starting build "b2fdbaa2-961e-419f-801e-9b2b37255ede" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0" Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Sending build context to Docker daemon 5.12kB Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": b549f31133a9: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 56f9cd7305b8: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a3da808747fd: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": e8f385fb0ae5: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 0a209505d108: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": e8738849466c: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5e911f2405d0: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 0e71a2cd93db: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 154940ec6144: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 62e67e23d3b0: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ac6056d8294c: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5e478f8f8849: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 31e7f2dd9e0c: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c18fdd1712cc: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": b7b01fe31839: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": acdda53aeb4f: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 17f35791cc37: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c7c35098559d: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 2a94e249a7ee: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 274afbe8934b: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 893c38e9a12b: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a114c0f985e4: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 591405398563: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 154940ec6144: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": d6e3e0fb308f: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 19eee4b559e6: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a20263f67019: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 8c45c60f46d6: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 307a3d7e4b66: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 31e7f2dd9e0c: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 18864125fc0a: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 550ec3b88eeb: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": aa587d180917: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5e478f8f8849: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 1cc98835b3c5: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 21355be65e5d: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a86dab369f21: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c54e1298e50a: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 78a44974b904: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 7cf3fdbde0fe: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 62e67e23d3b0: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 3c394a3bf5cc: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": da4f63b1fe17: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 591405398563: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 45bfac67d864: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5b030fc78d6f: Pulling fs layer Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 19eee4b559e6: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": d6e3e0fb308f: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a20263f67019: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ac6056d8294c: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c18fdd1712cc: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 8c45c60f46d6: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 18864125fc0a: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 307a3d7e4b66: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 550ec3b88eeb: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": b7b01fe31839: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 893c38e9a12b: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": aa587d180917: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c54e1298e50a: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 7cf3fdbde0fe: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": acdda53aeb4f: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 78a44974b904: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 1cc98835b3c5: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 3c394a3bf5cc: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 21355be65e5d: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 17f35791cc37: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a114c0f985e4: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c7c35098559d: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 45bfac67d864: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 0e71a2cd93db: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": da4f63b1fe17: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 2a94e249a7ee: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 274afbe8934b: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5b030fc78d6f: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a86dab369f21: Waiting Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a3da808747fd: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a3da808747fd: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 0a209505d108: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 0e71a2cd93db: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 0e71a2cd93db: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5e911f2405d0: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": b549f31133a9: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": b549f31133a9: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": e8f385fb0ae5: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": e8f385fb0ae5: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5e478f8f8849: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5e478f8f8849: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ac6056d8294c: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ac6056d8294c: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c18fdd1712cc: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c18fdd1712cc: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 31e7f2dd9e0c: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 31e7f2dd9e0c: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": acdda53aeb4f: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": acdda53aeb4f: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": b7b01fe31839: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": b7b01fe31839: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 62e67e23d3b0: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 62e67e23d3b0: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c7c35098559d: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c7c35098559d: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 56f9cd7305b8: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 56f9cd7305b8: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 2a94e249a7ee: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 17f35791cc37: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 17f35791cc37: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 893c38e9a12b: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 274afbe8934b: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 274afbe8934b: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a114c0f985e4: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": d6e3e0fb308f: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": d6e3e0fb308f: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 591405398563: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 591405398563: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 19eee4b559e6: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 19eee4b559e6: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a20263f67019: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 307a3d7e4b66: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 307a3d7e4b66: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 8c45c60f46d6: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 18864125fc0a: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 18864125fc0a: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": aa587d180917: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": aa587d180917: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 1cc98835b3c5: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 21355be65e5d: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 21355be65e5d: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 550ec3b88eeb: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 550ec3b88eeb: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": b549f31133a9: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a86dab369f21: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a86dab369f21: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c54e1298e50a: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 78a44974b904: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 78a44974b904: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 154940ec6144: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 154940ec6144: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": da4f63b1fe17: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": da4f63b1fe17: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5b030fc78d6f: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5b030fc78d6f: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 7cf3fdbde0fe: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 7cf3fdbde0fe: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 3c394a3bf5cc: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 3c394a3bf5cc: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": e8738849466c: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": e8738849466c: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 45bfac67d864: Verifying Checksum Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 45bfac67d864: Download complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 56f9cd7305b8: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a3da808747fd: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": e8f385fb0ae5: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 0a209505d108: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": e8738849466c: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5e911f2405d0: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 0e71a2cd93db: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 154940ec6144: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 62e67e23d3b0: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ac6056d8294c: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5e478f8f8849: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 31e7f2dd9e0c: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c18fdd1712cc: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": b7b01fe31839: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": acdda53aeb4f: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 17f35791cc37: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c7c35098559d: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 2a94e249a7ee: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 274afbe8934b: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 893c38e9a12b: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a114c0f985e4: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 591405398563: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": d6e3e0fb308f: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 19eee4b559e6: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a20263f67019: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 8c45c60f46d6: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 307a3d7e4b66: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 18864125fc0a: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 550ec3b88eeb: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": aa587d180917: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 1cc98835b3c5: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 21355be65e5d: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": a86dab369f21: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": c54e1298e50a: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 78a44974b904: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 7cf3fdbde0fe: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 3c394a3bf5cc: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": da4f63b1fe17: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 45bfac67d864: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": 5b030fc78d6f: Pull complete Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Digest: sha256:14f8d400140731bc1d23c83431315bbc9d4c7fdcf9337cc54601782a1e98c0f6 Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ---> f5ec60e85dc7 Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Step 2/6 : RUN git clone --depth 1 https://github.com/openfga/openfga Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ---> Running in 71f28df3c9bf Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Cloning into 'openfga'... Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Removing intermediate container 71f28df3c9bf Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ---> 585aab651174 Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Step 3/6 : RUN git clone --depth 1 https://github.com/cncf/cncf-fuzzing Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ---> Running in 40032385ea7a Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Cloning into 'cncf-fuzzing'... Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Removing intermediate container 40032385ea7a Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ---> 37d75f1b8ab0 Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Step 4/6 : RUN git clone --depth 1 https://github.com/AdamKorcz/go-118-fuzz-build --branch=v2_2 Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ---> Running in 4fab7cbe71cf Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Cloning into 'go-118-fuzz-build'... Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Removing intermediate container 4fab7cbe71cf Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ---> c90d44eeb043 Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Step 5/6 : COPY build.sh $SRC/ Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ---> 5a8bf7dd3abf Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Step 6/6 : WORKDIR $SRC/openfga Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ---> Running in 887cdeaad6a5 Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Removing intermediate container 887cdeaad6a5 Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": ---> 61ab2c2612fa Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Successfully built 61ab2c2612fa Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Successfully tagged gcr.io/oss-fuzz/openfga:latest Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/openfga:latest Finished Step #1 - "build-efbb4737-1b08-4ff7-b220-a7542f2c14e0" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/openfga Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file4oSfzP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/go-118-fuzz-build/.git Step #2 - "srcmap": + GIT_DIR=/src/go-118-fuzz-build Step #2 - "srcmap": + cd /src/go-118-fuzz-build Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/go-118-fuzz-build Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=65072595fdfb80eaedbc37db3837d82eb95ce7b2 Step #2 - "srcmap": + jq_inplace /tmp/file4oSfzP '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filewdn0ta Step #2 - "srcmap": + cat /tmp/file4oSfzP Step #2 - "srcmap": + jq '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": + mv /tmp/filewdn0ta /tmp/file4oSfzP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/cncf/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=821e393443ee5374927fa96fbd7d2744cc909015 Step #2 - "srcmap": + jq_inplace /tmp/file4oSfzP '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "821e393443ee5374927fa96fbd7d2744cc909015" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filefJgKVI Step #2 - "srcmap": + cat /tmp/file4oSfzP Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "821e393443ee5374927fa96fbd7d2744cc909015" }' Step #2 - "srcmap": + mv /tmp/filefJgKVI /tmp/file4oSfzP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/openfga/.git Step #2 - "srcmap": + GIT_DIR=/src/openfga Step #2 - "srcmap": + cd /src/openfga Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/openfga/openfga Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=f4c61a29fd628ac684d7ee0ddb1903538e1e48b0 Step #2 - "srcmap": + jq_inplace /tmp/file4oSfzP '."/src/openfga" = { type: "git", url: "https://github.com/openfga/openfga", rev: "f4c61a29fd628ac684d7ee0ddb1903538e1e48b0" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileIekRxd Step #2 - "srcmap": + cat /tmp/file4oSfzP Step #2 - "srcmap": + jq '."/src/openfga" = { type: "git", url: "https://github.com/openfga/openfga", rev: "f4c61a29fd628ac684d7ee0ddb1903538e1e48b0" }' Step #2 - "srcmap": + mv /tmp/fileIekRxd /tmp/file4oSfzP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file4oSfzP Step #2 - "srcmap": + rm /tmp/file4oSfzP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/go-118-fuzz-build": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/go-118-fuzz-build", Step #2 - "srcmap": "rev": "65072595fdfb80eaedbc37db3837d82eb95ce7b2" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/cncf/cncf-fuzzing", Step #2 - "srcmap": "rev": "821e393443ee5374927fa96fbd7d2744cc909015" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/openfga": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/openfga/openfga", Step #2 - "srcmap": "rev": "f4c61a29fd628ac684d7ee0ddb1903538e1e48b0" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + /src/cncf-fuzzing/projects/openfga/build.sh Step #3 - "compile-libfuzzer-address-x86_64": --2026-01-01 06:37:23-- https://go.dev/dl/go1.25.5.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-address-x86_64": Resolving go.dev (go.dev)... 216.239.32.21, 216.239.38.21, 216.239.34.21, ... Step #3 - "compile-libfuzzer-address-x86_64": Connecting to go.dev (go.dev)|216.239.32.21|:443... connected. Step #3 - "compile-libfuzzer-address-x86_64": HTTP request sent, awaiting response... 302 Found Step #3 - "compile-libfuzzer-address-x86_64": Location: https://dl.google.com/go/go1.25.5.linux-amd64.tar.gz [following] Step #3 - "compile-libfuzzer-address-x86_64": --2026-01-01 06:37:23-- https://dl.google.com/go/go1.25.5.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-address-x86_64": Resolving dl.google.com (dl.google.com)... 108.177.121.136, 108.177.121.93, 108.177.121.190, ... Step #3 - "compile-libfuzzer-address-x86_64": Connecting to dl.google.com (dl.google.com)|108.177.121.136|:443... connected. Step #3 - "compile-libfuzzer-address-x86_64": HTTP request sent, awaiting response... 200 OK Step #3 - "compile-libfuzzer-address-x86_64": Length: 59768009 (57M) [application/x-gzip] Step #3 - "compile-libfuzzer-address-x86_64": Saving to: 'go1.25.5.linux-amd64.tar.gz' Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": go1.25.5. 0%[ ] 0 --.-KB/s go1.25.5.l 0%[ ] 49.16K 210KB/s go1.25.5.li 0%[ ] 177.16K 395KB/s go1.25.5.lin 0%[ ] 401.16K 614KB/s go1.25.5.linu 1%[ ] 833.16K 971KB/s go1.25.5.linux 3%[ ] 1.73M 1.63MB/s go1.25.5.linux- 6%[> ] 3.71M 2.94MB/s go1.25.5.linux-a 13%[=> ] 7.66M 5.24MB/s go1.25.5.linux-am 20%[===> ] 11.73M 7.04MB/s go1.25.5.linux-amd 27%[====> ] 15.84M 8.49MB/s go1.25.5.linux-amd6 35%[======> ] 20.09M 9.72MB/s o1.25.5.linux-amd64 42%[=======> ] 24.29M 10.7MB/s 1.25.5.linux-amd64. 49%[========> ] 28.38M 11.5MB/s .25.5.linux-amd64.t 57%[==========> ] 32.85M 12.3MB/s 25.5.linux-amd64.ta 64%[===========> ] 36.91M 12.8MB/s 5.5.linux-amd64.tar 71%[=============> ] 40.98M 13.3MB/s eta 1s .5.linux-amd64.tar. 79%[==============> ] 45.07M 13.7MB/s eta 1s 5.linux-amd64.tar.g 86%[================> ] 49.51M 15.9MB/s eta 1s .linux-amd64.tar.gz 95%[==================> ] 54.38M 17.2MB/s eta 1s go1.25.5.linux-amd6 100%[===================>] 57.00M 18.1MB/s in 3.8s Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": 2026-01-01 06:37:28 (14.9 MB/s) - 'go1.25.5.linux-amd64.tar.gz' saved [59768009/59768009] Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": /src/go-118-fuzz-build/cmd/convertLibFuzzerTestcaseToStdLibGo /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/smacker/go-tree-sitter v0.0.0-20240827094217-dd81d9e9be82 Step #3 - "compile-libfuzzer-address-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-address-x86_64": /src/go-118-fuzz-build/cmd/addStdLibCorpusToFuzzer /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-address-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithExclusion... f: FuzzCheckWithExclusion... Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/openfga/language/pkg/go v0.2.0-beta.2.0.20251027165255-0f8f255e5f6c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/openfga/api/proto v0.0.0-20250909172242-b4b2a12f5c67 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/viper v1.20.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/errdefs v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/docker v28.5.2+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-connections v0.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/zap v1.27.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/grpc v1.77.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/oklog/ulid/v2 v2.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-sql-driver/mysql v1.9.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/testify v1.11.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jackc/pgx/v5 v5.7.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/protobuf v1.36.11 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pressly/goose/v3 v3.26.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_golang v1.23.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sync v0.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Yiling-J/theine-go v0.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/emirpasic/gods v1.18.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/logr v1.4.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.3.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.27.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/rs/cors v1.11.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/cobra v1.10.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/pflag v1.0.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.64.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.64.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/controller-runtime v0.22.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/cel-go v0.26.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/natefinch/wrap v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/exp v0.0.0-20250620022241-b7579e27df2b Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gonum.org/v1/gonum v0.16.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sourcegraph/conc v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/mock v0.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fsnotify/fsnotify v1.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-viper/mapstructure/v2 v2.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sagikazarmark/locafero v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/afero v1.15.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/cast v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading filippo.io/edwards25519 v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/MicahParks/keyfunc/v2 v2.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20251202230838-ff82c1b0f217 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Masterminds/squirrel v1.5.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading modernc.org/sqlite v1.40.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/IBM/pgxpoolprometheus v1.1.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/antlr4-go/antlr/v4 v4.13.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sethvargo/go-retry v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/common v0.66.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/procfs v0.16.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cel.dev/expr v0.24.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stoewer/go-strcase v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/apimachinery v0.34.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sys v0.39.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/text v0.31.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jackc/puddle/v2 v2.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/jackc/pgpassfile v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/crypto v0.45.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/lann/builder v0.0.0-20180802200727-47ae307949d0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/zeebo/xxh3 v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mfridman/interpolate v0.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20251202230838-ff82c1b0f217 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/net v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cenkalti/backoff/v5 v5.0.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/client-go v0.34.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/lann/ps v0.0.0-20150810152359-62de8c46ede0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.0.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/moby/docker-image-spec v1.3.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/errdefs/pkg v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/distribution/reference v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/time v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/randfill v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/api v0.34.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.9.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/term v0.37.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/oauth2 v0.32.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/gnostic-models v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag v0.23.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.12.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading modernc.org/libc v1.66.10 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading modernc.org/memory v1.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/dustin/go-humanize v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading modernc.org/mathutil v1.7.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/remyoudompheng/bigfft v0.0.0-20230129092748-24d4a6f8daec Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2966650953/ossFuzzOverlayFile.json2458664257 -o FuzzCheckWithExclusion.a ./main.839340278.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithIntersection... f: FuzzCheckWithIntersection... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild959163114/ossFuzzOverlayFile.json2788944142 -o FuzzCheckWithIntersection.a ./main.861466424.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithComputedUserset... f: FuzzCheckWithComputedUserset... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1949805806/ossFuzzOverlayFile.json2320637007 -o FuzzCheckWithComputedUserset.a ./main.29707751.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithPublicAccess... f: FuzzCheckWithPublicAccess... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3505776646/ossFuzzOverlayFile.json3990812777 -o FuzzCheckWithPublicAccess.a ./main.2362776226.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithMultipleRestrictions... f: FuzzCheckWithMultipleRestrictions... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2563373328/ossFuzzOverlayFile.json2335690767 -o FuzzCheckWithMultipleRestrictions.a ./main.1035521625.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithConditions... f: FuzzCheckWithConditions... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2434010201/ossFuzzOverlayFile.json3011098348 -o FuzzCheckWithConditions.a ./main.4210468988.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithParentChild... f: FuzzCheckWithParentChild... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1110734562/ossFuzzOverlayFile.json2064383342 -o FuzzCheckWithParentChild.a ./main.599804849.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheck_AllModels... f: FuzzCheck_AllModels... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild3679316475/ossFuzzOverlayFile.json1016332626 -o FuzzCheck_AllModels.a ./main.630255440.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzWildcardTupleset... f: FuzzWildcardTupleset... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild368505251/ossFuzzOverlayFile.json4169562383 -o FuzzWildcardTupleset.a ./main.47249718.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzUsersetFromClause... f: FuzzUsersetFromClause... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2328213894/ossFuzzOverlayFile.json3159061438 -o FuzzUsersetFromClause.a ./main.3806962039.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzRandomAPI... f: FuzzRandomAPI... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4033523170/ossFuzzOverlayFile.json3412660257 -o FuzzRandomAPI.a ./main.486676913.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzPublicUsersetConfusion... f: FuzzPublicUsersetConfusion... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2746400340/ossFuzzOverlayFile.json790356316 -o FuzzPublicUsersetConfusion.a ./main.3942299051.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzModelUpdateBypass... f: FuzzModelUpdateBypass... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild2356318794/ossFuzzOverlayFile.json3210471672 -o FuzzModelUpdateBypass.a ./main.3305279637.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzListObjectsMemoryLeak... f: FuzzListObjectsMemoryLeak... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild732869243/ossFuzzOverlayFile.json3499688727 -o FuzzListObjectsMemoryLeak.a ./main.1672040478.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzExpand... f: FuzzExpand... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4073090504/ossFuzzOverlayFile.json976877371 -o FuzzExpand.a ./main.543796073.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzListUsers... f: FuzzListUsers... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild767495497/ossFuzzOverlayFile.json3304927363 -o FuzzListUsers.a ./main.89065230.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzRead... f: FuzzRead... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4197359411/ossFuzzOverlayFile.json3699368889 -o FuzzRead.a ./main.2220893260.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzBatchCheck... f: FuzzBatchCheck... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild4219074301/ossFuzzOverlayFile.json1737233882 -o FuzzBatchCheck.a ./main.4105027541.go] Step #3 - "compile-libfuzzer-address-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzStorageBackends... f: FuzzStorageBackends... Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_advanced_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/authorization_models_extensive_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/batch_check_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/expand_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/functional_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/list_users_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/memory_leak_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/model_update_bypass_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/public_userset_confusion_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/random_api_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/read_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/storage_backends_fuzz_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/userset_from_clause_test.go Step #3 - "compile-libfuzzer-address-x86_64": renaming _test.go file in fuzzer dir: /src/openfga/tests/wildcard_tupleset_test.go Step #3 - "compile-libfuzzer-address-x86_64": Running go [build -buildmode c-archive -tags gofuzz_libfuzzer,libfuzzer,gofuzz -trimpath -gcflags all=-d=libfuzzer -gcflags syscall=-d=libfuzzer=0 -gcflags runtime/cgo=-d=libfuzzer=0 -gcflags runtime/pprof=-d=libfuzzer=0 -overlay /tmp/gofuzzbuild1639248463/ossFuzzOverlayFile.json1867643764 -o FuzzStorageBackends.a ./main.2220685597.go] Step #3 - "compile-libfuzzer-address-x86_64": Checking for and removing empty seed corpus files... Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithComputedUserset_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithConditions_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithExclusion_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithIntersection_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithMultipleRestrictions_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithParentChild_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzCheckWithPublicAccess_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzModelUpdateBypass_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzPublicUsersetConfusion_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Removing empty seed corpus: FuzzWildcardTupleset_seed_corpus.zip Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 56f9cd7305b8: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": a3da808747fd: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 47c95efa2151: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c698d96fcbe3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 91f8a71f0ef7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 91dcb16fe0a7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": de4742ba3c93: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3a9d8a9b16c2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 70aac1a4e21c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": d9d1c261c77c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 095fa85f7963: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": dee3158994fa: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": fc0046b4e176: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 749219e48907: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": efe2932d1427: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 37738d1e3746: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a193ef7123d6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0c62b1cdb8f3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0a4abff4058c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": cb5dd1fa04a1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b97daeb57e77: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 57d5c6eaccf4: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": fdf87962fd6a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 135f5510187c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6a1c5e0b432c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 80ba58ff366b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 37738d1e3746: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a193ef7123d6: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0c62b1cdb8f3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 135f5510187c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6a1c5e0b432c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0a4abff4058c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": cb5dd1fa04a1: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b97daeb57e77: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 57d5c6eaccf4: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fdf87962fd6a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 80ba58ff366b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": d9d1c261c77c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": dee3158994fa: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 095fa85f7963: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fc0046b4e176: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 749219e48907: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 70aac1a4e21c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": efe2932d1427: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": de4742ba3c93: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 91f8a71f0ef7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 91f8a71f0ef7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 47c95efa2151: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 47c95efa2151: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c698d96fcbe3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c698d96fcbe3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": d9d1c261c77c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": d9d1c261c77c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 70aac1a4e21c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 70aac1a4e21c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 91dcb16fe0a7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 91dcb16fe0a7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 095fa85f7963: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 095fa85f7963: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 47c95efa2151: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 749219e48907: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 749219e48907: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": efe2932d1427: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": efe2932d1427: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fc0046b4e176: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": fc0046b4e176: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a193ef7123d6: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a193ef7123d6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0a4abff4058c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0a4abff4058c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": cb5dd1fa04a1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": cb5dd1fa04a1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c698d96fcbe3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3a9d8a9b16c2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3a9d8a9b16c2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 91f8a71f0ef7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 57d5c6eaccf4: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fdf87962fd6a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": fdf87962fd6a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": dee3158994fa: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": dee3158994fa: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6a1c5e0b432c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6a1c5e0b432c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 80ba58ff366b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 80ba58ff366b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 135f5510187c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 135f5510187c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 91dcb16fe0a7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": de4742ba3c93: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b97daeb57e77: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b97daeb57e77: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 37738d1e3746: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 37738d1e3746: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0c62b1cdb8f3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0c62b1cdb8f3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3a9d8a9b16c2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 70aac1a4e21c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": d9d1c261c77c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 095fa85f7963: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": dee3158994fa: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": fc0046b4e176: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 749219e48907: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": efe2932d1427: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 37738d1e3746: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a193ef7123d6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0c62b1cdb8f3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0a4abff4058c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": cb5dd1fa04a1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b97daeb57e77: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 57d5c6eaccf4: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": fdf87962fd6a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 135f5510187c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6a1c5e0b432c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 80ba58ff366b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:4b95daf50030e4bfb504e001ef57c0616662ec1772995020a5bd81fde9a3e3ee Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzRead Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzCheckWithMultipleRestrictions Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzPublicUsersetConfusion Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzBatchCheck Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzListUsers Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzCheckWithComputedUserset Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzCheckWithParentChild Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzCheckWithIntersection Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzListObjectsMemoryLeak Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzCheckWithConditions Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzCheckWithExclusion Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzExpand Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzModelUpdateBypass Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzStorageBackends Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzUsersetFromClause Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzCheckWithPublicAccess Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzRandomAPI Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzWildcardTupleset Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpuzdk4qf7/FuzzCheck_AllModels Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/openfga Step #6: adding: FuzzBatchCheck (deflated 72%) Step #6: adding: FuzzBatchCheck_seed_corpus.zip (stored 0%) Step #6: adding: FuzzCheckWithComputedUserset (deflated 72%) Step #6: adding: FuzzCheckWithConditions (deflated 72%) Step #6: adding: FuzzCheckWithExclusion (deflated 72%) Step #6: adding: FuzzCheckWithIntersection (deflated 72%) Step #6: adding: FuzzCheckWithMultipleRestrictions (deflated 72%) Step #6: adding: FuzzCheckWithParentChild (deflated 72%) Step #6: adding: FuzzCheckWithPublicAccess (deflated 72%) Step #6: adding: FuzzCheck_AllModels (deflated 72%) Step #6: adding: FuzzExpand (deflated 72%) Step #6: adding: FuzzExpand_seed_corpus.zip (stored 0%) Step #6: adding: FuzzListObjectsMemoryLeak (deflated 72%) Step #6: adding: FuzzListObjectsMemoryLeak_seed_corpus.zip (stored 0%) Step #6: adding: FuzzListUsers (deflated 72%) Step #6: adding: FuzzListUsers_seed_corpus.zip (stored 0%) Step #6: adding: FuzzModelUpdateBypass (deflated 72%) Step #6: adding: FuzzPublicUsersetConfusion (deflated 72%) Step #6: adding: FuzzRandomAPI (deflated 72%) Step #6: adding: FuzzRandomAPI_seed_corpus.zip (stored 0%) Step #6: adding: FuzzRead (deflated 72%) Step #6: adding: FuzzRead_seed_corpus.zip (stored 0%) Step #6: adding: FuzzStorageBackends (deflated 72%) Step #6: adding: FuzzStorageBackends_seed_corpus.zip (stored 0%) Step #6: adding: FuzzUsersetFromClause (deflated 72%) Step #6: adding: FuzzWildcardTupleset (deflated 72%) Step #6: adding: llvm-symbolizer (deflated 65%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 89257482f398: Waiting Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 0062f774e994: Download complete Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 473 0 0 100 473 0 2219 --:--:-- --:--:-- --:--:-- 2220 100 473 0 0 100 473 0 2130 --:--:-- --:--:-- --:--:-- 2130 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 3 982M 0 0 3 29.6M 0 103M 0:00:09 --:--:-- 0:00:09 103M 14 982M 0 0 14 143M 0 112M 0:00:08 0:00:01 0:00:07 112M 26 982M 0 0 26 257M 0 113M 0:00:08 0:00:02 0:00:06 113M 38 982M 0 0 38 379M 0 115M 0:00:08 0:00:03 0:00:05 115M 50 982M 0 0 50 498M 0 116M 0:00:08 0:00:04 0:00:04 116M 62 982M 0 0 62 610M 0 115M 0:00:08 0:00:05 0:00:03 116M 75 982M 0 0 75 741M 0 118M 0:00:08 0:00:06 0:00:02 119M 87 982M 0 0 87 862M 0 118M 0:00:08 0:00:07 0:00:01 121M 99 982M 0 0 99 976M 0 117M 0:00:08 0:00:08 --:--:-- 119M 100 982M 0 0 100 982M 0 113M 0:00:08 0:00:08 --:--:-- 111M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 408 0 0 100 408 0 1566 --:--:-- --:--:-- --:--:-- 1569 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32 0 0 100 32 0 153 --:--:-- --:--:-- --:--:-- 153 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/openfga Finished Step #11 PUSH DONE