starting build "6e6bdbcd-0a8b-471a-afc0-bc5e82273da9" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae" Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Sending build context to Docker daemon 9.728kB Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Step 1/8 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": b549f31133a9: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": fda11c351fde: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": bde827a1238f: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 47fe9ac47af0: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6ceb804ebe72: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 141570139e07: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 7d296ced577f: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 5b2ecca66c2f: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 830012418f5b: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 0a16326ab986: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 5125300fde52: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1aa11dc3e76d: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1e66ea6b371f: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6d49e1f18e65: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c92bca758a75: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 46902f44dc57: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 201bb7da5556: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": cfba8a420bca: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 59f39204ed7b: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 7c9fbc0a1857: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": a30961f2bf4f: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 47fe9ac47af0: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c402a9f56a02: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": d2dcd451dd41: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 293dc2fd7cd1: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": e7ed01e7f728: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1c33a6b26d40: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 830012418f5b: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6ceb804ebe72: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": db6a3fe9e62e: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 0a16326ab986: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": f1feef9cbb2d: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 141570139e07: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 5125300fde52: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 5b2ecca66c2f: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 7c9fbc0a1857: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6c3bfcbfdc6c: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 46902f44dc57: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1aa11dc3e76d: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": cfbeeab1e81d: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 7d296ced577f: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": a30961f2bf4f: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1e66ea6b371f: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1dff8f3a3f3a: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 201bb7da5556: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": d2dcd451dd41: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6d49e1f18e65: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 046fd3128fec: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c402a9f56a02: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c92bca758a75: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 033a1029635f: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": cfba8a420bca: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 517bd38fc9ea: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 293dc2fd7cd1: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 59f39204ed7b: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": f1feef9cbb2d: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1bed9f25f8bf: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6c3bfcbfdc6c: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 8e4aa989bb76: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": e7ed01e7f728: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 69f495d9e75e: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": cfbeeab1e81d: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ad6eb50aef31: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1c33a6b26d40: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 046fd3128fec: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": db6a3fe9e62e: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1dff8f3a3f3a: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": b49e4f6e7f47: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c4709f2425fe: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": fd68e21b8df5: Pulling fs layer Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1bed9f25f8bf: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 517bd38fc9ea: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 8e4aa989bb76: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ad6eb50aef31: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 69f495d9e75e: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": b49e4f6e7f47: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c4709f2425fe: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": fd68e21b8df5: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 033a1029635f: Waiting Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": bde827a1238f: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": bde827a1238f: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": b549f31133a9: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": b549f31133a9: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6ceb804ebe72: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6ceb804ebe72: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 47fe9ac47af0: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 47fe9ac47af0: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 141570139e07: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 5b2ecca66c2f: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 5b2ecca66c2f: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": fda11c351fde: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": fda11c351fde: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 830012418f5b: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 830012418f5b: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": b549f31133a9: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 5125300fde52: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 5125300fde52: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1aa11dc3e76d: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1aa11dc3e76d: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1e66ea6b371f: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1e66ea6b371f: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6d49e1f18e65: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6d49e1f18e65: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c92bca758a75: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c92bca758a75: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 46902f44dc57: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 0a16326ab986: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 0a16326ab986: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": cfba8a420bca: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": cfba8a420bca: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 201bb7da5556: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 201bb7da5556: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 59f39204ed7b: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 59f39204ed7b: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 7c9fbc0a1857: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 7c9fbc0a1857: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": a30961f2bf4f: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": a30961f2bf4f: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 7d296ced577f: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 7d296ced577f: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c402a9f56a02: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c402a9f56a02: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 293dc2fd7cd1: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": e7ed01e7f728: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": e7ed01e7f728: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": d2dcd451dd41: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": d2dcd451dd41: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": db6a3fe9e62e: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1c33a6b26d40: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": f1feef9cbb2d: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": f1feef9cbb2d: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6c3bfcbfdc6c: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6c3bfcbfdc6c: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1dff8f3a3f3a: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1dff8f3a3f3a: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": cfbeeab1e81d: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": cfbeeab1e81d: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 046fd3128fec: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 046fd3128fec: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": fda11c351fde: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 033a1029635f: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": bde827a1238f: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 517bd38fc9ea: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 517bd38fc9ea: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1bed9f25f8bf: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1bed9f25f8bf: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 8e4aa989bb76: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 8e4aa989bb76: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": b49e4f6e7f47: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": b49e4f6e7f47: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 69f495d9e75e: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 69f495d9e75e: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ad6eb50aef31: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ad6eb50aef31: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": fd68e21b8df5: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 47fe9ac47af0: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6ceb804ebe72: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 141570139e07: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c4709f2425fe: Verifying Checksum Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c4709f2425fe: Download complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 7d296ced577f: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 5b2ecca66c2f: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 830012418f5b: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 0a16326ab986: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 5125300fde52: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1aa11dc3e76d: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1e66ea6b371f: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6d49e1f18e65: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c92bca758a75: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 46902f44dc57: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 201bb7da5556: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": cfba8a420bca: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 59f39204ed7b: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 7c9fbc0a1857: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": a30961f2bf4f: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c402a9f56a02: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": d2dcd451dd41: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 293dc2fd7cd1: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": e7ed01e7f728: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1c33a6b26d40: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": db6a3fe9e62e: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": f1feef9cbb2d: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 6c3bfcbfdc6c: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": cfbeeab1e81d: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1dff8f3a3f3a: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 046fd3128fec: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 033a1029635f: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 517bd38fc9ea: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 1bed9f25f8bf: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 8e4aa989bb76: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": 69f495d9e75e: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ad6eb50aef31: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": b49e4f6e7f47: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": c4709f2425fe: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": fd68e21b8df5: Pull complete Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Digest: sha256:883bb3bb561d560bf5147be95d777a8ff29e5ddc13519e45fad9419d67036206 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> 3cb9452d081a Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Step 2/8 : ENV GOPATH="${GOPATH:-/root/go}" Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> Running in 66839b229114 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Removing intermediate container 66839b229114 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> 7faba80a6177 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Step 3/8 : ENV ORG_ROOT="${ORG_ROOT:-${GOPATH}/src/github.com/fluxcd}" Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> Running in 067d97921b23 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Removing intermediate container 067d97921b23 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> 2eceb7f8772e Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Step 4/8 : RUN mkdir -p "${ORG_ROOT}" Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> Running in 1e8a409bc8a4 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Removing intermediate container 1e8a409bc8a4 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> eba98527063b Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Step 5/8 : ARG REPOSITORIES="pkg notification-controller kustomize-controller helm-controller image-reflector-controller source-controller image-automation-controller" Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> Running in 002b2c794645 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Removing intermediate container 002b2c794645 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> 9959cddced86 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Step 6/8 : RUN for repo in ${REPOSITORIES}; do git clone --depth 1 "https://github.com/fluxcd/${repo}" "${ORG_ROOT}/${repo}"; done Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> Running in e38214529e45 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Cloning into '/root/go/src/github.com/fluxcd/pkg'... Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Cloning into '/root/go/src/github.com/fluxcd/notification-controller'... Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Cloning into '/root/go/src/github.com/fluxcd/kustomize-controller'... Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Cloning into '/root/go/src/github.com/fluxcd/helm-controller'... Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Cloning into '/root/go/src/github.com/fluxcd/image-reflector-controller'... Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Cloning into '/root/go/src/github.com/fluxcd/source-controller'... Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Cloning into '/root/go/src/github.com/fluxcd/image-automation-controller'... Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Removing intermediate container e38214529e45 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> 8bf3828bdf38 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Step 7/8 : COPY build.sh $SRC/ Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> c64530424c06 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Step 8/8 : WORKDIR $SRC Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> Running in 99aed5a03b89 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Removing intermediate container 99aed5a03b89 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": ---> fa277c5e6dd8 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Successfully built fa277c5e6dd8 Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Successfully tagged gcr.io/oss-fuzz/fluxcd:latest Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/fluxcd:latest Finished Step #1 - "build-606f9623-250b-4bde-a633-d91ca02c89ae" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/fluxcd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileSf68YP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/fluxcd/kustomize-controller/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/fluxcd/kustomize-controller Step #2 - "srcmap": + cd /root/go/src/github.com/fluxcd/kustomize-controller Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/fluxcd/kustomize-controller Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=124402b53af760d7fff8b2b1e5f692173d2dce7d Step #2 - "srcmap": + jq_inplace /tmp/fileSf68YP '."/root/go/src/github.com/fluxcd/kustomize-controller" = { type: "git", url: "https://github.com/fluxcd/kustomize-controller", rev: "124402b53af760d7fff8b2b1e5f692173d2dce7d" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileTZusT9 Step #2 - "srcmap": + cat /tmp/fileSf68YP Step #2 - "srcmap": + jq '."/root/go/src/github.com/fluxcd/kustomize-controller" = { type: "git", url: "https://github.com/fluxcd/kustomize-controller", rev: "124402b53af760d7fff8b2b1e5f692173d2dce7d" }' Step #2 - "srcmap": + mv /tmp/fileTZusT9 /tmp/fileSf68YP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/fluxcd/image-automation-controller/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/fluxcd/image-automation-controller Step #2 - "srcmap": + cd /root/go/src/github.com/fluxcd/image-automation-controller Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/fluxcd/image-automation-controller Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=aedbb03c3e6b5a740f261f0f6204d3c7f6f310ac Step #2 - "srcmap": + jq_inplace /tmp/fileSf68YP '."/root/go/src/github.com/fluxcd/image-automation-controller" = { type: "git", url: "https://github.com/fluxcd/image-automation-controller", rev: "aedbb03c3e6b5a740f261f0f6204d3c7f6f310ac" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filevkvPTH Step #2 - "srcmap": + cat /tmp/fileSf68YP Step #2 - "srcmap": + jq '."/root/go/src/github.com/fluxcd/image-automation-controller" = { type: "git", url: "https://github.com/fluxcd/image-automation-controller", rev: "aedbb03c3e6b5a740f261f0f6204d3c7f6f310ac" }' Step #2 - "srcmap": + mv /tmp/filevkvPTH /tmp/fileSf68YP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/fluxcd/helm-controller/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/fluxcd/helm-controller Step #2 - "srcmap": + cd /root/go/src/github.com/fluxcd/helm-controller Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/fluxcd/helm-controller Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=68dc67620a03bb16079598f3525cf36e24f935b2 Step #2 - "srcmap": + jq_inplace /tmp/fileSf68YP '."/root/go/src/github.com/fluxcd/helm-controller" = { type: "git", url: "https://github.com/fluxcd/helm-controller", rev: "68dc67620a03bb16079598f3525cf36e24f935b2" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filedQ0bCf Step #2 - "srcmap": + cat /tmp/fileSf68YP Step #2 - "srcmap": + jq '."/root/go/src/github.com/fluxcd/helm-controller" = { type: "git", url: "https://github.com/fluxcd/helm-controller", rev: "68dc67620a03bb16079598f3525cf36e24f935b2" }' Step #2 - "srcmap": + mv /tmp/filedQ0bCf /tmp/fileSf68YP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/fluxcd/pkg/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/fluxcd/pkg Step #2 - "srcmap": + cd /root/go/src/github.com/fluxcd/pkg Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/fluxcd/pkg Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=21cbf19670ac61decc3a1ad7b3361cf14ec49845 Step #2 - "srcmap": + jq_inplace /tmp/fileSf68YP '."/root/go/src/github.com/fluxcd/pkg" = { type: "git", url: "https://github.com/fluxcd/pkg", rev: "21cbf19670ac61decc3a1ad7b3361cf14ec49845" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileoJtx7L Step #2 - "srcmap": + cat /tmp/fileSf68YP Step #2 - "srcmap": + jq '."/root/go/src/github.com/fluxcd/pkg" = { type: "git", url: "https://github.com/fluxcd/pkg", rev: "21cbf19670ac61decc3a1ad7b3361cf14ec49845" }' Step #2 - "srcmap": + mv /tmp/fileoJtx7L /tmp/fileSf68YP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/fluxcd/source-controller/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/fluxcd/source-controller Step #2 - "srcmap": + cd /root/go/src/github.com/fluxcd/source-controller Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/fluxcd/source-controller Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=32967c32c3676f0005cb902e2fdc37c22ae12efc Step #2 - "srcmap": + jq_inplace /tmp/fileSf68YP '."/root/go/src/github.com/fluxcd/source-controller" = { type: "git", url: "https://github.com/fluxcd/source-controller", rev: "32967c32c3676f0005cb902e2fdc37c22ae12efc" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileodJQ3k Step #2 - "srcmap": + cat /tmp/fileSf68YP Step #2 - "srcmap": + jq '."/root/go/src/github.com/fluxcd/source-controller" = { type: "git", url: "https://github.com/fluxcd/source-controller", rev: "32967c32c3676f0005cb902e2fdc37c22ae12efc" }' Step #2 - "srcmap": + mv /tmp/fileodJQ3k /tmp/fileSf68YP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/fluxcd/image-reflector-controller/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/fluxcd/image-reflector-controller Step #2 - "srcmap": + cd /root/go/src/github.com/fluxcd/image-reflector-controller Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/fluxcd/image-reflector-controller Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=51817d6c40bf4d83814440f5fe126bfbb7a6ab3b Step #2 - "srcmap": + jq_inplace /tmp/fileSf68YP '."/root/go/src/github.com/fluxcd/image-reflector-controller" = { type: "git", url: "https://github.com/fluxcd/image-reflector-controller", rev: "51817d6c40bf4d83814440f5fe126bfbb7a6ab3b" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filesDwIAP Step #2 - "srcmap": + cat /tmp/fileSf68YP Step #2 - "srcmap": + jq '."/root/go/src/github.com/fluxcd/image-reflector-controller" = { type: "git", url: "https://github.com/fluxcd/image-reflector-controller", rev: "51817d6c40bf4d83814440f5fe126bfbb7a6ab3b" }' Step #2 - "srcmap": + mv /tmp/filesDwIAP /tmp/fileSf68YP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/fluxcd/notification-controller/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/fluxcd/notification-controller Step #2 - "srcmap": + cd /root/go/src/github.com/fluxcd/notification-controller Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/fluxcd/notification-controller Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=a3e6dd6a1020e502887ae0a4b95678883bea3cb4 Step #2 - "srcmap": + jq_inplace /tmp/fileSf68YP '."/root/go/src/github.com/fluxcd/notification-controller" = { type: "git", url: "https://github.com/fluxcd/notification-controller", rev: "a3e6dd6a1020e502887ae0a4b95678883bea3cb4" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file0XqGml Step #2 - "srcmap": + cat /tmp/fileSf68YP Step #2 - "srcmap": + jq '."/root/go/src/github.com/fluxcd/notification-controller" = { type: "git", url: "https://github.com/fluxcd/notification-controller", rev: "a3e6dd6a1020e502887ae0a4b95678883bea3cb4" }' Step #2 - "srcmap": + mv /tmp/file0XqGml /tmp/fileSf68YP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileSf68YP Step #2 - "srcmap": + rm /tmp/fileSf68YP Step #2 - "srcmap": { Step #2 - "srcmap": "/root/go/src/github.com/fluxcd/kustomize-controller": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/fluxcd/kustomize-controller", Step #2 - "srcmap": "rev": "124402b53af760d7fff8b2b1e5f692173d2dce7d" Step #2 - "srcmap": }, Step #2 - "srcmap": "/root/go/src/github.com/fluxcd/image-automation-controller": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/fluxcd/image-automation-controller", Step #2 - "srcmap": "rev": "aedbb03c3e6b5a740f261f0f6204d3c7f6f310ac" Step #2 - "srcmap": }, Step #2 - "srcmap": "/root/go/src/github.com/fluxcd/helm-controller": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/fluxcd/helm-controller", Step #2 - "srcmap": "rev": "68dc67620a03bb16079598f3525cf36e24f935b2" Step #2 - "srcmap": }, Step #2 - "srcmap": "/root/go/src/github.com/fluxcd/pkg": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/fluxcd/pkg", Step #2 - "srcmap": "rev": "21cbf19670ac61decc3a1ad7b3361cf14ec49845" Step #2 - "srcmap": }, Step #2 - "srcmap": "/root/go/src/github.com/fluxcd/source-controller": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/fluxcd/source-controller", Step #2 - "srcmap": "rev": "32967c32c3676f0005cb902e2fdc37c22ae12efc" Step #2 - "srcmap": }, Step #2 - "srcmap": "/root/go/src/github.com/fluxcd/image-reflector-controller": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/fluxcd/image-reflector-controller", Step #2 - "srcmap": "rev": "51817d6c40bf4d83814440f5fe126bfbb7a6ab3b" Step #2 - "srcmap": }, Step #2 - "srcmap": "/root/go/src/github.com/fluxcd/notification-controller": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/fluxcd/notification-controller", Step #2 - "srcmap": "rev": "a3e6dd6a1020e502887ae0a4b95678883bea3cb4" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + GOPATH=/root/go Step #3 - "compile-libfuzzer-coverage-x86_64": + ORG_ROOT=/root/go/src/github.com/fluxcd Step #3 - "compile-libfuzzer-coverage-x86_64": + PREBUILD_SCRIPT_PATH=tests/fuzz/oss_fuzz_prebuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + POSTBUILD_SCRIPT_PATH=tests/fuzz/oss_fuzz_postbuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + main Step #3 - "compile-libfuzzer-coverage-x86_64": + grep -h '^module github.com/fluxcd/' /src/go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": grep: /src/go.mod: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Going through all repositories in /root/go/src/github.com/fluxcd' Step #3 - "compile-libfuzzer-coverage-x86_64": Going through all repositories in /root/go/src/github.com/fluxcd Step #3 - "compile-libfuzzer-coverage-x86_64": + loop_through_org_repositories Step #3 - "compile-libfuzzer-coverage-x86_64": + local repos= Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find /root/go/src/github.com/fluxcd -type d -mindepth 1 -maxdepth 1 Step #3 - "compile-libfuzzer-coverage-x86_64": find: warning: you have specified the global option -mindepth after the argument -type, but global options are not positional, i.e., -mindepth affects tests specified before it as well as those specified after it. Please specify global options before other arguments. Step #3 - "compile-libfuzzer-coverage-x86_64": find: warning: you have specified the global option -maxdepth after the argument -type, but global options are not positional, i.e., -maxdepth affects tests specified before it as well as those specified after it. Please specify global options before other arguments. Step #3 - "compile-libfuzzer-coverage-x86_64": + repos='/root/go/src/github.com/fluxcd/kustomize-controller Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/fluxcd/image-automation-controller Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/fluxcd/helm-controller Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/fluxcd/pkg Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/fluxcd/source-controller Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/fluxcd/image-reflector-controller Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/fluxcd/notification-controller' Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/fluxcd/kustomize-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/fluxcd/kustomize-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/kustomize-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + . tests/fuzz/oss_fuzz_prebuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": ++ set -euxo pipefail Step #3 - "compile-libfuzzer-coverage-x86_64": ++ mkdir -p internal/controller/testdata/crd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cp config/crd/bases/kustomize.toolkit.fluxcd.io_kustomizations.yaml internal/controller/testdata/crd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules='api Step #3 - "compile-libfuzzer-coverage-x86_64": .' Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/kustomize-controller/api Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/kustomize-controller/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files=./internal/controller/kustomization_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./internal/controller/kustomization_fuzzer_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.24.0 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- main.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package main' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./internal/controller/kustomization_fuzzer_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/runtime v0.60.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/getsops/sops/v3 v3.10.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/kms v1.21.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading filippo.io/age v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.40.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.36.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/auth v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/cache v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.17.67 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/cli-utils v0.36.0-flux.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go v0.120.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/apis/acl v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/apis/event v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/apis/meta v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/http/fetch v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/kustomize v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/ssa v0.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/tar v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dimchansky/utfbom v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/source-controller/api v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/controller-runtime v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/kustomize/api v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/apis/kustomize v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/testserver v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/vault/api v1.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.1-0.20220411205349-bde1400a84be Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ory/dockertest/v3 v3.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading c2sp.org/CCTV/age v0.0.0-20240306222714-3ec4d716e805 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity/cache v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/redis/go-redis/v9 v9.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.72.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azkeys v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/api v0.230.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250425173222-7b384671a197 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/go-homedir v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.29.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/kms v1.38.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.33.19 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ProtonMail/go-crypto v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/getsops/gopgagent v0.0.0-20241224165529-7044f28e491e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/goware/prefixer v0.0.0-20160118172347-395022866408 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/go-wordwrap v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli v1.22.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry v0.20.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20250425173222-7b384671a197 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-oidc/v3 v3.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ecr v1.43.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/cel-go v0.23.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest/blake3 v0.0.0-20250116041648-1e56c6daea3b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/iam v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/longrunning v0.6.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/gax-go/v2 v2.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/smithy-go v1.22.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/envsubst v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/sourceignore v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-git/go-git/v5 v5.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiextensions-apiserver v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/kustomize/kyaml v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/otiai10/copy v1.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubectl v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cli-runtime v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-rootcerts v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/parseutil v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/hcl v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-test/deep v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-sql-driver/mysql v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lib/pq v1.10.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/randfill v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch/v5 v5.9.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.23.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver/v4 v4.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/zapr v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-extensions-for-go/cache v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver v3.5.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250425173222-7b384671a197 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.63.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.8.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.30 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.25.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.30.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-colorable v0.1.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading filippo.io/edwards25519 v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/ini.v1 v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-isatty v0.0.20 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.34 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.12.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.12.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/storage v1.51.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.17.72 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/s3 v1.79.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/cli v28.1.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cel.dev/expr v0.22.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stoewer/go-strcase v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zeebo/blake3 v0.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/otiai10/mint v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ryanuber/go-glob v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-sockaddr v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-errors/errors v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.6.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gomodules.xyz/jsonpatch/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/btree v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-git/go-billy/v5 v5.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xlab/treeprint v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/keybase/go-keychain v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.34 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudflare/circl v1.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/antlr4-go/antlr/v4 v4.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sergi/go-diff v1.3.2-0.20230802210424-5b0b94c5c0d3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zeebo/assert v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runc v1.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Nvveen/Gotty v0.0.0-20120604004816-cd527374f1e5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/term v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-connections v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.51.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/detectors/gcp v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.34 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.18.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch v5.7.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jbenet/go-context v0.0.0-20150711004518-d14ea06fba99 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gotest.tools/v3 v3.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/docker v28.1.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-viper/mapstructure/v2 v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20240909161429-701f63a606c0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/carapace-sh/carapace-shlex v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.2.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/continuity v0.4.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/creack/pty v1.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/monitoring v1.24.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/resourcemapping v0.51.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/cloudmock v0.51.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane/envoy v1.32.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/automaxprocs v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/chai2010/gettext-go v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/MakeNowJust/heredoc v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/exponent-io/jsonpath v0.0.0-20210407135951-1de76d718b3f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/docker-credential-helpers v0.8.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/warnings.v0 v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonschema v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-ansiterm v0.0.0-20250102033503-faa5f7b0171c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.12.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/logging v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/trace v1.11.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane v0.13.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20250326154945-ae57f3c0d45f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/martian/v3 v3.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zeebo/pcg v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spiffe/go-spiffe/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane/ratelimit v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20250403155104-27863c87afa6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/spdystream v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zeebo/errs v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/docker-image-spec v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.60.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.60.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/s2a-go v0.1.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/kustomization_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/controller/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/controller/kustomization_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Controllers Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_controllers Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Controllers Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/kustomization_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/controller Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/controller/kustomization_fuzzer_test.go.Fuzz_Controllers into Fuzz_Controllers' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/controller/kustomization_fuzzer_test.go.Fuzz_Controllers into Fuzz_Controllers Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/controller Fuzz_Controllers Fuzz_Controllers Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/fluxcd/image-automation-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/fluxcd/image-automation-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/image-automation-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + . tests/fuzz/oss_fuzz_prebuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": ++ set -euxo pipefail Step #3 - "compile-libfuzzer-coverage-x86_64": ++ mkdir -p internal/controller/testdata/crd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cp config/crd/bases/image.toolkit.fluxcd.io_imageupdateautomations.yaml internal/controller/testdata/crd Step #3 - "compile-libfuzzer-coverage-x86_64": +++ go list -m github.com/fluxcd/source-controller/api Step #3 - "compile-libfuzzer-coverage-x86_64": +++ awk '{print $2}' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ SOURCE_VER=v1.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": +++ go list -m github.com/fluxcd/image-reflector-controller/api Step #3 - "compile-libfuzzer-coverage-x86_64": +++ awk '{print $2}' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ REFLECTOR_VER=v0.35.2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ '[' -d ../../internal/controller/testdata/crds ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ curl -s --fail https://raw.githubusercontent.com/fluxcd/source-controller/v1.6.1/config/crd/bases/source.toolkit.fluxcd.io_gitrepositories.yaml -o internal/controller/testdata/crd/gitrepositories.yaml Step #3 - "compile-libfuzzer-coverage-x86_64": ++ curl -s --fail https://raw.githubusercontent.com/fluxcd/image-reflector-controller/v0.35.2/config/crd/bases/image.toolkit.fluxcd.io_imagepolicies.yaml -o internal/controller/testdata/crd/imagepolicies.yaml Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules='api Step #3 - "compile-libfuzzer-coverage-x86_64": .' Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/image-automation-controller/api Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/image-automation-controller/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files='./internal/source/source_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/controller/controllers_fuzzer_test.go' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './internal/source/source_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/controller/controllers_fuzzer_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- main.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package main' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './internal/source/source_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/controller/controllers_fuzzer_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/image-reflector-controller/api v0.35.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/kustomize/kyaml v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/git v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/auth v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/source-controller/api v1.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/sprig/v3 v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/gittestserver v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/ssh v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-git/go-git/v5 v5.16.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/git/gogit v0.35.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.39.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/goutils v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/semver/v3 v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/huandu/xstrings v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/copystructure v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shopspring/decimal v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-colorable v0.1.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bradleyfalzon/ghinstallation/v2 v2.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/gitkit v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/version v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/elazarl/goproxy v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/reflectwalk v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/kustomize/api v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-git/go-git-fixtures/v4 v4.3.2-0.20231010084843-55a94097c399 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emirpasic/gods v1.18.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kevinburke/ssh_config v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/skeema/knownhosts v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xanzy/ssh-agent v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gliderlabs/ssh v0.3.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/cli v27.5.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ecrpublic v1.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pjbgf/sha1cd v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/smithy-go v1.22.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/anmitsu/go-shlex v0.0.0-20200514113438-38f4b401e2be Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v4 v4.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-github/v71 v71.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gofrs/uuid v4.4.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gotest.tools/v3 v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-querystring v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/source/source_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/source/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/source/source_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_templateMsg Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_templatemsg Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_templateMsg Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/source/source_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/source Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/source/source_test.go.Fuzz_templateMsg into Fuzz_templateMsg' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/source/source_test.go.Fuzz_templateMsg into Fuzz_templateMsg Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/source Fuzz_templateMsg Fuzz_templateMsg Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/controllers_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/controller/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/controller/controllers_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets='Fuzz_ImageUpdateReconciler Step #3 - "compile-libfuzzer-coverage-x86_64": FuzzUpdateWithSetters' Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_imageupdatereconciler Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_ImageUpdateReconciler Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/controllers_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/controller Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/controller/controllers_fuzzer_test.go.Fuzz_ImageUpdateReconciler into Fuzz_ImageUpdateReconciler' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/controller/controllers_fuzzer_test.go.Fuzz_ImageUpdateReconciler into Fuzz_ImageUpdateReconciler Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/controller Fuzz_ImageUpdateReconciler Fuzz_ImageUpdateReconciler Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzupdatewithsetters Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzUpdateWithSetters Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/controllers_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/controller Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/controller/controllers_fuzzer_test.go.FuzzUpdateWithSetters into FuzzUpdateWithSetters' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/controller/controllers_fuzzer_test.go.FuzzUpdateWithSetters into FuzzUpdateWithSetters Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/controller FuzzUpdateWithSetters FuzzUpdateWithSetters Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/fluxcd/helm-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/fluxcd/helm-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/helm-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules='api Step #3 - "compile-libfuzzer-coverage-x86_64": .' Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/helm-controller/api Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/helm-controller/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files=./internal/controller/helmrelease_controller_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./internal/controller/helmrelease_controller_fuzz_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: upgraded github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20230306123547-8075edf89bb0 => v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- main.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package main' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./internal/controller/helmrelease_controller_fuzz_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.1-0.20231025023718-d50d2fec9c98 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading helm.sh/helm/v3 v3.17.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/ssa v0.48.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/wI2L/jsondiff v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/apis/meta v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/chartutil v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch v5.9.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/term v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.62.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sergi/go-diff v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/chai2010/gettext-go v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zeebo/blake3 v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/sjson v1.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/gjson v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/pretty v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/match v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/DATA-DOG/go-sqlmock v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rubenv/sql-migrate v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gosuri/uitable v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmoiron/sqlx v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading oras.land/oras-go v1.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/squirrel v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/containerd v1.7.27 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/BurntSushi/toml v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/glob v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiserver v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/distribution/v3 v3.0.0-20221208165359-362910506bc2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/phayes/freeport v0.0.0-20220201140144-74d24b5ae9f5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/foxcpp/go-mockdns v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-runewidth v0.0.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-sqlite3 v1.14.22 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-gorp/gorp/v3 v3.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lann/builder v0.0.0-20180802200727-47ae307949d0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/dns v1.1.57 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lann/ps v0.0.0-20150810152359-62de8c46ede0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/poy/onpar v1.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/docker v27.1.2+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/cli v27.1.2+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/distribution v2.8.3+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/libtrust v0.0.0-20150114040149-fa567046d9b1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/reference v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/mux v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-metrics v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/handlers v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yvasiyarov/gorelic v0.0.0-20141212073537-a9bba5b9ab50 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-events v0.0.0-20190806004212-e31b211e4f1c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/bugsnag-go v0.0.0-20141110184014-b1d153021fcd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bshuster-repo/logrus-logstash-hook v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/golang-lru v0.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Shopify/logrus-bugsnag v0.0.0-20171204204709-577dee27f20d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gomodule/redigo v1.8.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gotest.tools/v3 v3.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yvasiyarov/newrelic_platform_go v0.0.0-20140908184405-b21fdbd4370f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yvasiyarov/go-metrics v0.0.0-20140926110328-57bccd1ccd43 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/panicwrap v0.0.0-20151223152923-e2c28503fcd0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/platforms v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.68.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/log v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.34.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/locker v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.34.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.58.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/continuity v0.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/hcsshim v0.11.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/userns v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.34.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/osext v0.0.0-20130617224835-0dd3f918b21b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/cgroups v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20241209162323-e6fa225c2576 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/helmrelease_controller_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/controller/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/controller/helmrelease_controller_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzHelmReleaseReconciler_reconcile Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzhelmreleasereconciler_reconcile Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzHelmReleaseReconciler_reconcile Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/helmrelease_controller_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/controller Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/controller/helmrelease_controller_fuzz_test.go.FuzzHelmReleaseReconciler_reconcile into FuzzHelmReleaseReconciler_reconcile' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/controller/helmrelease_controller_fuzz_test.go.FuzzHelmReleaseReconciler_reconcile into FuzzHelmReleaseReconciler_reconcile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/controller FuzzHelmReleaseReconciler_reconcile FuzzHelmReleaseReconciler_reconcile Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/fluxcd/pkg Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/fluxcd/pkg Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules='apis/acl Step #3 - "compile-libfuzzer-coverage-x86_64": apis/event Step #3 - "compile-libfuzzer-coverage-x86_64": apis/kustomize Step #3 - "compile-libfuzzer-coverage-x86_64": apis/meta Step #3 - "compile-libfuzzer-coverage-x86_64": auth Step #3 - "compile-libfuzzer-coverage-x86_64": cache Step #3 - "compile-libfuzzer-coverage-x86_64": chartutil Step #3 - "compile-libfuzzer-coverage-x86_64": envsubst Step #3 - "compile-libfuzzer-coverage-x86_64": git Step #3 - "compile-libfuzzer-coverage-x86_64": git/gogit Step #3 - "compile-libfuzzer-coverage-x86_64": git/internal/e2e Step #3 - "compile-libfuzzer-coverage-x86_64": gittestserver Step #3 - "compile-libfuzzer-coverage-x86_64": helmtestserver Step #3 - "compile-libfuzzer-coverage-x86_64": http/fetch Step #3 - "compile-libfuzzer-coverage-x86_64": http/transport Step #3 - "compile-libfuzzer-coverage-x86_64": kustomize Step #3 - "compile-libfuzzer-coverage-x86_64": lockedfile Step #3 - "compile-libfuzzer-coverage-x86_64": masktoken Step #3 - "compile-libfuzzer-coverage-x86_64": oci Step #3 - "compile-libfuzzer-coverage-x86_64": oci/tests/integration Step #3 - "compile-libfuzzer-coverage-x86_64": runtime Step #3 - "compile-libfuzzer-coverage-x86_64": sourceignore Step #3 - "compile-libfuzzer-coverage-x86_64": ssa Step #3 - "compile-libfuzzer-coverage-x86_64": ssh Step #3 - "compile-libfuzzer-coverage-x86_64": tar Step #3 - "compile-libfuzzer-coverage-x86_64": testserver Step #3 - "compile-libfuzzer-coverage-x86_64": version' Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/apis/acl Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/apis/event Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/apis/kustomize Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/apis/meta Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/auth Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/cache Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/chartutil Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files=./values_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./values_fuzz_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: upgraded github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 => v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- digest.go digest_test.go encode.go encode_test.go merge.go merge_test.go sort.go sort_test.go values.go values_fuzz_test.go values_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package chartutil' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./values_fuzz_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading helm.sh/helm/v3 v3.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.23.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20241210010833-40e02aabc2ad Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./values_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/envsubst Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/git Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/git/gogit Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/git/internal/e2e Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/gittestserver Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/helmtestserver Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/http/fetch Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/http/transport Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/kustomize Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/lockedfile Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/masktoken Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/oci Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/oci/tests/integration Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files='./events/recorder_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/matcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/patch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/getter_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/unstructured_fuzz_test.go' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './events/recorder_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/matcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/patch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/getter_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/unstructured_fuzz_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- doc.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package runtime' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './events/recorder_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/matcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/patch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/getter_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./conditions/unstructured_fuzz_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cel.dev/expr v0.19.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20241209162323-e6fa225c2576 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./events/recorder_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./events/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./events/recorder_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Eventf Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=runtime_ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_eventf Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Eventf Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./events/recorder_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./events Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./events/recorder_fuzzer_test.go.Fuzz_Eventf into Fuzz_Eventf' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./events/recorder_fuzzer_test.go.Fuzz_Eventf into Fuzz_Eventf Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./events Fuzz_Eventf Fuzz_Eventf Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./conditions/matcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./conditions/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./conditions/matcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Match Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=runtime_ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_match Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Match Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./conditions/matcher_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./conditions Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./conditions/matcher_test.go.Fuzz_Match into Fuzz_Match' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./conditions/matcher_test.go.Fuzz_Match into Fuzz_Match Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./conditions Fuzz_Match Fuzz_Match Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./conditions/patch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./conditions/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./conditions/patch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_PatchApply Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=runtime_ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_patchapply Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_PatchApply Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./conditions/patch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./conditions Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./conditions/patch_fuzz_test.go.Fuzz_PatchApply into Fuzz_PatchApply' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./conditions/patch_fuzz_test.go.Fuzz_PatchApply into Fuzz_PatchApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./conditions Fuzz_PatchApply Fuzz_PatchApply Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./conditions/getter_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./conditions/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./conditions/getter_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Getter Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=runtime_ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_getter Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Getter Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./conditions/getter_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./conditions Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./conditions/getter_test.go.Fuzz_Getter into Fuzz_Getter' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./conditions/getter_test.go.Fuzz_Getter into Fuzz_Getter Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./conditions Fuzz_Getter Fuzz_Getter Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./conditions/unstructured_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./conditions/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./conditions/unstructured_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Unstructured Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=runtime_ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=runtime Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_unstructured Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Unstructured Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./conditions/unstructured_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./conditions Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./conditions/unstructured_fuzz_test.go.Fuzz_Unstructured into Fuzz_Unstructured' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./conditions/unstructured_fuzz_test.go.Fuzz_Unstructured into Fuzz_Unstructured Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./conditions Fuzz_Unstructured Fuzz_Unstructured Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/sourceignore Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/ssa Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/ssh Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/tar Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files=./tar_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./tar_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- symlink_test.go tar.go tar_opts.go tar_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package tar' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./tar_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./tar_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/testserver Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/pkg/version Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/fluxcd/source-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/fluxcd/source-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/source-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + . tests/fuzz/oss_fuzz_prebuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": ++ set -euxo pipefail Step #3 - "compile-libfuzzer-coverage-x86_64": ++ mkdir -p internal/controller/testdata/crd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cp config/crd/bases/source.toolkit.fluxcd.io_buckets.yaml config/crd/bases/source.toolkit.fluxcd.io_gitrepositories.yaml config/crd/bases/source.toolkit.fluxcd.io_helmcharts.yaml config/crd/bases/source.toolkit.fluxcd.io_helmrepositories.yaml config/crd/bases/source.toolkit.fluxcd.io_ocirepositories.yaml internal/controller/testdata/crd/ Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules='api Step #3 - "compile-libfuzzer-coverage-x86_64": .' Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/source-controller/api Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/source-controller/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files=./internal/controller/gitrepository_controller_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./internal/controller/gitrepository_controller_fuzz_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: upgraded github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20230306123547-8075edf89bb0 => v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- main.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package main' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./internal/controller/gitrepository_controller_fuzz_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gotest.tools v2.2.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/minio-go/v7 v7.0.92 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/distribution/v3 v3.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/oci v0.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry v0.20.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/api v0.227.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/auth v0.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/storage v1.50.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/notation-core-go v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/cosign/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/notation-go v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go v0.118.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest/blake3 v0.0.0-20240426182413-22b78e47854a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/lockedfile v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading oras.land/oras-go/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/masktoken v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry/pkg/authn/k8schain v0.0.0-20241111191718-6bce25ecf029 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/helmtestserver v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/docker-credential-helpers v0.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/tspclient-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/veraison/go-cose v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-ini/ini v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gotest.tools/v3 v3.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.16.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dustin/go-humanize v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/crc64nvme v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/md5-simd v1.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/iam v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/detectors/gcp v1.34.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20250303144028-a0af3efb3deb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.71.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/letsencrypt/boulder v0.0.0-20240620165639-de9c06129bec Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/secure-systems-lab/go-securesystemslib v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/protobuf-specs v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-test/deep v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v3 v3.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/fulcio v1.6.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/depcheck-test/depcheck-test v0.0.0-20220607135614-199033aaa936 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/awslabs/amazon-ecr-credential-helper/ecr-login v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/chrismellard/docker-credential-acr-env v0.0.0-20230304212654-82a0ddb27589 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/in-toto/in-toto-golang v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mozillazg/docker-credential-acr-helper v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v1.20.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/release-utils v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/rekor v1.3.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyberphone/json-canonicalization v0.0.0-20231011164504-785e29786b46 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/digitorus/timestamp v0.0.0-20231217203849-220c5c2851b7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/runtime v0.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/strfmt v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/certificate-transparency-go v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nozzle/throttler v0.0.0-20180817012639-2ea982251481 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore-go v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/timestamp-authority v1.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/transparency-dev/merkle v0.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/dns v1.1.58 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/notation-plugin-framework-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry/pkg/authn/kubernetes v0.0.0-20230516205744-dbecb1de8cfa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/stargz-snapshotter/estargz v0.16.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/goccy/go-json v0.10.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rs/xid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250303144028-a0af3efb3deb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250313205543-e70fdf4c4cb4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/monitoring v1.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/resourcemapping v0.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/cloudmock v0.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/handlers v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/longrunning v0.6.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runc v1.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/segmentio/ksuid v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/skratchdot/open-golang v0.0.0-20200116055534-eef842397966 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-rod/rod v0.116.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/theupdateframework/go-tuf v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest v0.11.29 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest v14.2.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sagikazarmark/locafero v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/afero v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/digitorus/pkcs7 v0.0.0-20230818184609-3a137a874352 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shibumi/go-pathspec v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/errors v0.22.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.1-0.20231216201459-8508981c8b6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/oklog/ulid v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.mongodb.org/mongo-driver v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/codahale/rfc6979 v0.0.0-20141003034818-6a90f24967eb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/spec v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/validate v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230919221257-8b5d3ce2d11d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20241108190413-2d47ceb2692f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/titanous/rocacheck v0.0.0-20171023193734-afe73141d399 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/in-toto/attestation v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-ldap/ldap/v3 v3.4.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-piv/piv-go/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ThalesIgnite/crypto11 v1.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/pkcs11 v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tinylib/msgp v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vbatts/tar-split v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/mux v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/exporters/autoexport v0.57.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdouttrace v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bsm/ginkgo/v2 v2.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bsm/gomega v1.27.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/redis/go-redis/extra/redisotel/v9 v9.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20241223141626-cff3c89139a3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/creack/pty v1.1.19 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/trace v1.11.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.23 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gitlab.com/gitlab-org/api/client-go v0.127.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/logger v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ysmood/goob v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ysmood/got v0.40.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ysmood/gson v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ysmood/fetchup v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ysmood/leakless v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AliyunContainerService/ack-ram-tool/pkg/credentials/provider v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/cr-20160607 v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/cr-20181201 v1.0.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/darabonba-openapi v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/tea-utils v1.4.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/tea v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aliyun/credentials-go v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sourcegraph/conc v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/goleveldb v1.0.1-0.20220721030215-126854af5e6d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opentracing/opentracing-go v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-chi/chi v4.1.2+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sassoftware/relic v7.2.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/trillian v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sassoftware/relic/v7 v7.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jedisct1/go-minisign v0.0.0-20230811132847-661be99b8267 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmhodges/clock v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/theupdateframework/go-tuf/v2 v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgx/v5 v5.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/tink/go v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/aws v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/azure v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/hashivault v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/gcp v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.step.sm/crypto v0.60.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-ntlmssp v0.0.0-20221128193559-754e69321358 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-asn1-ber/asn1-ber v1.5.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/buildkite/agent/v3 v3.95.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/thales-e-security/pool v0.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-github/v55 v55.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/bridges/prometheus v0.57.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpc v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/prometheus v0.54.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutlog v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/log v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/analysis v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/loads v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/philhofer/fwd v1.1.3-0.20240916144458-20a13a1f6b7c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/golang-lru/arc/v2 v2.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/redis/go-redis/extra/rediscmd/v9 v9.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cuelang.org/go v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/open-policy-agent/opa v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/tracing v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/mocks v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/date v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/endpoint-util v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/openapi-util v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/alibabacloud-gateway-spi v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/tea-xml v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alibabacloud-go/debug v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tink-crypto/tink-go-awskms/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tink-crypto/tink-go-gcpkms/v2 v2.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tink-crypto/tink-go/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgpassfile v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go v1.55.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alexbrainman/sspi v0.0.0-20231016080023-1a75b4708caa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gokrb5/v8 v8.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/kms v1.38.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jellydator/ttlcache/v3 v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/kms v1.21.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-runewidth v0.0.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-sqlite3 v1.14.24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/log v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.26.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/golang-lru/v2 v2.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/buildkite/roko v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/buildkite/go-pipeline v0.13.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pborman/uuid v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tjfoc/gmsm v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/clbanning/mxj/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/snappy v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/howeyc/gopass v0.0.0-20210920133722-c8aef6fb66ef Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zalando/go-keyring v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgerrcode v0.0.0-20240316143900-6e2875d9b438 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth v0.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/parseutil v0.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/hcl v1.0.1-vault-5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.59.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/dnsutils/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gofork v1.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-uuid v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/goidentity/v6 v6.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rivo/uniseg v0.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nxadm/tail v1.4.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/apd/v3 v3.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cuelabs.dev/go/oci/ociregistry v0.0.0-20241125120445-2c00c104c6e1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/buildkite/interpolate v0.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/oleiade/reflections v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alessio/shellescape v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/danieljoos/wincred v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-sockaddr v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/aescts/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/rpc/v2 v2.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/puddle/v2 v2.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/proto v1.13.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/protocolbuffers/txtpbfmt v0.0.0-20241112170944-20d2c9ebc01d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/OneOfOne/xxhash v1.2.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rcrowley/go-metrics v0.0.0-20201227073835-cf1acfcdf475 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/agnivade/levenshtein v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tchap/go-patricia/v2 v2.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yashtewari/glob-intersection v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath v0.4.1-0.20220621161143-b0104c826a24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/storage/armstorage v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/gitrepository_controller_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/controller/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/controller/gitrepository_controller_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets='FuzzRandomGitFiles Step #3 - "compile-libfuzzer-coverage-x86_64": FuzzGitResourceObject' Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzrandomgitfiles Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzRandomGitFiles Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/gitrepository_controller_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/controller Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/controller/gitrepository_controller_fuzz_test.go.FuzzRandomGitFiles into FuzzRandomGitFiles' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/controller/gitrepository_controller_fuzz_test.go.FuzzRandomGitFiles into FuzzRandomGitFiles Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/controller FuzzRandomGitFiles FuzzRandomGitFiles Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzgitresourceobject Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzGitResourceObject Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/gitrepository_controller_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/controller Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/controller/gitrepository_controller_fuzz_test.go.FuzzGitResourceObject into FuzzGitResourceObject' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/controller/gitrepository_controller_fuzz_test.go.FuzzGitResourceObject into FuzzGitResourceObject Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/controller FuzzGitResourceObject FuzzGitResourceObject Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/fluxcd/image-reflector-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/fluxcd/image-reflector-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/image-reflector-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + . tests/fuzz/oss_fuzz_prebuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": ++ set -euxo pipefail Step #3 - "compile-libfuzzer-coverage-x86_64": ++ mkdir -p internal/controller/testdata/crd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cp config/crd/bases/image.toolkit.fluxcd.io_imagepolicies.yaml config/crd/bases/image.toolkit.fluxcd.io_imagerepositories.yaml internal/controller/testdata/crd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules='api Step #3 - "compile-libfuzzer-coverage-x86_64": . Step #3 - "compile-libfuzzer-coverage-x86_64": tests/integration' Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/image-reflector-controller/api Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/image-reflector-controller/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files=./internal/controller/controllers_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./internal/controller/controllers_fuzzer_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- main.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package main' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z ./internal/controller/controllers_fuzzer_test.go ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry/pkg/authn/k8schain v0.0.0-20250225234217-098045d5e61f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dgraph-io/badger/v3 v3.2103.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gotest.tools/v3 v3.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ecr v1.44.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry/pkg/authn/kubernetes v0.0.0-20250225234217-098045d5e61f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest v0.11.30 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/tracing v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/date v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/logger v0.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dgraph-io/ristretto v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/flatbuffers v25.2.10+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/snappy v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/OneOfOne/xxhash v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spaolacci/murmur3 v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dgryski/go-farm v0.0.0-20200201041132-a6ae2369ad13 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/controllers_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/controller/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/controller/controllers_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_ImageRepositoryController Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_imagerepositorycontroller Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_ImageRepositoryController Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/controller/controllers_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/controller Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/controller/controllers_fuzzer_test.go.Fuzz_ImageRepositoryController into Fuzz_ImageRepositoryController' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/controller/controllers_fuzzer_test.go.Fuzz_ImageRepositoryController into Fuzz_ImageRepositoryController Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/controller Fuzz_ImageRepositoryController Fuzz_ImageRepositoryController Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/image-reflector-controller/tests/integration Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/fluxcd/notification-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/fluxcd/notification-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/notification-controller Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules='api Step #3 - "compile-libfuzzer-coverage-x86_64": .' Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/notification-controller/api Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/fluxcd/notification-controller/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files='./internal/notifier/teams_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/pagerduty_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/grafana_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/azure_devops_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/util_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/bitbucket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/google_chat_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/discord_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/opsgenie_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/webex_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/lark_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/rocket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/telegram_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/forwarder_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/matrix_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/gitlab_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/alertmanager_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/github_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/github_dispatch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/slack_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/datadog_fuzz_test.go' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './internal/notifier/teams_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/pagerduty_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/grafana_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/azure_devops_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/util_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/bitbucket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/google_chat_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/discord_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/opsgenie_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/webex_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/lark_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/rocket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/telegram_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/forwarder_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/matrix_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/gitlab_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/alertmanager_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/github_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/github_dispatch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/slack_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/datadog_fuzz_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- main.go Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package main' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './internal/notifier/teams_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/pagerduty_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/grafana_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/azure_devops_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/util_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/bitbucket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/google_chat_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/discord_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/opsgenie_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/webex_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/lark_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/rocket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/telegram_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/forwarder_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/matrix_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/gitlab_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/alertmanager_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/github_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/github_dispatch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/slack_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/notifier/datadog_fuzz_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/runtime v0.61.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sethvargo/go-limiter v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/slok/go-http-metrics v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cdevents/sdk-go v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-github/v64 v64.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/pubsub v1.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading code.gitea.io/sdk/gitea v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-amqp-common-go/v4 v4.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-event-hubs-go/v3 v3.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/DataDog/datadog-api-client-go/v2 v2.37.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/PagerDuty/go-pagerduty v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/chainguard-dev/git-urls v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containrrr/shoutrrr v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/git v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/getsentry/sentry-go v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ktrysmt/go-bitbucket v0.9.85 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/microsoft/azure-devops-go-api/azuredevops/v6 v6.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nats.go v1.41.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gitlab.com/gitlab-org/api/client-go v0.122.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fluxcd/pkg/ssh v0.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go v0.120.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cel.dev/expr v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250313205543-e70fdf4c4cb4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go v65.0.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pingcap/errors v0.11.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/42wim/httpsig v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davidmz/go-pageant v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-fed/httpsig v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-version v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-amqp v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest v0.11.28 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/to v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/devigned/tab v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jpillora/backoff v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/joho/godotenv v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.21 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250414145226-207652e42e2e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/iam v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.einride.tech/aip v0.68.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20240904232852-e7e105dedf7e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/santhosh-tekuri/jsonschema/v6 v6.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudevents/sdk-go/v2 v2.15.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-playground/validator/v10 v10.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/package-url/packageurl-go v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dimchansky/utfbom v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nkeys v0.4.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nuid v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dlclark/regexp2 v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-playground/locales v0.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-playground/universal-translator v0.18.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/leodido/go-urn v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-playground/assert/v2 v2.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gabriel-vasile/mimetype v1.4.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jarcoal/httpmock v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/valyala/bytebufferpool v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fortytw2/leaktest v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/goccy/go-json v0.10.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/DataDog/zstd v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-autorest/autorest/validation v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/teams_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/teams_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_MSTeams Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_msteams Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_MSTeams Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/teams_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/teams_fuzz_test.go.Fuzz_MSTeams into Fuzz_MSTeams' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/teams_fuzz_test.go.Fuzz_MSTeams into Fuzz_MSTeams Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_MSTeams Fuzz_MSTeams Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/pagerduty_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/pagerduty_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_PagerDuty Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_pagerduty Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_PagerDuty Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/pagerduty_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/pagerduty_fuzz_test.go.Fuzz_PagerDuty into Fuzz_PagerDuty' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/pagerduty_fuzz_test.go.Fuzz_PagerDuty into Fuzz_PagerDuty Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_PagerDuty Fuzz_PagerDuty Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/grafana_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/grafana_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Grafana Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_grafana Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Grafana Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/grafana_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/grafana_fuzz_test.go.Fuzz_Grafana into Fuzz_Grafana' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/grafana_fuzz_test.go.Fuzz_Grafana into Fuzz_Grafana Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Grafana Fuzz_Grafana Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/azure_devops_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/azure_devops_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_AzureDevOps Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_azuredevops Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_AzureDevOps Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/azure_devops_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/azure_devops_fuzz_test.go.Fuzz_AzureDevOps into Fuzz_AzureDevOps' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/azure_devops_fuzz_test.go.Fuzz_AzureDevOps into Fuzz_AzureDevOps Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_AzureDevOps Fuzz_AzureDevOps Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/util_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/util_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets='Fuzz_Util_ParseGitAddress Step #3 - "compile-libfuzzer-coverage-x86_64": Fuzz_Util_FormatNameAndDescription' Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_util_parsegitaddress Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Util_ParseGitAddress Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/util_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/util_fuzz_test.go.Fuzz_Util_ParseGitAddress into Fuzz_Util_ParseGitAddress' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/util_fuzz_test.go.Fuzz_Util_ParseGitAddress into Fuzz_Util_ParseGitAddress Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Util_ParseGitAddress Fuzz_Util_ParseGitAddress Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_util_formatnameanddescription Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Util_FormatNameAndDescription Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/util_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/util_fuzz_test.go.Fuzz_Util_FormatNameAndDescription into Fuzz_Util_FormatNameAndDescription' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/util_fuzz_test.go.Fuzz_Util_FormatNameAndDescription into Fuzz_Util_FormatNameAndDescription Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Util_FormatNameAndDescription Fuzz_Util_FormatNameAndDescription Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/bitbucket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/bitbucket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Bitbucket Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_bitbucket Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Bitbucket Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/bitbucket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/bitbucket_fuzz_test.go.Fuzz_Bitbucket into Fuzz_Bitbucket' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/bitbucket_fuzz_test.go.Fuzz_Bitbucket into Fuzz_Bitbucket Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Bitbucket Fuzz_Bitbucket Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/google_chat_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/google_chat_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_GoogleChat Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_googlechat Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_GoogleChat Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/google_chat_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/google_chat_fuzz_test.go.Fuzz_GoogleChat into Fuzz_GoogleChat' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/google_chat_fuzz_test.go.Fuzz_GoogleChat into Fuzz_GoogleChat Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_GoogleChat Fuzz_GoogleChat Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/discord_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/discord_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Discord Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_discord Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Discord Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/discord_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/discord_fuzz_test.go.Fuzz_Discord into Fuzz_Discord' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/discord_fuzz_test.go.Fuzz_Discord into Fuzz_Discord Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Discord Fuzz_Discord Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/opsgenie_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/opsgenie_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_OpsGenie Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_opsgenie Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_OpsGenie Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/opsgenie_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/opsgenie_fuzz_test.go.Fuzz_OpsGenie into Fuzz_OpsGenie' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/opsgenie_fuzz_test.go.Fuzz_OpsGenie into Fuzz_OpsGenie Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_OpsGenie Fuzz_OpsGenie Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/webex_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/webex_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Webex Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_webex Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Webex Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/webex_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/webex_fuzz_test.go.Fuzz_Webex into Fuzz_Webex' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/webex_fuzz_test.go.Fuzz_Webex into Fuzz_Webex Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Webex Fuzz_Webex Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/lark_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/lark_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Lark Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_lark Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Lark Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/lark_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/lark_fuzz_test.go.Fuzz_Lark into Fuzz_Lark' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/lark_fuzz_test.go.Fuzz_Lark into Fuzz_Lark Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Lark Fuzz_Lark Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/rocket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/rocket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Rocket Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_rocket Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Rocket Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/rocket_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/rocket_fuzz_test.go.Fuzz_Rocket into Fuzz_Rocket' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/rocket_fuzz_test.go.Fuzz_Rocket into Fuzz_Rocket Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Rocket Fuzz_Rocket Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/telegram_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/telegram_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Telegram_escapeString Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_telegram_escapestring Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Telegram_escapeString Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/telegram_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/telegram_fuzz_test.go.Fuzz_Telegram_escapeString into Fuzz_Telegram_escapeString' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/telegram_fuzz_test.go.Fuzz_Telegram_escapeString into Fuzz_Telegram_escapeString Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Telegram_escapeString Fuzz_Telegram_escapeString Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/forwarder_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/forwarder_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Forwarder Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_forwarder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Forwarder Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/forwarder_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/forwarder_fuzz_test.go.Fuzz_Forwarder into Fuzz_Forwarder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/forwarder_fuzz_test.go.Fuzz_Forwarder into Fuzz_Forwarder Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Forwarder Fuzz_Forwarder Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/matrix_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/matrix_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Matrix Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_matrix Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Matrix Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/matrix_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/matrix_fuzz_test.go.Fuzz_Matrix into Fuzz_Matrix' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/matrix_fuzz_test.go.Fuzz_Matrix into Fuzz_Matrix Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Matrix Fuzz_Matrix Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/gitlab_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/gitlab_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_GitLab Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_gitlab Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_GitLab Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/gitlab_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/gitlab_fuzz_test.go.Fuzz_GitLab into Fuzz_GitLab' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/gitlab_fuzz_test.go.Fuzz_GitLab into Fuzz_GitLab Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_GitLab Fuzz_GitLab Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/alertmanager_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/alertmanager_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_AlertManager Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_alertmanager Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_AlertManager Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/alertmanager_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/alertmanager_fuzz_test.go.Fuzz_AlertManager into Fuzz_AlertManager' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/alertmanager_fuzz_test.go.Fuzz_AlertManager into Fuzz_AlertManager Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_AlertManager Fuzz_AlertManager Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/github_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/github_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_GitHub Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_github Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_GitHub Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/github_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/github_fuzz_test.go.Fuzz_GitHub into Fuzz_GitHub' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/github_fuzz_test.go.Fuzz_GitHub into Fuzz_GitHub Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_GitHub Fuzz_GitHub Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find the function: func Fuzz_GitHub(f *testing.F) Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/github_dispatch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/github_dispatch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_GitHub_Dispatch Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_github_dispatch Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_GitHub_Dispatch Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/github_dispatch_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/github_dispatch_fuzz_test.go.Fuzz_GitHub_Dispatch into Fuzz_GitHub_Dispatch' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/github_dispatch_fuzz_test.go.Fuzz_GitHub_Dispatch into Fuzz_GitHub_Dispatch Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_GitHub_Dispatch Fuzz_GitHub_Dispatch Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/slack_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/slack_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_Slack Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_slack Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_Slack Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/slack_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/slack_fuzz_test.go.Fuzz_Slack into Fuzz_Slack' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/slack_fuzz_test.go.Fuzz_Slack into Fuzz_Slack Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_Slack Fuzz_Slack Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/datadog_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/notifier/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/notifier/datadog_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=Fuzz_DataDog Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzz_datadog Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=Fuzz_DataDog Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/notifier/datadog_fuzz_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/notifier Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/notifier/datadog_fuzz_test.go.Fuzz_DataDog into Fuzz_DataDog' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/notifier/datadog_fuzz_test.go.Fuzz_DataDog into Fuzz_DataDog Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/notifier Fuzz_DataDog Fuzz_DataDog Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: fda11c351fde: Already exists Step #4: bde827a1238f: Already exists Step #4: 140fd3517c34: Pulling fs layer Step #4: 96aa938eb03e: Pulling fs layer Step #4: 3a56190a40cc: Pulling fs layer Step #4: b615500c2bbc: Pulling fs layer Step #4: 80667d18f987: Pulling fs layer Step #4: 4ae125a00b97: Pulling fs layer Step #4: ec8c5f3c3dcc: Pulling fs layer Step #4: a0d75a37d0e5: Pulling fs layer Step #4: 6f557737fcdb: Pulling fs layer Step #4: 520cd324e6bd: Pulling fs layer Step #4: f454ed755796: Pulling fs layer Step #4: 90aea261ea8c: Pulling fs layer Step #4: 44182b64cce5: Pulling fs layer Step #4: ae0ffe65c3ce: Pulling fs layer Step #4: 4d91cfddec85: Pulling fs layer Step #4: 0030f9a80ba9: Pulling fs layer Step #4: e910e64fbbec: Pulling fs layer Step #4: 60546b1b12f2: Pulling fs layer Step #4: 4bc136a5862a: Pulling fs layer Step #4: e77252f63d05: Pulling fs layer Step #4: 4ae125a00b97: Waiting Step #4: 2d19611b6ea7: Pulling fs layer Step #4: 1a433f8acdab: Pulling fs layer Step #4: ec8c5f3c3dcc: Waiting Step #4: 6f557737fcdb: Waiting Step #4: c58d55fc50ca: Pulling fs layer Step #4: a0d75a37d0e5: Waiting Step #4: 520cd324e6bd: Waiting Step #4: 2d19611b6ea7: Waiting Step #4: 60546b1b12f2: Waiting Step #4: 4bc136a5862a: Waiting Step #4: e77252f63d05: Waiting Step #4: f454ed755796: Waiting Step #4: 90aea261ea8c: Waiting Step #4: 0030f9a80ba9: Waiting Step #4: 4d91cfddec85: Waiting Step #4: c58d55fc50ca: Waiting Step #4: b615500c2bbc: Waiting Step #4: 80667d18f987: Waiting Step #4: ae0ffe65c3ce: Waiting Step #4: 1a433f8acdab: Waiting Step #4: 140fd3517c34: Verifying Checksum Step #4: 140fd3517c34: Download complete Step #4: 3a56190a40cc: Download complete Step #4: 96aa938eb03e: Verifying Checksum Step #4: 96aa938eb03e: Download complete Step #4: 80667d18f987: Verifying Checksum Step #4: 80667d18f987: Download complete Step #4: 140fd3517c34: Pull complete Step #4: b615500c2bbc: Verifying Checksum Step #4: b615500c2bbc: Download complete Step #4: ec8c5f3c3dcc: Download complete Step #4: 96aa938eb03e: Pull complete Step #4: a0d75a37d0e5: Verifying Checksum Step #4: a0d75a37d0e5: Download complete Step #4: 6f557737fcdb: Verifying Checksum Step #4: 3a56190a40cc: Pull complete Step #4: f454ed755796: Verifying Checksum Step #4: f454ed755796: Download complete Step #4: 4ae125a00b97: Verifying Checksum Step #4: 4ae125a00b97: Download complete Step #4: b615500c2bbc: Pull complete Step #4: 44182b64cce5: Verifying Checksum Step #4: 44182b64cce5: Download complete Step #4: 90aea261ea8c: Verifying Checksum Step #4: 90aea261ea8c: Download complete Step #4: 80667d18f987: Pull complete Step #4: 4d91cfddec85: Verifying Checksum Step #4: 4d91cfddec85: Download complete Step #4: 520cd324e6bd: Verifying Checksum Step #4: 520cd324e6bd: Download complete Step #4: ae0ffe65c3ce: Verifying Checksum Step #4: ae0ffe65c3ce: Download complete Step #4: e910e64fbbec: Verifying Checksum Step #4: e910e64fbbec: Download complete Step #4: 60546b1b12f2: Verifying Checksum Step #4: 60546b1b12f2: Download complete Step #4: 4bc136a5862a: Verifying Checksum Step #4: 4bc136a5862a: Download complete Step #4: e77252f63d05: Verifying Checksum Step #4: e77252f63d05: Download complete Step #4: 2d19611b6ea7: Verifying Checksum Step #4: 2d19611b6ea7: Download complete Step #4: 1a433f8acdab: Download complete Step #4: 0030f9a80ba9: Verifying Checksum Step #4: 0030f9a80ba9: Download complete Step #4: c58d55fc50ca: Download complete Step #4: 4ae125a00b97: Pull complete Step #4: ec8c5f3c3dcc: Pull complete Step #4: a0d75a37d0e5: Pull complete Step #4: 6f557737fcdb: Pull complete Step #4: 520cd324e6bd: Pull complete Step #4: f454ed755796: Pull complete Step #4: 90aea261ea8c: Pull complete Step #4: 44182b64cce5: Pull complete Step #4: ae0ffe65c3ce: Pull complete Step #4: 4d91cfddec85: Pull complete Step #4: 0030f9a80ba9: Pull complete Step #4: e910e64fbbec: Pull complete Step #4: 60546b1b12f2: Pull complete Step #4: 4bc136a5862a: Pull complete Step #4: e77252f63d05: Pull complete Step #4: 2d19611b6ea7: Pull complete Step #4: 1a433f8acdab: Pull complete Step #4: c58d55fc50ca: Pull complete Step #4: Digest: sha256:dd0baa0e7c52d0bc227b78c8300339638fa60897a59689ddefc8a74dc7f9ff0a Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: warning [/corpus/FuzzGitResourceObject.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzGitResourceObject. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzHelmReleaseReconciler_reconcile.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzHelmReleaseReconciler_reconcile. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzRandomGitFiles.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzRandomGitFiles. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzUpdateWithSetters.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzUpdateWithSetters. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_AlertManager.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_AlertManager. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_AzureDevOps.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_AzureDevOps. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Bitbucket.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Bitbucket. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Controllers.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Controllers. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_DataDog.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_DataDog. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Discord.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Discord. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Eventf.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Eventf. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Forwarder.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Forwarder. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Getter.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Getter. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_GitHub_Dispatch.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_GitHub_Dispatch. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_GitLab.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_GitLab. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_GoogleChat.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_GoogleChat. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Grafana.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Grafana. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_ImageRepositoryController.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_ImageRepositoryController. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_ImageUpdateReconciler.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_ImageUpdateReconciler. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Lark.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Lark. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_MSTeams.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_MSTeams. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Match.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Match. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Matrix.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Matrix. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_OpsGenie.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_OpsGenie. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_PagerDuty.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_PagerDuty. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_PatchApply.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_PatchApply. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Rocket.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Rocket. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Slack.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Slack. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Telegram_escapeString.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Telegram_escapeString. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Unstructured.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Unstructured. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Util_FormatNameAndDescription.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Util_FormatNameAndDescription. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Util_ParseGitAddress.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Util_ParseGitAddress. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_Webex.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_Webex. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/Fuzz_templateMsg.zip]: zipfile is empty Step #5: Failed to unpack the corpus for Fuzz_templateMsg. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image fluxcd Step #5: python infra/helper.py build_fuzzers --sanitizer coverage fluxcd Step #5: python infra/helper.py coverage fluxcd Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1