starting build "7091fa12-ee68-44ea-b921-2736ad95e497" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 7.68kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-python Step #1: latest: Pulling from oss-fuzz-base/base-builder-python Step #1: b549f31133a9: Pulling fs layer Step #1: 8fcb4deacf22: Pulling fs layer Step #1: de1f70d7e61d: Pulling fs layer Step #1: 118d181f4354: Pulling fs layer Step #1: 51cf54cfeccf: Pulling fs layer Step #1: b0f5d8d1b519: Pulling fs layer Step #1: 429a28bd6d48: Pulling fs layer Step #1: 09122e65c165: Pulling fs layer Step #1: 1a450bc42fd7: Pulling fs layer Step #1: a75b23ddc2b7: Pulling fs layer Step #1: 456762261dec: Pulling fs layer Step #1: e31a6dacdd00: Pulling fs layer Step #1: e6fb54761daf: Pulling fs layer Step #1: dc68e71fa799: Pulling fs layer Step #1: d1f3f1a24347: Pulling fs layer Step #1: 4049ccfe9ae0: Pulling fs layer Step #1: b10061bb0df2: Pulling fs layer Step #1: 56ac6ad5df4f: Pulling fs layer Step #1: 445d4ad3dcf7: Pulling fs layer Step #1: 09122e65c165: Waiting Step #1: e31a6dacdd00: Waiting Step #1: 1a450bc42fd7: Waiting Step #1: a75b23ddc2b7: Waiting Step #1: 456762261dec: Waiting Step #1: 06d2e179e971: Pulling fs layer Step #1: e6fb54761daf: Waiting Step #1: 1ab7e88fa2e2: Pulling fs layer Step #1: 2c7ffd31830b: Pulling fs layer Step #1: dc68e71fa799: Waiting Step #1: 1ac824e1693d: Pulling fs layer Step #1: 209e38fb6a26: Pulling fs layer Step #1: 1dff7521e43d: Pulling fs layer Step #1: df1d111a1034: Pulling fs layer Step #1: 51cf54cfeccf: Waiting Step #1: d70f07bc2268: Pulling fs layer Step #1: d1f3f1a24347: Waiting Step #1: fb9cddcca915: Pulling fs layer Step #1: 14062b451eed: Pulling fs layer Step #1: 4049ccfe9ae0: Waiting Step #1: 7b2d77840f81: Pulling fs layer Step #1: 7a0070697ecc: Pulling fs layer Step #1: b10061bb0df2: Waiting Step #1: d380fb0e81dd: Pulling fs layer Step #1: 8dc6b64154d7: Pulling fs layer Step #1: 16223f1a767e: Pulling fs layer Step #1: 79c2aef41f6c: Pulling fs layer Step #1: df1d111a1034: Waiting Step #1: 56ac6ad5df4f: Waiting Step #1: d70f07bc2268: Waiting Step #1: 7b2d77840f81: Waiting Step #1: 445d4ad3dcf7: Waiting Step #1: 14062b451eed: Waiting Step #1: 7a0070697ecc: Waiting Step #1: 429a28bd6d48: Waiting Step #1: 06d2e179e971: Waiting Step #1: d380fb0e81dd: Waiting Step #1: 1ab7e88fa2e2: Waiting Step #1: 1ac824e1693d: Waiting Step #1: 8dc6b64154d7: Waiting Step #1: 2c7ffd31830b: Waiting Step #1: 16223f1a767e: Waiting Step #1: fb9cddcca915: Waiting Step #1: 209e38fb6a26: Waiting Step #1: 79c2aef41f6c: Waiting Step #1: 1dff7521e43d: Waiting Step #1: 118d181f4354: Waiting Step #1: de1f70d7e61d: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 51cf54cfeccf: Download complete Step #1: 118d181f4354: Verifying Checksum Step #1: 118d181f4354: Download complete Step #1: b0f5d8d1b519: Download complete Step #1: 09122e65c165: Download complete Step #1: 1a450bc42fd7: Verifying Checksum Step #1: 1a450bc42fd7: Download complete Step #1: 8fcb4deacf22: Verifying Checksum Step #1: 8fcb4deacf22: Download complete Step #1: b549f31133a9: Pull complete Step #1: 456762261dec: Verifying Checksum Step #1: 456762261dec: Download complete Step #1: e31a6dacdd00: Verifying Checksum Step #1: e31a6dacdd00: Download complete Step #1: e6fb54761daf: Verifying Checksum Step #1: e6fb54761daf: Download complete Step #1: dc68e71fa799: Verifying Checksum Step #1: dc68e71fa799: Download complete Step #1: d1f3f1a24347: Verifying Checksum Step #1: d1f3f1a24347: Download complete Step #1: 4049ccfe9ae0: Download complete Step #1: a75b23ddc2b7: Verifying Checksum Step #1: a75b23ddc2b7: Download complete Step #1: 56ac6ad5df4f: Verifying Checksum Step #1: 56ac6ad5df4f: Download complete Step #1: b10061bb0df2: Verifying Checksum Step #1: b10061bb0df2: Download complete Step #1: 445d4ad3dcf7: Verifying Checksum Step #1: 445d4ad3dcf7: Download complete Step #1: 06d2e179e971: Verifying Checksum Step #1: 06d2e179e971: Download complete Step #1: 1ab7e88fa2e2: Verifying Checksum Step #1: 1ab7e88fa2e2: Download complete Step #1: 2c7ffd31830b: Download complete Step #1: 1ac824e1693d: Verifying Checksum Step #1: 1ac824e1693d: Download complete Step #1: 429a28bd6d48: Verifying Checksum Step #1: 429a28bd6d48: Download complete Step #1: 209e38fb6a26: Verifying Checksum Step #1: 209e38fb6a26: Download complete Step #1: 1dff7521e43d: Verifying Checksum Step #1: 1dff7521e43d: Download complete Step #1: df1d111a1034: Verifying Checksum Step #1: df1d111a1034: Download complete Step #1: d70f07bc2268: Download complete Step #1: fb9cddcca915: Verifying Checksum Step #1: fb9cddcca915: Download complete Step #1: 14062b451eed: Download complete Step #1: 7a0070697ecc: Verifying Checksum Step #1: 7a0070697ecc: Download complete Step #1: 7b2d77840f81: Verifying Checksum Step #1: 7b2d77840f81: Download complete Step #1: d380fb0e81dd: Verifying Checksum Step #1: d380fb0e81dd: Download complete Step #1: 8dc6b64154d7: Verifying Checksum Step #1: 8dc6b64154d7: Download complete Step #1: 16223f1a767e: Verifying Checksum Step #1: 16223f1a767e: Download complete Step #1: 8fcb4deacf22: Pull complete Step #1: de1f70d7e61d: Pull complete Step #1: 79c2aef41f6c: Verifying Checksum Step #1: 79c2aef41f6c: Download complete Step #1: 118d181f4354: Pull complete Step #1: 51cf54cfeccf: Pull complete Step #1: b0f5d8d1b519: Pull complete Step #1: 429a28bd6d48: Pull complete Step #1: 09122e65c165: Pull complete Step #1: 1a450bc42fd7: Pull complete Step #1: a75b23ddc2b7: Pull complete Step #1: 456762261dec: Pull complete Step #1: e31a6dacdd00: Pull complete Step #1: e6fb54761daf: Pull complete Step #1: dc68e71fa799: Pull complete Step #1: d1f3f1a24347: Pull complete Step #1: 4049ccfe9ae0: Pull complete Step #1: b10061bb0df2: Pull complete Step #1: 56ac6ad5df4f: Pull complete Step #1: 445d4ad3dcf7: Pull complete Step #1: 06d2e179e971: Pull complete Step #1: 1ab7e88fa2e2: Pull complete Step #1: 2c7ffd31830b: Pull complete Step #1: 1ac824e1693d: Pull complete Step #1: 209e38fb6a26: Pull complete Step #1: 1dff7521e43d: Pull complete Step #1: df1d111a1034: Pull complete Step #1: d70f07bc2268: Pull complete Step #1: fb9cddcca915: Pull complete Step #1: 14062b451eed: Pull complete Step #1: 7b2d77840f81: Pull complete Step #1: 7a0070697ecc: Pull complete Step #1: d380fb0e81dd: Pull complete Step #1: 8dc6b64154d7: Pull complete Step #1: 16223f1a767e: Pull complete Step #1: 79c2aef41f6c: Pull complete Step #1: Digest: sha256:d83e58ef5aa6e0b43904121b94a9b3ec99e64d888917d953e6f93f02281a8b9e Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest Step #1: ---> 06147a097b4c Step #1: Step 2/6 : RUN apt-get update && apt-get install -y make autoconf automake libtool Step #1: ---> Running in a11b07a67973 Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:3 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (193 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: autotools-dev file libltdl-dev libltdl7 libmagic-mgc libmagic1 libsigsegv2 Step #1: m4 Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext libtool-doc gfortran Step #1: | fortran95-compiler gcj-jdk m4-doc Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev file libltdl-dev libltdl7 libmagic-mgc Step #1: libmagic1 libsigsegv2 libtool m4 Step #1: 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 1774 kB of archives. Step #1: After this operation, 12.8 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 1774 kB in 0s (4736 kB/s) Step #1: Selecting previously unselected package libmagic-mgc. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../00-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../01-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../02-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../03-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../04-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../05-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../06-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../07-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../08-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../09-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../10-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.17) ... Step #1: Removing intermediate container a11b07a67973 Step #1: ---> f9ba9524e4e7 Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/oauthlib/oauthlib oauthlib Step #1: ---> Running in 0039d565434a Step #1: Cloning into 'oauthlib'... Step #1: Removing intermediate container 0039d565434a Step #1: ---> d877f2576292 Step #1: Step 4/6 : RUN pip3 install --upgrade pip && pip3 install -r $SRC/oauthlib/requirements.txt Step #1: ---> Running in 66d1702784c2 Step #1: Requirement already satisfied: pip in /usr/local/lib/python3.10/site-packages (25.0.1) Step #1: WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #1: Collecting pyjwt<3,>=2.0.0 (from -r /src/oauthlib/requirements.txt (line 1)) Step #1: Downloading PyJWT-2.10.1-py3-none-any.whl.metadata (4.0 kB) Step #1: Collecting blinker==1.4 (from -r /src/oauthlib/requirements.txt (line 2)) Step #1: Downloading blinker-1.4.tar.gz (111 kB) Step #1: Installing build dependencies: started Step #1: Installing build dependencies: finished with status 'done' Step #1: Getting requirements to build wheel: started Step #1: Getting requirements to build wheel: finished with status 'done' Step #1: Preparing metadata (pyproject.toml): started Step #1: Preparing metadata (pyproject.toml): finished with status 'done' Step #1: Collecting cryptography>=3.0.0 (from -r /src/oauthlib/requirements.txt (line 3)) Step #1: Downloading cryptography-44.0.2-cp39-abi3-manylinux_2_28_x86_64.whl.metadata (5.7 kB) Step #1: Collecting cffi>=1.12 (from cryptography>=3.0.0->-r /src/oauthlib/requirements.txt (line 3)) Step #1: Downloading cffi-1.17.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (1.5 kB) Step #1: Collecting pycparser (from cffi>=1.12->cryptography>=3.0.0->-r /src/oauthlib/requirements.txt (line 3)) Step #1: Downloading pycparser-2.22-py3-none-any.whl.metadata (943 bytes) Step #1: Downloading PyJWT-2.10.1-py3-none-any.whl (22 kB) Step #1: Downloading cryptography-44.0.2-cp39-abi3-manylinux_2_28_x86_64.whl (4.2 MB) Step #1: ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 4.2/4.2 MB 74.9 MB/s eta 0:00:00 Step #1: Downloading cffi-1.17.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (446 kB) Step #1: Downloading pycparser-2.22-py3-none-any.whl (117 kB) Step #1: Building wheels for collected packages: blinker Step #1: Building wheel for blinker (pyproject.toml): started Step #1: Building wheel for blinker (pyproject.toml): finished with status 'done' Step #1: Created wheel for blinker: filename=blinker-1.4-py3-none-any.whl size=13501 sha256=3837050110e7defcd6ca638a143f15bfdfd551b268f29a5ea0191031953f67c6 Step #1: Stored in directory: /root/.cache/pip/wheels/46/d1/36/f5bd574e4181b8e1ca3e12dd8d243aa9218725603566fd3c1d Step #1: Successfully built blinker Step #1: Installing collected packages: blinker, pyjwt, pycparser, cffi, cryptography Step #1: Successfully installed blinker-1.4 cffi-1.17.1 cryptography-44.0.2 pycparser-2.22 pyjwt-2.10.1 Step #1: WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #1: Removing intermediate container 66d1702784c2 Step #1: ---> 4ff4abd98042 Step #1: Step 5/6 : WORKDIR oauthlib Step #1: ---> Running in fdc6af64ebcd Step #1: Removing intermediate container fdc6af64ebcd Step #1: ---> 35a8e29f053e Step #1: Step 6/6 : COPY build.sh *.py $SRC/ Step #1: ---> 2db298067c24 Step #1: Successfully built 2db298067c24 Step #1: Successfully tagged gcr.io/oss-fuzz/oauthlib:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/oauthlib Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filetplvzO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ python == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/oauthlib/.git Step #2 - "srcmap": + GIT_DIR=/src/oauthlib Step #2 - "srcmap": + cd /src/oauthlib Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/oauthlib/oauthlib Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=dab6a5ae1830ddd8a79c1e9687f63508eae60b57 Step #2 - "srcmap": + jq_inplace /tmp/filetplvzO '."/src/oauthlib" = { type: "git", url: "https://github.com/oauthlib/oauthlib", rev: "dab6a5ae1830ddd8a79c1e9687f63508eae60b57" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file9hHa79 Step #2 - "srcmap": + cat /tmp/filetplvzO Step #2 - "srcmap": + jq '."/src/oauthlib" = { type: "git", url: "https://github.com/oauthlib/oauthlib", rev: "dab6a5ae1830ddd8a79c1e9687f63508eae60b57" }' Step #2 - "srcmap": + mv /tmp/file9hHa79 /tmp/filetplvzO Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filetplvzO Step #2 - "srcmap": + rm /tmp/filetplvzO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/oauthlib": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/oauthlib/oauthlib", Step #2 - "srcmap": "rev": "dab6a5ae1830ddd8a79c1e9687f63508eae60b57" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr, Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + pip3 install . Step #3 - "compile-libfuzzer-address-x86_64": Processing /src/oauthlib Step #3 - "compile-libfuzzer-address-x86_64": Installing build dependencies ... [?25l- \ done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Getting requirements to build wheel ... [?25l- done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25l- done Step #3 - "compile-libfuzzer-address-x86_64": [?25hBuilding wheels for collected packages: oauthlib Step #3 - "compile-libfuzzer-address-x86_64": Building wheel for oauthlib (pyproject.toml) ... [?25l- \ done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Created wheel for oauthlib: filename=oauthlib-3.2.2-py3-none-any.whl size=164615 sha256=0b32d4c8080a028e900df16f205ab861480b36e18fc9762e630b1b3fbad057ca Step #3 - "compile-libfuzzer-address-x86_64": Stored in directory: /tmp/pip-ephem-wheel-cache-ggch8ubj/wheels/3b/f2/4d/0c3f3d9d65007b8606b3f5eb91af4d2c124823f1257e39b625 Step #3 - "compile-libfuzzer-address-x86_64": Successfully built oauthlib Step #3 - "compile-libfuzzer-address-x86_64": Installing collected packages: oauthlib Step #3 - "compile-libfuzzer-address-x86_64": Successfully installed oauthlib-3.2.2 Step #3 - "compile-libfuzzer-address-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #3 - "compile-libfuzzer-address-x86_64": ++ find /src -name 'fuzz_*.py' Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/fuzz_oauth1_sig.py --hidden-import=jwt --hidden-import=jwt.algorithms Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/fuzz_oauth1_sig.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/fuzz_oauth1_sig.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_oauth1_sig Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_oauth1_sig.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_oauth1_sig Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_oauth1_sig Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_oauth1_sig --onefile --name fuzz_oauth1_sig.pkg --hidden-import=jwt --hidden-import=jwt.algorithms /src/fuzz_oauth1_sig.py Step #3 - "compile-libfuzzer-address-x86_64": 113 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.1 Step #3 - "compile-libfuzzer-address-x86_64": 113 INFO: Python: 3.10.14 Step #3 - "compile-libfuzzer-address-x86_64": 114 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 115 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 115 INFO: wrote /src/oauthlib/fuzz_oauth1_sig.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 117 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python310.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src'] Step #3 - "compile-libfuzzer-address-x86_64": 233 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 233 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 233 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 233 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 233 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 234 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 247 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 912 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 1012 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2505 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 4142 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 4266 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 4276 INFO: Using Python shared library: /usr/local/lib/libpython3.10.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 4276 INFO: Analyzing /src/fuzz_oauth1_sig.py Step #3 - "compile-libfuzzer-address-x86_64": 4280 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.10/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 4474 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.10/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 5066 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 5715 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 5728 INFO: Performing binary vs. data reclassification (10 entries) Step #3 - "compile-libfuzzer-address-x86_64": 5732 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 5735 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 5738 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.10/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 5739 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 5747 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 6273 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_oauth1_sig/fuzz_oauth1_sig.pkg/warn-fuzz_oauth1_sig.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 6296 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_oauth1_sig/fuzz_oauth1_sig.pkg/xref-fuzz_oauth1_sig.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 6313 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 6313 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 6313 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_oauth1_sig/fuzz_oauth1_sig.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 6598 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_oauth1_sig/fuzz_oauth1_sig.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 6614 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 6614 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 6614 INFO: Building PKG (CArchive) fuzz_oauth1_sig.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 23243 INFO: Building PKG (CArchive) fuzz_oauth1_sig.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 23246 INFO: Bootloader /usr/local/lib/python3.10/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 23247 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 23247 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 23247 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 23247 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_oauth1_sig.pkg Step #3 - "compile-libfuzzer-address-x86_64": 23247 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 23338 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_oauth1_sig.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_oauth1_sig.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_oauth1_sig.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_oauth1_sig Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 8fcb4deacf22: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": de1f70d7e61d: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 3f0dcd2a0ab7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 26455c16d721: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 525f9c6a3431: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1b04fed7d28e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ff71552952a1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4364bf6b7c4e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": eb4f18d501d6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a9598040cb92: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c17c833cb68e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3062284ca4a3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c4cbdbf51399: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3f8e99d012d9: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 79b3de57a4b8: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5f9fad5eda4b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3d8618322244: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": cb35b4284751: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 174981b2f952: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 22da4ba23ba3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 50c6b48512ac: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ae25c09ac704: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": be117e916c18: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 990c2b69150a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7aee311f0403: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ff71552952a1: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4364bf6b7c4e: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": eb4f18d501d6: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a9598040cb92: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c17c833cb68e: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3062284ca4a3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c4cbdbf51399: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 50c6b48512ac: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": ae25c09ac704: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3f8e99d012d9: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": be117e916c18: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 1b04fed7d28e: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 990c2b69150a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 79b3de57a4b8: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7aee311f0403: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 22da4ba23ba3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 174981b2f952: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3d8618322244: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5f9fad5eda4b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": cb35b4284751: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 525f9c6a3431: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 525f9c6a3431: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3f0dcd2a0ab7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3f0dcd2a0ab7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 26455c16d721: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 26455c16d721: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": ff71552952a1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3f0dcd2a0ab7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": ff71552952a1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1b04fed7d28e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1b04fed7d28e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": eb4f18d501d6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a9598040cb92: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a9598040cb92: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c17c833cb68e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c17c833cb68e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 26455c16d721: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 525f9c6a3431: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4364bf6b7c4e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4364bf6b7c4e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3f8e99d012d9: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3f8e99d012d9: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 79b3de57a4b8: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 79b3de57a4b8: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1b04fed7d28e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": ff71552952a1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3d8618322244: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3d8618322244: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3062284ca4a3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3062284ca4a3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5f9fad5eda4b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5f9fad5eda4b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 22da4ba23ba3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 22da4ba23ba3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 174981b2f952: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 174981b2f952: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 50c6b48512ac: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 50c6b48512ac: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": ae25c09ac704: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": ae25c09ac704: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4364bf6b7c4e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": cb35b4284751: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": cb35b4284751: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": eb4f18d501d6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 990c2b69150a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": be117e916c18: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": be117e916c18: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 7aee311f0403: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 7aee311f0403: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a9598040cb92: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c17c833cb68e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3062284ca4a3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c4cbdbf51399: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3f8e99d012d9: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 79b3de57a4b8: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5f9fad5eda4b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3d8618322244: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": cb35b4284751: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 174981b2f952: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 22da4ba23ba3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 50c6b48512ac: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": ae25c09ac704: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": be117e916c18: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 990c2b69150a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7aee311f0403: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:89aa4f118392e1a47d881c23dbf99ed553d76ee4956e8f12dedf1900ed080fd0 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpqzbf2gfr/fuzz_oauth1_sig Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/oauthlib Step #6: adding: fuzz_oauth1_sig (deflated 32%) Step #6: adding: fuzz_oauth1_sig.pkg (deflated 1%) Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: sanitizer_with_fuzzer.so (deflated 72%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 0062f774e994: Waiting Step #7: 6b33fd031fac: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 6b33fd031fac: Download complete Step #7: 0062f774e994: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 153 0 0 100 153 0 697 --:--:-- --:--:-- --:--:-- 695 100 153 0 0 100 153 0 697 --:--:-- --:--:-- --:--:-- 695 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 36.2M 0 0 100 36.2M 0 71.3M --:--:-- --:--:-- --:--:-- 71.2M 100 36.2M 0 0 100 36.2M 0 71.3M --:--:-- --:--:-- --:--:-- 71.2M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 16 0 0 100 16 0 53 --:--:-- --:--:-- --:--:-- 52 100 16 0 0 100 16 0 53 --:--:-- --:--:-- --:--:-- 52 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 157 --:--:-- --:--:-- --:--:-- 157 100 33 0 0 100 33 0 120 --:--:-- --:--:-- --:--:-- 120 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/oauthlib Finished Step #11 Starting Step #12 - "compile-libfuzzer-undefined-x86_64" Step #12 - "compile-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #12 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #12 - "compile-libfuzzer-undefined-x86_64": vm.mmap_rnd_bits = 28 Step #12 - "compile-libfuzzer-undefined-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #12 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #12 - "compile-libfuzzer-undefined-x86_64": CC=clang Step #12 - "compile-libfuzzer-undefined-x86_64": CXX=clang++ Step #12 - "compile-libfuzzer-undefined-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fno-sanitize=function -fno-sanitize=function,leak,vptr, Step #12 - "compile-libfuzzer-undefined-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #12 - "compile-libfuzzer-undefined-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers Step #12 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #12 - "compile-libfuzzer-undefined-x86_64": + pip3 install . Step #12 - "compile-libfuzzer-undefined-x86_64": Processing /src/oauthlib Step #12 - "compile-libfuzzer-undefined-x86_64": Installing build dependencies ... [?25l- \ done Step #12 - "compile-libfuzzer-undefined-x86_64": [?25h Getting requirements to build wheel ... [?25l- done Step #12 - "compile-libfuzzer-undefined-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25l- done Step #12 - "compile-libfuzzer-undefined-x86_64": [?25hBuilding wheels for collected packages: oauthlib Step #12 - "compile-libfuzzer-undefined-x86_64": Building wheel for oauthlib (pyproject.toml) ... [?25l- \ done Step #12 - "compile-libfuzzer-undefined-x86_64": [?25h Created wheel for oauthlib: filename=oauthlib-3.2.2-py3-none-any.whl size=164615 sha256=0aca3d2acb5672d71be4b7feb75c92c19ce64e0325922869c79c6a9e76ee0e94 Step #12 - "compile-libfuzzer-undefined-x86_64": Stored in directory: /tmp/pip-ephem-wheel-cache-lbjgemgh/wheels/3b/f2/4d/0c3f3d9d65007b8606b3f5eb91af4d2c124823f1257e39b625 Step #12 - "compile-libfuzzer-undefined-x86_64": Successfully built oauthlib Step #12 - "compile-libfuzzer-undefined-x86_64": Installing collected packages: oauthlib Step #12 - "compile-libfuzzer-undefined-x86_64": Successfully installed oauthlib-3.2.2 Step #12 - "compile-libfuzzer-undefined-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #12 - "compile-libfuzzer-undefined-x86_64": ++ find /src -name 'fuzz_*.py' Step #12 - "compile-libfuzzer-undefined-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #12 - "compile-libfuzzer-undefined-x86_64": + compile_python_fuzzer /src/fuzz_oauth1_sig.py --hidden-import=jwt --hidden-import=jwt.algorithms Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_path=/src/fuzz_oauth1_sig.py Step #12 - "compile-libfuzzer-undefined-x86_64": + shift 1 Step #12 - "compile-libfuzzer-undefined-x86_64": ++ basename -s .py /src/fuzz_oauth1_sig.py Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_basename=fuzz_oauth1_sig Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_package=fuzz_oauth1_sig.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #12 - "compile-libfuzzer-undefined-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_oauth1_sig Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *introspector* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ 0 != \0 ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #12 - "compile-libfuzzer-undefined-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_oauth1_sig Step #12 - "compile-libfuzzer-undefined-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-undefined-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_oauth1_sig --onefile --name fuzz_oauth1_sig.pkg --hidden-import=jwt --hidden-import=jwt.algorithms /src/fuzz_oauth1_sig.py Step #12 - "compile-libfuzzer-undefined-x86_64": 113 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.1 Step #12 - "compile-libfuzzer-undefined-x86_64": 113 INFO: Python: 3.10.14 Step #12 - "compile-libfuzzer-undefined-x86_64": 114 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #12 - "compile-libfuzzer-undefined-x86_64": 114 INFO: Python environment: /usr/local Step #12 - "compile-libfuzzer-undefined-x86_64": 115 INFO: wrote /src/oauthlib/fuzz_oauth1_sig.pkg.spec Step #12 - "compile-libfuzzer-undefined-x86_64": 117 INFO: Module search paths (PYTHONPATH): Step #12 - "compile-libfuzzer-undefined-x86_64": ['/usr/local/lib/python310.zip', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/lib-dynload', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/site-packages', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/site-packages/setuptools/_vendor', Step #12 - "compile-libfuzzer-undefined-x86_64": '/src'] Step #12 - "compile-libfuzzer-undefined-x86_64": 235 INFO: checking Analysis Step #12 - "compile-libfuzzer-undefined-x86_64": 235 INFO: Building Analysis because Analysis-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 235 INFO: Running Analysis Analysis-00.toc Step #12 - "compile-libfuzzer-undefined-x86_64": 235 INFO: Target bytecode optimization level: 0 Step #12 - "compile-libfuzzer-undefined-x86_64": 235 INFO: Initializing module dependency graph... Step #12 - "compile-libfuzzer-undefined-x86_64": 236 INFO: Caching module graph hooks... Step #12 - "compile-libfuzzer-undefined-x86_64": 249 INFO: Analyzing base_library.zip ... Step #12 - "compile-libfuzzer-undefined-x86_64": 863 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 963 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 2570 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 4163 INFO: Caching module dependency graph... Step #12 - "compile-libfuzzer-undefined-x86_64": 4287 INFO: Looking for Python shared library... Step #12 - "compile-libfuzzer-undefined-x86_64": 4298 INFO: Using Python shared library: /usr/local/lib/libpython3.10.so.1.0 Step #12 - "compile-libfuzzer-undefined-x86_64": 4298 INFO: Analyzing /src/fuzz_oauth1_sig.py Step #12 - "compile-libfuzzer-undefined-x86_64": 4301 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.10/site-packages/atheris' Step #12 - "compile-libfuzzer-undefined-x86_64": 4503 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.10/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 5104 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #12 - "compile-libfuzzer-undefined-x86_64": 5769 INFO: Processing module hooks (post-graph stage)... Step #12 - "compile-libfuzzer-undefined-x86_64": 5782 INFO: Performing binary vs. data reclassification (10 entries) Step #12 - "compile-libfuzzer-undefined-x86_64": 5786 INFO: Looking for ctypes DLLs Step #12 - "compile-libfuzzer-undefined-x86_64": 5789 INFO: Analyzing run-time hooks ... Step #12 - "compile-libfuzzer-undefined-x86_64": 5792 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.10/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 5793 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks/rthooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 5801 INFO: Looking for dynamic libraries Step #12 - "compile-libfuzzer-undefined-x86_64": 6330 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_oauth1_sig/fuzz_oauth1_sig.pkg/warn-fuzz_oauth1_sig.pkg.txt Step #12 - "compile-libfuzzer-undefined-x86_64": 6354 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_oauth1_sig/fuzz_oauth1_sig.pkg/xref-fuzz_oauth1_sig.pkg.html Step #12 - "compile-libfuzzer-undefined-x86_64": 6370 INFO: checking PYZ Step #12 - "compile-libfuzzer-undefined-x86_64": 6371 INFO: Building PYZ because PYZ-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 6371 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_oauth1_sig/fuzz_oauth1_sig.pkg/PYZ-00.pyz Step #12 - "compile-libfuzzer-undefined-x86_64": 6661 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_oauth1_sig/fuzz_oauth1_sig.pkg/PYZ-00.pyz completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": 6677 INFO: checking PKG Step #12 - "compile-libfuzzer-undefined-x86_64": 6678 INFO: Building PKG because PKG-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 6678 INFO: Building PKG (CArchive) fuzz_oauth1_sig.pkg.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": 23315 INFO: Building PKG (CArchive) fuzz_oauth1_sig.pkg.pkg completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": 23318 INFO: Bootloader /usr/local/lib/python3.10/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #12 - "compile-libfuzzer-undefined-x86_64": 23318 INFO: checking EXE Step #12 - "compile-libfuzzer-undefined-x86_64": 23318 INFO: Building EXE because EXE-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 23318 INFO: Building EXE from EXE-00.toc Step #12 - "compile-libfuzzer-undefined-x86_64": 23319 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-undefined-x86_64/fuzz_oauth1_sig.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": 23319 INFO: Appending PKG archive to custom ELF section in EXE Step #12 - "compile-libfuzzer-undefined-x86_64": 23408 INFO: Building EXE from EXE-00.toc completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod -x /workspace/out/libfuzzer-undefined-x86_64/fuzz_oauth1_sig.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + echo '#!/bin/sh Step #12 - "compile-libfuzzer-undefined-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #12 - "compile-libfuzzer-undefined-x86_64": this_dir=$(dirname "$0") Step #12 - "compile-libfuzzer-undefined-x86_64": chmod +x $this_dir/fuzz_oauth1_sig.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_oauth1_sig.pkg $@' Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod +x /workspace/out/libfuzzer-undefined-x86_64/fuzz_oauth1_sig Finished Step #12 - "compile-libfuzzer-undefined-x86_64" Starting Step #13 - "build-check-libfuzzer-undefined-x86_64" Step #13 - "build-check-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #13 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmplp94idcc/fuzz_oauth1_sig Finished Step #13 - "build-check-libfuzzer-undefined-x86_64" Starting Step #14 Step #14: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #14 Starting Step #15 Step #15: Already have image: gcr.io/oss-fuzz/oauthlib Step #15: adding: fuzz_oauth1_sig (deflated 32%) Step #15: adding: fuzz_oauth1_sig.pkg (deflated 1%) Step #15: adding: llvm-symbolizer (deflated 66%) Step #15: adding: sanitizer_with_fuzzer.so (deflated 70%) Finished Step #15 Starting Step #16 Step #16: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #16: % Total % Received % Xferd Average Speed Time Time Time Current Step #16: Dload Upload Total Spent Left Speed Step #16: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 153 0 0 100 153 0 769 --:--:-- --:--:-- --:--:-- 772 Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33.7M 0 0 100 33.7M 0 71.2M --:--:-- --:--:-- --:--:-- 71.2M Finished Step #17 Starting Step #18 Step #18: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #18: % Total % Received % Xferd Average Speed Time Time Time Current Step #18: Dload Upload Total Spent Left Speed Step #18: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 16 0 0 100 16 0 60 --:--:-- --:--:-- --:--:-- 60 Finished Step #18 Starting Step #19 Step #19: Already have image (with digest): gcr.io/cloud-builders/curl Step #19: % Total % Received % Xferd Average Speed Time Time Time Current Step #19: Dload Upload Total Spent Left Speed Step #19: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 35 0 0 100 35 0 145 --:--:-- --:--:-- --:--:-- 145 Finished Step #19 Starting Step #20 Step #20: Already have image: gcr.io/oss-fuzz/oauthlib Finished Step #20 PUSH DONE