starting build "cda3af96-789b-4560-94e2-b41efc8baaf1" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 7.168kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-python Step #1: latest: Pulling from oss-fuzz-base/base-builder-python Step #1: b549f31133a9: Pulling fs layer Step #1: a977fd1d1d2c: Pulling fs layer Step #1: b7af597d0683: Pulling fs layer Step #1: 0ad851ab79a7: Pulling fs layer Step #1: 32d6a845953a: Pulling fs layer Step #1: 13291e1f0083: Pulling fs layer Step #1: 12c3fa064ec9: Pulling fs layer Step #1: 5bf877a30e45: Pulling fs layer Step #1: 12c76ab55805: Pulling fs layer Step #1: bcee33c0f2c5: Pulling fs layer Step #1: 00901539164e: Pulling fs layer Step #1: 652e81a6c3ce: Pulling fs layer Step #1: 2bd7184f3186: Pulling fs layer Step #1: 6ef14a282d78: Pulling fs layer Step #1: f0b30797ba63: Pulling fs layer Step #1: c255474facb8: Pulling fs layer Step #1: 2037056aed43: Pulling fs layer Step #1: 4ea8cc67e5b1: Pulling fs layer Step #1: 1593bc33732e: Pulling fs layer Step #1: fac862d0d976: Pulling fs layer Step #1: 8a5f772dc665: Pulling fs layer Step #1: a682fa05afee: Pulling fs layer Step #1: 50ae31b489cf: Pulling fs layer Step #1: bcfe6fcb5c6a: Pulling fs layer Step #1: 32d6a845953a: Waiting Step #1: 88ea93146e84: Pulling fs layer Step #1: 12c76ab55805: Waiting Step #1: 912a9adfcdcb: Pulling fs layer Step #1: 7ec1d093c1da: Pulling fs layer Step #1: 13291e1f0083: Waiting Step #1: bcee33c0f2c5: Waiting Step #1: 12c3fa064ec9: Waiting Step #1: 00901539164e: Waiting Step #1: 5bf877a30e45: Waiting Step #1: 8c8a3977119b: Pulling fs layer Step #1: 7e3654bd47ef: Pulling fs layer Step #1: 0ad851ab79a7: Waiting Step #1: 390d9580ed9e: Pulling fs layer Step #1: dcd9de8bf193: Pulling fs layer Step #1: f97e0fb3e819: Pulling fs layer Step #1: 290c9d807336: Pulling fs layer Step #1: 50ae31b489cf: Waiting Step #1: f0b30797ba63: Waiting Step #1: 390d9580ed9e: Waiting Step #1: fac862d0d976: Waiting Step #1: 7ec1d093c1da: Waiting Step #1: 290c9d807336: Waiting Step #1: dcd9de8bf193: Waiting Step #1: 8a5f772dc665: Waiting Step #1: 2bd7184f3186: Waiting Step #1: a682fa05afee: Waiting Step #1: 6ef14a282d78: Waiting Step #1: 8c8a3977119b: Waiting Step #1: c255474facb8: Waiting Step #1: 4ea8cc67e5b1: Waiting Step #1: f97e0fb3e819: Waiting Step #1: 912a9adfcdcb: Waiting Step #1: 2037056aed43: Waiting Step #1: 88ea93146e84: Waiting Step #1: 7e3654bd47ef: Waiting Step #1: b7af597d0683: Verifying Checksum Step #1: b7af597d0683: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 32d6a845953a: Verifying Checksum Step #1: 32d6a845953a: Download complete Step #1: 0ad851ab79a7: Verifying Checksum Step #1: 0ad851ab79a7: Download complete Step #1: 13291e1f0083: Download complete Step #1: 5bf877a30e45: Download complete Step #1: a977fd1d1d2c: Verifying Checksum Step #1: a977fd1d1d2c: Download complete Step #1: 12c76ab55805: Verifying Checksum Step #1: 12c76ab55805: Download complete Step #1: b549f31133a9: Pull complete Step #1: 00901539164e: Verifying Checksum Step #1: 00901539164e: Download complete Step #1: 652e81a6c3ce: Verifying Checksum Step #1: 652e81a6c3ce: Download complete Step #1: 2bd7184f3186: Verifying Checksum Step #1: 2bd7184f3186: Download complete Step #1: 6ef14a282d78: Verifying Checksum Step #1: 6ef14a282d78: Download complete Step #1: f0b30797ba63: Verifying Checksum Step #1: f0b30797ba63: Download complete Step #1: c255474facb8: Verifying Checksum Step #1: c255474facb8: Download complete Step #1: bcee33c0f2c5: Verifying Checksum Step #1: bcee33c0f2c5: Download complete Step #1: 2037056aed43: Verifying Checksum Step #1: 2037056aed43: Download complete Step #1: 4ea8cc67e5b1: Verifying Checksum Step #1: 4ea8cc67e5b1: Download complete Step #1: 1593bc33732e: Verifying Checksum Step #1: 1593bc33732e: Download complete Step #1: fac862d0d976: Verifying Checksum Step #1: fac862d0d976: Download complete Step #1: 8a5f772dc665: Verifying Checksum Step #1: 8a5f772dc665: Download complete Step #1: a682fa05afee: Verifying Checksum Step #1: a682fa05afee: Download complete Step #1: 50ae31b489cf: Download complete Step #1: bcfe6fcb5c6a: Download complete Step #1: 88ea93146e84: Verifying Checksum Step #1: 88ea93146e84: Download complete Step #1: 12c3fa064ec9: Verifying Checksum Step #1: 12c3fa064ec9: Download complete Step #1: 912a9adfcdcb: Verifying Checksum Step #1: 912a9adfcdcb: Download complete Step #1: 7ec1d093c1da: Verifying Checksum Step #1: 7ec1d093c1da: Download complete Step #1: 8c8a3977119b: Download complete Step #1: 390d9580ed9e: Verifying Checksum Step #1: 390d9580ed9e: Download complete Step #1: dcd9de8bf193: Verifying Checksum Step #1: dcd9de8bf193: Download complete Step #1: 7e3654bd47ef: Verifying Checksum Step #1: 7e3654bd47ef: Download complete Step #1: f97e0fb3e819: Verifying Checksum Step #1: f97e0fb3e819: Download complete Step #1: 290c9d807336: Verifying Checksum Step #1: 290c9d807336: Download complete Step #1: a977fd1d1d2c: Pull complete Step #1: b7af597d0683: Pull complete Step #1: 0ad851ab79a7: Pull complete Step #1: 32d6a845953a: Pull complete Step #1: 13291e1f0083: Pull complete Step #1: 12c3fa064ec9: Pull complete Step #1: 5bf877a30e45: Pull complete Step #1: 12c76ab55805: Pull complete Step #1: bcee33c0f2c5: Pull complete Step #1: 00901539164e: Pull complete Step #1: 652e81a6c3ce: Pull complete Step #1: 2bd7184f3186: Pull complete Step #1: 6ef14a282d78: Pull complete Step #1: f0b30797ba63: Pull complete Step #1: c255474facb8: Pull complete Step #1: 2037056aed43: Pull complete Step #1: 4ea8cc67e5b1: Pull complete Step #1: 1593bc33732e: Pull complete Step #1: fac862d0d976: Pull complete Step #1: 8a5f772dc665: Pull complete Step #1: a682fa05afee: Pull complete Step #1: 50ae31b489cf: Pull complete Step #1: bcfe6fcb5c6a: Pull complete Step #1: 88ea93146e84: Pull complete Step #1: 912a9adfcdcb: Pull complete Step #1: 7ec1d093c1da: Pull complete Step #1: 8c8a3977119b: Pull complete Step #1: 7e3654bd47ef: Pull complete Step #1: 390d9580ed9e: Pull complete Step #1: dcd9de8bf193: Pull complete Step #1: f97e0fb3e819: Pull complete Step #1: 290c9d807336: Pull complete Step #1: Digest: sha256:522e05eb433fe415db843a936f4e7f8d1a51fa8149730ec8ddc897755ef424f8 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest Step #1: ---> 712396eedf9a Step #1: Step 2/5 : RUN git clone https://github.com/aio-libs/yarl yarl Step #1: ---> Running in e1077bdbe890 Step #1: Cloning into 'yarl'... Step #1: Removing intermediate container e1077bdbe890 Step #1: ---> ce74d87f4260 Step #1: Step 3/5 : RUN pip3 install --upgrade pip && pip3 install cython Step #1: ---> Running in cd6d730aea35 Step #1: Collecting pip Step #1: Downloading https://files.pythonhosted.org/packages/d4/55/90db48d85f7689ec6f81c0db0622d704306c5284850383c090e6c7195a5c/pip-24.2-py3-none-any.whl (1.8MB) Step #1: Installing collected packages: pip Step #1: Found existing installation: pip 19.2.3 Step #1: Uninstalling pip-19.2.3: Step #1: Successfully uninstalled pip-19.2.3 Step #1: Successfully installed pip-24.2 Step #1: Collecting cython Step #1: Downloading Cython-3.0.11-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (3.2 kB) Step #1: Downloading Cython-3.0.11-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (3.6 MB) Step #1: ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 3.6/3.6 MB 27.4 MB/s eta 0:00:00 Step #1: Installing collected packages: cython Step #1: Successfully installed cython-3.0.11 Step #1: WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable.It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #1: Removing intermediate container cd6d730aea35 Step #1: ---> 7d7fbe2068b6 Step #1: Step 4/5 : COPY *.sh *py $SRC/ Step #1: ---> 63a15e632027 Step #1: Step 5/5 : WORKDIR $SRC/yarl Step #1: ---> Running in d35db1aa162c Step #1: Removing intermediate container d35db1aa162c Step #1: ---> 3c052073e5ae Step #1: Successfully built 3c052073e5ae Step #1: Successfully tagged gcr.io/oss-fuzz/yarl:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/yarl Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileLqcpNM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ python == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/yarl/.git Step #2 - "srcmap": + GIT_DIR=/src/yarl Step #2 - "srcmap": + cd /src/yarl Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/aio-libs/yarl Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=67c2c02243d4e2417fc22f23151764ff32d9c5a0 Step #2 - "srcmap": + jq_inplace /tmp/fileLqcpNM '."/src/yarl" = { type: "git", url: "https://github.com/aio-libs/yarl", rev: "67c2c02243d4e2417fc22f23151764ff32d9c5a0" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filekTJe6c Step #2 - "srcmap": + cat /tmp/fileLqcpNM Step #2 - "srcmap": + jq '."/src/yarl" = { type: "git", url: "https://github.com/aio-libs/yarl", rev: "67c2c02243d4e2417fc22f23151764ff32d9c5a0" }' Step #2 - "srcmap": + mv /tmp/filekTJe6c /tmp/fileLqcpNM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileLqcpNM Step #2 - "srcmap": + rm /tmp/fileLqcpNM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/yarl": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/aio-libs/yarl", Step #2 - "srcmap": "rev": "67c2c02243d4e2417fc22f23151764ff32d9c5a0" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr, Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + sed -i s/python/python3/g Makefile Step #3 - "compile-libfuzzer-address-x86_64": + make cythonize Step #3 - "compile-libfuzzer-address-x86_64": pip install -r requirements/cython.txt Step #3 - "compile-libfuzzer-address-x86_64": Requirement already satisfied: cython==3.0.11 in /usr/local/lib/python3.8/site-packages (from -r requirements/cython.txt (line 1)) (3.0.11) Step #3 - "compile-libfuzzer-address-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable.It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #3 - "compile-libfuzzer-address-x86_64": touch .install-cython Step #3 - "compile-libfuzzer-address-x86_64": python3 -m cython -3 -o yarl/_quoting_c.c yarl/_quoting_c.pyx -I yarl Step #3 - "compile-libfuzzer-address-x86_64": python3 -m cython -3 -o yarl/_helpers_c.c yarl/_helpers_c.pyx -I yarl Step #3 - "compile-libfuzzer-address-x86_64": + python3 -m pip install . Step #3 - "compile-libfuzzer-address-x86_64": Processing /src/yarl Step #3 - "compile-libfuzzer-address-x86_64": Installing build dependencies ... [?25l- \ | / - done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Getting requirements to build wheel ... [?25l- done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Installing backend dependencies ... [?25l- \ done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25l- done Step #3 - "compile-libfuzzer-address-x86_64": [?25hCollecting idna>=2.0 (from yarl==1.10.0) Step #3 - "compile-libfuzzer-address-x86_64": Downloading idna-3.8-py3-none-any.whl.metadata (9.9 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting multidict>=4.0 (from yarl==1.10.0) Step #3 - "compile-libfuzzer-address-x86_64": Downloading multidict-6.0.5-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (4.2 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading idna-3.8-py3-none-any.whl (66 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading multidict-6.0.5-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (129 kB) Step #3 - "compile-libfuzzer-address-x86_64": Building wheels for collected packages: yarl Step #3 - "compile-libfuzzer-address-x86_64": Building wheel for yarl (pyproject.toml) ... [?25l- \ | / - \ | / done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Created wheel for yarl: filename=yarl-1.10.0-cp38-cp38-linux_x86_64.whl size=410384 sha256=ea367789929791e29ed80e5540ea5cd6b8f28ceb736811c925aaa7d4a06f8ac2 Step #3 - "compile-libfuzzer-address-x86_64": Stored in directory: /tmp/pip-ephem-wheel-cache-b0zengm0/wheels/1a/79/b3/8d9eb8e670c5b3ade15f8cf9d135bb94602e6827867bc20eea Step #3 - "compile-libfuzzer-address-x86_64": Successfully built yarl Step #3 - "compile-libfuzzer-address-x86_64": Installing collected packages: multidict, idna, yarl Step #3 - "compile-libfuzzer-address-x86_64": Successfully installed idna-3.8 multidict-6.0.5 yarl-1.10.0 Step #3 - "compile-libfuzzer-address-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable.It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #3 - "compile-libfuzzer-address-x86_64": + '[' address = address ']' Step #3 - "compile-libfuzzer-address-x86_64": + export ENABLE_PYSECSAN=1 Step #3 - "compile-libfuzzer-address-x86_64": + ENABLE_PYSECSAN=1 Step #3 - "compile-libfuzzer-address-x86_64": ++ find /src -name 'fuzz_*.py' Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/fuzz_url.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/fuzz_url.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/fuzz_url.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_url Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_url.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_url Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 1 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ ! -d /pysecsan ]] Step #3 - "compile-libfuzzer-address-x86_64": + pushd /usr/local/lib/sanitizers/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/lib/sanitizers/pysecsan /src/yarl Step #3 - "compile-libfuzzer-address-x86_64": + python3 setup.py install Step #3 - "compile-libfuzzer-address-x86_64": running install Step #3 - "compile-libfuzzer-address-x86_64": running bdist_egg Step #3 - "compile-libfuzzer-address-x86_64": running egg_info Step #3 - "compile-libfuzzer-address-x86_64": creating pysecsan.egg-info Step #3 - "compile-libfuzzer-address-x86_64": writing pysecsan.egg-info/PKG-INFO Step #3 - "compile-libfuzzer-address-x86_64": writing dependency_links to pysecsan.egg-info/dependency_links.txt Step #3 - "compile-libfuzzer-address-x86_64": writing top-level names to pysecsan.egg-info/top_level.txt Step #3 - "compile-libfuzzer-address-x86_64": writing manifest file 'pysecsan.egg-info/SOURCES.txt' Step #3 - "compile-libfuzzer-address-x86_64": reading manifest file 'pysecsan.egg-info/SOURCES.txt' Step #3 - "compile-libfuzzer-address-x86_64": writing manifest file 'pysecsan.egg-info/SOURCES.txt' Step #3 - "compile-libfuzzer-address-x86_64": installing library code to build/bdist.linux-x86_64/egg Step #3 - "compile-libfuzzer-address-x86_64": running install_lib Step #3 - "compile-libfuzzer-address-x86_64": running build_py Step #3 - "compile-libfuzzer-address-x86_64": creating build Step #3 - "compile-libfuzzer-address-x86_64": creating build/lib Step #3 - "compile-libfuzzer-address-x86_64": creating build/lib/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": copying pysecsan/yaml_deserialization.py -> build/lib/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": copying pysecsan/command_injection.py -> build/lib/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": copying pysecsan/sanlib.py -> build/lib/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": copying pysecsan/redos.py -> build/lib/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": copying pysecsan/__init__.py -> build/lib/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": creating build/bdist.linux-x86_64 Step #3 - "compile-libfuzzer-address-x86_64": creating build/bdist.linux-x86_64/egg Step #3 - "compile-libfuzzer-address-x86_64": creating build/bdist.linux-x86_64/egg/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": copying build/lib/pysecsan/yaml_deserialization.py -> build/bdist.linux-x86_64/egg/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": copying build/lib/pysecsan/command_injection.py -> build/bdist.linux-x86_64/egg/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": copying build/lib/pysecsan/sanlib.py -> build/bdist.linux-x86_64/egg/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": copying build/lib/pysecsan/redos.py -> build/bdist.linux-x86_64/egg/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": copying build/lib/pysecsan/__init__.py -> build/bdist.linux-x86_64/egg/pysecsan Step #3 - "compile-libfuzzer-address-x86_64": byte-compiling build/bdist.linux-x86_64/egg/pysecsan/yaml_deserialization.py to yaml_deserialization.cpython-38.pyc Step #3 - "compile-libfuzzer-address-x86_64": byte-compiling build/bdist.linux-x86_64/egg/pysecsan/command_injection.py to command_injection.cpython-38.pyc Step #3 - "compile-libfuzzer-address-x86_64": byte-compiling build/bdist.linux-x86_64/egg/pysecsan/sanlib.py to sanlib.cpython-38.pyc Step #3 - "compile-libfuzzer-address-x86_64": byte-compiling build/bdist.linux-x86_64/egg/pysecsan/redos.py to redos.cpython-38.pyc Step #3 - "compile-libfuzzer-address-x86_64": byte-compiling build/bdist.linux-x86_64/egg/pysecsan/__init__.py to __init__.cpython-38.pyc Step #3 - "compile-libfuzzer-address-x86_64": creating build/bdist.linux-x86_64/egg/EGG-INFO Step #3 - "compile-libfuzzer-address-x86_64": copying pysecsan.egg-info/PKG-INFO -> build/bdist.linux-x86_64/egg/EGG-INFO Step #3 - "compile-libfuzzer-address-x86_64": copying pysecsan.egg-info/SOURCES.txt -> build/bdist.linux-x86_64/egg/EGG-INFO Step #3 - "compile-libfuzzer-address-x86_64": copying pysecsan.egg-info/dependency_links.txt -> build/bdist.linux-x86_64/egg/EGG-INFO Step #3 - "compile-libfuzzer-address-x86_64": copying pysecsan.egg-info/top_level.txt -> build/bdist.linux-x86_64/egg/EGG-INFO Step #3 - "compile-libfuzzer-address-x86_64": zip_safe flag not set; analyzing archive contents... Step #3 - "compile-libfuzzer-address-x86_64": creating dist Step #3 - "compile-libfuzzer-address-x86_64": creating 'dist/pysecsan-0.1-py3.8.egg' and adding 'build/bdist.linux-x86_64/egg' to it Step #3 - "compile-libfuzzer-address-x86_64": removing 'build/bdist.linux-x86_64/egg' (and everything under it) Step #3 - "compile-libfuzzer-address-x86_64": Processing pysecsan-0.1-py3.8.egg Step #3 - "compile-libfuzzer-address-x86_64": Copying pysecsan-0.1-py3.8.egg to /usr/local/lib/python3.8/site-packages Step #3 - "compile-libfuzzer-address-x86_64": Adding pysecsan 0.1 to easy-install.pth file Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": Installed /usr/local/lib/python3.8/site-packages/pysecsan-0.1-py3.8.egg Step #3 - "compile-libfuzzer-address-x86_64": Processing dependencies for pysecsan==0.1 Step #3 - "compile-libfuzzer-address-x86_64": Finished processing dependencies for pysecsan==0.1 Step #3 - "compile-libfuzzer-address-x86_64": + popd Step #3 - "compile-libfuzzer-address-x86_64": /src/yarl Step #3 - "compile-libfuzzer-address-x86_64": + cat Step #3 - "compile-libfuzzer-address-x86_64": + cat pysecsan_wrapper.py /src/fuzz_url.py Step #3 - "compile-libfuzzer-address-x86_64": + mv tmp_fuzzer_pysecsan.py /src/fuzz_url.py Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_url Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_url --onefile --name fuzz_url.pkg /src/fuzz_url.py Step #3 - "compile-libfuzzer-address-x86_64": 60 INFO: PyInstaller: 5.0.1 Step #3 - "compile-libfuzzer-address-x86_64": 60 INFO: Python: 3.8.3 Step #3 - "compile-libfuzzer-address-x86_64": 61 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.2.5 Step #3 - "compile-libfuzzer-address-x86_64": 61 INFO: wrote /src/yarl/fuzz_url.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 64 INFO: UPX is not available. Step #3 - "compile-libfuzzer-address-x86_64": 65 INFO: Extending PYTHONPATH with paths Step #3 - "compile-libfuzzer-address-x86_64": ['/src'] Step #3 - "compile-libfuzzer-address-x86_64": 295 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 295 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 296 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 297 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 307 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 3086 INFO: Processing pre-find module path hook distutils from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/pre_find_module_path/hook-distutils.py'. Step #3 - "compile-libfuzzer-address-x86_64": 3086 INFO: distutils: retargeting to non-venv dir '/usr/local/lib/python3.8' Step #3 - "compile-libfuzzer-address-x86_64": 4798 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 4958 INFO: running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 4982 INFO: Analyzing /src/fuzz_url.py Step #3 - "compile-libfuzzer-address-x86_64": 5623 INFO: Processing module hooks... Step #3 - "compile-libfuzzer-address-x86_64": 5624 INFO: Loading module hook 'hook-atheris.py' from '/usr/local/lib/python3.8/site-packages/atheris'... Step #3 - "compile-libfuzzer-address-x86_64": 5625 INFO: Loading module hook 'hook-xml.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5881 INFO: Loading module hook 'hook-encodings.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5930 INFO: Loading module hook 'hook-heapq.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5932 INFO: Loading module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5933 INFO: Loading module hook 'hook-pickle.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5935 INFO: Loading module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5943 INFO: Loading module hook 'hook-difflib.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5945 INFO: Loading module hook 'hook-distutils.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5961 INFO: checking Tree Step #3 - "compile-libfuzzer-address-x86_64": 5961 INFO: Building Tree because Tree-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 5961 INFO: Building Tree Tree-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 5961 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 5966 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 5969 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_subprocess.py' Step #3 - "compile-libfuzzer-address-x86_64": 5971 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_pkgutil.py' Step #3 - "compile-libfuzzer-address-x86_64": 5973 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_multiprocessing.py' Step #3 - "compile-libfuzzer-address-x86_64": 5976 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_inspect.py' Step #3 - "compile-libfuzzer-address-x86_64": 5984 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 6899 INFO: Looking for eggs Step #3 - "compile-libfuzzer-address-x86_64": 6899 INFO: Using Python library /usr/local/lib/libpython3.8.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 6903 INFO: Warnings written to /src/pyfuzzworkdir//fuzz_url/fuzz_url.pkg/warn-fuzz_url.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 6933 INFO: Graph cross-reference written to /src/pyfuzzworkdir//fuzz_url/fuzz_url.pkg/xref-fuzz_url.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 6947 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 6947 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 6947 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir//fuzz_url/fuzz_url.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 7410 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir//fuzz_url/fuzz_url.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 7415 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 7415 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 7415 INFO: Building PKG (CArchive) fuzz_url.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 14841 INFO: Building PKG (CArchive) fuzz_url.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 14844 INFO: Bootloader /usr/local/lib/python3.8/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 14844 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 14844 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 14844 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 14844 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_url.pkg Step #3 - "compile-libfuzzer-address-x86_64": 14845 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 14905 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_url.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_url.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_url.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_url Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": a977fd1d1d2c: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": b7af597d0683: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 13e3034c244d: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": dec64d51f794: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e31f3b260b9e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 367f9bb09834: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5b25d2c94427: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": d2a50f9fb1f3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 8632b0bd8e7d: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5368468cae7f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3c2efcf61031: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ac5a534aec8b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b7e426295cd7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a3f08180fccf: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": d948d546ccc6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0ad7fe872fbd: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6a857bbda8a0: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a70462462a24: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2a0c7f3b0701: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 8632b0bd8e7d: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": d948d546ccc6: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0ad7fe872fbd: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6a857bbda8a0: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 367f9bb09834: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 2a0c7f3b0701: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5368468cae7f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b7e426295cd7: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a3f08180fccf: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5b25d2c94427: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3c2efcf61031: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": d2a50f9fb1f3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": ac5a534aec8b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e31f3b260b9e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e31f3b260b9e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 13e3034c244d: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 13e3034c244d: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": dec64d51f794: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": dec64d51f794: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5b25d2c94427: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5b25d2c94427: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 13e3034c244d: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": d2a50f9fb1f3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": d2a50f9fb1f3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 8632b0bd8e7d: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 8632b0bd8e7d: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3c2efcf61031: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3c2efcf61031: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": dec64d51f794: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5368468cae7f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5368468cae7f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e31f3b260b9e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b7e426295cd7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b7e426295cd7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 367f9bb09834: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 367f9bb09834: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a3f08180fccf: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a3f08180fccf: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": d948d546ccc6: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": d948d546ccc6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0ad7fe872fbd: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0ad7fe872fbd: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6a857bbda8a0: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6a857bbda8a0: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a70462462a24: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a70462462a24: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2a0c7f3b0701: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2a0c7f3b0701: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": ac5a534aec8b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": ac5a534aec8b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 367f9bb09834: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5b25d2c94427: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": d2a50f9fb1f3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 8632b0bd8e7d: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5368468cae7f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3c2efcf61031: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": ac5a534aec8b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b7e426295cd7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a3f08180fccf: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": d948d546ccc6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0ad7fe872fbd: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6a857bbda8a0: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a70462462a24: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 2a0c7f3b0701: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:44d0c2654e5beb6475c2a8205a6abe1b890292906574ed74740db7d2400248f9 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpqhbl9i_7/fuzz_url Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/yarl Step #6: adding: fuzz_url (deflated 31%) Step #6: adding: fuzz_url.pkg (deflated 1%) Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: sanitizer_with_fuzzer.so (deflated 67%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 0062f774e994: Waiting Step #7: 6b33fd031fac: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 145 0 0 100 145 0 710 --:--:-- --:--:-- --:--:-- 714 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 58 21.2M 0 0 58 12.3M 0 73.9M --:--:-- --:--:-- --:--:-- 73.6M 100 21.2M 0 0 100 21.2M 0 46.7M --:--:-- --:--:-- --:--:-- 46.6M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 9 0 0 100 9 0 43 --:--:-- --:--:-- --:--:-- 43 100 9 0 0 100 9 0 32 --:--:-- --:--:-- --:--:-- 32 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 29 0 0 100 29 0 139 --:--:-- --:--:-- --:--:-- 139 100 29 0 0 100 29 0 133 --:--:-- --:--:-- --:--:-- 133 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/yarl Finished Step #11 PUSH DONE