starting build "f1e2dc84-333c-431b-a45e-c004b491e26b" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0" Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Sending build context to Docker daemon 5.12kB Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b549f31133a9: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 2c402b3c1c2f: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e5c6561396d5: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ccd6942ed3d2: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b46e60347118: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 55ea69e41097: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e5d6e860d7d3: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 11202192dc12: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b28884c93391: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4c97d1652d22: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 6a812d6be828: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e68c2fa3527c: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 935821dc4c93: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 11202192dc12: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e5d6e860d7d3: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b28884c93391: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c9574a9235c8: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4c97d1652d22: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 6a812d6be828: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 935821dc4c93: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": fc4ea0408340: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 66cdd82a217c: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c79233615af7: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4a57f2efd839: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b437320e1a60: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e39e802b3ce2: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c9574a9235c8: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c79233615af7: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": fc4ea0408340: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 66cdd82a217c: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e68c2fa3527c: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b437320e1a60: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e39e802b3ce2: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 90cd4fbf37e0: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4d89074feeb9: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 2008765f6086: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 90cd4fbf37e0: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 07af864f11a4: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 2008765f6086: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9c7f64f3fd89: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 19899e344280: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4a57f2efd839: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 07af864f11a4: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9c7f64f3fd89: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 8dcec2efe63d: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 06ca184f6385: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": f198a0ccadfd: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 71662828eda3: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 1d13cdf70869: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 19899e344280: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 1f10d96ed13c: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 8dcec2efe63d: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 06ca184f6385: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": f198a0ccadfd: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 943e5698151a: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 71662828eda3: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 1f10d96ed13c: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": da23fb04c1a1: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 1d13cdf70869: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9a31504a0fbc: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": d7b26aade5d3: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 943e5698151a: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": da23fb04c1a1: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9bc83ab7b163: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9a31504a0fbc: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e4746fff5f31: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": d7b26aade5d3: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": fbc20cf0da84: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c7948c42c8f1: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9e65bd4fb815: Pulling fs layer Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9bc83ab7b163: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e4746fff5f31: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": fbc20cf0da84: Waiting Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e5c6561396d5: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b46e60347118: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b46e60347118: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 11202192dc12: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 11202192dc12: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e5d6e860d7d3: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e5d6e860d7d3: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b549f31133a9: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 6a812d6be828: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 6a812d6be828: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e68c2fa3527c: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e68c2fa3527c: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ccd6942ed3d2: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ccd6942ed3d2: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c9574a9235c8: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 935821dc4c93: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 935821dc4c93: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 2c402b3c1c2f: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 2c402b3c1c2f: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4c97d1652d22: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4c97d1652d22: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 66cdd82a217c: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 66cdd82a217c: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": fc4ea0408340: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": fc4ea0408340: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4a57f2efd839: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4a57f2efd839: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c79233615af7: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c79233615af7: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b437320e1a60: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b437320e1a60: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e39e802b3ce2: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e39e802b3ce2: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 90cd4fbf37e0: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 90cd4fbf37e0: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4d89074feeb9: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b549f31133a9: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 2008765f6086: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 2008765f6086: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 07af864f11a4: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9c7f64f3fd89: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9c7f64f3fd89: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 19899e344280: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 8dcec2efe63d: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 06ca184f6385: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 06ca184f6385: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": f198a0ccadfd: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": f198a0ccadfd: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 71662828eda3: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 71662828eda3: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 1d13cdf70869: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 1d13cdf70869: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b28884c93391: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b28884c93391: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 1f10d96ed13c: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 1f10d96ed13c: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 943e5698151a: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 943e5698151a: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": d7b26aade5d3: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": d7b26aade5d3: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": da23fb04c1a1: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": da23fb04c1a1: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9a31504a0fbc: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9a31504a0fbc: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9e65bd4fb815: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9e65bd4fb815: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": fbc20cf0da84: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": fbc20cf0da84: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9bc83ab7b163: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9bc83ab7b163: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e4746fff5f31: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e4746fff5f31: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 55ea69e41097: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 55ea69e41097: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c7948c42c8f1: Verifying Checksum Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c7948c42c8f1: Download complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 2c402b3c1c2f: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e5c6561396d5: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ccd6942ed3d2: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b46e60347118: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 55ea69e41097: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e5d6e860d7d3: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 11202192dc12: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b28884c93391: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4c97d1652d22: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 6a812d6be828: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e68c2fa3527c: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 935821dc4c93: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c9574a9235c8: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": fc4ea0408340: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 66cdd82a217c: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c79233615af7: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4a57f2efd839: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": b437320e1a60: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e39e802b3ce2: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 90cd4fbf37e0: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 4d89074feeb9: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 2008765f6086: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 07af864f11a4: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9c7f64f3fd89: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 19899e344280: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 8dcec2efe63d: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 06ca184f6385: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": f198a0ccadfd: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 71662828eda3: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 1d13cdf70869: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 1f10d96ed13c: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 943e5698151a: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": da23fb04c1a1: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9a31504a0fbc: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": d7b26aade5d3: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9bc83ab7b163: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": e4746fff5f31: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": fbc20cf0da84: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": c7948c42c8f1: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": 9e65bd4fb815: Pull complete Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Digest: sha256:4e1ebbd689975e9b579680757948ae482a0a4fc812536b698b3ec1240061fd24 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ---> d22c7eb38d12 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Step 2/6 : RUN git clone --depth 1 https://github.com/openfga/openfga Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ---> Running in f78cb9afcaf7 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Cloning into 'openfga'... Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Removing intermediate container f78cb9afcaf7 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ---> 019a7b8cc04d Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Step 3/6 : RUN git clone --depth 1 https://github.com/cncf/cncf-fuzzing Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ---> Running in 70a1f5825350 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Cloning into 'cncf-fuzzing'... Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Removing intermediate container 70a1f5825350 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ---> c8227be26051 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Step 4/6 : RUN git clone --depth 1 https://github.com/AdamKorcz/go-118-fuzz-build --branch=v2_2 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ---> Running in fc2343a44fc4 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Cloning into 'go-118-fuzz-build'... Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Removing intermediate container fc2343a44fc4 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ---> 98f8113bfda2 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Step 5/6 : COPY build.sh $SRC/ Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ---> aa405a5b3a7a Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Step 6/6 : WORKDIR $SRC/openfga Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ---> Running in b933a91ac6ad Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Removing intermediate container b933a91ac6ad Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": ---> f48e729fd1d8 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Successfully built f48e729fd1d8 Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Successfully tagged gcr.io/oss-fuzz/openfga:latest Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/openfga:latest Finished Step #1 - "build-45b21f6e-7fe2-4b51-9d17-2a0d801d6de0" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/openfga Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filexgqx0P Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/go-118-fuzz-build/.git Step #2 - "srcmap": + GIT_DIR=/src/go-118-fuzz-build Step #2 - "srcmap": + cd /src/go-118-fuzz-build Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/go-118-fuzz-build Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=65072595fdfb80eaedbc37db3837d82eb95ce7b2 Step #2 - "srcmap": + jq_inplace /tmp/filexgqx0P '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileK0hH69 Step #2 - "srcmap": + cat /tmp/filexgqx0P Step #2 - "srcmap": + jq '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": + mv /tmp/fileK0hH69 /tmp/filexgqx0P Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/cncf/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=3f40cbe6b1aa30f1f6e9d9cc312de571ad2b4212 Step #2 - "srcmap": + jq_inplace /tmp/filexgqx0P '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "3f40cbe6b1aa30f1f6e9d9cc312de571ad2b4212" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileiAFNXJ Step #2 - "srcmap": + cat /tmp/filexgqx0P Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "3f40cbe6b1aa30f1f6e9d9cc312de571ad2b4212" }' Step #2 - "srcmap": + mv /tmp/fileiAFNXJ /tmp/filexgqx0P Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/openfga/.git Step #2 - "srcmap": + GIT_DIR=/src/openfga Step #2 - "srcmap": + cd /src/openfga Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/openfga/openfga Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=80ce922758f05d8a9c3f2eebefd60af958edfc4c Step #2 - "srcmap": + jq_inplace /tmp/filexgqx0P '."/src/openfga" = { type: "git", url: "https://github.com/openfga/openfga", rev: "80ce922758f05d8a9c3f2eebefd60af958edfc4c" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filegXkG3c Step #2 - "srcmap": + cat /tmp/filexgqx0P Step #2 - "srcmap": + jq '."/src/openfga" = { type: "git", url: "https://github.com/openfga/openfga", rev: "80ce922758f05d8a9c3f2eebefd60af958edfc4c" }' Step #2 - "srcmap": + mv /tmp/filegXkG3c /tmp/filexgqx0P Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filexgqx0P Step #2 - "srcmap": + rm /tmp/filexgqx0P Step #2 - "srcmap": { Step #2 - "srcmap": "/src/go-118-fuzz-build": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/go-118-fuzz-build", Step #2 - "srcmap": "rev": "65072595fdfb80eaedbc37db3837d82eb95ce7b2" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/cncf/cncf-fuzzing", Step #2 - "srcmap": "rev": "3f40cbe6b1aa30f1f6e9d9cc312de571ad2b4212" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/openfga": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/openfga/openfga", Step #2 - "srcmap": "rev": "80ce922758f05d8a9c3f2eebefd60af958edfc4c" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/cncf-fuzzing/projects/openfga/build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": --2026-04-08 06:06:24-- https://go.dev/dl/go1.25.7.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving go.dev (go.dev)... 216.239.34.21, 216.239.36.21, 216.239.38.21, ... Step #3 - "compile-libfuzzer-coverage-x86_64": Connecting to go.dev (go.dev)|216.239.34.21|:443... connected. Step #3 - "compile-libfuzzer-coverage-x86_64": HTTP request sent, awaiting response... 302 Found Step #3 - "compile-libfuzzer-coverage-x86_64": Location: https://dl.google.com/go/go1.25.7.linux-amd64.tar.gz [following] Step #3 - "compile-libfuzzer-coverage-x86_64": --2026-04-08 06:06:24-- https://dl.google.com/go/go1.25.7.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving dl.google.com (dl.google.com)... 172.217.214.93, 172.217.214.190, 172.217.214.136, ... Step #3 - "compile-libfuzzer-coverage-x86_64": Connecting to dl.google.com (dl.google.com)|172.217.214.93|:443... connected. Step #3 - "compile-libfuzzer-coverage-x86_64": HTTP request sent, awaiting response... 200 OK Step #3 - "compile-libfuzzer-coverage-x86_64": Length: 59768749 (57M) [application/x-gzip] Step #3 - "compile-libfuzzer-coverage-x86_64": Saving to: 'go1.25.7.linux-amd64.tar.gz' Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": go1.25.7. 0%[ ] 0 --.-KB/s go1.25.7.linux-amd6 100%[===================>] 57.00M 303MB/s in 0.2s Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": 2026-04-08 06:06:24 (303 MB/s) - 'go1.25.7.linux-amd64.tar.gz' saved [59768749/59768749] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build/cmd/convertLibFuzzerTestcaseToStdLibGo /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/smacker/go-tree-sitter v0.0.0-20240827094217-dd81d9e9be82 Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build/cmd/addStdLibCorpusToFuzzer /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithExclusion... f: FuzzCheckWithExclusion... Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.26.1 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.27.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.79.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/openfga/api/proto v0.0.0-20260319214821-f153694bfc20 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pressly/goose/v3 v3.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/oklog/ulid/v2 v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/openfga/language/pkg/go v0.2.0-beta.2.0.20251202173232-1e8bf16f1dce Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-sql-driver/mysql v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/docker v28.5.2+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-connections v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgx/v5 v5.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.23.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rs/cors v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.10.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v1.20.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.42.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.42.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/controller-runtime v0.23.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Yiling-J/theine-go v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emirpasic/gods v1.18.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sourcegraph/conc v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/MicahParks/keyfunc/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gonum.org/v1/gonum v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.42.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.42.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.42.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/squirrel v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/IBM/pgxpoolprometheus v1.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgpassfile v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading modernc.org/sqlite v1.47.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/antlr4-go/antlr/v4 v4.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading filippo.io/edwards25519 v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.42.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20260209200024-4cfbd4190f57 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-viper/mapstructure/v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sagikazarmark/locafero v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/afero v1.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/cel-go v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/natefinch/wrap v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20260218203240-3dfff04db8fa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/mock v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sethvargo/go-retry v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.66.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.19.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.34.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jackc/puddle/v2 v2.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lann/builder v0.0.0-20180802200727-47ae307949d0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.42.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.51.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20260226221140-a57be14db171 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mfridman/interpolate v0.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zeebo/xxh3 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lann/ps v0.0.0-20150810152359-62de8c46ede0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.0.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v5 v5.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cel.dev/expr v0.25.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20251002143259-bc988d571ff4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/docker-image-spec v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/reference v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs/pkg v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/randfill v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20250910181357-589584f1c912 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.2-0.20260122202528-d9cc6641c482 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.40.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20250730193827-2d320260d730 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.12.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading modernc.org/libc v1.70.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading modernc.org/memory v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading modernc.org/mathutil v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dustin/go-humanize v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/remyoudompheng/bigfft v0.0.0-20230129092748-24d4a6f8daec Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCheckWithExclusion" -> [string string string string string string string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithIntersection... f: FuzzCheckWithIntersection... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCheckWithIntersection" -> [string string string string string string string string string string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithComputedUserset... f: FuzzCheckWithComputedUserset... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCheckWithComputedUserset" -> [string string string string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithPublicAccess... f: FuzzCheckWithPublicAccess... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCheckWithPublicAccess" -> [string string string string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithMultipleRestrictions... f: FuzzCheckWithMultipleRestrictions... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCheckWithMultipleRestrictions" -> [string string string string string string string string string string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithConditions... f: FuzzCheckWithConditions... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCheckWithConditions" -> [string string string int64 string string string int64] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheckWithParentChild... f: FuzzCheckWithParentChild... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCheckWithParentChild" -> [string string string string string string string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzCheck_AllModels... f: FuzzCheck_AllModels... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCheck_AllModels" -> [uint8 string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzWildcardTupleset... f: FuzzWildcardTupleset... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzWildcardTupleset" -> [[]byte []byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzUsersetFromClause... f: FuzzUsersetFromClause... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzUsersetFromClause" -> [[]byte []byte []byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzRandomAPI... f: FuzzRandomAPI... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzRandomAPI" -> [[]byte uint8 uint8 uint8 []byte []byte []byte []byte []byte []byte []byte []byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzPublicUsersetConfusion... f: FuzzPublicUsersetConfusion... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzPublicUsersetConfusion" -> [[]byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzModelUpdateBypass... f: FuzzModelUpdateBypass... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzModelUpdateBypass" -> [[]byte []byte []byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzListObjectsMemoryLeak... f: FuzzListObjectsMemoryLeak... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzListObjectsMemoryLeak" -> [string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string uint8 string string string string string string string string string string string string string string string string string string string string string string string string string string string string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzExpand... f: FuzzExpand... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzExpand" -> [[]byte []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzListUsers... f: FuzzListUsers... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzListUsers" -> [[]byte []byte []byte []byte []byte uint8 []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzRead... f: FuzzRead... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzRead" -> [[]byte []byte []byte []byte []byte uint8 []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzBatchCheck... f: FuzzBatchCheck... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzBatchCheck" -> [[]byte []byte []byte []byte []byte []byte []byte []byte uint8 []byte []byte []byte []byte []byte []byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzStorageBackends... f: FuzzStorageBackends... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzStorageBackends" -> [[]byte []byte []byte []byte []byte uint8 []byte []byte []byte []byte []byte []byte []byte []byte []byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzRecursivePublicAccessConsistency... f: FuzzRecursivePublicAccessConsistency... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzRecursivePublicAccessConsistency" -> [uint8 uint8 uint8 uint8 uint8 uint8 string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzListUsersConsistency... f: FuzzListUsersConsistency... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzListUsersConsistency" -> [string string string string string string uint8 uint8] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzPresharedKeyAuthentication... f: FuzzPresharedKeyAuthentication... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzPresharedKeyAuthentication" -> [string string string string uint8] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzOIDCAuthentication... f: FuzzOIDCAuthentication... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzOIDCAuthentication" -> [string string string string string uint8 int16] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": compiling fuzzer: pkg: github.com/openfga/openfga/tests... f: FuzzAuthorizationBypass... f: FuzzAuthorizationBypass... Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.26.1.linux-amd64/src/vendor/golang.org/x/crypto/chacha20poly1305/fips140only_go1.26.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/pkg/mod/golang.org/x/net@v0.51.0/http2/config_go126.go:7:9: file requires newer Go version go1.26 (application built with go1.25) Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzAuthorizationBypass" -> [string string uint16 uint8] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Checking for and removing empty seed corpus files... Step #3 - "compile-libfuzzer-coverage-x86_64": Removing empty seed corpus: FuzzCheckWithComputedUserset_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Removing empty seed corpus: FuzzCheckWithConditions_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Removing empty seed corpus: FuzzCheckWithExclusion_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Removing empty seed corpus: FuzzCheckWithIntersection_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Removing empty seed corpus: FuzzCheckWithMultipleRestrictions_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Removing empty seed corpus: FuzzCheckWithParentChild_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Removing empty seed corpus: FuzzCheckWithPublicAccess_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Removing empty seed corpus: FuzzModelUpdateBypass_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Removing empty seed corpus: FuzzPublicUsersetConfusion_seed_corpus.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Removing empty seed corpus: FuzzWildcardTupleset_seed_corpus.zip Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 2c402b3c1c2f: Already exists Step #4: e5c6561396d5: Already exists Step #4: 1dd777c18394: Pulling fs layer Step #4: 0ad3bc70d6dd: Pulling fs layer Step #4: 4c9b68cb5dfd: Pulling fs layer Step #4: c9d5dfc94f1e: Pulling fs layer Step #4: b8dbf37b8620: Pulling fs layer Step #4: bb205a3dc9cc: Pulling fs layer Step #4: c4eeab10f79e: Pulling fs layer Step #4: cca326168272: Pulling fs layer Step #4: 7c199061c6a2: Pulling fs layer Step #4: 4c36015dfdac: Pulling fs layer Step #4: b7b768cc5428: Pulling fs layer Step #4: 7c199061c6a2: Waiting Step #4: 4c36015dfdac: Waiting Step #4: f1b8dd26cdbd: Pulling fs layer Step #4: dce33d072688: Pulling fs layer Step #4: aac573a12fea: Pulling fs layer Step #4: cca326168272: Waiting Step #4: 71d7d5a7448b: Pulling fs layer Step #4: b7b768cc5428: Waiting Step #4: 6f024dd074fa: Pulling fs layer Step #4: 4ee6bcd85df9: Pulling fs layer Step #4: dce33d072688: Waiting Step #4: aac573a12fea: Waiting Step #4: c4eeab10f79e: Waiting Step #4: 0a0c2a9027fe: Pulling fs layer Step #4: a5962fd4e081: Pulling fs layer Step #4: fdb83425ff4b: Pulling fs layer Step #4: 12f6c061e1a1: Pulling fs layer Step #4: 6f024dd074fa: Waiting Step #4: 4ee6bcd85df9: Waiting Step #4: fdb83425ff4b: Waiting Step #4: a5962fd4e081: Waiting Step #4: 12f6c061e1a1: Waiting Step #4: 8cc0cd0a619d: Pulling fs layer Step #4: 8fa4b61077eb: Pulling fs layer Step #4: d1e148e672c1: Pulling fs layer Step #4: 8fa4b61077eb: Waiting Step #4: 7d1810a3ce9f: Pulling fs layer Step #4: d1e148e672c1: Waiting Step #4: 7d1810a3ce9f: Waiting Step #4: 4c9b68cb5dfd: Download complete Step #4: b8dbf37b8620: Verifying Checksum Step #4: b8dbf37b8620: Download complete Step #4: 1dd777c18394: Verifying Checksum Step #4: 1dd777c18394: Download complete Step #4: 0ad3bc70d6dd: Verifying Checksum Step #4: 0ad3bc70d6dd: Download complete Step #4: c9d5dfc94f1e: Verifying Checksum Step #4: c9d5dfc94f1e: Download complete Step #4: cca326168272: Download complete Step #4: 7c199061c6a2: Verifying Checksum Step #4: 7c199061c6a2: Download complete Step #4: c4eeab10f79e: Verifying Checksum Step #4: c4eeab10f79e: Download complete Step #4: 1dd777c18394: Pull complete Step #4: f1b8dd26cdbd: Verifying Checksum Step #4: f1b8dd26cdbd: Download complete Step #4: b7b768cc5428: Verifying Checksum Step #4: b7b768cc5428: Download complete Step #4: dce33d072688: Download complete Step #4: 71d7d5a7448b: Verifying Checksum Step #4: 71d7d5a7448b: Download complete Step #4: 0ad3bc70d6dd: Pull complete Step #4: bb205a3dc9cc: Verifying Checksum Step #4: bb205a3dc9cc: Download complete Step #4: 4ee6bcd85df9: Verifying Checksum Step #4: 4ee6bcd85df9: Download complete Step #4: 4c9b68cb5dfd: Pull complete Step #4: 0a0c2a9027fe: Verifying Checksum Step #4: 0a0c2a9027fe: Download complete Step #4: fdb83425ff4b: Verifying Checksum Step #4: fdb83425ff4b: Download complete Step #4: 12f6c061e1a1: Download complete Step #4: 4c36015dfdac: Download complete Step #4: c9d5dfc94f1e: Pull complete Step #4: 8fa4b61077eb: Verifying Checksum Step #4: 8fa4b61077eb: Download complete Step #4: b8dbf37b8620: Pull complete Step #4: 7d1810a3ce9f: Download complete Step #4: 8cc0cd0a619d: Verifying Checksum Step #4: 8cc0cd0a619d: Download complete Step #4: d1e148e672c1: Verifying Checksum Step #4: d1e148e672c1: Download complete Step #4: aac573a12fea: Download complete Step #4: a5962fd4e081: Verifying Checksum Step #4: a5962fd4e081: Download complete Step #4: 6f024dd074fa: Verifying Checksum Step #4: 6f024dd074fa: Download complete Step #4: bb205a3dc9cc: Pull complete Step #4: c4eeab10f79e: Pull complete Step #4: cca326168272: Pull complete Step #4: 7c199061c6a2: Pull complete Step #4: 4c36015dfdac: Pull complete Step #4: b7b768cc5428: Pull complete Step #4: f1b8dd26cdbd: Pull complete Step #4: dce33d072688: Pull complete Step #4: aac573a12fea: Pull complete Step #4: 71d7d5a7448b: Pull complete Step #4: 6f024dd074fa: Pull complete Step #4: 4ee6bcd85df9: Pull complete Step #4: 0a0c2a9027fe: Pull complete Step #4: a5962fd4e081: Pull complete Step #4: fdb83425ff4b: Pull complete Step #4: 12f6c061e1a1: Pull complete Step #4: 8cc0cd0a619d: Pull complete Step #4: 8fa4b61077eb: Pull complete Step #4: d1e148e672c1: Pull complete Step #4: 7d1810a3ce9f: Pull complete Step #4: Digest: sha256:33e2bfc298d08050aa42a5ab2203c0c9432cb24c1952268dae9f53e50211c6ad Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target FuzzRead Step #5: Running go target FuzzRecursivePublicAccessConsistency Step #5: Running go target FuzzCheckWithMultipleRestrictions Step #5: Running go target FuzzPublicUsersetConfusion Step #5: Running go target FuzzBatchCheck Step #5: Running go target FuzzListUsers Step #5: Running go target FuzzCheckWithComputedUserset Step #5: Running go target FuzzCheckWithParentChild Step #5: Running go target FuzzCheckWithIntersection Step #5: Running go target FuzzListObjectsMemoryLeak Step #5: Running go target FuzzCheckWithConditions Step #5: Generated 3453 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzRead Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1292 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCheckWithMultipleRestrictions Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 3303 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzBatchCheck Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 851 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzPublicUsersetConfusion Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1330 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCheckWithIntersection Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1122 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCheckWithComputedUserset Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1138 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCheckWithParentChild Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 3040 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzListUsers Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1238 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCheckWithConditions Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1108 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzRecursivePublicAccessConsistency Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 4196 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzListObjectsMemoryLeak Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzOIDCAuthentication Step #5: Running go target FuzzCheckWithExclusion Step #5: Running go target FuzzExpand Step #5: Running go target FuzzListUsersConsistency Step #5: Running go target FuzzModelUpdateBypass Step #5: Generated 1005 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCheckWithExclusion Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1142 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzOIDCAuthentication Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 3359 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzModelUpdateBypass Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 3577 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzExpand Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1549 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzListUsersConsistency Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzStorageBackends Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 3319 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzStorageBackends Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzUsersetFromClause Step #5: Running go target FuzzCheckWithPublicAccess Step #5: Generated 1107 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCheckWithPublicAccess Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1081 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzUsersetFromClause Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzPresharedKeyAuthentication Step #5: Running go target FuzzAuthorizationBypass Step #5: Running go target FuzzRandomAPI Step #5: Generated 148 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzPresharedKeyAuthentication Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 4772 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzRandomAPI Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 970 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzAuthorizationBypass Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzWildcardTupleset Step #5: Running go target FuzzCheck_AllModels Step #5: Generated 1008 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzWildcardTupleset Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 955 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCheck_AllModels Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2026/04/08 06:31:07 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2026/04/08 06:31:07 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Pulling image: gcr.io/cloud-builders/gsutil Step #6: Using default tag: latest Step #6: latest: Pulling from cloud-builders/gsutil Step #6: ad1a9d392ffd: Already exists Step #6: 6d44099c30c0: Already exists Step #6: bdcdc4c9e240: Already exists Step #6: 06540544a05c: Already exists Step #6: f6bdbf6b9743: Already exists Step #6: 7a031521ecf8: Already exists Step #6: f18ec7c82c4b: Pulling fs layer Step #6: 479bc7e1b0ea: Pulling fs layer Step #6: 479bc7e1b0ea: Verifying Checksum Step #6: 479bc7e1b0ea: Download complete Step #6: f18ec7c82c4b: Verifying Checksum Step #6: f18ec7c82c4b: Download complete Step #6: f18ec7c82c4b: Pull complete Step #6: 479bc7e1b0ea: Pull complete Step #6: Digest: sha256:ab5a73fea25f0fce6c3294fac5b7f44df3331d1624bc96d9c1532e5f27da2ce8 Step #6: Status: Downloaded newer image for gcr.io/cloud-builders/gsutil:latest Step #6: gcr.io/cloud-builders/gsutil:latest Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.2 MiB] 0% Done / [0/3 files][ 0.0 B/ 4.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.2 MiB] 0% Done / [1/3 files][ 4.2 MiB/ 4.2 MiB] 99% Done / [2/3 files][ 4.2 MiB/ 4.2 MiB] 99% Done / [3/3 files][ 4.2 MiB/ 4.2 MiB] 100% Done Step #7: Operation completed over 3 objects/4.2 MiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCheckWithComputedUserset.json [Content-Type=application/json]... Step #9: / [0/25 files][ 0.0 B/ 1.9 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCheckWithParentChild.json [Content-Type=application/json]... Step #9: / [0/25 files][ 0.0 B/ 1.9 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzRandomAPI.json [Content-Type=application/json]... Step #9: / [0/25 files][ 80.3 KiB/ 1.9 MiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzExpand.json [Content-Type=application/json]... Step #9: / [0/25 files][ 80.3 KiB/ 1.9 MiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzOIDCAuthentication.json [Content-Type=application/json]... Step #9: / [0/25 files][ 80.3 KiB/ 1.9 MiB] 4% Done / [1/25 files][241.4 KiB/ 1.9 MiB] 12% Done / [2/25 files][400.7 KiB/ 1.9 MiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCheckWithIntersection.json [Content-Type=application/json]... Step #9: / [2/25 files][400.7 KiB/ 1.9 MiB] 20% Done / [3/25 files][400.7 KiB/ 1.9 MiB] 20% Done / [4/25 files][400.7 KiB/ 1.9 MiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzUsersetFromClause.json [Content-Type=application/json]... Step #9: / [4/25 files][400.7 KiB/ 1.9 MiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzStorageBackends.json [Content-Type=application/json]... Step #9: / [4/25 files][400.7 KiB/ 1.9 MiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzModelUpdateBypass.json [Content-Type=application/json]... Step #9: / [4/25 files][400.7 KiB/ 1.9 MiB] 20% Done / [5/25 files][400.7 KiB/ 1.9 MiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzListObjectsMemoryLeak.json [Content-Type=application/json]... Step #9: / [5/25 files][400.7 KiB/ 1.9 MiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzAuthorizationBypass.json [Content-Type=application/json]... Step #9: / [5/25 files][480.9 KiB/ 1.9 MiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzListUsersConsistency.json [Content-Type=application/json]... Step #9: / [5/25 files][480.9 KiB/ 1.9 MiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzPresharedKeyAuthentication.json [Content-Type=application/json]... Step #9: / [5/25 files][480.9 KiB/ 1.9 MiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzRecursivePublicAccessConsistency.json [Content-Type=application/json]... Step #9: / [5/25 files][561.9 KiB/ 1.9 MiB] 29% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCheckWithMultipleRestrictions.json [Content-Type=application/json]... Step #9: / [5/25 files][642.4 KiB/ 1.9 MiB] 33% Done / [6/25 files][884.3 KiB/ 1.9 MiB] 45% Done / [7/25 files][884.3 KiB/ 1.9 MiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCheckWithExclusion.json [Content-Type=application/json]... Step #9: / [7/25 files][884.3 KiB/ 1.9 MiB] 45% Done / [8/25 files][884.3 KiB/ 1.9 MiB] 45% Done / [9/25 files][884.3 KiB/ 1.9 MiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCheckWithConditions.json [Content-Type=application/json]... Step #9: / [10/25 files][884.3 KiB/ 1.9 MiB] 45% Done / [10/25 files][884.3 KiB/ 1.9 MiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzWildcardTupleset.json [Content-Type=application/json]... Step #9: / [10/25 files][884.3 KiB/ 1.9 MiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzRead.json [Content-Type=application/json]... Step #9: / [10/25 files][965.5 KiB/ 1.9 MiB] 50% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzListUsers.json [Content-Type=application/json]... Step #9: / [10/25 files][965.5 KiB/ 1.9 MiB] 50% Done / [11/25 files][ 1.2 MiB/ 1.9 MiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCheck_AllModels.json [Content-Type=application/json]... Step #9: / [11/25 files][ 1.2 MiB/ 1.9 MiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [11/25 files][ 1.2 MiB/ 1.9 MiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCheckWithPublicAccess.json [Content-Type=application/json]... Step #9: / [11/25 files][ 1.2 MiB/ 1.9 MiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzPublicUsersetConfusion.json [Content-Type=application/json]... Step #9: / [11/25 files][ 1.3 MiB/ 1.9 MiB] 66% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzBatchCheck.json [Content-Type=application/json]... Step #9: / [11/25 files][ 1.3 MiB/ 1.9 MiB] 66% Done / [12/25 files][ 1.3 MiB/ 1.9 MiB] 66% Done / [13/25 files][ 1.3 MiB/ 1.9 MiB] 66% Done - - [14/25 files][ 1.3 MiB/ 1.9 MiB] 66% Done - [15/25 files][ 1.3 MiB/ 1.9 MiB] 70% Done - [16/25 files][ 1.6 MiB/ 1.9 MiB] 87% Done - [17/25 files][ 1.9 MiB/ 1.9 MiB] 99% Done - [18/25 files][ 1.9 MiB/ 1.9 MiB] 99% Done - [19/25 files][ 1.9 MiB/ 1.9 MiB] 99% Done - [20/25 files][ 1.9 MiB/ 1.9 MiB] 99% Done - [21/25 files][ 1.9 MiB/ 1.9 MiB] 99% Done - [22/25 files][ 1.9 MiB/ 1.9 MiB] 99% Done - [23/25 files][ 1.9 MiB/ 1.9 MiB] 99% Done - [24/25 files][ 1.9 MiB/ 1.9 MiB] 99% Done - [25/25 files][ 1.9 MiB/ 1.9 MiB] 100% Done Step #9: Operation completed over 25 objects/1.9 MiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCheckWithPublicAccess.log [Content-Type=application/octet-stream]... Step #11: / [0/24 files][ 0.0 B/ 1.6 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzPublicUsersetConfusion.log [Content-Type=application/octet-stream]... Step #11: / [0/24 files][ 0.0 B/ 1.6 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzRecursivePublicAccessConsistency.log [Content-Type=application/octet-stream]... Step #11: / [0/24 files][ 0.0 B/ 1.6 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCheck_AllModels.log [Content-Type=application/octet-stream]... Step #11: / [0/24 files][ 0.0 B/ 1.6 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzRead.log [Content-Type=application/octet-stream]... Step #11: / [0/24 files][ 0.0 B/ 1.6 KiB] 0% Done / [1/24 files][ 343.0 B/ 1.6 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzListUsersConsistency.log [Content-Type=application/octet-stream]... Step #11: / [1/24 files][ 343.0 B/ 1.6 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCheckWithExclusion.log [Content-Type=application/octet-stream]... Step #11: / [1/24 files][ 343.0 B/ 1.6 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCheckWithIntersection.log [Content-Type=application/octet-stream]... Step #11: / [1/24 files][ 343.0 B/ 1.6 KiB] 20% Done / [2/24 files][ 343.0 B/ 1.6 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzUsersetFromClause.log [Content-Type=application/octet-stream]... Step #11: / [3/24 files][ 343.0 B/ 1.6 KiB] 20% Done / [3/24 files][ 343.0 B/ 1.6 KiB] 20% Done / [4/24 files][ 343.0 B/ 1.6 KiB] 20% Done / [5/24 files][ 343.0 B/ 1.6 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzModelUpdateBypass.log [Content-Type=application/octet-stream]... Step #11: / [5/24 files][ 343.0 B/ 1.6 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCheckWithComputedUserset.log [Content-Type=application/octet-stream]... Step #11: / [5/24 files][ 343.0 B/ 1.6 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzBatchCheck.log [Content-Type=application/octet-stream]... Step #11: / [5/24 files][ 343.0 B/ 1.6 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCheckWithConditions.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCheckWithMultipleRestrictions.log [Content-Type=application/octet-stream]... Step #11: / [5/24 files][ 412.0 B/ 1.6 KiB] 25% Done / [5/24 files][ 412.0 B/ 1.6 KiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzAuthorizationBypass.log [Content-Type=application/octet-stream]... Step #11: / [5/24 files][ 412.0 B/ 1.6 KiB] 25% Done / [6/24 files][ 685.0 B/ 1.6 KiB] 41% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzListObjectsMemoryLeak.log [Content-Type=application/octet-stream]... Step #11: / [6/24 files][ 685.0 B/ 1.6 KiB] 41% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzRandomAPI.log [Content-Type=application/octet-stream]... Step #11: / [6/24 files][ 753.0 B/ 1.6 KiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzListUsers.log [Content-Type=application/octet-stream]... Step #11: / [6/24 files][ 753.0 B/ 1.6 KiB] 45% Done / [7/24 files][ 753.0 B/ 1.6 KiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzExpand.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzStorageBackends.log [Content-Type=application/octet-stream]... Step #11: / [7/24 files][ 753.0 B/ 1.6 KiB] 45% Done / [7/24 files][ 753.0 B/ 1.6 KiB] 45% Done / [8/24 files][ 889.0 B/ 1.6 KiB] 54% Done / [9/24 files][ 1.0 KiB/ 1.6 KiB] 62% Done / [10/24 files][ 1.0 KiB/ 1.6 KiB] 62% Done / [11/24 files][ 1.0 KiB/ 1.6 KiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzWildcardTupleset.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzPresharedKeyAuthentication.log [Content-Type=application/octet-stream]... Step #11: / [11/24 files][ 1.0 KiB/ 1.6 KiB] 62% Done / [11/24 files][ 1.0 KiB/ 1.6 KiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzOIDCAuthentication.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCheckWithParentChild.log [Content-Type=application/octet-stream]... Step #11: / [11/24 files][ 1.1 KiB/ 1.6 KiB] 66% Done / [11/24 files][ 1.1 KiB/ 1.6 KiB] 66% Done / [12/24 files][ 1.1 KiB/ 1.6 KiB] 70% Done / [13/24 files][ 1.1 KiB/ 1.6 KiB] 70% Done / [14/24 files][ 1.1 KiB/ 1.6 KiB] 70% Done / [15/24 files][ 1.3 KiB/ 1.6 KiB] 79% Done / [16/24 files][ 1.3 KiB/ 1.6 KiB] 83% Done / [17/24 files][ 1.4 KiB/ 1.6 KiB] 87% Done - - [18/24 files][ 1.6 KiB/ 1.6 KiB] 99% Done - [19/24 files][ 1.6 KiB/ 1.6 KiB] 99% Done - [20/24 files][ 1.6 KiB/ 1.6 KiB] 99% Done - [21/24 files][ 1.6 KiB/ 1.6 KiB] 99% Done - [22/24 files][ 1.6 KiB/ 1.6 KiB] 99% Done - [23/24 files][ 1.6 KiB/ 1.6 KiB] 99% Done - [24/24 files][ 1.6 KiB/ 1.6 KiB] 100% Done Step #11: Operation completed over 24 objects/1.6 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 473.0 B] / [1 files][ 473.0 B/ 473.0 B] Step #12: Operation completed over 1 objects/473.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 309 0 0 100 309 0 1552 --:--:-- --:--:-- --:--:-- 1560 Finished Step #13 PUSH DONE