starting build "8425e4c7-69cc-43bd-8049-e5ca5fd42090" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3" Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Sending build context to Docker daemon 5.12kB Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": b549f31133a9: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 331d25ff9ac6: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 7f4811f93e43: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1449f4b02c73: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": d5f9015cdf50: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": bf9191db3d46: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": f27160af0e8a: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ffc229321738: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 5eb6a76cbe80: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": e4f88222f8b5: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 6e3b3ba61038: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 91cc90b1221a: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 022be336536a: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 8d7517370834: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 143d14c055b2: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 563697c080f5: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": a5f2882d703b: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 8da8b2999c07: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 38cc6e8918e3: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4a950f999ebb: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 152c59a4a631: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 221f4d7c2908: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 2254c1dc0a72: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 11436d2b55b1: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1ce3f1d18760: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4e86f2e12e91: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": f247db4944c2: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 762bd85308ec: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ec844ac4e3d0: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 2dc59509164e: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 0cde037983b3: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 3ddf7ad7b27e: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": faa202d7867d: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1cf9d8798e7a: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 32059e3a3678: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 40d504b9d98a: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ffc229321738: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 16ab56a2166a: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4e63b3bc3844: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 27228757afc0: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 5eb6a76cbe80: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": f27160af0e8a: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 75967b614453: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 00f45086d84f: Pulling fs layer Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": e4f88222f8b5: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 022be336536a: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 762bd85308ec: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 8d7517370834: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ec844ac4e3d0: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 2dc59509164e: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 143d14c055b2: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 0cde037983b3: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 563697c080f5: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 3ddf7ad7b27e: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": faa202d7867d: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": a5f2882d703b: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1cf9d8798e7a: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 8da8b2999c07: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 32059e3a3678: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 40d504b9d98a: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 38cc6e8918e3: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 16ab56a2166a: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4e63b3bc3844: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4a950f999ebb: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 27228757afc0: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 152c59a4a631: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 75967b614453: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 00f45086d84f: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 221f4d7c2908: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 2254c1dc0a72: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": f247db4944c2: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 11436d2b55b1: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4e86f2e12e91: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1ce3f1d18760: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 6e3b3ba61038: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 91cc90b1221a: Waiting Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": d5f9015cdf50: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": d5f9015cdf50: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 7f4811f93e43: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 7f4811f93e43: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": f27160af0e8a: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": f27160af0e8a: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ffc229321738: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": b549f31133a9: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": b549f31133a9: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1449f4b02c73: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1449f4b02c73: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 6e3b3ba61038: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 6e3b3ba61038: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 91cc90b1221a: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 91cc90b1221a: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 022be336536a: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 022be336536a: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 8d7517370834: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 8d7517370834: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 563697c080f5: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 563697c080f5: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 143d14c055b2: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 143d14c055b2: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": e4f88222f8b5: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": e4f88222f8b5: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": a5f2882d703b: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": a5f2882d703b: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 8da8b2999c07: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 38cc6e8918e3: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 38cc6e8918e3: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4a950f999ebb: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4a950f999ebb: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 152c59a4a631: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 152c59a4a631: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 221f4d7c2908: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 11436d2b55b1: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1ce3f1d18760: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1ce3f1d18760: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 2254c1dc0a72: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 2254c1dc0a72: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4e86f2e12e91: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4e86f2e12e91: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": f247db4944c2: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": b549f31133a9: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 762bd85308ec: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 762bd85308ec: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 0cde037983b3: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ec844ac4e3d0: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ec844ac4e3d0: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 2dc59509164e: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 2dc59509164e: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 5eb6a76cbe80: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 5eb6a76cbe80: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 3ddf7ad7b27e: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 3ddf7ad7b27e: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": faa202d7867d: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": faa202d7867d: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1cf9d8798e7a: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1cf9d8798e7a: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 32059e3a3678: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 40d504b9d98a: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 40d504b9d98a: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 27228757afc0: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 27228757afc0: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 00f45086d84f: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 00f45086d84f: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 16ab56a2166a: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 16ab56a2166a: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4e63b3bc3844: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4e63b3bc3844: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 331d25ff9ac6: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 331d25ff9ac6: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": bf9191db3d46: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": bf9191db3d46: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 75967b614453: Verifying Checksum Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 75967b614453: Download complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 331d25ff9ac6: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 7f4811f93e43: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1449f4b02c73: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": d5f9015cdf50: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": bf9191db3d46: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": f27160af0e8a: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ffc229321738: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 5eb6a76cbe80: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": e4f88222f8b5: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 6e3b3ba61038: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 91cc90b1221a: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 022be336536a: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 8d7517370834: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 143d14c055b2: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 563697c080f5: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": a5f2882d703b: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 8da8b2999c07: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 38cc6e8918e3: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4a950f999ebb: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 152c59a4a631: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 221f4d7c2908: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 2254c1dc0a72: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 11436d2b55b1: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1ce3f1d18760: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4e86f2e12e91: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": f247db4944c2: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 762bd85308ec: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ec844ac4e3d0: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 2dc59509164e: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 0cde037983b3: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 3ddf7ad7b27e: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": faa202d7867d: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 1cf9d8798e7a: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 32059e3a3678: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 40d504b9d98a: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 16ab56a2166a: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 4e63b3bc3844: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 27228757afc0: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 75967b614453: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": 00f45086d84f: Pull complete Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Digest: sha256:f09b97d8e44ca58f1f4aa8cda3a13c81cb2c26f6a3e702b48697992abc4b26ea Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ---> b90825186b34 Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Step 2/6 : RUN git clone --depth 1 https://github.com/openfga/openfga Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ---> Running in 43043cc36946 Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Cloning into 'openfga'... Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Removing intermediate container 43043cc36946 Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ---> e94142f1e47b Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Step 3/6 : RUN git clone --depth 1 https://github.com/cncf/cncf-fuzzing Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ---> Running in 83f1c7989ddf Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Cloning into 'cncf-fuzzing'... Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Removing intermediate container 83f1c7989ddf Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ---> 530e33ef9be2 Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Step 4/6 : RUN git clone --depth 1 https://github.com/AdamKorcz/go-118-fuzz-build --branch=v2_2 Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ---> Running in 90eb31fe6a9f Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Cloning into 'go-118-fuzz-build'... Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Removing intermediate container 90eb31fe6a9f Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ---> 7153ec1c2a8e Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Step 5/6 : COPY build.sh $SRC/ Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ---> bc84d19caf67 Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Step 6/6 : WORKDIR $SRC/openfga Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ---> Running in 6b27bcde2c2c Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Removing intermediate container 6b27bcde2c2c Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": ---> 721735dbf24b Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Successfully built 721735dbf24b Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Successfully tagged gcr.io/oss-fuzz/openfga:latest Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/openfga:latest Finished Step #1 - "build-8742f422-fd47-47fc-9103-2bf921903ed3" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/openfga Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileUgRsuO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/go-118-fuzz-build/.git Step #2 - "srcmap": + GIT_DIR=/src/go-118-fuzz-build Step #2 - "srcmap": + cd /src/go-118-fuzz-build Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/go-118-fuzz-build Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=65072595fdfb80eaedbc37db3837d82eb95ce7b2 Step #2 - "srcmap": + jq_inplace /tmp/fileUgRsuO '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filea5iZF9 Step #2 - "srcmap": + cat /tmp/fileUgRsuO Step #2 - "srcmap": + jq '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": + mv /tmp/filea5iZF9 /tmp/fileUgRsuO Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/cncf/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=821e393443ee5374927fa96fbd7d2744cc909015 Step #2 - "srcmap": + jq_inplace /tmp/fileUgRsuO '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "821e393443ee5374927fa96fbd7d2744cc909015" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filelev47I Step #2 - "srcmap": + cat /tmp/fileUgRsuO Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "821e393443ee5374927fa96fbd7d2744cc909015" }' Step #2 - "srcmap": + mv /tmp/filelev47I /tmp/fileUgRsuO Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/openfga/.git Step #2 - "srcmap": + GIT_DIR=/src/openfga Step #2 - "srcmap": + cd /src/openfga Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/openfga/openfga Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=77280a5229637c40fef07b57a7599c54cbac1b1b Step #2 - "srcmap": + jq_inplace /tmp/fileUgRsuO '."/src/openfga" = { type: "git", url: "https://github.com/openfga/openfga", rev: "77280a5229637c40fef07b57a7599c54cbac1b1b" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileQCae4e Step #2 - "srcmap": + cat /tmp/fileUgRsuO Step #2 - "srcmap": + jq '."/src/openfga" = { type: "git", url: "https://github.com/openfga/openfga", rev: "77280a5229637c40fef07b57a7599c54cbac1b1b" }' Step #2 - "srcmap": + mv /tmp/fileQCae4e /tmp/fileUgRsuO Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileUgRsuO Step #2 - "srcmap": + rm /tmp/fileUgRsuO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/go-118-fuzz-build": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/go-118-fuzz-build", Step #2 - "srcmap": "rev": "65072595fdfb80eaedbc37db3837d82eb95ce7b2" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/cncf/cncf-fuzzing", Step #2 - "srcmap": "rev": "821e393443ee5374927fa96fbd7d2744cc909015" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/openfga": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/openfga/openfga", Step #2 - "srcmap": "rev": "77280a5229637c40fef07b57a7599c54cbac1b1b" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + /src/cncf-fuzzing/projects/openfga/build.sh Step #3 - "compile-libfuzzer-address-x86_64": --2026-01-14 07:01:51-- https://go.dev/dl/go1.25.5.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-address-x86_64": Resolving go.dev (go.dev)... 216.239.38.21, 216.239.34.21, 216.239.36.21, ... Step #3 - "compile-libfuzzer-address-x86_64": Connecting to go.dev (go.dev)|216.239.38.21|:443... connected. Step #3 - "compile-libfuzzer-address-x86_64": HTTP request sent, awaiting response... 302 Found Step #3 - "compile-libfuzzer-address-x86_64": Location: https://dl.google.com/go/go1.25.5.linux-amd64.tar.gz [following] Step #3 - "compile-libfuzzer-address-x86_64": --2026-01-14 07:01:51-- https://dl.google.com/go/go1.25.5.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-address-x86_64": Resolving dl.google.com (dl.google.com)... 173.194.206.93, 173.194.206.136, 173.194.206.190, ... Step #3 - "compile-libfuzzer-address-x86_64": Connecting to dl.google.com (dl.google.com)|173.194.206.93|:443... connected. Step #3 - "compile-libfuzzer-address-x86_64": HTTP request sent, awaiting response... 200 OK Step #3 - "compile-libfuzzer-address-x86_64": Length: 59768009 (57M) [application/x-gzip] Step #3 - "compile-libfuzzer-address-x86_64": Saving to: 'go1.25.5.linux-amd64.tar.gz' Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": go1.25.5. 0%[ ] 0 --.-KB/s go1.25.5.linux-amd6 100%[===================>] 57.00M 334MB/s in 0.2s Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": 2026-01-14 07:01:52 (334 MB/s) - 'go1.25.5.linux-amd64.tar.gz' saved [59768009/59768009] Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": /src/go-118-fuzz-build/cmd/convertLibFuzzerTestcaseToStdLibGo /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/smacker/go-tree-sitter v0.0.0-20240827094217-dd81d9e9be82 Step #3 - "compile-libfuzzer-address-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-address-x86_64": /src/go-118-fuzz-build/cmd/addStdLibCorpusToFuzzer /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-address-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithExclusion... f: FuzzCheckWithExclusion... Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/grpc v1.78.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/openfga/api/proto v0.0.0-20250909172242-b4b2a12f5c67 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/openfga/language/pkg/go v0.2.0-beta.2.0.20251027165255-0f8f255e5f6c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-sql-driver/mysql v1.9.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/zap v1.27.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/errdefs v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/docker v28.5.2+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-connections v0.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jackc/pgx/v5 v5.8.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/oklog/ulid/v2 v2.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pressly/goose/v3 v3.26.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/viper v1.20.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/protobuf v1.36.11 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/testify v1.11.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/logr v1.4.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.3.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.27.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_golang v1.23.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/rs/cors v1.11.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/cobra v1.10.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/pflag v1.0.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.64.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.64.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/controller-runtime v0.22.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Yiling-J/theine-go v0.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/emirpasic/gods v1.18.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sync v0.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/MicahParks/keyfunc/v2 v2.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gonum.org/v1/gonum v0.17.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Masterminds/squirrel v1.5.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/IBM/pgxpoolprometheus v1.1.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading modernc.org/sqlite v1.44.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20251222181119-0a764e51fe1b Step #3 - "compile-libfuzzer-address-x86_64": go: downloading filippo.io/edwards25519 v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/antlr4-go/antlr/v4 v4.13.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fsnotify/fsnotify v1.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-viper/mapstructure/v2 v2.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sagikazarmark/locafero v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/afero v1.15.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/cast v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/cel-go v0.26.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/natefinch/wrap v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/exp v0.0.0-20251023183803-a4bb9ffd2546 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sourcegraph/conc v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/mock v0.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sethvargo/go-retry v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/common v0.66.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/procfs v0.16.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jackc/puddle/v2 v2.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jackc/pgpassfile v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/text v0.32.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/lann/builder v0.0.0-20180802200727-47ae307949d0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/apimachinery v0.34.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20251222181119-0a764e51fe1b Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sys v0.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mfridman/interpolate v0.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zeebo/xxh3 v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/net v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cenkalti/backoff/v5 v5.0.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/lann/ps v0.0.0-20150810152359-62de8c46ede0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/client-go v0.34.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.0.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cel.dev/expr v0.24.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stoewer/go-strcase v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/moby/docker-image-spec v1.3.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/errdefs/pkg v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/distribution/reference v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/time v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/api v0.34.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/randfill v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/term v0.37.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/oauth2 v0.34.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/gnostic-models v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag v0.23.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.12.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading modernc.org/libc v1.67.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading modernc.org/memory v1.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/dustin/go-humanize v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading modernc.org/mathutil v1.7.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/remyoudompheng/bigfft v0.0.0-20230129092748-24d4a6f8daec Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2955087451/ossFuzzOverlayFile.json718789502 -o FuzzCheckWithExclusion.a ./main.4289204288.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithIntersection... f: FuzzCheckWithIntersection... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1412240900/ossFuzzOverlayFile.json3311848374 -o FuzzCheckWithIntersection.a ./main.2307304802.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithComputedUserset... f: FuzzCheckWithComputedUserset... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4079980134/ossFuzzOverlayFile.json3523811603 -o FuzzCheckWithComputedUserset.a ./main.1211154429.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithPublicAccess... f: FuzzCheckWithPublicAccess... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2628957112/ossFuzzOverlayFile.json2526753954 -o FuzzCheckWithPublicAccess.a ./main.1590293472.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithMultipleRestrictions... f: FuzzCheckWithMultipleRestrictions... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3598103458/ossFuzzOverlayFile.json1316191415 -o FuzzCheckWithMultipleRestrictions.a ./main.660577511.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithConditions... f: FuzzCheckWithConditions... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3302054667/ossFuzzOverlayFile.json2770715354 -o FuzzCheckWithConditions.a ./main.3695006522.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithParentChild... f: FuzzCheckWithParentChild... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild164088808/ossFuzzOverlayFile.json112364356 -o FuzzCheckWithParentChild.a ./main.1250629383.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheck_AllModels... f: FuzzCheck_AllModels... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3718916227/ossFuzzOverlayFile.json2142593894 -o FuzzCheck_AllModels.a ./main.1415212077.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzWildcardTupleset... f: FuzzWildcardTupleset... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4221708837/ossFuzzOverlayFile.json36160740 -o FuzzWildcardTupleset.a ./main.172685302.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzUsersetFromClause... f: FuzzUsersetFromClause... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2383593302/ossFuzzOverlayFile.json1391334533 -o FuzzUsersetFromClause.a ./main.1451775988.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzRandomAPI... f: FuzzRandomAPI... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1866210489/ossFuzzOverlayFile.json2879240593 -o FuzzRandomAPI.a ./main.977294699.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzPublicUsersetConfusion... f: FuzzPublicUsersetConfusion... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2935146054/ossFuzzOverlayFile.json2975568489 -o FuzzPublicUsersetConfusion.a ./main.681403880.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzModelUpdateBypass... f: FuzzModelUpdateBypass... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild485943535/ossFuzzOverlayFile.json3071826507 -o FuzzModelUpdateBypass.a ./main.3834835015.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzListObjectsMemoryLeak... f: FuzzListObjectsMemoryLeak... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2359520212/ossFuzzOverlayFile.json2244512922 -o FuzzListObjectsMemoryLeak.a ./main.1148613934.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzExpand... f: FuzzExpand... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1980963509/ossFuzzOverlayFile.json3196410035 -o FuzzExpand.a ./main.4156205108.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzListUsers... f: FuzzListUsers... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3858013731/ossFuzzOverlayFile.json2030369223 -o FuzzListUsers.a ./main.3592521008.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzRead... f: FuzzRead... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild788656620/ossFuzzOverlayFile.json2592203194 -o FuzzRead.a ./main.2179284382.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzBatchCheck... f: FuzzBatchCheck... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild944560166/ossFuzzOverlayFile.json869262159 -o FuzzBatchCheck.a ./main.209737438.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzStorageBackends... f: FuzzStorageBackends... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2403874943/ossFuzzOverlayFile.json2621440689 -o FuzzStorageBackends.a ./main.2847070375.go] Step #3 - "compile-libfuzzer-address-x86_64": Checking for and removing empty seed corpus files... Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithComputedUserset_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithConditions_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithExclusion_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithIntersection_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithMultipleRestrictions_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithParentChild_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithPublicAccess_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzModelUpdateBypass_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzPublicUsersetConfusion_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzWildcardTupleset_seed_corpus.zip Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 331d25ff9ac6: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 7f4811f93e43: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": af41fefaae93: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4a518ae63354: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": fdf6a1f3d4e9: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 421d3824bf7c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c4d1682a255f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": de2add8be930: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 18248c285058: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 64aa356fd701: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": dfe92e50c230: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 01476a19d153: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 666b86a0ef21: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 53ca1cb4e23f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 837b61cc240b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0e9c18a11c6f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 776213c12561: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5bec4c9eb524: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ef297f2bb0bf: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6c231c715396: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0384d9df3071: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ed88f7341982: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c43797feedc2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 8dd4699374e0: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2710c0ab2722: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 666b86a0ef21: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5bec4c9eb524: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 9a55b5a70812: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 53ca1cb4e23f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 837b61cc240b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0e9c18a11c6f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 776213c12561: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": dfe92e50c230: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 9a55b5a70812: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 64aa356fd701: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 2710c0ab2722: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": ef297f2bb0bf: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 8dd4699374e0: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0384d9df3071: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": ed88f7341982: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c43797feedc2: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6c231c715396: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 18248c285058: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 01476a19d153: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fdf6a1f3d4e9: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": fdf6a1f3d4e9: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c4d1682a255f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c4d1682a255f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": af41fefaae93: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 421d3824bf7c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 421d3824bf7c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4a518ae63354: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4a518ae63354: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 64aa356fd701: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 64aa356fd701: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 18248c285058: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 18248c285058: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": dfe92e50c230: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": af41fefaae93: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 837b61cc240b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 53ca1cb4e23f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 666b86a0ef21: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 666b86a0ef21: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 776213c12561: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": ef297f2bb0bf: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": ef297f2bb0bf: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6c231c715396: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4a518ae63354: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": fdf6a1f3d4e9: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": de2add8be930: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": de2add8be930: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 01476a19d153: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": ed88f7341982: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": ed88f7341982: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c43797feedc2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c43797feedc2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 421d3824bf7c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 2710c0ab2722: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2710c0ab2722: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 9a55b5a70812: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 9a55b5a70812: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c4d1682a255f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 8dd4699374e0: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 8dd4699374e0: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0384d9df3071: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0384d9df3071: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0e9c18a11c6f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0e9c18a11c6f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5bec4c9eb524: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5bec4c9eb524: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": de2add8be930: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 18248c285058: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 64aa356fd701: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": dfe92e50c230: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 01476a19d153: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 666b86a0ef21: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 53ca1cb4e23f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 837b61cc240b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0e9c18a11c6f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 776213c12561: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5bec4c9eb524: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": ef297f2bb0bf: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6c231c715396: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0384d9df3071: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": ed88f7341982: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c43797feedc2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 8dd4699374e0: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 2710c0ab2722: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 9a55b5a70812: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:8236763117bccc523e675c6ecb6a1215c4fd60620d8553d02b5fac53efb8921e Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzRead Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzCheckWithMultipleRestrictions Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzPublicUsersetConfusion Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzBatchCheck Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzListUsers Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzCheckWithComputedUserset Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzCheckWithParentChild Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzCheckWithIntersection Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzListObjectsMemoryLeak Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzCheckWithConditions Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzCheckWithExclusion Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzExpand Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzModelUpdateBypass Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzStorageBackends Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzUsersetFromClause Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzCheckWithPublicAccess Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzRandomAPI Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzWildcardTupleset Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp622n8hyt/FuzzCheck_AllModels Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/openfga Step #6: adding: FuzzBatchCheck (deflated 72%) Step #6: adding: FuzzBatchCheck_seed_corpus.zip (stored 0%) Step #6: adding: FuzzCheckWithComputedUserset (deflated 72%) Step #6: adding: FuzzCheckWithConditions (deflated 72%) Step #6: adding: FuzzCheckWithExclusion (deflated 72%) Step #6: adding: FuzzCheckWithIntersection (deflated 72%) Step #6: adding: FuzzCheckWithMultipleRestrictions (deflated 72%) Step #6: adding: FuzzCheckWithParentChild (deflated 72%) Step #6: adding: FuzzCheckWithPublicAccess (deflated 72%) Step #6: adding: FuzzCheck_AllModels (deflated 72%) Step #6: adding: FuzzExpand (deflated 72%) Step #6: adding: FuzzExpand_seed_corpus.zip (stored 0%) Step #6: adding: FuzzListObjectsMemoryLeak (deflated 72%) Step #6: adding: FuzzListObjectsMemoryLeak_seed_corpus.zip (stored 0%) Step #6: adding: FuzzListUsers (deflated 72%) Step #6: adding: FuzzListUsers_seed_corpus.zip (stored 0%) Step #6: adding: FuzzModelUpdateBypass (deflated 72%) Step #6: adding: FuzzPublicUsersetConfusion (deflated 72%) Step #6: adding: FuzzRandomAPI (deflated 72%) Step #6: adding: FuzzRandomAPI_seed_corpus.zip (stored 0%) Step #6: adding: FuzzRead (deflated 72%) Step #6: adding: FuzzRead_seed_corpus.zip (stored 0%) Step #6: adding: FuzzStorageBackends (deflated 72%) Step #6: adding: FuzzStorageBackends_seed_corpus.zip (stored 0%) Step #6: adding: FuzzUsersetFromClause (deflated 72%) Step #6: adding: FuzzWildcardTupleset (deflated 72%) Step #6: adding: llvm-symbolizer (deflated 65%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 89257482f398: Waiting Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: d4fceeeb758e: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 473 0 0 100 473 0 2440 --:--:-- --:--:-- --:--:-- 2450 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 8 984M 0 0 8 85.7M 0 120M 0:00:08 --:--:-- 0:00:08 120M 20 984M 0 0 20 206M 0 120M 0:00:08 0:00:01 0:00:07 120M 32 984M 0 0 32 321M 0 113M 0:00:08 0:00:02 0:00:06 113M 42 984M 0 0 42 417M 0 112M 0:00:08 0:00:03 0:00:05 112M 53 984M 0 0 53 524M 0 111M 0:00:08 0:00:04 0:00:04 111M 65 984M 0 0 65 643M 0 111M 0:00:08 0:00:05 0:00:03 110M 77 984M 0 0 77 763M 0 113M 0:00:08 0:00:06 0:00:02 111M 90 984M 0 0 90 889M 0 115M 0:00:08 0:00:07 0:00:01 116M 100 984M 0 0 100 984M 0 112M 0:00:08 0:00:08 --:--:-- 112M 100 984M 0 0 100 984M 0 112M 0:00:08 0:00:08 --:--:-- 113M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 408 0 0 100 408 0 1539 --:--:-- --:--:-- --:--:-- 1545 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32 0 0 100 32 0 155 --:--:-- --:--:-- --:--:-- 156 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/openfga Finished Step #11 PUSH DONE