b73dcb041214 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bradleyfalzon/ghinstallation/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sqs v1.29.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/OvyFlash/telegram-bot-api/v5 v5.0.0-20240108230938-63e5c59035bf Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-github/v41 v41.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gregdel/pushover v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opsgenie/opsgenie-go-sdk-v2 v1.2.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/slack-go/slack v0.12.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/whilp/git-urls v0.0.0-20191001220047-6db9661140c0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gomodules.xyz/notify v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/api v0.162.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/soheilhy/cmux v0.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ghodss/yaml v1.0.1-0.20190212211648-25d852aebe32 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-colorable v0.1.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-isatty v0.0.19 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-querystring v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tomnomnom/linkheader v0.0.0-20180905144013-02ca5825eb80 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/valyala/fastjson v1.6.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go v1.44.116 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.17 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/sprig/v3 v3.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/term v0.0.0-20221205130635-1aeaba878587 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/kustomize/api v0.13.5-0.20230601165947-6ce0bf390ce3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/kustomize/kyaml v0.14.3-0.20230601165947-6ce0bf390ce3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/elazarl/goproxy v0.0.0-20231117061959-7cc037d33fb5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jhump/protoreflect v1.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.19 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/valyala/bytebufferpool v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/apapsch/go-jsonmerge/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-github/v53 v53.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gomodules.xyz/envconfig v1.3.1-0.20190308184047-426f31af0d45 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/gomail.v2 v2.0.0-20160411212932-81ebce5c23df Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lunixbochs/vtclean v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-test/deep v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/goutils v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/semver/v3 v3.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/huandu/xstrings v1.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/copystructure v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shopspring/decimal v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/btree v1.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jpillora/backoff v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/exponent-io/jsonpath v0.0.0-20210407135951-1de76d718b3f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Jeffail/gabs v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gopackage/ddp v0.0.0-20170117053602-652027933df4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sony/sonyflake v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/alexcesaro/quotedprintable.v3 v3.0.0-20150716171945-2caba252f4dc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/reflectwalk v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sergi/go-diff v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/spdystream v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bufbuild/protocompile v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ProtonMail/go-crypto v0.0.0-20230217124315-7d5c6f04bbb8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudflare/circl v1.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20210720184732-4bb14d4b1be1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cluster-bootstrap v0.25.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubelet v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-helpers v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cloud-provider v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/controller-manager v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/natefinch/lumberjack.v2 v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/cel-go v0.17.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/apiserver-network-proxy/konnectivity-client v0.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/client/pkg/v3 v3.5.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/client/v3 v3.5.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.47.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.47.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kms v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/api/v3 v3.5.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/server/v3 v3.5.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/NYTimes/gziphandler v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/zapr v1.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/atomic v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/benbjohnson/clock v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20240423153145-555b57ec207b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stoewer/go-strcase v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-semver v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/antlr/antlr4/runtime/Go/antlr/v4 v4.0.0-20230305170008-8188dc5388df Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20220722155223-a9213eeb770e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tmc/grpc-websocket-proxy v0.0.0-20220101234140-673ab2c3ae75 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/bbolt v1.3.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/raft/v3 v3.5.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dustin/go-humanize v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/pkg/v3 v3.5.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/client/v2 v2.305.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/s2a-go v0.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/gax-go/v2 v2.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-rollouts/analysis: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdaLogics/go-fuzz-headers Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdaLogics/go-fuzz-headers in github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-rollouts/analysis Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-rollouts/analysis Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-rollouts/metricproviders/webmetric: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-rollouts/metricproviders/webmetric Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-rollouts/metricproviders/webmetric Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-rollouts/metricproviders/prometheus: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-rollouts/metricproviders/prometheus Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-rollouts/metricproviders/prometheus Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-rollouts/metricproviders/kayenta: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-rollouts/metricproviders/kayenta Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-rollouts/metricproviders/kayenta Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/eventsources/sources/stripe: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudevents/sdk-go/v2 v2.15.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/controller-runtime v0.17.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20221103172237-443f56ff4ba8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.29.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nats.go v1.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/graft v0.0.0-20220215174245-93d18541496f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.29.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/IBM/sarama v1.43.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Knetic/govaluate v3.0.1-0.20171022003610-9aa49832a739+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/stan.go v0.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/glob v0.2.4-0.20181002190808-e7a84e9525fe Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/hashstructure/v2 v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/smartystreets/goconvey v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/robfig/cron/v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-event-hubs-go/v3 v3.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rabbitmq/amqp091-go v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go v1.47.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xdg-go/scram v1.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ktrysmt/go-bitbucket v0.9.80 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/storage/azqueue v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/messaging/azservicebus v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go v65.0.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/doublerebel/bellows v0.0.0-20160303004610-f177d92a03d3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/mux v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.48.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.34.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gfleury/go-bitbucket-v1 v0.0.0-20210707202713-7d616f7c18ac Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emitter-io/go/v2 v2.0.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/radovskyb/watcher v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20240416160154-fe59bbe5cc7f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/andygrunwald/go-gerrit v0.0.0-20230325081502-da63a5c62d80 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go v0.113.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/pubsub v1.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.63.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xanzy/go-gitlab v0.107.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/api v0.181.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bradleyfalzon/ghinstallation/v2 v2.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-github/v50 v50.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/colinmarc/hdfs v1.1.4-0.20180802165501-48eb8d6c34a9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/jcmturner/gokrb5.v5 v5.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/apache/openwhisk-client-go v0.0.0-20190915054138-716c6f973eb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/apache/pulsar-client-go v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/ratelimit v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/semver/v3 v3.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/huandu/xstrings v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shopspring/decimal v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/minio-go/v7 v7.0.74 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stripe/stripe-go v70.15.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sagikazarmark/locafero v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sagikazarmark/slog-shim v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/afero v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/oliveagle/jsonpath v0.0.0-20180606110733-2e52cf6e6852 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nuid v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nats-streaming-server v0.24.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nats-server/v2 v2.9.23 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xdg-go/pbkdf2 v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xdg-go/stringprep v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/eclipse/paho.mqtt.golang v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-amqp-common-go/v4 v4.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-amqp v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest v0.11.28 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/date v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/to v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/devigned/tab v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.17.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nkeys v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/inflect v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jtolds/gls v4.20.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/smartystreets/assertions v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/eapache/go-resiliency v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest v14.2.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/eapache/go-xerial-snappy v0.0.0-20230731223053-c322873962e3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/eapache/queue v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gofork v1.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gokrb5/v8 v8.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pierrec/lz4/v4 v4.1.21 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rcrowley/go-metrics v0.0.0-20201227073835-cf1acfcdf475 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch/v5 v5.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nsqio/go-nsq v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-redis/redis/v8 v8.11.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/gjson v1.17.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/sftp v1.13.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/slack-go/slack v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/joho/godotenv v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fortytw2/leaktest v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-resty/resty/v2 v2.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/joncalhoun/qson v0.0.0-20200422171543-84433dcd3da0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ahmetb/gen-crd-api-reference-docs v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-swagger/go-swagger v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/code-generator v0.29.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/controller-tools v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blushft/go-diagrams v0.0.0-20201006005127-c78c821223d9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt v3.2.2+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-github/v62 v62.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/iam v1.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/gax-go/v2 v2.12.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.16.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/kms v1.15.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ProtonMail/go-crypto v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240513163218-0867130af1f8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20240401170217-c3f982113cda Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/itchyny/gojq v0.12.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yuin/gopher-lua v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/sjson v1.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/argoproj/notifications-engine v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hamba/avro v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/riferrei/srclient v0.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/benbjohnson/clock v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-git/go-git/v5 v5.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gavv/httpexpect/v2 v2.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hokaccha/go-prettyjson v0.0.0-20211117102719-0474bc63780f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sourcegraph/conc v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/hcl v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/ini.v1 v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/magiconair/properties v1.8.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-ini/ini v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/goccy/go-json v0.10.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/md5-simd v1.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bits-and-blooms/bitset v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/linkedin/goavro/v2 v2.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pierrec/lz4 v2.6.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.21 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gopherjs/gopherjs v0.0.0-20200217142428-fce0ec30dd00 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/logger v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/tracing v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/mocks v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/snappy v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-msgpack v1.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/raft v1.3.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/dnsutils/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-uuid v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/goidentity/v6 v6.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiextensions-apiserver v0.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/zapr v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/match v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/pretty v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/fs v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/glog v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240506185236-b8a5c65736ae Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.einride.tech/aip v0.67.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jessevdk/go-flags v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/santhosh-tekuri/jsonschema/v5 v5.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/itchyny/timefmt-go v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/PagerDuty/go-pagerduty v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/RocketChat/Rocket.Chat.Go.SDK v0.0.0-20210112200207-10ab4d695d60 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-telegram-bot-api/telegram-bot-api/v5 v5.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gregdel/pushover v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opsgenie/opsgenie-go-sdk-v2 v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-git/go-billy/v5 v5.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-git/go-git-fixtures/v4 v4.3.2-0.20231010084843-55a94097c399 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sergi/go-diff v1.3.2-0.20230802210424-5b0b94c5c0d3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/elazarl/goproxy v0.0.0-20230808193330-2592e75ae04a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kevinburke/ssh_config v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/skeema/knownhosts v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xanzy/ssh-agent v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudfoundry/jibber_jabber v0.0.0-20151120183258-bcc4c8345a21 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nicksnyder/go-i18n v1.10.1-0.20190510212457-b280125b035a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gliderlabs/ssh v0.3.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-isatty v0.0.20 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rs/xid v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/TylerBrock/colorjson v0.0.0-20200706003622-8a50f05110d2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ajg/form v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/structs v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/imkira/go-interpol v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sanity-io/litter v1.5.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/valyala/fasthttp v1.34.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonschema v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yalp/jsonpath v0.0.0-20180802001716-5cc68e5049a0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yudai/gojsondiff v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading moul.io/http2curl/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AthenZ/athenz v1.10.39 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spaolacci/murmur3 v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/DataDog/zstd v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.2.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dimchansky/utfbom v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/highwayhash v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/jwt/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/rpc/v2 v2.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-metrics v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/jcmturner/dnsutils.v1 v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobuffalo/flect v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/jcmturner/goidentity.v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudflare/circl v1.3.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/analysis v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/loads v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/runtime v0.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/spec v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/strfmt v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/validate v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/handlers v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/toqueteos/webbrowser v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pjbgf/sha1cd v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emirpasic/gods v1.18.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/andybalholm/brotli v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yudai/golcs v0.0.0-20170316035057-ecda9a501e82 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yudai/pp v2.0.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/awalterschulze/gographviz v0.0.0-20200901124122-0eecad45bd71 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/99designs/keyring v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/aescts/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/go-homedir v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-immutable-radix v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nxadm/tail v1.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/errors v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/warnings.v0 v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/oklog/ulid v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.mongodb.org/mongo-driver v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/jcmturner/aescts.v1 v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/jcmturner/rpc.v0 v0.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/99designs/go-keychain v0.0.0-20191008050251-8e49817e8af4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/danieljoos/wincred v1.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dvsekhvalnov/jose2go v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus v0.0.0-20190726142602-4481cbc300e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gsterjov/go-libsecret v0.0.0-20161001094733-a6f4afe4910c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mtibben/percent v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/golang-lru v0.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dimfeld/httptreemux v5.0.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ardielle/ardielle-go v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading nhooyr.io/websocket v1.8.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/validation v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/eventsources/sources/stripe Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/eventsources/sources/stripe Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/eventsources/sources/github: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/eventsources/sources/github Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/eventsources/sources/github Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/eventsources/sources/awssns: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/eventsources/sources/awssns Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/eventsources/sources/awssns Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/eventsources/sources/slack: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/eventsources/sources/slack Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/eventsources/sources/slack Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/sensors/triggers: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/sensors/triggers Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/sensors/triggers Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/controllers/eventbus: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/controllers/eventbus Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/controllers/eventbus Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/controllers/sensor: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/controllers/sensor Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/controllers/sensor Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/controllers/sensor: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/controllers/sensor Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/controllers/sensor Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/sensors: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/sensors Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/sensors Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/sensors/triggers/argo-workflow: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/sensors/triggers/argo-workflow Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/sensors/triggers/argo-workflow Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/common/expr/: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/common/expr Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/common/expr Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-events/controllers/sensor: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/controllers/sensor Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-events/controllers/sensor Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cncf-fuzzing/projects/argo/seeds/fuzz_expr/seed1 (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cncf-fuzzing/projects/argo/seeds/fuzz_expr/seed2 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cncf-fuzzing/projects/argo/seeds/fuzz_expr/seed3 (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/microsoft/azure-devops-go-api/azuredevops v1.0.0-b5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/controller-runtime v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/argoproj/pkg v0.13.7-0.20230626144333-d56162821bd1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading code.gitea.io/sdk/gitea v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gfleury/go-bitbucket-v1 v0.0.0-20220301131131-8e7ed04b843e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-github/v63 v63.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xanzy/go-gitlab v0.109.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go v1.55.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/automaxprocs v1.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/kubelogin v0.0.20 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.20.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/argoproj/gitops-engine v0.7.1-0.20240917171920-72bcdda3f0a5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.55.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-zglob v0.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/redis/go-redis/v9 v9.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-playground/webhooks/v6 v6.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/sprig/v3 v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gosimple/slug v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/argoproj/notifications-engine v0.4.1-0.20240606074338-0802cd427621 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jeremywohl/flatten v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/semver/v3 v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20230522175609-2e198f4a06a1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bmatcuk/doublestar/v4 v4.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/glob v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/r3labs/diff v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading oras.land/oras-go/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch v5.9.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogits/go-gogs-client v0.0.0-20200905025246-8bb8a50cb355 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/patrickmn/go-cache v2.1.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-oidc/v3 v3.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/skratchdot/open-golang v0.0.0-20160302144031-75fb7ed4208c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/improbable-eng/grpc-web v0.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bombsimon/logrusr/v2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-jsonnet v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-fed/httpsig v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-version v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240903143218-8af14fe29dc1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davidmz/go-pageant v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest v0.11.29 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.23 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/retry.v1 v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20230822172742-b8732ec3820d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alicebob/miniredis/v2 v2.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240903143218-8af14fe29dc1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/TomOnTime/utfutil v0.0.0-20180511104225-09c41003ee1d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-redis/cache/v9 v9.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/huandu/xstrings v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shopspring/decimal v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gosimple/unidecode v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/btree v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/blake2b-simd v0.0.0-20160723061019-3f5f724cb5b1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/code-generator v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dlclark/regexp2 v1.11.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/olekukonko/tablewriter v0.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading layeh.com/gopher-json v0.0.0-20190114024228-97fed8db8427 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bsm/ginkgo/v2 v2.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bsm/gomega v1.27.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/casbin/casbin/v2 v2.100.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/casbin/govaluate v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/expr-lang/expr v1.16.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.24.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.25.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.16.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/chainguard-dev/git-urls v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/api v0.132.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v3 v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/antonmedv/expr v1.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/desertbit/timer v0.0.0-20180107155436-c41aec40b27f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rs/cors v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading nhooyr.io/websocket v1.8.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/clock v0.0.0-20190514195947-2896927a307a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vmihailenco/go-tinylfu v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vmihailenco/msgpack/v5 v5.3.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/malexdev/utfutil v0.0.0-20180510171754-00c8d4a8e7a8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alicebob/gopher-json v0.0.0-20200520072559-a9ecdc9d1d3a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/gengo/v2 v2.0.0-20240228010128-51d4e06bde70 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-runewidth v0.0.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prashantv/gostub v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/smithy-go v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.2.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.14.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.18.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.21.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.26.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20210911075715-681adbf594b8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vmihailenco/tagparser/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/ws v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gin-gonic/gin v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dnaeon/go-vcr v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ghodss/yaml v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rivo/uniseg v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.5.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.10.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/httphead v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/pool v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gin-contrib/sse v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-playground/validator/v10 v10.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ugorji/go/codec v1.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-playground/universal-translator v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ugorji/go v1.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/leodido/go-urn v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-playground/locales v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/appengine v1.6.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/enterprise-certificate-proxy v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/server/project: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/server/project Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/server/project Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/server/project: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/server/project Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/server/project Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/server/project: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/server/project Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/server/project Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/db: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/db Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/db Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/grpc: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/grpc Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/grpc Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/grpc: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/grpc Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/grpc Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/rbac: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/rbac Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/rbac Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/argo: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/argo Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/argo Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/argo: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/argo Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/argo Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/gpg: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/gpg Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/gpg Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/gpg: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/gpg Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/gpg Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/pkg/apis/application/v1alpha1: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/pkg/apis/application/v1alpha1 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/pkg/apis/application/v1alpha1 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/argo/diff: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/argo/diff Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/argo/diff Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/session: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/session Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/session Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/session: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/session Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/session Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/reposerver/repository: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/reposerver/repository Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/reposerver/repository Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-cd/v2/util/argo/normalizers: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/argo/normalizers Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-cd/v2/util/argo/normalizers Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.23.1 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-sql-driver/mysql v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/upper/db/v4 v4.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.30.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.61.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.30.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.30.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/argoproj/pkg v0.13.7-0.20240704113442-a69fd34a8117 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/argoproj/argo-events v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/skratchdot/open-golang v0.0.0-20200116055534-eef842397966 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v1.18.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/TwiN/go-color v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240125205218-1f4bbc51befe Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.120.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/itchyny/gojq v0.12.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/gjson v1.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cli-runtime v0.30.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/gengo v0.0.0-20220902162205-c0856e24416d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubectl v0.30.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20240116215550-a9fa1716bcac Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/creack/pty v1.1.21 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sethvargo/go-limiter v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.22.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-oidc/v3 v3.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/go-playground/webhooks.v5 v5.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading zombiezen.com/go/sqlite v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/minio-go/v7 v7.0.66 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/pgzip v1.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch v5.8.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20230905200255-921286631fa9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgtype v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgx/v4 v4.18.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lib/pq v1.10.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/runtime v0.48.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/prometheus v0.45.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/storage v1.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-git/go-git/v5 v5.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/api v0.163.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go v66.0.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/colinmarc/hdfs/v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go v0.112.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/tea v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aliyun/aliyun-oss-go-sdk v3.0.2+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry/pkg/authn/k8schain v0.0.0-20220720195016-31786c6cbb82 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aliyun/credentials-go v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240125205218-1f4bbc51befe Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/itchyny/timefmt-go v0.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.30.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading modernc.org/libc v1.41.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading modernc.org/sqlite v1.29.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.17.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/sha256-simd v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/imdario/mergo v0.3.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/segmentio/fasthash v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ipfs/go-detect-race v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/mgo.v2 v2.0.0-20190816093944-a6b53ec6cb22 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evilmonkeyinc/jsonpath v0.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgconn v1.14.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgio v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/iam v1.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/compute v1.23.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/debug v0.0.0-20190504072949-9472017b5c68 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.27.23 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.17.24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.30.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ProtonMail/go-crypto v0.0.0-20230828082145-3c4c8a2d2371 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.30.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/skeema/knownhosts v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gliderlabs/ssh v0.3.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-helpers v0.30.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/daviddengcn/go-colortext v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fvbommel/sortorder v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/kustomize/kustomize/v5 v5.0.4-0.20230601165947-6ce0bf390ce3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/metrics v0.30.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgproto3/v2 v2.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/apd v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gofrs/uuid v4.0.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/chunkreader/v2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgpassfile v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgservicefile v0.0.0-20221227161230-091c0ba34f0a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgmock v0.0.0-20210724152146-4ad1a8207f65 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/sessions v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/awslabs/amazon-ecr-credential-helper/ecr-login v0.0.0-20220706184558-ce46abcd012b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/chrismellard/docker-credential-acr-env v0.0.0-20220327082430-c57b701bfc08 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry/pkg/authn/kubernetes v0.0.0-20220719135131-f79ec2192282 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golangplus/testing v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/smithy-go v1.20.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.22.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.26.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/martian/v3 v3.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/martian v2.1.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/cli v24.0.7+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/securecookie v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/stargz-snapshotter/estargz v0.14.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/distribution v2.8.2+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/docker-credential-helpers v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0-rc3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vbatts/tar-split v0.11.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ecr v1.17.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ecrpublic v1.13.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dimchansky/utfbom v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20221118152302-e6195bd50e26 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/docker v27.1.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gotest.tools/v3 v3.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ncruces/go-strftime v0.1.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading modernc.org/memory v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading modernc.org/mathutil v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/remyoudompheng/bigfft v0.0.0-20230129092748-24d4a6f8daec Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20231109132714-523115ebc101 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/storage/armstorage v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: upgraded github.com/AdaLogics/go-fuzz-headers v0.0.0-20221103172237-443f56ff4ba8 => v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: upgraded github.com/aws/aws-sdk-go-v2/internal/ini v1.8.0 => v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/server/workflow: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/server/workflow Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/server/workflow Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cncf-fuzzing/projects/argo/seeds/workflow_server_fuzzer/seed1 (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cncf-fuzzing/projects/argo/seeds/workflow_server_fuzzer/seed2 (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cncf-fuzzing/projects/argo/seeds/workflow_server_fuzzer/seed3 (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cncf-fuzzing/projects/argo/seeds/workflow_server_fuzzer/seed4 (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cncf-fuzzing/projects/argo/seeds/workflow_server_fuzzer/seed5 (deflated 62%) Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/server/artifacts: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/server/artifacts Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/server/artifacts Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/server/artifacts: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/server/artifacts Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/server/artifacts Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/workflow/common: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/common Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/common Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/workflow/controller: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/controller Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/controller Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/workflow/controller: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/controller Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/controller Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/workflow/sync: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/sync Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/sync Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/server/auth/sso: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/server/auth/sso Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/server/auth/sso Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/workflow/util: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/util Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/util Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/workflow/cron: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/cron Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/cron Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/workflow/validate: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/validate Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/validate Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/argoproj/argo-workflows/v3/workflow/common: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/common Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/argoproj/argo-workflows/v3/workflow/common Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/argo-events/examples/sensors/trigger-with-template.yaml (deflated 70%) Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: cf863423b736: Already exists Step #4: ce28af4871ad: Already exists Step #4: cb882b03508a: Pulling fs layer Step #4: 29b01ef7a475: Pulling fs layer Step #4: 38a6181937c0: Pulling fs layer Step #4: 1f3897435a68: Pulling fs layer Step #4: 14447d8ca5b1: Pulling fs layer Step #4: b19a225566d8: Pulling fs layer Step #4: 24e70137e62a: Pulling fs layer Step #4: d8accd820e3c: Pulling fs layer Step #4: bd8eb1de46c2: Pulling fs layer Step #4: 203271aed069: Pulling fs layer Step #4: 683065a01b32: Pulling fs layer Step #4: e16a8f196b55: Pulling fs layer Step #4: a4d1cc0da4ce: Pulling fs layer Step #4: 061927071cc5: Pulling fs layer Step #4: 40ace3eba5e8: Pulling fs layer Step #4: be1d84894dcf: Pulling fs layer Step #4: e32a414890da: Pulling fs layer Step #4: 14447d8ca5b1: Waiting Step #4: b19a225566d8: Waiting Step #4: 24e70137e62a: Waiting Step #4: e32a414890da: Waiting Step #4: 40ace3eba5e8: Waiting Step #4: d8accd820e3c: Waiting Step #4: bd8eb1de46c2: Waiting Step #4: be1d84894dcf: Waiting Step #4: 683065a01b32: Waiting Step #4: 1f3897435a68: Waiting Step #4: 203271aed069: Waiting Step #4: 061927071cc5: Waiting Step #4: e16a8f196b55: Waiting Step #4: 38a6181937c0: Verifying Checksum Step #4: 38a6181937c0: Download complete Step #4: cb882b03508a: Verifying Checksum Step #4: cb882b03508a: Download complete Step #4: 29b01ef7a475: Verifying Checksum Step #4: 29b01ef7a475: Download complete Step #4: cb882b03508a: Pull complete Step #4: b19a225566d8: Verifying Checksum Step #4: b19a225566d8: Download complete Step #4: 14447d8ca5b1: Verifying Checksum Step #4: 14447d8ca5b1: Download complete Step #4: 24e70137e62a: Download complete Step #4: 29b01ef7a475: Pull complete Step #4: bd8eb1de46c2: Verifying Checksum Step #4: bd8eb1de46c2: Download complete Step #4: 38a6181937c0: Pull complete Step #4: d8accd820e3c: Verifying Checksum Step #4: d8accd820e3c: Download complete Step #4: 1f3897435a68: Verifying Checksum Step #4: 1f3897435a68: Download complete Step #4: 683065a01b32: Verifying Checksum Step #4: 683065a01b32: Download complete Step #4: e16a8f196b55: Verifying Checksum Step #4: e16a8f196b55: Download complete Step #4: a4d1cc0da4ce: Verifying Checksum Step #4: a4d1cc0da4ce: Download complete Step #4: 40ace3eba5e8: Verifying Checksum Step #4: 40ace3eba5e8: Download complete Step #4: 061927071cc5: Verifying Checksum Step #4: 061927071cc5: Download complete Step #4: be1d84894dcf: Download complete Step #4: 203271aed069: Verifying Checksum Step #4: 203271aed069: Download complete Step #4: e32a414890da: Verifying Checksum Step #4: e32a414890da: Download complete Step #4: 1f3897435a68: Pull complete Step #4: 14447d8ca5b1: Pull complete Step #4: b19a225566d8: Pull complete Step #4: 24e70137e62a: Pull complete Step #4: d8accd820e3c: Pull complete Step #4: bd8eb1de46c2: Pull complete Step #4: 203271aed069: Pull complete Step #4: 683065a01b32: Pull complete Step #4: e16a8f196b55: Pull complete Step #4: a4d1cc0da4ce: Pull complete Step #4: 061927071cc5: Pull complete Step #4: 40ace3eba5e8: Pull complete Step #4: be1d84894dcf: Pull complete Step #4: e32a414890da: Pull complete Step #4: Digest: sha256:2df8f53a0699f024838dfa85fa7629cd0ae8e389238fcc61438ece602430f7a7 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz_awssns_eventsource.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_awssns_eventsource.zip or Step #5: /corpus/fuzz_awssns_eventsource.zip.zip, and cannot find /corpus/fuzz_awssns_eventsource.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_awssns_eventsource. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_construct_payload.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_construct_payload.zip or Step #5: /corpus/fuzz_construct_payload.zip.zip, and cannot find /corpus/fuzz_construct_payload.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_construct_payload. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_create_repo_certificate.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_create_repo_certificate.zip or Step #5: /corpus/fuzz_create_repo_certificate.zip.zip, and cannot find /corpus/fuzz_create_repo_certificate.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_create_repo_certificate. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_create_token.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_create_token.zip or Step #5: /corpus/fuzz_create_token.zip.zip, and cannot find /corpus/fuzz_create_token.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_create_token. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_decode_lock_name.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_decode_lock_name.zip or Step #5: /corpus/fuzz_decode_lock_name.zip.zip, and cannot find /corpus/fuzz_decode_lock_name.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_decode_lock_name. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_eventbus_reconciler.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_eventbus_reconciler.zip or Step #5: /corpus/fuzz_eventbus_reconciler.zip.zip, and cannot find /corpus/fuzz_eventbus_reconciler.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_eventbus_reconciler. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_events_argo_workflow_trigger_execute.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_events_argo_workflow_trigger_execute.zip or Step #5: /corpus/fuzz_events_argo_workflow_trigger_execute.zip.zip, and cannot find /corpus/fuzz_events_argo_workflow_trigger_execute.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_events_argo_workflow_trigger_execute. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_eventsource_reconciler.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_eventsource_reconciler.zip or Step #5: /corpus/fuzz_eventsource_reconciler.zip.zip, and cannot find /corpus/fuzz_eventsource_reconciler.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_eventsource_reconciler. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_expr.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_expr.zip or Step #5: /corpus/fuzz_expr.zip.zip, and cannot find /corpus/fuzz_expr.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_expr. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_generate_manifests.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_generate_manifests.zip or Step #5: /corpus/fuzz_generate_manifests.zip.zip, and cannot find /corpus/fuzz_generate_manifests.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_generate_manifests. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_get_app_name.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_get_app_name.zip or Step #5: /corpus/fuzz_get_app_name.zip.zip, and cannot find /corpus/fuzz_get_app_name.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_get_app_name. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_get_dependency_expression.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_get_dependency_expression.zip or Step #5: /corpus/fuzz_get_dependency_expression.zip.zip, and cannot find /corpus/fuzz_get_dependency_expression.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_get_dependency_expression. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_get_output_artifact.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_get_output_artifact.zip or Step #5: /corpus/fuzz_get_output_artifact.zip.zip, and cannot find /corpus/fuzz_get_output_artifact.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_get_output_artifact. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_get_output_artifact_by_uuid.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_get_output_artifact_by_uuid.zip or Step #5: /corpus/fuzz_get_output_artifact_by_uuid.zip.zip, and cannot find /corpus/fuzz_get_output_artifact_by_uuid.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_get_output_artifact_by_uuid. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_get_task_dependencies.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_get_task_dependencies.zip or Step #5: /corpus/fuzz_get_task_dependencies.zip.zip, and cannot find /corpus/fuzz_get_task_dependencies.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_get_task_dependencies. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_github_eventsource.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_github_eventsource.zip or Step #5: /corpus/fuzz_github_eventsource.zip.zip, and cannot find /corpus/fuzz_github_eventsource.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_github_eventsource. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_gitops_diff.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_gitops_diff.zip or Step #5: /corpus/fuzz_gitops_diff.zip.zip, and cannot find /corpus/fuzz_gitops_diff.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_gitops_diff. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_import_pgp_keys.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_import_pgp_keys.zip or Step #5: /corpus/fuzz_import_pgp_keys.zip.zip, and cannot find /corpus/fuzz_import_pgp_keys.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_import_pgp_keys. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_kayenta_provider.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_kayenta_provider.zip or Step #5: /corpus/fuzz_kayenta_provider.zip.zip, and cannot find /corpus/fuzz_kayenta_provider.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_kayenta_provider. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_load_policy.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_load_policy.zip or Step #5: /corpus/fuzz_load_policy.zip.zip, and cannot find /corpus/fuzz_load_policy.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_load_policy. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_new_web_metric_json_parser.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_new_web_metric_json_parser.zip or Step #5: /corpus/fuzz_new_web_metric_json_parser.zip.zip, and cannot find /corpus/fuzz_new_web_metric_json_parser.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_new_web_metric_json_parser. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_normalize.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_normalize.zip or Step #5: /corpus/fuzz_normalize.zip.zip, and cannot find /corpus/fuzz_normalize.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_normalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_operator.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_operator.zip or Step #5: /corpus/fuzz_operator.zip.zip, and cannot find /corpus/fuzz_operator.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_operator. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_parse_app_instance_value.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_parse_app_instance_value.zip or Step #5: /corpus/fuzz_parse_app_instance_value.zip.zip, and cannot find /corpus/fuzz_parse_app_instance_value.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_parse_app_instance_value. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_parse_objects.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_parse_objects.zip or Step #5: /corpus/fuzz_parse_objects.zip.zip, and cannot find /corpus/fuzz_parse_objects.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_parse_objects. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_parse_unverified.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_parse_unverified.zip or Step #5: /corpus/fuzz_parse_unverified.zip.zip, and cannot find /corpus/fuzz_parse_unverified.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_parse_unverified. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_prometheus_provider.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_prometheus_provider.zip or Step #5: /corpus/fuzz_prometheus_provider.zip.zip, and cannot find /corpus/fuzz_prometheus_provider.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_prometheus_provider. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_reconcile_analysis_run.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_reconcile_analysis_run.zip or Step #5: /corpus/fuzz_reconcile_analysis_run.zip.zip, and cannot find /corpus/fuzz_reconcile_analysis_run.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_reconcile_analysis_run. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_resource_reconcile.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_resource_reconcile.zip or Step #5: /corpus/fuzz_resource_reconcile.zip.zip, and cannot find /corpus/fuzz_resource_reconcile.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_resource_reconcile. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_sensor_controller.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_sensor_controller.zip or Step #5: /corpus/fuzz_sensor_controller.zip.zip, and cannot find /corpus/fuzz_sensor_controller.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_sensor_controller. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_sensor_controller_reconcile.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_sensor_controller_reconcile.zip or Step #5: /corpus/fuzz_sensor_controller_reconcile.zip.zip, and cannot find /corpus/fuzz_sensor_controller_reconcile.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_sensor_controller_reconcile. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_sessionmanager_parse.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_sessionmanager_parse.zip or Step #5: /corpus/fuzz_sessionmanager_parse.zip.zip, and cannot find /corpus/fuzz_sessionmanager_parse.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_sessionmanager_parse. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_slack_eventsource.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_slack_eventsource.zip or Step #5: /corpus/fuzz_slack_eventsource.zip.zip, and cannot find /corpus/fuzz_slack_eventsource.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_slack_eventsource. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_sso_authorize.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_sso_authorize.zip or Step #5: /corpus/fuzz_sso_authorize.zip.zip, and cannot find /corpus/fuzz_sso_authorize.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_sso_authorize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_state_diff.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_state_diff.zip or Step #5: /corpus/fuzz_state_diff.zip.zip, and cannot find /corpus/fuzz_state_diff.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_state_diff. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_stripe_eventsource.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_stripe_eventsource.zip or Step #5: /corpus/fuzz_stripe_eventsource.zip.zip, and cannot find /corpus/fuzz_stripe_eventsource.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_stripe_eventsource. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_submit_workflow.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_submit_workflow.zip or Step #5: /corpus/fuzz_submit_workflow.zip.zip, and cannot find /corpus/fuzz_submit_workflow.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_submit_workflow. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_user_agent_enforcer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_user_agent_enforcer.zip or Step #5: /corpus/fuzz_user_agent_enforcer.zip.zip, and cannot find /corpus/fuzz_user_agent_enforcer.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_user_agent_enforcer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_user_agent_unary_server_interceptor.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_user_agent_unary_server_interceptor.zip or Step #5: /corpus/fuzz_user_agent_unary_server_interceptor.zip.zip, and cannot find /corpus/fuzz_user_agent_unary_server_interceptor.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_user_agent_unary_server_interceptor. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_validate_app_project.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_validate_app_project.zip or Step #5: /corpus/fuzz_validate_app_project.zip.zip, and cannot find /corpus/fuzz_validate_app_project.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_validate_app_project. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_validate_event_source.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_validate_event_source.zip or Step #5: /corpus/fuzz_validate_event_source.zip.zip, and cannot find /corpus/fuzz_validate_event_source.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_validate_event_source. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_validate_pgp_keys.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_validate_pgp_keys.zip or Step #5: /corpus/fuzz_validate_pgp_keys.zip.zip, and cannot find /corpus/fuzz_validate_pgp_keys.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_validate_pgp_keys. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_validate_project.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_validate_project.zip or Step #5: /corpus/fuzz_validate_project.zip.zip, and cannot find /corpus/fuzz_validate_project.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_validate_project. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_validate_sensor.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_validate_sensor.zip or Step #5: /corpus/fuzz_validate_sensor.zip.zip, and cannot find /corpus/fuzz_validate_sensor.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_validate_sensor. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_validate_workflow.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_validate_workflow.zip or Step #5: /corpus/fuzz_validate_workflow.zip.zip, and cannot find /corpus/fuzz_validate_workflow.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_validate_workflow. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_verify_username_password.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_verify_username_password.zip or Step #5: /corpus/fuzz_verify_username_password.zip.zip, and cannot find /corpus/fuzz_verify_username_password.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_verify_username_password. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_woc_run.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_woc_run.zip or Step #5: /corpus/fuzz_woc_run.zip.zip, and cannot find /corpus/fuzz_woc_run.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_woc_run. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_workflow_controller.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_workflow_controller.zip or Step #5: /corpus/fuzz_workflow_controller.zip.zip, and cannot find /corpus/fuzz_workflow_controller.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_workflow_controller. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_workflow_server.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_workflow_server.zip or Step #5: /corpus/fuzz_workflow_server.zip.zip, and cannot find /corpus/fuzz_workflow_server.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_workflow_server. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image argo Step #5: python infra/helper.py build_fuzzers --sanitizer coverage argo Step #5: python infra/helper.py coverage argo Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1