starting build "fb579f43-f7a2-432b-a61b-78680236e55d" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: ec12294c7773: Pulling fs layer Step #1: 8b61fe3445b0: Pulling fs layer Step #1: a8610754c668: Pulling fs layer Step #1: 9331a7fef79c: Pulling fs layer Step #1: 0af868ec8988: Pulling fs layer Step #1: ebdd00eec1a9: Pulling fs layer Step #1: b3bb36063c76: Pulling fs layer Step #1: 2fbdd0e88615: Pulling fs layer Step #1: b50d18c63c34: Pulling fs layer Step #1: 6eb49c4fa9ae: Pulling fs layer Step #1: 381b97dc9a7a: Pulling fs layer Step #1: 60d103892dc1: Pulling fs layer Step #1: f1b551c79866: Pulling fs layer Step #1: 8266c3622d2d: Pulling fs layer Step #1: 5e8b28d6e092: Pulling fs layer Step #1: 72540c6a55bb: Pulling fs layer Step #1: 5c7e133d0580: Pulling fs layer Step #1: ca80bc61072d: Pulling fs layer Step #1: 07c8d23b7870: Pulling fs layer Step #1: fef6fbeb525a: Pulling fs layer Step #1: 4a7a19571fda: Pulling fs layer Step #1: 84118ee89666: Pulling fs layer Step #1: 1ad8494fd200: Pulling fs layer Step #1: 8d10af7fe4ba: Pulling fs layer Step #1: 4a5a1bafa165: Pulling fs layer Step #1: 64de481878d0: Pulling fs layer Step #1: b6207f8c2841: Pulling fs layer Step #1: bd4fba643c78: Pulling fs layer Step #1: c64b3c4bc37b: Pulling fs layer Step #1: f8326c862278: Pulling fs layer Step #1: a8610754c668: Waiting Step #1: 57e9a252ec8f: Pulling fs layer Step #1: 46b6402d7451: Pulling fs layer Step #1: 9331a7fef79c: Waiting Step #1: ce0293ab8a6e: Pulling fs layer Step #1: ebdd00eec1a9: Waiting Step #1: 0af868ec8988: Waiting Step #1: 2f3417b2d974: Pulling fs layer Step #1: b3bb36063c76: Waiting Step #1: 07c8d23b7870: Waiting Step #1: 2fbdd0e88615: Waiting Step #1: fef6fbeb525a: Waiting Step #1: b6207f8c2841: Waiting Step #1: b50d18c63c34: Waiting Step #1: 8d10af7fe4ba: Waiting Step #1: bd4fba643c78: Waiting Step #1: 6eb49c4fa9ae: Waiting Step #1: 4a7a19571fda: Waiting Step #1: 64de481878d0: Waiting Step #1: 72540c6a55bb: Waiting Step #1: c64b3c4bc37b: Waiting Step #1: 2f3417b2d974: Waiting Step #1: ce0293ab8a6e: Waiting Step #1: 1ad8494fd200: Waiting Step #1: 5e8b28d6e092: Waiting Step #1: 5c7e133d0580: Waiting Step #1: f1b551c79866: Waiting Step #1: 57e9a252ec8f: Waiting Step #1: 46b6402d7451: Waiting Step #1: 84118ee89666: Waiting Step #1: 8b61fe3445b0: Verifying Checksum Step #1: 8b61fe3445b0: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 9331a7fef79c: Verifying Checksum Step #1: 9331a7fef79c: Download complete Step #1: a8610754c668: Verifying Checksum Step #1: a8610754c668: Download complete Step #1: 0af868ec8988: Verifying Checksum Step #1: 0af868ec8988: Download complete Step #1: b3bb36063c76: Verifying Checksum Step #1: b3bb36063c76: Download complete Step #1: 2fbdd0e88615: Verifying Checksum Step #1: 2fbdd0e88615: Download complete Step #1: ec12294c7773: Verifying Checksum Step #1: ec12294c7773: Download complete Step #1: 6eb49c4fa9ae: Verifying Checksum Step #1: 6eb49c4fa9ae: Download complete Step #1: b549f31133a9: Pull complete Step #1: 381b97dc9a7a: Verifying Checksum Step #1: 381b97dc9a7a: Download complete Step #1: 60d103892dc1: Verifying Checksum Step #1: 60d103892dc1: Download complete Step #1: f1b551c79866: Verifying Checksum Step #1: f1b551c79866: Download complete Step #1: 8266c3622d2d: Verifying Checksum Step #1: 8266c3622d2d: Download complete Step #1: 5e8b28d6e092: Verifying Checksum Step #1: 5e8b28d6e092: Download complete Step #1: 72540c6a55bb: Verifying Checksum Step #1: 72540c6a55bb: Download complete Step #1: b50d18c63c34: Verifying Checksum Step #1: b50d18c63c34: Download complete Step #1: 5c7e133d0580: Download complete Step #1: ca80bc61072d: Verifying Checksum Step #1: ca80bc61072d: Download complete Step #1: 07c8d23b7870: Verifying Checksum Step #1: 07c8d23b7870: Download complete Step #1: fef6fbeb525a: Verifying Checksum Step #1: fef6fbeb525a: Download complete Step #1: 4a7a19571fda: Verifying Checksum Step #1: 4a7a19571fda: Download complete Step #1: 84118ee89666: Download complete Step #1: 1ad8494fd200: Download complete Step #1: 8d10af7fe4ba: Verifying Checksum Step #1: 8d10af7fe4ba: Download complete Step #1: 4a5a1bafa165: Verifying Checksum Step #1: 4a5a1bafa165: Download complete Step #1: ebdd00eec1a9: Verifying Checksum Step #1: ebdd00eec1a9: Download complete Step #1: 64de481878d0: Verifying Checksum Step #1: 64de481878d0: Download complete Step #1: b6207f8c2841: Verifying Checksum Step #1: b6207f8c2841: Download complete Step #1: f8326c862278: Download complete Step #1: bd4fba643c78: Verifying Checksum Step #1: bd4fba643c78: Download complete Step #1: c64b3c4bc37b: Verifying Checksum Step #1: c64b3c4bc37b: Download complete Step #1: 46b6402d7451: Verifying Checksum Step #1: 46b6402d7451: Download complete Step #1: 57e9a252ec8f: Verifying Checksum Step #1: 57e9a252ec8f: Download complete Step #1: 2f3417b2d974: Download complete Step #1: ec12294c7773: Pull complete Step #1: 8b61fe3445b0: Pull complete Step #1: ce0293ab8a6e: Verifying Checksum Step #1: ce0293ab8a6e: Download complete Step #1: a8610754c668: Pull complete Step #1: 9331a7fef79c: Pull complete Step #1: 0af868ec8988: Pull complete Step #1: ebdd00eec1a9: Pull complete Step #1: b3bb36063c76: Pull complete Step #1: 2fbdd0e88615: Pull complete Step #1: b50d18c63c34: Pull complete Step #1: 6eb49c4fa9ae: Pull complete Step #1: 381b97dc9a7a: Pull complete Step #1: 60d103892dc1: Pull complete Step #1: f1b551c79866: Pull complete Step #1: 8266c3622d2d: Pull complete Step #1: 5e8b28d6e092: Pull complete Step #1: 72540c6a55bb: Pull complete Step #1: 5c7e133d0580: Pull complete Step #1: ca80bc61072d: Pull complete Step #1: 07c8d23b7870: Pull complete Step #1: fef6fbeb525a: Pull complete Step #1: 4a7a19571fda: Pull complete Step #1: 84118ee89666: Pull complete Step #1: 1ad8494fd200: Pull complete Step #1: 8d10af7fe4ba: Pull complete Step #1: 4a5a1bafa165: Pull complete Step #1: 64de481878d0: Pull complete Step #1: b6207f8c2841: Pull complete Step #1: bd4fba643c78: Pull complete Step #1: c64b3c4bc37b: Pull complete Step #1: f8326c862278: Pull complete Step #1: 57e9a252ec8f: Pull complete Step #1: 46b6402d7451: Pull complete Step #1: ce0293ab8a6e: Pull complete Step #1: 2f3417b2d974: Pull complete Step #1: Digest: sha256:559a8623355bb8cb14da5c322951372664cdfe8a90678b2a65f7dd6a461e1e4c Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> cb49839f44e4 Step #1: Step 2/6 : RUN git clone --depth 1 https://github.com/notaryproject/notary Step #1: ---> Running in dc9ef430c1bc Step #1: Cloning into 'notary'... Step #1: Removing intermediate container dc9ef430c1bc Step #1: ---> 2685a8d43c3e Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/notaryproject/notation-go Step #1: ---> Running in 65f2d446ee0c Step #1: Cloning into 'notation-go'... Step #1: Removing intermediate container 65f2d446ee0c Step #1: ---> b614a588beeb Step #1: Step 4/6 : RUN git clone --depth 1 https://github.com/cncf/cncf-fuzzing Step #1: ---> Running in 2c8b7fe9c1da Step #1: Cloning into 'cncf-fuzzing'... Step #1: Removing intermediate container 2c8b7fe9c1da Step #1: ---> 717cda6dad74 Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> 43ab9f10fb59 Step #1: Step 6/6 : WORKDIR $SRC/notary Step #1: ---> Running in f65288a7ea9b Step #1: Removing intermediate container f65288a7ea9b Step #1: ---> 1cc91826a35d Step #1: Successfully built 1cc91826a35d Step #1: Successfully tagged gcr.io/oss-fuzz/notary:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/notary Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileadjKqP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/cncf/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=6040f84390a203672f898d51d7b6f0835c8c644d Step #2 - "srcmap": + jq_inplace /tmp/fileadjKqP '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "6040f84390a203672f898d51d7b6f0835c8c644d" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileBw4Zl9 Step #2 - "srcmap": + cat /tmp/fileadjKqP Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "6040f84390a203672f898d51d7b6f0835c8c644d" }' Step #2 - "srcmap": + mv /tmp/fileBw4Zl9 /tmp/fileadjKqP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/notation-go/.git Step #2 - "srcmap": + GIT_DIR=/src/notation-go Step #2 - "srcmap": + cd /src/notation-go Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/notaryproject/notation-go Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=694e3a0314b5ecb7f04d100bae6249c527abfd47 Step #2 - "srcmap": + jq_inplace /tmp/fileadjKqP '."/src/notation-go" = { type: "git", url: "https://github.com/notaryproject/notation-go", rev: "694e3a0314b5ecb7f04d100bae6249c527abfd47" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file7IsgLH Step #2 - "srcmap": + cat /tmp/fileadjKqP Step #2 - "srcmap": + jq '."/src/notation-go" = { type: "git", url: "https://github.com/notaryproject/notation-go", rev: "694e3a0314b5ecb7f04d100bae6249c527abfd47" }' Step #2 - "srcmap": + mv /tmp/file7IsgLH /tmp/fileadjKqP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/notary/.git Step #2 - "srcmap": + GIT_DIR=/src/notary Step #2 - "srcmap": + cd /src/notary Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/notaryproject/notary Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=9d2b3b35929392c9945d976b8bdecbe2f53a299e Step #2 - "srcmap": + jq_inplace /tmp/fileadjKqP '."/src/notary" = { type: "git", url: "https://github.com/notaryproject/notary", rev: "9d2b3b35929392c9945d976b8bdecbe2f53a299e" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filevFgW2g Step #2 - "srcmap": + cat /tmp/fileadjKqP Step #2 - "srcmap": + jq '."/src/notary" = { type: "git", url: "https://github.com/notaryproject/notary", rev: "9d2b3b35929392c9945d976b8bdecbe2f53a299e" }' Step #2 - "srcmap": + mv /tmp/filevFgW2g /tmp/fileadjKqP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileadjKqP Step #2 - "srcmap": + rm /tmp/fileadjKqP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/cncf/cncf-fuzzing", Step #2 - "srcmap": "rev": "6040f84390a203672f898d51d7b6f0835c8c644d" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/notation-go": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/notaryproject/notation-go", Step #2 - "srcmap": "rev": "694e3a0314b5ecb7f04d100bae6249c527abfd47" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/notary": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/notaryproject/notary", Step #2 - "srcmap": "rev": "9d2b3b35929392c9945d976b8bdecbe2f53a299e" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/cncf-fuzzing/projects/notary/build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + sed 's/go 1.17/go 1.19/g' -i /src/notary/go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": + export CNCFFuzz=/src/cncf-fuzzing/projects/notary Step #3 - "compile-libfuzzer-coverage-x86_64": + CNCFFuzz=/src/cncf-fuzzing/projects/notary Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/cncf-fuzzing/projects/notary/fuzz_trustmanager_test.go /src/notary/trustmanager/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/cncf-fuzzing/projects/notary/fuzz_tuf_utils.go /src/notary/tuf/utils/ Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package trustmanager\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdaLogics/go-fuzz-headers=github.com/AdamKorcz/go-fuzz-headers-1@1f10f66a31bf0e5cc26a2f4a74bd3be5f6463b67 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.0.0-20201117132131-f5c789dd3221 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dvsekhvalnov/jose2go v0.0.0-20200901110807-248326c1351b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go v1.5.1-1.0.20160303222718-d30aec9fd63c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.47.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.27.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudflare/cfssl v0.0.0-20180223231731-4e2dcbde5004 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/distribution v2.7.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-connections v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/rethinkdb/rethinkdb-go.v6 v6.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Shopify/logrus-bugsnag v0.0.0-20170309145241-6dbc35f2c30d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/bugsnag-go v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/mux v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-sql-driver/mysql v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.0.0-20201021035429-f5854403a974 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v0.0.0-20150530192845-be5ff3e4840c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/pkcs11 v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jinzhu/gorm v1.9.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lib/pq v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-sqlite3 v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v0.9.0-pre1.0.20180209125602-c332b6f63c06 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.0.0-20201117144127-c1f2f97bffc9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/BurntSushi/toml v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/magiconair/properties v1.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v0.0.0-20150508191742-4d07383ffe94 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/jwalterweatherman v0.0.0-20141219030609-3d60171a6431 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jinzhu/inflection v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jinzhu/now v1.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/panicwrap v0.0.0-20151223152923-e2c28503fcd0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bugsnag/osext v0.0.0-20130617224835-0dd3f918b21b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bitly/go-simplejson v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20200227125254-8fa46927fb4f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/erikstmartin/go-testdb v0.0.0-20160219214506-8d10e4a1bae5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/juju/loggo v0.0.0-20190526231331-6e530bcce5d8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.0.0-20180110214958-89604d197083 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.0.0-20180125133057-cb4147076ac7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hailocab/go-hostpool v0.0.0-20160125115350-e80d13ce29ed Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opentracing/opentracing-go v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/cenkalti/backoff.v2 v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/libtrust v0.0.0-20160708172513-aabc10ec26b7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/denisenkom/go-mssqldb v0.0.0-20191128021309-1d7a30a10f73 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bitly/go-hostpool v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bmizerany/assert v0.0.0-20160611221934-b7ed37b82869 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/certificate-transparency-go v1.0.10-0.20180222191210-5ab67e519c93 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-metrics v0.0.0-20180209012529-399ea8c73916 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-sql/civil v0.0.0-20190719163853-cb61b32ac6fe Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230111232327-1f10f66a31bf Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdaLogics/go-fuzz-headers in github.com/AdaLogics/go-fuzz-headers v0.0.0-00010101000000-000000000000 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/theupdateframework/notary/cryptoservice/fuzz Fuzz fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/theupdateframework/notary/cryptoservice/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/theupdateframework/notary/cryptoservice/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/theupdateframework/notary/cryptoservice/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/trustmanager/keys_test.go /src/notary/trustmanager/keys_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/trustmanager/keystore_test.go /src/notary/trustmanager/keystore_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/trustmanager FuzzImportKeysSimple FuzzImportKeysSimple Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/trustmanager FuzzImportKeysStructured FuzzImportKeysStructured Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/tuf/utils FuzzParsePEMPrivateKey FuzzParsePEMPrivateKey Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_handlers.go /src/notary/server/handlers/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzAtomicUpdateHandler FuzzAtomicUpdateHandler Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find the function: func FuzzAtomicUpdateHandler(f *testing.F) Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzAtomicUpdateHandlerMultipart FuzzAtomicUpdateHandlerMultipart Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzGetKeyHandler FuzzGetKeyHandler Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzChangefeed FuzzChangefeed Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzRotateKeyHandler FuzzRotateKeyHandler Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/handlers FuzzDeleteHandler FuzzDeleteHandler Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_keydbstore.go /src/notary/signer/keydbstore/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/signer/keydbstore/keydbstore_test.go /src/notary/signer/keydbstore/keydbstore_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/signer/keydbstore/cachedcryptoservice_test.go /src/notary/signer/keydbstore/cachedcryptoservice_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/signer/keydbstore FuzzKeyDBStore FuzzKeyDBStore Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_server_storage.go /src/notary/server/storage/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/notary/server/storage/storage_test.go /src/notary/server/storage/storage_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/storage FuzzServerStorageSQL FuzzServerStorage Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/storage FuzzServerStorageMemStorage FuzzServerStorageMemStorage Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/theupdateframework/notary/server/storage FuzzServerStorageTufStorage FuzzServerStorageTufStorage Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/notation-go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_verification.go /src/notation-go/verifier/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_pkix_test.go /src/notation-go/internal/pkix/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_notation_artifactref_parsing.go /src/notation-go/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/cncf-fuzzing/projects/notary/fuzz_trustpolicy.go /src/notation-go/verifier/trustpolicy/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv ./verifier/helpers_test.go ./verifier/helpers_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package verifier\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdaLogics/go-fuzz-headers=github.com/AdamKorcz/go-fuzz-headers-1@12e09aba5ebdbc7ddb01b6203347a11c93015534 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/veraison/go-cose v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/notation-core-go v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading oras.land/oras-go/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/notation-plugin-framework-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/notaryproject/tspclient-go v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-ldap/ldap/v3 v3.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-asn1-ber/asn1-ber v1.5.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-ntlmssp v0.0.0-20221128193559-754e69321358 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gokrb5/v8 v8.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alexbrainman/sspi v0.0.0-20231016080023-1a75b4708caa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/gofork v1.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/aescts/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-uuid v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/dnsutils/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/rpc/v2 v2.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jcmturner/goidentity/v6 v6.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230329111138-12e09aba5ebd Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdaLogics/go-fuzz-headers in github.com/AdaLogics/go-fuzz-headers v0.0.0-00010101000000-000000000000 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/notaryproject/notation-go/verifier FuzzVerify FuzzVerify Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/notaryproject/notation-go/verifier [github.com/notaryproject/notation-go/verifier.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_verification.go:330:19: undefined: dummyPolicyDocument Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_verification.go:352:3: unknown field trustPolicyDoc in struct literal of type verifier Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_verification.go:489:38: vv.trustPolicyDoc undefined (type *verifier has no field or method trustPolicyDoc) Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image notary Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 notary Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1