starting build "e9b7d922-d77a-4d18-8aa9-dd47f6e845fe" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: a977fd1d1d2c: Pulling fs layer Step #1: b7af597d0683: Pulling fs layer Step #1: 0ad851ab79a7: Pulling fs layer Step #1: 32d6a845953a: Pulling fs layer Step #1: 13291e1f0083: Pulling fs layer Step #1: 32d6a845953a: Waiting Step #1: 0ad851ab79a7: Waiting Step #1: 12c3fa064ec9: Pulling fs layer Step #1: 5bf877a30e45: Pulling fs layer Step #1: 12c3fa064ec9: Waiting Step #1: 12c76ab55805: Pulling fs layer Step #1: 5bf877a30e45: Waiting Step #1: bcee33c0f2c5: Pulling fs layer Step #1: 00901539164e: Pulling fs layer Step #1: 652e81a6c3ce: Pulling fs layer Step #1: 2bd7184f3186: Pulling fs layer Step #1: 6ef14a282d78: Pulling fs layer Step #1: 12c76ab55805: Waiting Step #1: f0b30797ba63: Pulling fs layer Step #1: c255474facb8: Pulling fs layer Step #1: bcee33c0f2c5: Waiting Step #1: 2037056aed43: Pulling fs layer Step #1: 4ea8cc67e5b1: Pulling fs layer Step #1: 1593bc33732e: Pulling fs layer Step #1: 00901539164e: Waiting Step #1: 6ef14a282d78: Waiting Step #1: fac862d0d976: Pulling fs layer Step #1: 652e81a6c3ce: Waiting Step #1: 8a5f772dc665: Pulling fs layer Step #1: 1593bc33732e: Waiting Step #1: a682fa05afee: Pulling fs layer Step #1: 50ae31b489cf: Pulling fs layer Step #1: 2bd7184f3186: Waiting Step #1: bcfe6fcb5c6a: Pulling fs layer Step #1: 88ea93146e84: Pulling fs layer Step #1: 912a9adfcdcb: Pulling fs layer Step #1: 7ec1d093c1da: Pulling fs layer Step #1: fac862d0d976: Waiting Step #1: 8c8a3977119b: Pulling fs layer Step #1: 7e3654bd47ef: Pulling fs layer Step #1: 390d9580ed9e: Pulling fs layer Step #1: dcd9de8bf193: Pulling fs layer Step #1: f97e0fb3e819: Pulling fs layer Step #1: f0b30797ba63: Waiting Step #1: 6341849a53eb: Pulling fs layer Step #1: fb2e13b262c7: Pulling fs layer Step #1: bcfe6fcb5c6a: Waiting Step #1: 912a9adfcdcb: Waiting Step #1: 7ec1d093c1da: Waiting Step #1: e39246d0ba97: Pulling fs layer Step #1: 2037056aed43: Waiting Step #1: fb2e13b262c7: Waiting Step #1: 8c8a3977119b: Waiting Step #1: 7e3654bd47ef: Waiting Step #1: e39246d0ba97: Waiting Step #1: 88ea93146e84: Waiting Step #1: 50ae31b489cf: Waiting Step #1: f97e0fb3e819: Waiting Step #1: 390d9580ed9e: Waiting Step #1: dcd9de8bf193: Waiting Step #1: 4ea8cc67e5b1: Waiting Step #1: b7af597d0683: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 32d6a845953a: Verifying Checksum Step #1: 32d6a845953a: Download complete Step #1: 0ad851ab79a7: Verifying Checksum Step #1: 0ad851ab79a7: Download complete Step #1: 13291e1f0083: Verifying Checksum Step #1: 13291e1f0083: Download complete Step #1: 5bf877a30e45: Download complete Step #1: a977fd1d1d2c: Download complete Step #1: 12c76ab55805: Verifying Checksum Step #1: 12c76ab55805: Download complete Step #1: 00901539164e: Verifying Checksum Step #1: 00901539164e: Download complete Step #1: b549f31133a9: Pull complete Step #1: 652e81a6c3ce: Verifying Checksum Step #1: 652e81a6c3ce: Download complete Step #1: 2bd7184f3186: Download complete Step #1: 6ef14a282d78: Verifying Checksum Step #1: 6ef14a282d78: Download complete Step #1: f0b30797ba63: Download complete Step #1: c255474facb8: Verifying Checksum Step #1: c255474facb8: Download complete Step #1: bcee33c0f2c5: Verifying Checksum Step #1: bcee33c0f2c5: Download complete Step #1: 2037056aed43: Verifying Checksum Step #1: 2037056aed43: Download complete Step #1: 4ea8cc67e5b1: Download complete Step #1: 1593bc33732e: Verifying Checksum Step #1: 1593bc33732e: Download complete Step #1: fac862d0d976: Verifying Checksum Step #1: fac862d0d976: Download complete Step #1: 8a5f772dc665: Verifying Checksum Step #1: 8a5f772dc665: Download complete Step #1: 50ae31b489cf: Verifying Checksum Step #1: 50ae31b489cf: Download complete Step #1: a682fa05afee: Verifying Checksum Step #1: a682fa05afee: Download complete Step #1: bcfe6fcb5c6a: Verifying Checksum Step #1: bcfe6fcb5c6a: Download complete Step #1: 88ea93146e84: Verifying Checksum Step #1: 88ea93146e84: Download complete Step #1: 912a9adfcdcb: Verifying Checksum Step #1: 912a9adfcdcb: Download complete Step #1: 12c3fa064ec9: Verifying Checksum Step #1: 12c3fa064ec9: Download complete Step #1: 7ec1d093c1da: Verifying Checksum Step #1: 7ec1d093c1da: Download complete Step #1: 8c8a3977119b: Verifying Checksum Step #1: 8c8a3977119b: Download complete Step #1: 7e3654bd47ef: Verifying Checksum Step #1: 7e3654bd47ef: Download complete Step #1: 390d9580ed9e: Download complete Step #1: dcd9de8bf193: Verifying Checksum Step #1: dcd9de8bf193: Download complete Step #1: f97e0fb3e819: Verifying Checksum Step #1: f97e0fb3e819: Download complete Step #1: 6341849a53eb: Download complete Step #1: e39246d0ba97: Verifying Checksum Step #1: e39246d0ba97: Download complete Step #1: a977fd1d1d2c: Pull complete Step #1: b7af597d0683: Pull complete Step #1: fb2e13b262c7: Verifying Checksum Step #1: fb2e13b262c7: Download complete Step #1: 0ad851ab79a7: Pull complete Step #1: 32d6a845953a: Pull complete Step #1: 13291e1f0083: Pull complete Step #1: 12c3fa064ec9: Pull complete Step #1: 5bf877a30e45: Pull complete Step #1: 12c76ab55805: Pull complete Step #1: bcee33c0f2c5: Pull complete Step #1: 00901539164e: Pull complete Step #1: 652e81a6c3ce: Pull complete Step #1: 2bd7184f3186: Pull complete Step #1: 6ef14a282d78: Pull complete Step #1: f0b30797ba63: Pull complete Step #1: c255474facb8: Pull complete Step #1: 2037056aed43: Pull complete Step #1: 4ea8cc67e5b1: Pull complete Step #1: 1593bc33732e: Pull complete Step #1: fac862d0d976: Pull complete Step #1: 8a5f772dc665: Pull complete Step #1: a682fa05afee: Pull complete Step #1: 50ae31b489cf: Pull complete Step #1: bcfe6fcb5c6a: Pull complete Step #1: 88ea93146e84: Pull complete Step #1: 912a9adfcdcb: Pull complete Step #1: 7ec1d093c1da: Pull complete Step #1: 8c8a3977119b: Pull complete Step #1: 7e3654bd47ef: Pull complete Step #1: 390d9580ed9e: Pull complete Step #1: dcd9de8bf193: Pull complete Step #1: f97e0fb3e819: Pull complete Step #1: 6341849a53eb: Pull complete Step #1: fb2e13b262c7: Pull complete Step #1: e39246d0ba97: Pull complete Step #1: Digest: sha256:da7c263f5ff098ec906135e9e100511dedd2e33fddcb5674db56bc013ef5ec65 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 042b5e305fe6 Step #1: Step 2/6 : RUN git clone --depth 1 https://github.com/notaryproject/notary Step #1: ---> Running in 57a6c969e8c2 Step #1: Cloning into 'notary'... Step #1: Removing intermediate container 57a6c969e8c2 Step #1: ---> acc1de993cde Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/notaryproject/notation-go Step #1: ---> Running in 7e0389ddcfe6 Step #1: Cloning into 'notation-go'... Step #1: Removing intermediate container 7e0389ddcfe6 Step #1: ---> 68a3f9dba11f Step #1: Step 4/6 : RUN git clone --depth 1 https://github.com/cncf/cncf-fuzzing Step #1: ---> Running in 8e36131190db Step #1: Cloning into 'cncf-fuzzing'... Step #1: Removing intermediate container 8e36131190db Step #1: ---> 5b63b89a4ebf Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> c0647494ac64 Step #1: Step 6/6 : WORKDIR $SRC/notary Step #1: ---> Running in b88b9dbb668d Step #1: Removing intermediate container b88b9dbb668d Step #1: ---> 764458c27dd1 Step #1: Successfully built 764458c27dd1 Step #1: Successfully tagged gcr.io/oss-fuzz/notary:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/notary Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileP5Uw0L Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/cncf/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bcc768e35927b51f508e486ffa2606720d5e9b71 Step #2 - "srcmap": + jq_inplace /tmp/fileP5Uw0L '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "bcc768e35927b51f508e486ffa2606720d5e9b71" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileVBHE0b Step #2 - "srcmap": + cat /tmp/fileP5Uw0L Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "bcc768e35927b51f508e486ffa2606720d5e9b71" }' Step #2 - "srcmap": + mv /tmp/fileVBHE0b /tmp/fileP5Uw0L Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/notation-go/.git Step #2 - "srcmap": + GIT_DIR=/src/notation-go Step #2 - "srcmap": + cd /src/notation-go Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/notaryproject/notation-go Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=4d76f9a41595021b71b5d36559a29e8def50aa47 Step #2 - "srcmap": + jq_inplace /tmp/fileP5Uw0L '."/src/notation-go" = { type: "git", url: "https://github.com/notaryproject/notation-go", rev: "4d76f9a41595021b71b5d36559a29e8def50aa47" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file1NS44I Step #2 - "srcmap": + cat /tmp/fileP5Uw0L Step #2 - "srcmap": + jq '."/src/notation-go" = { type: "git", url: "https://github.com/notaryproject/notation-go", rev: "4d76f9a41595021b71b5d36559a29e8def50aa47" }' Step #2 - "srcmap": + mv /tmp/file1NS44I /tmp/fileP5Uw0L Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/notary/.git Step #2 - "srcmap": + GIT_DIR=/src/notary Step #2 - "srcmap": + cd /src/notary Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/notaryproject/notary Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=9d2b3b35929392c9945d976b8bdecbe2f53a299e Step #2 - "srcmap": + jq_inplace /tmp/fileP5Uw0L '."/src/notary" = { type: "git", url: "https://github.com/notaryproject/notary", rev: "9d2b3b35929392c9945d976b8bdecbe2f53a299e" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file4W8j4e Step #2 - "srcmap": + cat /tmp/fileP5Uw0L Step #2 - "srcmap": + jq '."/src/notary" = { type: "git", url: "https://github.com/notaryproject/notary", rev: "9d2b3b35929392c9945d976b8bdecbe2f53a299e" }' Step #2 - "srcmap": + mv /tmp/file4W8j4e /tmp/fileP5Uw0L Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileP5Uw0L Step #2 - "srcmap": + rm /tmp/fileP5Uw0L Step #2 - "srcmap": { Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/cncf/cncf-fuzzing", Step #2 - "srcmap": "rev": "bcc768e35927b51f508e486ffa2606720d5e9b71" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/notation-go": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/notaryproject/notation-go", Step #2 - "srcmap": "rev": "4d76f9a41595021b71b5d36559a29e8def50aa47" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/notary": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/notaryproject/notary", Step #2 - "srcmap": "rev": "9d2b3b35929392c9945d976b8bdecbe2f53a299e" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/cncf-fuzzing/projects/notary/build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + sed 's/go 1.17/go 1.19/g' -i /src/notary/go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": + export CNCFFuzz=/src/cncf-fuzzing/projects/notary Step #3 - "compile-libfuzzer-coverage-x86_64": + CNCFFuzz=/src/cncf-fuzzing/projects/notary Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/cncf-fuzzing/projects/notary/fuzz_trustmanager_test.go /src/notary/trustmanager/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/cncf-fuzzing/projects/notary/fuzz_tuf_utils.go /src/notary/tuf/utils/ Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package trustmanager\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdaLogics/go-fuzz-headers=github.com/AdamKorcz/go-fuzz-headers-1@1f10f66a31bf0e5cc26a2f4a74bd3be5f6463b67 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.0.0-20201021035429-f5854403a974 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.47.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/pkcs11 v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/rethinkdb/rethinkdb-go.v6 v6.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-connections v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go v1.5.1-1.0.20160303222718-d30aec9fd63c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v0.0.0-20150530192845-be5ff3e4840c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/distribution v2.7.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/mux v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Shopify/logrus-bugsnag v0.0.0-20170309145241-6dbc35f2c30d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/bugsnag-go v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.27.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.0.0-20201117132131-f5c789dd3221 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-sql-driver/mysql v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lib/pq v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-sqlite3 v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dvsekhvalnov/jose2go v0.0.0-20200901110807-248326c1351b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jinzhu/gorm v1.9.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.0.0-20201117144127-c1f2f97bffc9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudflare/cfssl v0.0.0-20180223231731-4e2dcbde5004 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v0.9.0-pre1.0.20180209125602-c332b6f63c06 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/BurntSushi/toml v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/magiconair/properties v1.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v0.0.0-20150508191742-4d07383ffe94 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/jwalterweatherman v0.0.0-20141219030609-3d60171a6431 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jinzhu/inflection v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jinzhu/now v1.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/panicwrap v0.0.0-20151223152923-e2c28503fcd0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bitly/go-simplejson v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/osext v0.0.0-20130617224835-0dd3f918b21b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/juju/loggo v0.0.0-20190526231331-6e530bcce5d8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hailocab/go-hostpool v0.0.0-20160125115350-e80d13ce29ed Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opentracing/opentracing-go v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20200227125254-8fa46927fb4f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/erikstmartin/go-testdb v0.0.0-20160219214506-8d10e4a1bae5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/cenkalti/backoff.v2 v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/libtrust v0.0.0-20160708172513-aabc10ec26b7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.0.0-20180110214958-89604d197083 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.0.0-20180125133057-cb4147076ac7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/denisenkom/go-mssqldb v0.0.0-20191128021309-1d7a30a10f73 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bitly/go-hostpool v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bmizerany/assert v0.0.0-20160611221934-b7ed37b82869 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-metrics v0.0.0-20180209012529-399ea8c73916 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/certificate-transparency-go v1.0.10-0.20180222191210-5ab67e519c93 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-sql/civil v0.0.0-20190719163853-cb61b32ac6fe Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230111232327-1f10f66a31bf Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdaLogics/go-fuzz-headers in github.com/AdaLogics/go-fuzz-headers v0.0.0-00010101000000-000000000000 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/theupdateframework/notary/cryptoservice/fuzz Fuzz fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/theupdateframework/notary/cryptoservice/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/theupdateframework/notary/cryptoservice/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/theupdateframework/notary/cryptoservice/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/trustmanager/keys_test.go /src/notary/trustmanager/keys_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/trustmanager/keystore_test.go /src/notary/trustmanager/keystore_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/trustmanager FuzzImportKeysSimple FuzzImportKeysSimple Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/trustmanager FuzzImportKeysStructured FuzzImportKeysStructured Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/tuf/utils FuzzParsePEMPrivateKey FuzzParsePEMPrivateKey Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_handlers.go /src/notary/server/handlers/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzAtomicUpdateHandler FuzzAtomicUpdateHandler Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find the function: func FuzzAtomicUpdateHandler(f *testing.F) Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzAtomicUpdateHandlerMultipart FuzzAtomicUpdateHandlerMultipart Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzGetKeyHandler FuzzGetKeyHandler Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzChangefeed FuzzChangefeed Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzRotateKeyHandler FuzzRotateKeyHandler Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzDeleteHandler FuzzDeleteHandler Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_keydbstore.go /src/notary/signer/keydbstore/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/signer/keydbstore/keydbstore_test.go /src/notary/signer/keydbstore/keydbstore_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/signer/keydbstore/cachedcryptoservice_test.go /src/notary/signer/keydbstore/cachedcryptoservice_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/signer/keydbstore FuzzKeyDBStore FuzzKeyDBStore Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_server_storage.go /src/notary/server/storage/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/server/storage/storage_test.go /src/notary/server/storage/storage_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/storage FuzzServerStorageSQL FuzzServerStorage Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/storage FuzzServerStorageMemStorage FuzzServerStorageMemStorage Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/storage FuzzServerStorageTufStorage FuzzServerStorageTufStorage Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/notation-go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_verification.go /src/notation-go/verifier/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_pkix_test.go /src/notation-go/internal/pkix/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_notation_artifactref_parsing.go /src/notation-go/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_trustpolicy.go /src/notation-go/verifier/trustpolicy/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv ./verifier/helpers_test.go ./verifier/helpers_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package verifier\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdaLogics/go-fuzz-headers=github.com/AdamKorcz/go-fuzz-headers-1@12e09aba5ebdbc7ddb01b6203347a11c93015534 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/notation-core-go v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading oras.land/oras-go/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/notation-plugin-framework-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-ldap/ldap/v3 v3.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/veraison/go-cose v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/tspclient-go v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-asn1-ber/asn1-ber v1.5.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-ntlmssp v0.0.0-20221128193559-754e69321358 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gokrb5/v8 v8.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alexbrainman/sspi v0.0.0-20231016080023-1a75b4708caa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/goidentity/v6 v6.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gofork v1.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/aescts/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-uuid v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/dnsutils/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/rpc/v2 v2.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230329111138-12e09aba5ebd Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdaLogics/go-fuzz-headers in github.com/AdaLogics/go-fuzz-headers v0.0.0-00010101000000-000000000000 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/notaryproject/notation-go/verifier FuzzVerify FuzzVerify Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/notaryproject/notation-go/verifier [github.com/notaryproject/notation-go/verifier.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_verification.go:330:19: undefined: dummyPolicyDocument Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_verification.go:352:3: unknown field trustPolicyDoc in struct literal of type verifier Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_verification.go:489:38: vv.trustPolicyDoc undefined (type *verifier has no field or method trustPolicyDoc) Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image notary Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 notary Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1