starting build "9d9384db-d039-4a97-8e26-0631eafa05fb" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 27a60affb188: Pulling fs layer Step #1: fe996ae7dc59: Pulling fs layer Step #1: 87e0e48e0cd6: Pulling fs layer Step #1: f835b9e0cf1c: Pulling fs layer Step #1: af789c137254: Pulling fs layer Step #1: aff0ac00717e: Pulling fs layer Step #1: 3b1039f9896d: Pulling fs layer Step #1: 03589768b946: Pulling fs layer Step #1: 476467ef4fc6: Pulling fs layer Step #1: 3c766dd49ffb: Pulling fs layer Step #1: cfbfe91f834e: Pulling fs layer Step #1: 0b187dafa8d3: Pulling fs layer Step #1: 345ac71c4767: Pulling fs layer Step #1: 7eadecc7791c: Pulling fs layer Step #1: dde9b3807101: Pulling fs layer Step #1: aa322f9d5179: Pulling fs layer Step #1: ed7ec7eeb8fb: Pulling fs layer Step #1: fcd3b4f5fe45: Pulling fs layer Step #1: 88e3f27d7c68: Pulling fs layer Step #1: 84249ace8dd9: Pulling fs layer Step #1: b48628b9660b: Pulling fs layer Step #1: 560589aab225: Pulling fs layer Step #1: 8049d1ac7afb: Pulling fs layer Step #1: 9ca13435c3d5: Pulling fs layer Step #1: bdf125cfc8ec: Pulling fs layer Step #1: 479b0a7911fe: Pulling fs layer Step #1: b33bd0575475: Pulling fs layer Step #1: aff0ac00717e: Waiting Step #1: 58dcb60388c1: Pulling fs layer Step #1: 3b1039f9896d: Waiting Step #1: b8e63fb00ce7: Pulling fs layer Step #1: d8ea79b21b9a: Pulling fs layer Step #1: 03589768b946: Waiting Step #1: 74524f23875e: Pulling fs layer Step #1: 8a3a946d5a7c: Pulling fs layer Step #1: 476467ef4fc6: Waiting Step #1: 8328a6d3718e: Pulling fs layer Step #1: 5cf1d6e2f591: Pulling fs layer Step #1: 3c766dd49ffb: Waiting Step #1: 1c535dcf659d: Pulling fs layer Step #1: f611436a7c2a: Pulling fs layer Step #1: cfbfe91f834e: Waiting Step #1: 0b187dafa8d3: Waiting Step #1: 345ac71c4767: Waiting Step #1: 7eadecc7791c: Waiting Step #1: 87e0e48e0cd6: Waiting Step #1: 479b0a7911fe: Waiting Step #1: 8a3a946d5a7c: Waiting Step #1: b33bd0575475: Waiting Step #1: 8328a6d3718e: Waiting Step #1: 5cf1d6e2f591: Waiting Step #1: dde9b3807101: Waiting Step #1: 58dcb60388c1: Waiting Step #1: 1c535dcf659d: Waiting Step #1: b8e63fb00ce7: Waiting Step #1: aa322f9d5179: Waiting Step #1: f611436a7c2a: Waiting Step #1: d8ea79b21b9a: Waiting Step #1: ed7ec7eeb8fb: Waiting Step #1: 74524f23875e: Waiting Step #1: f835b9e0cf1c: Waiting Step #1: 8049d1ac7afb: Waiting Step #1: b48628b9660b: Waiting Step #1: af789c137254: Waiting Step #1: 560589aab225: Waiting Step #1: 9ca13435c3d5: Waiting Step #1: fcd3b4f5fe45: Waiting Step #1: 84249ace8dd9: Waiting Step #1: bdf125cfc8ec: Waiting Step #1: 88e3f27d7c68: Waiting Step #1: fe996ae7dc59: Verifying Checksum Step #1: fe996ae7dc59: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 87e0e48e0cd6: Verifying Checksum Step #1: 87e0e48e0cd6: Download complete Step #1: f835b9e0cf1c: Verifying Checksum Step #1: f835b9e0cf1c: Download complete Step #1: af789c137254: Verifying Checksum Step #1: af789c137254: Download complete Step #1: 3b1039f9896d: Verifying Checksum Step #1: 3b1039f9896d: Download complete Step #1: 27a60affb188: Verifying Checksum Step #1: 27a60affb188: Download complete Step #1: 03589768b946: Verifying Checksum Step #1: 03589768b946: Download complete Step #1: b549f31133a9: Pull complete Step #1: 3c766dd49ffb: Verifying Checksum Step #1: 3c766dd49ffb: Download complete Step #1: cfbfe91f834e: Verifying Checksum Step #1: cfbfe91f834e: Download complete Step #1: 0b187dafa8d3: Verifying Checksum Step #1: 0b187dafa8d3: Download complete Step #1: 345ac71c4767: Verifying Checksum Step #1: 345ac71c4767: Download complete Step #1: 7eadecc7791c: Verifying Checksum Step #1: 7eadecc7791c: Download complete Step #1: dde9b3807101: Download complete Step #1: 476467ef4fc6: Verifying Checksum Step #1: 476467ef4fc6: Download complete Step #1: aa322f9d5179: Download complete Step #1: ed7ec7eeb8fb: Verifying Checksum Step #1: ed7ec7eeb8fb: Download complete Step #1: fcd3b4f5fe45: Verifying Checksum Step #1: fcd3b4f5fe45: Download complete Step #1: 88e3f27d7c68: Verifying Checksum Step #1: 88e3f27d7c68: Download complete Step #1: 84249ace8dd9: Verifying Checksum Step #1: 84249ace8dd9: Download complete Step #1: b48628b9660b: Download complete Step #1: 8049d1ac7afb: Download complete Step #1: 560589aab225: Verifying Checksum Step #1: 560589aab225: Download complete Step #1: aff0ac00717e: Verifying Checksum Step #1: aff0ac00717e: Download complete Step #1: 9ca13435c3d5: Verifying Checksum Step #1: 9ca13435c3d5: Download complete Step #1: bdf125cfc8ec: Verifying Checksum Step #1: bdf125cfc8ec: Download complete Step #1: 479b0a7911fe: Verifying Checksum Step #1: 479b0a7911fe: Download complete Step #1: b33bd0575475: Verifying Checksum Step #1: b33bd0575475: Download complete Step #1: 58dcb60388c1: Verifying Checksum Step #1: 58dcb60388c1: Download complete Step #1: d8ea79b21b9a: Verifying Checksum Step #1: d8ea79b21b9a: Download complete Step #1: 74524f23875e: Verifying Checksum Step #1: 74524f23875e: Download complete Step #1: b8e63fb00ce7: Download complete Step #1: 8a3a946d5a7c: Verifying Checksum Step #1: 8a3a946d5a7c: Download complete Step #1: 8328a6d3718e: Verifying Checksum Step #1: 8328a6d3718e: Download complete Step #1: 5cf1d6e2f591: Verifying Checksum Step #1: 5cf1d6e2f591: Download complete Step #1: f611436a7c2a: Verifying Checksum Step #1: f611436a7c2a: Download complete Step #1: 27a60affb188: Pull complete Step #1: fe996ae7dc59: Pull complete Step #1: 87e0e48e0cd6: Pull complete Step #1: 1c535dcf659d: Verifying Checksum Step #1: 1c535dcf659d: Download complete Step #1: f835b9e0cf1c: Pull complete Step #1: af789c137254: Pull complete Step #1: aff0ac00717e: Pull complete Step #1: 3b1039f9896d: Pull complete Step #1: 03589768b946: Pull complete Step #1: 476467ef4fc6: Pull complete Step #1: 3c766dd49ffb: Pull complete Step #1: cfbfe91f834e: Pull complete Step #1: 0b187dafa8d3: Pull complete Step #1: 345ac71c4767: Pull complete Step #1: 7eadecc7791c: Pull complete Step #1: dde9b3807101: Pull complete Step #1: aa322f9d5179: Pull complete Step #1: ed7ec7eeb8fb: Pull complete Step #1: fcd3b4f5fe45: Pull complete Step #1: 88e3f27d7c68: Pull complete Step #1: 84249ace8dd9: Pull complete Step #1: b48628b9660b: Pull complete Step #1: 560589aab225: Pull complete Step #1: 8049d1ac7afb: Pull complete Step #1: 9ca13435c3d5: Pull complete Step #1: bdf125cfc8ec: Pull complete Step #1: 479b0a7911fe: Pull complete Step #1: b33bd0575475: Pull complete Step #1: 58dcb60388c1: Pull complete Step #1: b8e63fb00ce7: Pull complete Step #1: d8ea79b21b9a: Pull complete Step #1: 74524f23875e: Pull complete Step #1: 8a3a946d5a7c: Pull complete Step #1: 8328a6d3718e: Pull complete Step #1: 5cf1d6e2f591: Pull complete Step #1: 1c535dcf659d: Pull complete Step #1: f611436a7c2a: Pull complete Step #1: Digest: sha256:fc82f871f962d86d3eaf641af959105188b030d2ba7cd522610ff2629fa62281 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 199904efe5ba Step #1: Step 2/4 : RUN git clone --depth 1 https://github.com/nats-io/nats-server Step #1: ---> Running in 06c94d44921c Step #1: Cloning into 'nats-server'... Step #1: Removing intermediate container 06c94d44921c Step #1: ---> 0034c415f1d0 Step #1: Step 3/4 : COPY build.sh $SRC/ Step #1: ---> fe4fe8bdd4ce Step #1: Step 4/4 : WORKDIR $SRC/nats-server Step #1: ---> Running in 832c2b445dcb Step #1: Removing intermediate container 832c2b445dcb Step #1: ---> 49d6ea3064d8 Step #1: Successfully built 49d6ea3064d8 Step #1: Successfully tagged gcr.io/oss-fuzz/nats:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/nats Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file3ujIuO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/nats-server/.git Step #2 - "srcmap": + GIT_DIR=/src/nats-server Step #2 - "srcmap": + cd /src/nats-server Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/nats-io/nats-server Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=7e8c334ec33ee0bf5685eea4c7a4879c4795aeaa Step #2 - "srcmap": + jq_inplace /tmp/file3ujIuO '."/src/nats-server" = { type: "git", url: "https://github.com/nats-io/nats-server", rev: "7e8c334ec33ee0bf5685eea4c7a4879c4795aeaa" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filenxFGMc Step #2 - "srcmap": + cat /tmp/file3ujIuO Step #2 - "srcmap": + jq '."/src/nats-server" = { type: "git", url: "https://github.com/nats-io/nats-server", rev: "7e8c334ec33ee0bf5685eea4c7a4879c4795aeaa" }' Step #2 - "srcmap": + mv /tmp/filenxFGMc /tmp/file3ujIuO Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file3ujIuO Step #2 - "srcmap": + rm /tmp/file3ujIuO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/nats-server": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/nats-io/nats-server", Step #2 - "srcmap": "rev": "7e8c334ec33ee0bf5685eea4c7a4879c4795aeaa" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/nats-io/nats-server/v2/conf Fuzz fuzz_conf Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/nats-io/nats-server/v2/conf: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.23.6 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/antithesishq/antithesis-sdk-go v0.4.3-default-no-op Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/automaxprocs v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/jwt/v2 v2.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nats.go v1.39.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nkeys v0.4.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nats-io/nuid v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-tpm v0.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.17.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/highwayhash v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prashantv/gostub v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/nats-io/nats-server/v2/conf Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/nats-io/nats-server/v2/conf Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/nats-io/nats-server/v2/server FuzzClient fuzz_client Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/nats-io/nats-server/v2/server: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/nats-io/nats-server/v2/server Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/nats-io/nats-server/v2/server Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 27a60affb188: Already exists Step #4: fe996ae7dc59: Already exists Step #4: 1fb60f76380f: Pulling fs layer Step #4: ceacc69a5eb6: Pulling fs layer Step #4: 56df53c7e92f: Pulling fs layer Step #4: 5b0678c590a1: Pulling fs layer Step #4: 643b93c5a493: Pulling fs layer Step #4: 3a053ccbe2fc: Pulling fs layer Step #4: 75399c9193ed: Pulling fs layer Step #4: 73b63ae67252: Pulling fs layer Step #4: 958e446b901c: Pulling fs layer Step #4: 596eac7a3fb3: Pulling fs layer Step #4: 3f5cabb069a2: Pulling fs layer Step #4: 82db9b94cb83: Pulling fs layer Step #4: c75b5213d1e6: Pulling fs layer Step #4: 09665408fcc1: Pulling fs layer Step #4: 512c6bb36969: Pulling fs layer Step #4: b8df1e8c820b: Pulling fs layer Step #4: 552a7107d98a: Pulling fs layer Step #4: eb6497a150eb: Pulling fs layer Step #4: 4e0ebe252713: Pulling fs layer Step #4: a210141399dc: Pulling fs layer Step #4: 49e603669c49: Pulling fs layer Step #4: fd39327fd459: Pulling fs layer Step #4: 471f435a1c08: Pulling fs layer Step #4: 643b93c5a493: Waiting Step #4: 3a053ccbe2fc: Waiting Step #4: 75399c9193ed: Waiting Step #4: b8df1e8c820b: Waiting Step #4: 73b63ae67252: Waiting Step #4: 552a7107d98a: Waiting Step #4: 82db9b94cb83: Waiting Step #4: eb6497a150eb: Waiting Step #4: 958e446b901c: Waiting Step #4: 4e0ebe252713: Waiting Step #4: c75b5213d1e6: Waiting Step #4: 596eac7a3fb3: Waiting Step #4: a210141399dc: Waiting Step #4: 09665408fcc1: Waiting Step #4: 3f5cabb069a2: Waiting Step #4: 49e603669c49: Waiting Step #4: fd39327fd459: Waiting Step #4: 512c6bb36969: Waiting Step #4: 471f435a1c08: Waiting Step #4: 5b0678c590a1: Waiting Step #4: 1fb60f76380f: Verifying Checksum Step #4: 1fb60f76380f: Download complete Step #4: 56df53c7e92f: Verifying Checksum Step #4: 56df53c7e92f: Download complete Step #4: ceacc69a5eb6: Verifying Checksum Step #4: ceacc69a5eb6: Download complete Step #4: 643b93c5a493: Verifying Checksum Step #4: 643b93c5a493: Download complete Step #4: 1fb60f76380f: Pull complete Step #4: 5b0678c590a1: Verifying Checksum Step #4: 5b0678c590a1: Download complete Step #4: 75399c9193ed: Verifying Checksum Step #4: 75399c9193ed: Download complete Step #4: 73b63ae67252: Verifying Checksum Step #4: 73b63ae67252: Download complete Step #4: 958e446b901c: Download complete Step #4: ceacc69a5eb6: Pull complete Step #4: 56df53c7e92f: Pull complete Step #4: 3a053ccbe2fc: Verifying Checksum Step #4: 3a053ccbe2fc: Download complete Step #4: 3f5cabb069a2: Verifying Checksum Step #4: 3f5cabb069a2: Download complete Step #4: 5b0678c590a1: Pull complete Step #4: 82db9b94cb83: Verifying Checksum Step #4: 82db9b94cb83: Download complete Step #4: 643b93c5a493: Pull complete Step #4: c75b5213d1e6: Verifying Checksum Step #4: c75b5213d1e6: Download complete Step #4: 596eac7a3fb3: Verifying Checksum Step #4: 596eac7a3fb3: Download complete Step #4: 512c6bb36969: Verifying Checksum Step #4: 512c6bb36969: Download complete Step #4: 552a7107d98a: Verifying Checksum Step #4: 552a7107d98a: Download complete Step #4: 09665408fcc1: Verifying Checksum Step #4: 09665408fcc1: Download complete Step #4: eb6497a150eb: Verifying Checksum Step #4: eb6497a150eb: Download complete Step #4: 4e0ebe252713: Verifying Checksum Step #4: 4e0ebe252713: Download complete Step #4: 49e603669c49: Verifying Checksum Step #4: 49e603669c49: Download complete Step #4: a210141399dc: Verifying Checksum Step #4: a210141399dc: Download complete Step #4: 3a053ccbe2fc: Pull complete Step #4: 75399c9193ed: Pull complete Step #4: 471f435a1c08: Verifying Checksum Step #4: 471f435a1c08: Download complete Step #4: fd39327fd459: Download complete Step #4: 73b63ae67252: Pull complete Step #4: 958e446b901c: Pull complete Step #4: b8df1e8c820b: Verifying Checksum Step #4: b8df1e8c820b: Download complete Step #4: 596eac7a3fb3: Pull complete Step #4: 3f5cabb069a2: Pull complete Step #4: 82db9b94cb83: Pull complete Step #4: c75b5213d1e6: Pull complete Step #4: 09665408fcc1: Pull complete Step #4: 512c6bb36969: Pull complete Step #4: b8df1e8c820b: Pull complete Step #4: 552a7107d98a: Pull complete Step #4: eb6497a150eb: Pull complete Step #4: 4e0ebe252713: Pull complete Step #4: a210141399dc: Pull complete Step #4: 49e603669c49: Pull complete Step #4: fd39327fd459: Pull complete Step #4: 471f435a1c08: Pull complete Step #4: Digest: sha256:6380368e5a1bcc9a8c85c797794b7522f246f2693da3edf42319530441784b00 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target fuzz_conf Step #5: Running go target fuzz_client Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: panic: open /workspace/out/libfuzzer-coverage-x86_64/rawfuzzers/fuzz_conf: no such file or directory Step #5: Step #5: goroutine 1 [running]: Step #5: main.main.func1({0xc00002c080, 0x40}, {0x51b758?, 0xc0000d0410?}, {0x0?, 0x0?}) Step #5: /root/go/gocoverage/convertcorpus/main.go:36 +0x32d Step #5: path/filepath.walk({0xc00002c080, 0x40}, {0x51b758, 0xc0000d0410}, 0xc00009bf58) Step #5: /root/.go/src/path/filepath/path.go:433 +0x123 Step #5: path/filepath.walk({0x7fffa61788c8, 0x17}, {0x51b758, 0xc0000d0340}, 0xc00009bf58) Step #5: /root/.go/src/path/filepath/path.go:457 +0x285 Step #5: path/filepath.Walk({0x7fffa61788c8, 0x17}, 0xc00009bf58) Step #5: /root/.go/src/path/filepath/path.go:520 +0x6c Step #5: main.main() Step #5: /root/go/gocoverage/convertcorpus/main.go:22 +0xeb Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_client: Step #5: --- FAIL: TestAccountParseConfigImportsExports (0.00s) Step #5: accounts_test.go:592: parsing failed: open ./configs/accounts.conf: no such file or directory Step #5: --- FAIL: TestAccountTrackLatencyRemoteLeaks (0.00s) Step #5: accounts_test.go:1819: require no error, but got: open ./configs/seed.conf: no such file or directory Step #5: --- FAIL: TestAuthCalloutClientTLSCerts (0.00s) Step #5: panic: Error processing configuration file: /tmp/TestAuthCalloutClientTLSCerts3724308073/001/484484303:5:3: error parsing X509 certificate/key pair: open ../test/configs/certs/tlsauth/server.pem: no such file or directory Step #5: [recovered] Step #5: panic: Error processing configuration file: /tmp/TestAuthCalloutClientTLSCerts3724308073/001/484484303:5:3: error parsing X509 certificate/key pair: open ../test/configs/certs/tlsauth/server.pem: no such file or directory Step #5: Step #5: Step #5: goroutine 1756 [running]: Step #5: testing.tRunner.func1.2({0x13b09c0, 0xc0002bd460}) Step #5: /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.23.6.linux-amd64/src/testing/testing.go:1632 +0x230 Step #5: testing.tRunner.func1() Step #5: /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.23.6.linux-amd64/src/testing/testing.go:1635 +0x35e Step #5: panic({0x13b09c0?, 0xc0002bd460?}) Step #5: /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.23.6.linux-amd64/src/runtime/panic.go:785 +0x132 Step #5: github.com/nats-io/nats-server/v2/server.LoadConfig({0xc000b30200?, 0xc000b30200?}) Step #5: /src/nats-server/server/server_test.go:114 +0x7b Step #5: github.com/nats-io/nats-server/v2/server.RunServerWithConfig({0xc000b30200?, 0xc000538000?}) Step #5: /src/nats-server/server/server_test.go:122 +0x18 Step #5: github.com/nats-io/nats-server/v2/server.NewAuthTest(0xc000538000, {0x15d0291, 0x25b}, 0xc0002bc1b0, {0xc0002f1f30, 0x3, 0x3}) Step #5: /src/nats-server/server/auth_callout_test.go:140 +0xe5 Step #5: github.com/nats-io/nats-server/v2/server.TestAuthCalloutClientTLSCerts(0xc000538000) Step #5: /src/nats-server/server/auth_callout_test.go:464 +0x1f3 Step #5: testing.tRunner(0xc000538000, 0x15f5da8) Step #5: /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.23.6.linux-amd64/src/testing/testing.go:1690 +0xf4 Step #5: created by testing.(*T).Run in goroutine 1 Step #5: /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.23.6.linux-amd64/src/testing/testing.go:1743 +0x390 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_client.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_client.profdata: No such file or directory Step #5: 2025/02/21 06:11:55 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_client.profdata: no such file or directory Step #5: Error occured while running fuzz_conf: Step #5: --- FAIL: TestIncludes (0.00s) Step #5: parse_test.go:356: Received err: error opening config file: open simple.conf: no such file or directory Step #5: --- FAIL: TestIncludeVariablesWithChecks (0.00s) Step #5: parse_test.go:385: Received err: error parsing include file './includes/passwords.conf', open includes/passwords.conf: no such file or directory Step #5: FAIL Step #5: coverage: 97.2% of statements in github.com/nats-io/nats-server/v2/... Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/5 files][ 0.0 B/211.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/cpu.prof [Content-Type=application/octet-stream]... Step #7: / [0/5 files][ 0.0 B/211.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/5 files][ 0.0 B/211.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/heap.prof [Content-Type=application/octet-stream]... Step #7: / [0/5 files][ 0.0 B/211.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/5 files][ 0.0 B/211.8 KiB] 0% Done / [1/5 files][211.8 KiB/211.8 KiB] 99% Done / [2/5 files][211.8 KiB/211.8 KiB] 99% Done / [3/5 files][211.8 KiB/211.8 KiB] 99% Done / [4/5 files][211.8 KiB/211.8 KiB] 99% Done / [5/5 files][211.8 KiB/211.8 KiB] 100% Done Step #7: Operation completed over 5 objects/211.8 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_conf.json [Content-Type=application/json]... Step #9: / [0/3 files][ 0.0 B/ 1.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_client.json [Content-Type=application/json]... Step #9: / [0/3 files][ 0.0 B/ 1.8 KiB] 0% Done / [0/3 files][ 0.0 B/ 1.8 KiB] 0% Done / [1/3 files][ 1.8 KiB/ 1.8 KiB] 99% Done / [2/3 files][ 1.8 KiB/ 1.8 KiB] 99% Done / [3/3 files][ 1.8 KiB/ 1.8 KiB] 100% Done Step #9: Operation completed over 3 objects/1.8 KiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_conf.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_client.log [Content-Type=application/octet-stream]... Step #11: / [0/2 files][ 0.0 B/ 2.5 KiB] 0% Done / [0/2 files][ 0.0 B/ 2.5 KiB] 0% Done / [1/2 files][ 2.5 KiB/ 2.5 KiB] 99% Done / [2/2 files][ 2.5 KiB/ 2.5 KiB] 100% Done Step #11: Operation completed over 2 objects/2.5 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Step #12: ***** NOTICE ***** Step #12: Step #12: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #12: platforms, can be found at Step #12: https://github.com/GoogleCloudPlatform/cloud-sdk-docker. Step #12: Step #12: Suggested alternative images include: Step #12: Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk:alpine Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk:debian_component_based Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk:slim Step #12: Step #12: Please note that the `gsutil` entrypoint must be specified when using these Step #12: images. Step #12: Step #12: ***** END OF NOTICE ***** Step #12: Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 158.0 B] / [1 files][ 158.0 B/ 158.0 B] Step #12: Operation completed over 1 objects/158.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 300 0 0 100 300 0 1442 --:--:-- --:--:-- --:--:-- 1442 100 300 0 0 100 300 0 1388 --:--:-- --:--:-- --:--:-- 1388 Finished Step #13 PUSH DONE