starting build "3e5dcb9f-abbe-4963-9807-63d56692442b" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 19.46kB Step #1: Step 1/9 : FROM gcr.io/oss-fuzz-base/base-builder-python Step #1: latest: Pulling from oss-fuzz-base/base-builder-python Step #1: b549f31133a9: Pulling fs layer Step #1: 9f80bca35359: Pulling fs layer Step #1: c2e9ab7e6d55: Pulling fs layer Step #1: a2c1799b005c: Pulling fs layer Step #1: 647124c852bc: Pulling fs layer Step #1: 4c0db9535385: Pulling fs layer Step #1: 7d9d6400b844: Pulling fs layer Step #1: b95ba533437d: Pulling fs layer Step #1: 98ef18780bd4: Pulling fs layer Step #1: 0bcc6c903840: Pulling fs layer Step #1: 294ba0b9a924: Pulling fs layer Step #1: 344841c178fd: Pulling fs layer Step #1: 8a24d9f6813c: Pulling fs layer Step #1: 8cfff2f8b62b: Pulling fs layer Step #1: 7b6fc8fef10c: Pulling fs layer Step #1: b56b52e44dc7: Pulling fs layer Step #1: d4dbf4e8824f: Pulling fs layer Step #1: fa95fc65ee8e: Pulling fs layer Step #1: 1da1ba4445a7: Pulling fs layer Step #1: 14cc587b05ae: Pulling fs layer Step #1: 03fa8c0fad9a: Pulling fs layer Step #1: ccfd740776f9: Pulling fs layer Step #1: 04ec2d031af9: Pulling fs layer Step #1: 0fe86fe6d25a: Pulling fs layer Step #1: 3d5e727cc8f7: Pulling fs layer Step #1: 639389e328da: Pulling fs layer Step #1: da2ba7c8e5f6: Pulling fs layer Step #1: 0c2ec5c7c85c: Pulling fs layer Step #1: 7d9d6400b844: Waiting Step #1: 189e9da4e490: Pulling fs layer Step #1: 6ec4707e85be: Pulling fs layer Step #1: b95ba533437d: Waiting Step #1: e5ccbdccd3b0: Pulling fs layer Step #1: 98ef18780bd4: Waiting Step #1: 0bcc6c903840: Waiting Step #1: 294ba0b9a924: Waiting Step #1: b56b52e44dc7: Waiting Step #1: 0fe86fe6d25a: Waiting Step #1: 344841c178fd: Waiting Step #1: d4dbf4e8824f: Waiting Step #1: 8a24d9f6813c: Waiting Step #1: 3d5e727cc8f7: Waiting Step #1: fa95fc65ee8e: Waiting Step #1: 8cfff2f8b62b: Waiting Step #1: 1da1ba4445a7: Waiting Step #1: 639389e328da: Waiting Step #1: 7b6fc8fef10c: Waiting Step #1: 14cc587b05ae: Waiting Step #1: a2c1799b005c: Waiting Step #1: da2ba7c8e5f6: Waiting Step #1: 647124c852bc: Waiting Step #1: 4c0db9535385: Waiting Step #1: 189e9da4e490: Waiting Step #1: ccfd740776f9: Waiting Step #1: 0c2ec5c7c85c: Waiting Step #1: 04ec2d031af9: Waiting Step #1: c2e9ab7e6d55: Verifying Checksum Step #1: c2e9ab7e6d55: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 647124c852bc: Verifying Checksum Step #1: 647124c852bc: Download complete Step #1: 4c0db9535385: Download complete Step #1: a2c1799b005c: Verifying Checksum Step #1: a2c1799b005c: Download complete Step #1: b95ba533437d: Download complete Step #1: 98ef18780bd4: Verifying Checksum Step #1: 98ef18780bd4: Download complete Step #1: 9f80bca35359: Verifying Checksum Step #1: 9f80bca35359: Download complete Step #1: 294ba0b9a924: Verifying Checksum Step #1: 294ba0b9a924: Download complete Step #1: 344841c178fd: Verifying Checksum Step #1: 344841c178fd: Download complete Step #1: b549f31133a9: Pull complete Step #1: 8a24d9f6813c: Verifying Checksum Step #1: 8a24d9f6813c: Download complete Step #1: 8cfff2f8b62b: Verifying Checksum Step #1: 8cfff2f8b62b: Download complete Step #1: 7b6fc8fef10c: Verifying Checksum Step #1: 7b6fc8fef10c: Download complete Step #1: b56b52e44dc7: Verifying Checksum Step #1: b56b52e44dc7: Download complete Step #1: d4dbf4e8824f: Verifying Checksum Step #1: d4dbf4e8824f: Download complete Step #1: fa95fc65ee8e: Download complete Step #1: 1da1ba4445a7: Download complete Step #1: 14cc587b05ae: Verifying Checksum Step #1: 14cc587b05ae: Download complete Step #1: 0bcc6c903840: Verifying Checksum Step #1: 0bcc6c903840: Download complete Step #1: 03fa8c0fad9a: Verifying Checksum Step #1: 03fa8c0fad9a: Download complete Step #1: 04ec2d031af9: Verifying Checksum Step #1: 04ec2d031af9: Download complete Step #1: ccfd740776f9: Verifying Checksum Step #1: ccfd740776f9: Download complete Step #1: 0fe86fe6d25a: Verifying Checksum Step #1: 0fe86fe6d25a: Download complete Step #1: 3d5e727cc8f7: Verifying Checksum Step #1: 3d5e727cc8f7: Download complete Step #1: 639389e328da: Verifying Checksum Step #1: 639389e328da: Download complete Step #1: 0c2ec5c7c85c: Verifying Checksum Step #1: 0c2ec5c7c85c: Download complete Step #1: da2ba7c8e5f6: Verifying Checksum Step #1: da2ba7c8e5f6: Download complete Step #1: 189e9da4e490: Download complete Step #1: 6ec4707e85be: Verifying Checksum Step #1: 6ec4707e85be: Download complete Step #1: e5ccbdccd3b0: Verifying Checksum Step #1: e5ccbdccd3b0: Download complete Step #1: 7d9d6400b844: Verifying Checksum Step #1: 7d9d6400b844: Download complete Step #1: 9f80bca35359: Pull complete Step #1: c2e9ab7e6d55: Pull complete Step #1: a2c1799b005c: Pull complete Step #1: 647124c852bc: Pull complete Step #1: 4c0db9535385: Pull complete Step #1: 7d9d6400b844: Pull complete Step #1: b95ba533437d: Pull complete Step #1: 98ef18780bd4: Pull complete Step #1: 0bcc6c903840: Pull complete Step #1: 294ba0b9a924: Pull complete Step #1: 344841c178fd: Pull complete Step #1: 8a24d9f6813c: Pull complete Step #1: 8cfff2f8b62b: Pull complete Step #1: 7b6fc8fef10c: Pull complete Step #1: b56b52e44dc7: Pull complete Step #1: d4dbf4e8824f: Pull complete Step #1: fa95fc65ee8e: Pull complete Step #1: 1da1ba4445a7: Pull complete Step #1: 14cc587b05ae: Pull complete Step #1: 03fa8c0fad9a: Pull complete Step #1: ccfd740776f9: Pull complete Step #1: 04ec2d031af9: Pull complete Step #1: 0fe86fe6d25a: Pull complete Step #1: 3d5e727cc8f7: Pull complete Step #1: 639389e328da: Pull complete Step #1: da2ba7c8e5f6: Pull complete Step #1: 0c2ec5c7c85c: Pull complete Step #1: 189e9da4e490: Pull complete Step #1: 6ec4707e85be: Pull complete Step #1: e5ccbdccd3b0: Pull complete Step #1: Digest: sha256:786ad72422a2b8582c6774030abd6a124f957369661848a806307195d3467d95 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest Step #1: ---> 577e624e3043 Step #1: Step 2/9 : RUN apt-get update && apt-get install -y libffi-dev Step #1: ---> Running in 079556b24780 Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:3 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 1s (170 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following NEW packages will be installed: Step #1: libffi-dev Step #1: 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 57.0 kB of archives. Step #1: After this operation, 312 kB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libffi-dev amd64 3.3-4 [57.0 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 57.0 kB in 0s (332 kB/s) Step #1: Selecting previously unselected package libffi-dev:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #1: Preparing to unpack .../libffi-dev_3.3-4_amd64.deb ... Step #1: Unpacking libffi-dev:amd64 (3.3-4) ... Step #1: Setting up libffi-dev:amd64 (3.3-4) ... Step #1: Removing intermediate container 079556b24780 Step #1: ---> ca318826ef37 Step #1: Step 3/9 : RUN python3 -m pip install --upgrade pip Step #1: ---> Running in 52a3032b0014 Step #1: Collecting pip Step #1: Downloading https://files.pythonhosted.org/packages/8a/6a/19e9fe04fca059ccf770861c7d5721ab4c2aebc539889e97c7977528a53b/pip-24.0-py3-none-any.whl (2.1MB) Step #1: Installing collected packages: pip Step #1: Found existing installation: pip 19.2.3 Step #1: Uninstalling pip-19.2.3: Step #1: Successfully uninstalled pip-19.2.3 Step #1: Successfully installed pip-24.0 Step #1: Removing intermediate container 52a3032b0014 Step #1: ---> a9628c872e18 Step #1: Step 4/9 : RUN git clone https://github.com/pallets/flask Step #1: ---> Running in da6b6600ed82 Step #1: Cloning into 'flask'... Step #1: Removing intermediate container da6b6600ed82 Step #1: ---> f60e0a268ee4 Step #1: Step 5/9 : RUN git clone https://github.com/pallets/werkzeug Step #1: ---> Running in 163b1a6c42e1 Step #1: Cloning into 'werkzeug'... Step #1: Removing intermediate container 163b1a6c42e1 Step #1: ---> bd71f61e7c73 Step #1: Step 6/9 : RUN git clone https://github.com/corydolphin/flask-cors Step #1: ---> Running in 5db06b0ff53d Step #1: Cloning into 'flask-cors'... Step #1: Removing intermediate container 5db06b0ff53d Step #1: ---> f0f8ad466b73 Step #1: Step 7/9 : RUN git clone --depth=1 https://github.com/google/fuzzing/ Step #1: ---> Running in 3bd5f630f590 Step #1: Cloning into 'fuzzing'... Step #1: Removing intermediate container 3bd5f630f590 Step #1: ---> f77f3d3b620d Step #1: Step 8/9 : RUN pip3 install markupsafe itsdangerous jinja2 Step #1: ---> Running in 23e5ad9e7476 Step #1: Collecting markupsafe Step #1: Downloading MarkupSafe-2.1.5-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (3.0 kB) Step #1: Collecting itsdangerous Step #1: Downloading itsdangerous-2.2.0-py3-none-any.whl.metadata (1.9 kB) Step #1: Collecting jinja2 Step #1: Downloading jinja2-3.1.4-py3-none-any.whl.metadata (2.6 kB) Step #1: Downloading MarkupSafe-2.1.5-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (26 kB) Step #1: Downloading itsdangerous-2.2.0-py3-none-any.whl (16 kB) Step #1: Downloading jinja2-3.1.4-py3-none-any.whl (133 kB) Step #1: ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 133.3/133.3 kB 2.4 MB/s eta 0:00:00 Step #1: Installing collected packages: markupsafe, itsdangerous, jinja2 Step #1: Successfully installed itsdangerous-2.2.0 jinja2-3.1.4 markupsafe-2.1.5 Step #1: WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv Step #1: Removing intermediate container 23e5ad9e7476 Step #1: ---> 9f18ea4e02b0 Step #1: Step 9/9 : COPY build.sh *.py $SRC/ Step #1: ---> b00c223a23ed Step #1: Successfully built b00c223a23ed Step #1: Successfully tagged gcr.io/oss-fuzz/flask:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/flask Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filePwKZ3M Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ python == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/fuzzing Step #2 - "srcmap": + cd /src/fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/fuzzing/ Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=41d7725e6a12ec2e0a89b68fafacb4bb5af8fac7 Step #2 - "srcmap": + jq_inplace /tmp/filePwKZ3M '."/src/fuzzing" = { type: "git", url: "https://github.com/google/fuzzing/", rev: "41d7725e6a12ec2e0a89b68fafacb4bb5af8fac7" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filejLl5aa Step #2 - "srcmap": + cat /tmp/filePwKZ3M Step #2 - "srcmap": + jq '."/src/fuzzing" = { type: "git", url: "https://github.com/google/fuzzing/", rev: "41d7725e6a12ec2e0a89b68fafacb4bb5af8fac7" }' Step #2 - "srcmap": + mv /tmp/filejLl5aa /tmp/filePwKZ3M Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/flask-cors/.git Step #2 - "srcmap": + GIT_DIR=/src/flask-cors Step #2 - "srcmap": + cd /src/flask-cors Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/corydolphin/flask-cors Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=1df178ccc019c5aa7282246288c04f867d716790 Step #2 - "srcmap": + jq_inplace /tmp/filePwKZ3M '."/src/flask-cors" = { type: "git", url: "https://github.com/corydolphin/flask-cors", rev: "1df178ccc019c5aa7282246288c04f867d716790" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file1lac6F Step #2 - "srcmap": + cat /tmp/filePwKZ3M Step #2 - "srcmap": + jq '."/src/flask-cors" = { type: "git", url: "https://github.com/corydolphin/flask-cors", rev: "1df178ccc019c5aa7282246288c04f867d716790" }' Step #2 - "srcmap": + mv /tmp/file1lac6F /tmp/filePwKZ3M Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/werkzeug/.git Step #2 - "srcmap": + GIT_DIR=/src/werkzeug Step #2 - "srcmap": + cd /src/werkzeug Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/pallets/werkzeug Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=e87f60b7b985d356f17333b69e7cb135aa75cd92 Step #2 - "srcmap": + jq_inplace /tmp/filePwKZ3M '."/src/werkzeug" = { type: "git", url: "https://github.com/pallets/werkzeug", rev: "e87f60b7b985d356f17333b69e7cb135aa75cd92" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileL1fFie Step #2 - "srcmap": + cat /tmp/filePwKZ3M Step #2 - "srcmap": + jq '."/src/werkzeug" = { type: "git", url: "https://github.com/pallets/werkzeug", rev: "e87f60b7b985d356f17333b69e7cb135aa75cd92" }' Step #2 - "srcmap": + mv /tmp/fileL1fFie /tmp/filePwKZ3M Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/flask/.git Step #2 - "srcmap": + GIT_DIR=/src/flask Step #2 - "srcmap": + cd /src/flask Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/pallets/flask Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=255c8d66af6daff3eaa063ea0819e185d4d1e214 Step #2 - "srcmap": + jq_inplace /tmp/filePwKZ3M '."/src/flask" = { type: "git", url: "https://github.com/pallets/flask", rev: "255c8d66af6daff3eaa063ea0819e185d4d1e214" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileMuetXN Step #2 - "srcmap": + cat /tmp/filePwKZ3M Step #2 - "srcmap": + jq '."/src/flask" = { type: "git", url: "https://github.com/pallets/flask", rev: "255c8d66af6daff3eaa063ea0819e185d4d1e214" }' Step #2 - "srcmap": + mv /tmp/fileMuetXN /tmp/filePwKZ3M Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filePwKZ3M Step #2 - "srcmap": + rm /tmp/filePwKZ3M Step #2 - "srcmap": { Step #2 - "srcmap": "/src/fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/fuzzing/", Step #2 - "srcmap": "rev": "41d7725e6a12ec2e0a89b68fafacb4bb5af8fac7" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/flask-cors": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/corydolphin/flask-cors", Step #2 - "srcmap": "rev": "1df178ccc019c5aa7282246288c04f867d716790" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/werkzeug": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/pallets/werkzeug", Step #2 - "srcmap": "rev": "e87f60b7b985d356f17333b69e7cb135aa75cd92" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/flask": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/pallets/flask", Step #2 - "srcmap": "rev": "255c8d66af6daff3eaa063ea0819e185d4d1e214" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fno-sanitize=function,leak,vptr, Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/werkzeug Step #3 - "compile-libfuzzer-coverage-x86_64": + pip3 install -r ./requirements/dev.in Step #3 - "compile-libfuzzer-coverage-x86_64": Collecting cffi@ https://github.com/python-cffi/cffi/archive/d7f750b1b1c5ea4da5aa537b9baba0e01b0ce843.zip (from -r ./requirements/tests.txt (line 7)) Step #3 - "compile-libfuzzer-coverage-x86_64": Downloading https://github.com/python-cffi/cffi/archive/d7f750b1b1c5ea4da5aa537b9baba0e01b0ce843.zip Step #3 - "compile-libfuzzer-coverage-x86_64": [?25l - 0 bytes ? 0:00:00  - 36.6 kB 1.3 MB/s 0:00:00  - 98.3 kB 1.4 MB/s 0:00:00  \ 428.8 kB 4.2 MB/s 0:00:00  \ 618.3 kB 5.0 MB/s 0:00:00 Step #3 - "compile-libfuzzer-coverage-x86_64": [?25h Installing build dependencies ... [?25l- \ | / - done Step #3 - "compile-libfuzzer-coverage-x86_64": [?25h Getting requirements to build wheel ... [?25l- done Step #3 - "compile-libfuzzer-coverage-x86_64": [?25h Installing backend dependencies ... [?25l- \ | done Step #3 - "compile-libfuzzer-coverage-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25l- done Step #3 - "compile-libfuzzer-coverage-x86_64": ERROR: Ignored the following versions that require a different python version: 0.7.14 Requires-Python >=3.9; 0.7.15 Requires-Python >=3.9; 0.7.16 Requires-Python >=3.9 Step #3 - "compile-libfuzzer-coverage-x86_64": ERROR: Could not find a version that satisfies the requirement alabaster==0.7.16 (from versions: 0.1.0, 0.2.0, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.5.0, 0.5.1, 0.6.0, 0.6.1, 0.6.2, 0.6.3, 0.7.1, 0.7.2, 0.7.3, 0.7.4, 0.7.5, 0.7.6, 0.7.7, 0.7.8, 0.7.9, 0.7.10, 0.7.11, 0.7.12, 0.7.13) Step #3 - "compile-libfuzzer-coverage-x86_64": ERROR: No matching distribution found for alabaster==0.7.16 Step #3 - "compile-libfuzzer-coverage-x86_64": [?25h******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image flask Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 flask Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1