Skip to content
Snippets Groups Projects

rspec-ee system pg14 5/16

Full log viewer Experiment
Running with gitlab-runner 17.0.0~pre.88.g761ae5dd (761ae5dd)
on green-6.private.runners-manager.gitlab.com/gitlab.com/gitlab-org vHriyjxu, system ID: s_44fde8db605e
feature flags: FF_NETWORK_PER_BUILD:true
Resolving secrets
Preparing the "docker+machine" executor
Using Docker executor with image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 ...
Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1 ...
Authenticating with credentials from job payload (GitLab Registry)
Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1 ...
Using docker image sha256:82f132c22567f8ce17cc132c14b2f9aa3eaf9bb5424d91c2d966912433f0257d for registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:c55e1364ee4327b244a9cfa1750f19feea14fc774eaf792b725967d146eb45f5 ...
WARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 is already created. Ignoring.
WARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 is already created. Ignoring.
Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 ...
Authenticating with credentials from job payload (GitLab Registry)
Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 ...
Using docker image sha256:5c5ba5b83d6c60cb0b225bd670b7a43be8c238cc72347d24af57e5027c3648f3 for registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:46aceab84c42d0e819c8e7940f2f98ce9e184785cd7b22d95872024a35f52407 ...
Starting service redis:6.2-alpine ...
Pulling docker image redis:6.2-alpine ...
Using docker image sha256:36c1d3cfe18f4b12d4640576f7048068acbfc3625027b6bbb46bba0e31b11831 for redis:6.2-alpine with digest redis@sha256:e3b17ba9479deec4b7d1eeec1548a253acc5374d68d3b27937fcfe4df8d18c7e ...
WARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 is already created. Ignoring.
WARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 is already created. Ignoring.
Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 ...
Authenticating with credentials from job payload (GitLab Registry)
Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 ...
Using docker image sha256:df819140e3df737cdc7b8d6fb73ce804b05058c790e025b5f52840956feb1734 for registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:7bdf349fc3dd9da64bc6581d44c0e906bffd38977ddbd2668ba34adb5dedfe38 ...
Starting service elasticsearch:7.17.6 ...
Pulling docker image elasticsearch:7.17.6 ...
Using docker image sha256:5fad10241ffd65d817ed0ddfaf6e87eee1f7dc2a7db33db1047835560ea71fda for elasticsearch:7.17.6 with digest elasticsearch@sha256:6c128de5d01c0c130a806022d6bd99b3e4c27a9af5bfc33b6b81861ae117d028 ...
Starting service registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway:v1.15.0 ...
Authenticating with credentials from job payload (GitLab Registry)
Pulling docker image registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway:v1.15.0 ...
Using docker image sha256:a30dfbd70a5ce5c22a86589004a91775d1058abbf8fc0d6cf08a3024177a0d8e for registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway:v1.15.0 with digest registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway@sha256:067593f7d33000df515b665f8e988768376e97b66123fdcf2e016e23e3a8c5f3 ...
Waiting for services to be up and running (timeout 30 seconds)...
*** WARNING: Service runner-vhriyjxu-project-278964-concurrent-0-2a21e6b05f86d684-elasticsearch-4 probably didn't start properly.
Health check error:
service "runner-vhriyjxu-project-278964-concurrent-0-2a21e6b05f86d684-elasticsearch-4-wait-for-service" timeout
Health check container logs:
2024-09-05T10:57:45.967543098Z waiting for TCP connection to 6f8d1e1ca861 on [9200 9300]...
2024-09-05T10:57:45.967595188Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:45.967602638Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:46.973150024Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:46.973179524Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:47.978807568Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:47.978882259Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:48.980656742Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:48.980697633Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:49.981543247Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:49.982087127Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:50.982586683Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:50.983043123Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:51.984936539Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:51.984976939Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:52.986538534Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:52.986651794Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:53.989487949Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:53.989526629Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:54.988803475Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:54.990818785Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:55.993319501Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:55.993398961Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:57.003340256Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:57.003382946Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:58.004499221Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:58.004618341Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:57:59.006942427Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:57:59.006989357Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:00.008871863Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:00.008933473Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:01.009677799Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:01.010111809Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:02.011486404Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:02.011529204Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:03.012408112Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:03.012462712Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:04.013932137Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:04.013974777Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:05.016018743Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:05.016056483Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:06.017430448Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:06.017495818Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:07.018793724Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:07.018836324Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:08.020796320Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:08.020830220Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:09.021721243Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:09.021786233Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:10.023529580Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:10.023726210Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:11.025482336Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:11.025547036Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:12.026901652Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:12.026943022Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:13.029055328Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:13.029096768Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:14.030103161Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:14.030161621Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:15.031415679Z dialing 6f8d1e1ca861:9200...
2024-09-05T10:58:15.031454899Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:16.032517583Z dialing 6f8d1e1ca861:9300...
2024-09-05T10:58:16.032570693Z dialing 6f8d1e1ca861:9200...
Service container logs:
2024-09-05T10:57:55.183087529Z {"type": "server", "timestamp": "2024-09-05T10:57:55,166Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "version[7.17.6], pid[7], build[default/docker/f65e9d338dc1d07b642e14a27f338990148ee5b6/2022-08-23T11:08:48.893373482Z], OS[Linux/5.15.154+/amd64], JVM[Oracle Corporation/OpenJDK 64-Bit Server VM/18.0.2/18.0.2+9-61]" }
2024-09-05T10:57:55.184206299Z {"type": "server", "timestamp": "2024-09-05T10:57:55,183Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "JVM home [/usr/share/elasticsearch/jdk], using bundled JDK [true]" }
2024-09-05T10:57:55.184936679Z {"type": "server", "timestamp": "2024-09-05T10:57:55,184Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "JVM arguments [-Xshare:auto, -Des.networkaddress.cache.ttl=60, -Des.networkaddress.cache.negative.ttl=10, -XX:+AlwaysPreTouch, -Xss1m, -Djava.awt.headless=true, -Dfile.encoding=UTF-8, -Djna.nosys=true, -XX:-OmitStackTraceInFastThrow, -XX:+ShowCodeDetailsInExceptionMessages, -Dio.netty.noUnsafe=true, -Dio.netty.noKeySetOptimization=true, -Dio.netty.recycler.maxCapacityPerThread=0, -Dio.netty.allocator.numDirectArenas=0, -Dlog4j.shutdownHookEnabled=false, -Dlog4j2.disable.jmx=true, -Dlog4j2.formatMsgNoLookups=true, -Djava.locale.providers=SPI,COMPAT, --add-opens=java.base/java.io=ALL-UNNAMED, -Djava.security.manager=allow, -XX:+UseG1GC, -Djava.io.tmpdir=/tmp/elasticsearch-15322317234052103762, -XX:+HeapDumpOnOutOfMemoryError, -XX:+ExitOnOutOfMemoryError, -XX:HeapDumpPath=data, -XX:ErrorFile=logs/hs_err_pid%p.log, -Xlog:gc*,gc+age=trace,safepoint:file=logs/gc.log:utctime,pid,tags:filecount=32,filesize=64m, -Des.cgroups.hierarchy.override=/, -Xms256m, -Xmx256m, -XX:MaxDirectMemorySize=134217728, -XX:G1HeapRegionSize=4m, -XX:InitiatingHeapOccupancyPercent=30, -XX:G1ReservePercent=15, -Des.path.home=/usr/share/elasticsearch, -Des.path.conf=/usr/share/elasticsearch/config, -Des.distribution.flavor=default, -Des.distribution.type=docker, -Des.bundled_jdk=true]" }
2024-09-05T10:58:01.673549533Z {"type": "server", "timestamp": "2024-09-05T10:58:01,672Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [aggs-matrix-stats]" }
2024-09-05T10:58:01.674385913Z {"type": "server", "timestamp": "2024-09-05T10:58:01,673Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [analysis-common]" }
2024-09-05T10:58:01.675218453Z {"type": "server", "timestamp": "2024-09-05T10:58:01,674Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [constant-keyword]" }
2024-09-05T10:58:01.675635133Z {"type": "server", "timestamp": "2024-09-05T10:58:01,675Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [frozen-indices]" }
2024-09-05T10:58:01.681908362Z {"type": "server", "timestamp": "2024-09-05T10:58:01,675Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [ingest-common]" }
2024-09-05T10:58:01.682520152Z {"type": "server", "timestamp": "2024-09-05T10:58:01,682Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [ingest-geoip]" }
2024-09-05T10:58:01.682887762Z {"type": "server", "timestamp": "2024-09-05T10:58:01,682Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [ingest-user-agent]" }
2024-09-05T10:58:01.683224982Z {"type": "server", "timestamp": "2024-09-05T10:58:01,682Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [kibana]" }
2024-09-05T10:58:01.683582962Z {"type": "server", "timestamp": "2024-09-05T10:58:01,683Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [lang-expression]" }
2024-09-05T10:58:01.684075312Z {"type": "server", "timestamp": "2024-09-05T10:58:01,683Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [lang-mustache]" }
2024-09-05T10:58:01.684431382Z {"type": "server", "timestamp": "2024-09-05T10:58:01,684Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [lang-painless]" }
2024-09-05T10:58:01.684848482Z {"type": "server", "timestamp": "2024-09-05T10:58:01,684Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [legacy-geo]" }
2024-09-05T10:58:01.685184902Z {"type": "server", "timestamp": "2024-09-05T10:58:01,684Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [mapper-extras]" }
2024-09-05T10:58:01.685694162Z {"type": "server", "timestamp": "2024-09-05T10:58:01,685Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [mapper-version]" }
2024-09-05T10:58:01.686001282Z {"type": "server", "timestamp": "2024-09-05T10:58:01,685Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [parent-join]" }
2024-09-05T10:58:01.686700392Z {"type": "server", "timestamp": "2024-09-05T10:58:01,686Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [percolator]" }
2024-09-05T10:58:01.687017942Z {"type": "server", "timestamp": "2024-09-05T10:58:01,686Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [rank-eval]" }
2024-09-05T10:58:01.687373862Z {"type": "server", "timestamp": "2024-09-05T10:58:01,687Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [reindex]" }
2024-09-05T10:58:01.687865372Z {"type": "server", "timestamp": "2024-09-05T10:58:01,687Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [repositories-metering-api]" }
2024-09-05T10:58:01.688201332Z {"type": "server", "timestamp": "2024-09-05T10:58:01,687Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [repository-encrypted]" }
2024-09-05T10:58:01.689009022Z {"type": "server", "timestamp": "2024-09-05T10:58:01,688Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [repository-url]" }
2024-09-05T10:58:01.689353662Z {"type": "server", "timestamp": "2024-09-05T10:58:01,689Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [runtime-fields-common]" }
2024-09-05T10:58:01.690132011Z {"type": "server", "timestamp": "2024-09-05T10:58:01,689Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [search-business-rules]" }
2024-09-05T10:58:01.690499831Z {"type": "server", "timestamp": "2024-09-05T10:58:01,690Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [searchable-snapshots]" }
2024-09-05T10:58:01.690821431Z {"type": "server", "timestamp": "2024-09-05T10:58:01,690Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [snapshot-repo-test-kit]" }
2024-09-05T10:58:01.691745611Z {"type": "server", "timestamp": "2024-09-05T10:58:01,690Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [spatial]" }
2024-09-05T10:58:01.692078782Z {"type": "server", "timestamp": "2024-09-05T10:58:01,691Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [transform]" }
2024-09-05T10:58:01.692427231Z {"type": "server", "timestamp": "2024-09-05T10:58:01,692Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [transport-netty4]" }
2024-09-05T10:58:01.692845711Z {"type": "server", "timestamp": "2024-09-05T10:58:01,692Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [unsigned-long]" }
2024-09-05T10:58:01.693198001Z {"type": "server", "timestamp": "2024-09-05T10:58:01,692Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [vector-tile]" }
2024-09-05T10:58:01.693511671Z {"type": "server", "timestamp": "2024-09-05T10:58:01,693Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [vectors]" }
2024-09-05T10:58:01.693871611Z {"type": "server", "timestamp": "2024-09-05T10:58:01,693Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [wildcard]" }
2024-09-05T10:58:01.694226401Z {"type": "server", "timestamp": "2024-09-05T10:58:01,693Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-aggregate-metric]" }
2024-09-05T10:58:01.694588181Z {"type": "server", "timestamp": "2024-09-05T10:58:01,694Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-analytics]" }
2024-09-05T10:58:01.695149051Z {"type": "server", "timestamp": "2024-09-05T10:58:01,694Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-async]" }
2024-09-05T10:58:01.695508121Z {"type": "server", "timestamp": "2024-09-05T10:58:01,695Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-async-search]" }
2024-09-05T10:58:01.695832131Z {"type": "server", "timestamp": "2024-09-05T10:58:01,695Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-autoscaling]" }
2024-09-05T10:58:01.696162561Z {"type": "server", "timestamp": "2024-09-05T10:58:01,695Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-ccr]" }
2024-09-05T10:58:01.696660401Z {"type": "server", "timestamp": "2024-09-05T10:58:01,696Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-core]" }
2024-09-05T10:58:01.697105451Z {"type": "server", "timestamp": "2024-09-05T10:58:01,696Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-data-streams]" }
2024-09-05T10:58:01.697444321Z {"type": "server", "timestamp": "2024-09-05T10:58:01,697Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-deprecation]" }
2024-09-05T10:58:01.697759511Z {"type": "server", "timestamp": "2024-09-05T10:58:01,697Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-enrich]" }
2024-09-05T10:58:01.698320921Z {"type": "server", "timestamp": "2024-09-05T10:58:01,697Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-eql]" }
2024-09-05T10:58:01.698640441Z {"type": "server", "timestamp": "2024-09-05T10:58:01,698Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-fleet]" }
2024-09-05T10:58:01.698997251Z {"type": "server", "timestamp": "2024-09-05T10:58:01,698Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-graph]" }
2024-09-05T10:58:01.699413901Z {"type": "server", "timestamp": "2024-09-05T10:58:01,699Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-identity-provider]" }
2024-09-05T10:58:01.699850731Z {"type": "server", "timestamp": "2024-09-05T10:58:01,699Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-ilm]" }
2024-09-05T10:58:01.700434381Z {"type": "server", "timestamp": "2024-09-05T10:58:01,699Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-logstash]" }
2024-09-05T10:58:01.700882871Z {"type": "server", "timestamp": "2024-09-05T10:58:01,700Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-ml]" }
2024-09-05T10:58:01.701208061Z {"type": "server", "timestamp": "2024-09-05T10:58:01,700Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-monitoring]" }
2024-09-05T10:58:01.702546901Z {"type": "server", "timestamp": "2024-09-05T10:58:01,701Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-ql]" }
2024-09-05T10:58:01.702879701Z {"type": "server", "timestamp": "2024-09-05T10:58:01,702Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-rollup]" }
2024-09-05T10:58:01.703199140Z {"type": "server", "timestamp": "2024-09-05T10:58:01,702Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-security]" }
2024-09-05T10:58:01.703531060Z {"type": "server", "timestamp": "2024-09-05T10:58:01,703Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-shutdown]" }
2024-09-05T10:58:01.703849020Z {"type": "server", "timestamp": "2024-09-05T10:58:01,703Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-sql]" }
2024-09-05T10:58:01.704636000Z {"type": "server", "timestamp": "2024-09-05T10:58:01,703Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-stack]" }
2024-09-05T10:58:01.704974390Z {"type": "server", "timestamp": "2024-09-05T10:58:01,704Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-text-structure]" }
2024-09-05T10:58:01.705353110Z {"type": "server", "timestamp": "2024-09-05T10:58:01,705Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-voting-only-node]" }
2024-09-05T10:58:01.705652270Z {"type": "server", "timestamp": "2024-09-05T10:58:01,705Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "loaded module [x-pack-watcher]" }
2024-09-05T10:58:01.706482370Z {"type": "server", "timestamp": "2024-09-05T10:58:01,706Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "no plugins loaded" }
2024-09-05T10:58:01.875436426Z {"type": "server", "timestamp": "2024-09-05T10:58:01,874Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "using [1] data paths, mounts [[/ (overlay)]], net usable_space [74.7gb], net total_space [94.2gb], types [overlay]" }
2024-09-05T10:58:01.875697356Z {"type": "server", "timestamp": "2024-09-05T10:58:01,875Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "heap size [256mb], compressed ordinary object pointers [true]" }
2024-09-05T10:58:02.026957833Z {"type": "server", "timestamp": "2024-09-05T10:58:02,026Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "node name [6f8d1e1ca861], node ID [NKkUIq1-Qq2hqmNgQYhA5Q], cluster name [docker-cluster], roles [transform, data_frozen, master, remote_cluster_client, data, ml, data_content, data_hot, data_warm, data_cold, ingest]" }
2024-09-05T10:58:14.658622449Z {"type": "server", "timestamp": "2024-09-05T10:58:14,657Z", "level": "INFO", "component": "o.e.x.m.p.l.CppLogMessageHandler", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "[controller/210] [Main.cc@122] controller (64 bit): Version 7.17.6 (Build ea0305ae2a3b09) Copyright (c) 2022 Elasticsearch BV" }
2024-09-05T10:58:16.223578268Z {"type": "server", "timestamp": "2024-09-05T10:58:16,223Z", "level": "INFO", "component": "o.e.i.g.ConfigDatabases", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "initialized default databases [[GeoLite2-Country.mmdb, GeoLite2-City.mmdb, GeoLite2-ASN.mmdb]], config databases [[]] and watching [/usr/share/elasticsearch/config/ingest-geoip] for changes" }
2024-09-05T10:58:16.224966148Z {"type": "server", "timestamp": "2024-09-05T10:58:16,224Z", "level": "INFO", "component": "o.e.i.g.DatabaseNodeService", "cluster.name": "docker-cluster", "node.name": "6f8d1e1ca861", "message": "initialized database registry, using geoip-databases directory [/tmp/elasticsearch-15322317234052103762/geoip-databases/NKkUIq1-Qq2hqmNgQYhA5Q]" }
*********
Authenticating with credentials from job payload (GitLab Registry)
Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 ...
Using docker image sha256:533b69d21cbef3edef3b4fa4c5106d4fe43a2d2e80f65333682de7f2d5ac1800 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14@sha256:b25c1b0aa2724a8dc6571d9ee6edbadc50e2d4eab75d2ce2c3f35f9e2f74acfe ...
Preparing environment
Running on runner-vhriyjxu-project-278964-concurrent-0 via runner-vhriyjxu-private-1725523990-12158f2b...
Getting source from Git repository
Skipping Git repository setup
Skipping Git checkout
Skipping Git submodules setup
Restoring cache
Checking cache for ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-18...
Downloading cache from https://storage.googleapis.com/gitlab-com-runners-cache/project/278964/ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-18
Successfully extracted cache
Downloading artifacts
Downloading artifacts for clone-gitlab-repo (7752790011)...
Downloading artifacts from coordinator... ok host=storage.googleapis.com id=7752790011 responseStatus=200 OK token=glcbt-66
WARNING: Part of .git directory is on the list of files to extract
WARNING: This may introduce unexpected problems
Downloading artifacts for compile-test-assets (7752790146)...
Downloading artifacts from coordinator... ok host=storage.googleapis.com id=7752790146 responseStatus=200 OK token=glcbt-66
Downloading artifacts for retrieve-tests-metadata (7752790215)...
Downloading artifacts from coordinator... ok host=storage.googleapis.com id=7752790215 responseStatus=200 OK token=glcbt-66
Downloading artifacts for setup-test-env (7752790180)...
Downloading artifacts from coordinator... ok host=storage.googleapis.com id=7752790180 responseStatus=200 OK token=glcbt-66
Executing "step_script" stage of the job script
Using docker image sha256:533b69d21cbef3edef3b4fa4c5106d4fe43a2d2e80f65333682de7f2d5ac1800 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14@sha256:b25c1b0aa2724a8dc6571d9ee6edbadc50e2d4eab75d2ce2c3f35f9e2f74acfe ...
$ echo $FOSS_ONLY
$ [ "$FOSS_ONLY" = "1" ] && rm -rf ee/ qa/spec/ee/ qa/qa/specs/features/ee/ qa/qa/ee/ qa/qa/ee.rb
$ export GOPATH=$CI_PROJECT_DIR/.go
$ mkdir -p $GOPATH
$ source scripts/utils.sh
$ log_disk_usage before_script
[log_disk_usage before_script] start
df -h
Filesystem Size Used Avail Use% Mounted on
overlay 95G 24G 71G 25% /
tmpfs 64M 0 64M 0% /dev
shm 64M 0 64M 0% /dev/shm
/dev/sda1 95G 24G 71G 25% /cache
tmpfs 3.9G 0 3.9G 0% /sys/devices/virtual/dmi/id
du -h -d 1
7.3M ./workhorse
148K ./bin
1.2M ./.gitlab
164M ./.git
4.0K ./builds
27M ./lib
8.0K ./.vscode
516K ./storybook
20K ./log
1.8M ./data
9.9M ./qa
2.9M ./.rubocop_todo
1.1G ./vendor
919M ./public
58M ./doc
480K ./danger
104K ./rspec
536K ./tooling
138M ./ee
1.3M ./knapsack
296K ./patches
4.3M ./changelogs
20K ./haml_lint
28K ./metrics_server
88K ./keeps
48K ./shared
44K ./generator_templates
1.3M ./scripts
649M ./tmp
125M ./spec
20K ./file_hooks
16K ./sidekiq_cluster
16M ./gems
1.2M ./fixtures
948K ./rubocop
4.0K ./.go
29M ./db
12K ./.github
118M ./locale
1.9M ./glfm_specification
17M ./config
80M ./app
16K ./.lefthook
3.4G .
[log_disk_usage before_script] end
$ source scripts/prepare_build.sh
Installing gems
Using decomposed database config (config/database.yml.decomposed-postgresql)
Geo DB will be set up.
Embedding DB will be set up.
Setting up DBs
$ source ./scripts/rspec_helpers.sh
$ run_timed_command "gem install knapsack --no-document"
$ gem install knapsack --no-document
Successfully installed knapsack-4.0.0
1 gem installed
==> 'gem install knapsack --no-document' succeeded in 3 seconds.
$ $ section_start "gitaly-test-spawn" "Spawning Gitaly"; scripts/gitaly-test-spawn; section_end "gitaly-test-spawn"
Spawning Gitaly
$ export RSPEC_SKIPPED_TESTS_REPORT_PATH="rspec/skipped_tests-${CI_JOB_ID}.txt"
$ export RSPEC_RETRIED_TESTS_REPORT_PATH="rspec/retried_tests-${CI_JOB_ID}.txt"
$ tooling/bin/create_job_metrics_file || true
[job-metrics] Creating the job metrics file for the CI/CD job.
$ rspec_section rspec_parallelized_job "--fail-fast=${RSPEC_FAIL_FAST_THRESHOLD} --tag ~quarantine --tag ~level:background_migration --tag ~click_house"
RSpec
[11:01:30] Starting rspec_parallelized_job
RETRY_FAILED_TESTS_IN_NEW_PROCESS: true
KNAPSACK_GENERATE_REPORT: true
FLAKY_RSPEC_GENERATE_REPORT: true
KNAPSACK_TEST_FILE_PATTERN: {ee/}spec/{features}{,/**/}*_spec.rb
KNAPSACK_LOG_LEVEL: debug
KNAPSACK_REPORT_PATH: knapsack/rspec-ee_system_pg14_5_16_278964_report.json
FLAKY_RSPEC_SUITE_REPORT_PATH: rspec/flaky/report-suite.json
FLAKY_RSPEC_REPORT_PATH: rspec/flaky/all_rspec-ee_system_pg14_5_16_278964_report.json
NEW_FLAKY_RSPEC_REPORT_PATH: rspec/flaky/new_rspec-ee_system_pg14_5_16_278964_report.json
RSPEC_SKIPPED_TESTS_REPORT_PATH: rspec/skipped_tests-7752792418.txt
CRYSTALBALL:
RSPEC_TESTS_MAPPING_ENABLED:
RSPEC_TESTS_FILTER_FILE:
Shell set options (set -o) enabled:
braceexpand on
hashall on
interactive-comments on
pipefail on
Knapsack report generator started!
warning: parser/current is loading parser/ruby31, which recognizes 3.1.6-compliant syntax, but you are running 3.1.5.
Please see https://github.com/whitequark/parser#compatibility-with-ruby-mri.
Run options: exclude {:quarantine=>true, :level=>"background_migration", :click_house=>true}
# [RSpecRunTime] Starting RSpec timer...
[TEST PROF INFO] EventProf enabled (sql.active_record)
unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String.
unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String.
Test environment set up in 3.33741113 seconds
# [RSpecRunTime] Starting example group ee/spec/features/registrations/identity_verification_spec.rb. Expected to take 10 minutes 21.87 seconds.
Identity Verification
Starting the Capybara driver server...
Invite flow
when Arkose is up
when the user is risk is unavailable
Capybara starting Puma...
* Version 6.4.0, codename: The Eagle of Durango
* Min threads: 0, max threads: 4
* Listening on unix:///tmp/20240905-329-e7z7ha
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
does not verify the user and lands on group page
when the user is risk is low
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
does not verify the user and lands on group page
# [RSpecRunTime] RSpec elapsed time: 51.87 seconds. Current RSS: ~1371M. Threads: 13. load average: 1.87 1.54 1.41 1/485 526
.
behaves like registering a medium risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the user requests a phone verification exemption
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
# [RSpecRunTime] RSpec elapsed time: 1 minute 11.11 seconds. Current RSS: ~1532M. Threads: 13. load average: 1.62 1.50 1.40 1/487 530
.
access to verification endpoints
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 1 minute 14.78 seconds. Current RSS: ~1514M. Threads: 12. load average: 1.65 1.51 1.40 1/486 531
.
when invite is from a paid namespace
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
does not require identity verification
# [RSpecRunTime] RSpec elapsed time: 1 minute 18.31 seconds. Current RSS: ~1513M. Threads: 12. load average: 1.65 1.51 1.40 1/486 532
.
behaves like allows the user to complete registration when Arkose is unavailable
when Arkose is disabled via feature flag
behaves like allows the user to complete registration
is expected to have text "You have been granted access to the group8 group with the following role: Developer."
# [RSpecRunTime] RSpec elapsed time: 1 minute 23.31 seconds. Current RSS: ~1475M. Threads: 13. load average: 1.52 1.49 1.39 1/486 534
.
when Arkose is down
behaves like allows the user to complete registration
is expected to have text "You have been granted access to the group9 group with the following role: Developer."
# [RSpecRunTime] RSpec elapsed time: 1 minute 28.06 seconds. Current RSS: ~1457M. Threads: 13. load average: 1.40 1.46 1.39 1/487 536
.
when unable to connect to Arkose
behaves like allows the user to complete registration
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to have text "You have been granted access to the group10 group with the following role: Developer."
# [RSpecRunTime] RSpec elapsed time: 1 minute 34.31 seconds. Current RSS: ~1462M. Threads: 13. load average: 1.36 1.45 1.38 1/487 538
.
when Arkose returns an unknown client error
behaves like allows the user to complete registration
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to have text "You have been granted access to the group11 group with the following role: Developer."
# [RSpecRunTime] RSpec elapsed time: 1 minute 39.23 seconds. Current RSS: ~1476M. Threads: 13. load average: 1.34 1.45 1.38 1/487 539
.
SAML flow
when Arkose is up
behaves like registering a user with identity verification when risk is unavailable
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the verification code is empty
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 1 minute 49.28 seconds. Current RSS: ~1504M. Threads: 12. load average: 1.28 1.43 1.38 1/486 541
.
when the verification code is invalid
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 1 minute 51.79 seconds. Current RSS: ~1510M. Threads: 12. load average: 1.34 1.44 1.38 1/486 542
.
when the verification code has expired
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 1 minute 54.44 seconds. Current RSS: ~1514M. Threads: 12. load average: 1.34 1.44 1.38 2/485 543
.
when the verification code is incorrect
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 1 minute 57.05 seconds. Current RSS: ~1495M. Threads: 12. load average: 1.31 1.43 1.38 1/485 544
.
when user requests a new code
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
resends a new code
# [RSpecRunTime] RSpec elapsed time: 1 minute 59.58 seconds. Current RSS: ~1490M. Threads: 12. load average: 1.31 1.43 1.38 1/485 545
.
behaves like registering a low risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the verification code is empty
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 2 minutes 9.16 seconds. Current RSS: ~1502M. Threads: 12. load average: 1.50 1.47 1.39 1/485 547
.
when the verification code is invalid
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 2 minutes 11.58 seconds. Current RSS: ~1493M. Threads: 12. load average: 1.62 1.49 1.40 1/485 548
.
when the verification code has expired
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 2 minutes 14.16 seconds. Current RSS: ~1489M. Threads: 11. load average: 1.62 1.49 1.40 1/485 549
.
when the verification code is incorrect
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 2 minutes 16.77 seconds. Current RSS: ~1473M. Threads: 11. load average: 1.57 1.49 1.40 1/484 550
.
when user requests a new code
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
resends a new code
# [RSpecRunTime] RSpec elapsed time: 2 minutes 19.59 seconds. Current RSS: ~1481M. Threads: 11. load average: 1.57 1.49 1.40 1/484 551
.
behaves like registering a medium risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the user requests a phone verification exemption
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
# [RSpecRunTime] RSpec elapsed time: 2 minutes 36.49 seconds. Current RSS: ~1578M. Threads: 11. load average: 1.41 1.45 1.39 1/484 554
.
behaves like registering a high risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
and the user has a phone verification exemption
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
# [RSpecRunTime] RSpec elapsed time: 2 minutes 52.87 seconds. Current RSS: ~1585M. Threads: 10. load average: 1.24 1.41 1.37 1/484 556
.
behaves like allows the user to complete registration when Arkose is unavailable
when Arkose is disabled via feature flag
behaves like allows the user to complete registration
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 2 minutes 59.44 seconds. Current RSS: ~1586M. Threads: 10. load average: 1.22 1.41 1.37 1/484 558
.
when Arkose is down
behaves like allows the user to complete registration
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 3 minutes 6.51 seconds. Current RSS: ~1582M. Threads: 10. load average: 1.19 1.39 1.37 1/484 560
.
when unable to connect to Arkose
behaves like allows the user to complete registration
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 3 minutes 13.54 seconds. Current RSS: ~1579M. Threads: 10. load average: 1.09 1.37 1.36 1/485 562
.
when Arkose returns an unknown client error
behaves like allows the user to complete registration
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 3 minutes 20.49 seconds. Current RSS: ~1575M. Threads: 10. load average: 1.08 1.36 1.35 1/485 564
.
Subscription flow
when Arkose is up
behaves like registering a user with identity verification when risk is unavailable
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the verification code is empty
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 3 minutes 30.9 seconds. Current RSS: ~1549M. Threads: 10. load average: 0.99 1.33 1.35 1/485 566
.
when the verification code is invalid
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 3 minutes 33.94 seconds. Current RSS: ~1532M. Threads: 10. load average: 0.99 1.33 1.35 1/485 568
.
when the verification code has expired
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 3 minutes 37.22 seconds. Current RSS: ~1519M. Threads: 10. load average: 1.07 1.34 1.35 1/485 570
.
when the verification code is incorrect
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 3 minutes 40.41 seconds. Current RSS: ~1494M. Threads: 10. load average: 1.06 1.33 1.35 1/485 572
.
when user requests a new code
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
resends a new code
# [RSpecRunTime] RSpec elapsed time: 3 minutes 43.48 seconds. Current RSS: ~1475M. Threads: 10. load average: 1.06 1.33 1.35 1/485 574
.
access to verification endpoints
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 3 minutes 46.87 seconds. Current RSS: ~1469M. Threads: 10. load average: 1.14 1.35 1.35 1/488 579
.
behaves like registering a low risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the verification code is empty
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 3 minutes 57.16 seconds. Current RSS: ~1505M. Threads: 10. load average: 1.34 1.38 1.36 1/488 582
.
when the verification code is invalid
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 4 minutes 0.23 second. Current RSS: ~1504M. Threads: 10. load average: 1.40 1.39 1.37 1/488 584
.
when the verification code has expired
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 4 minutes 3.47 seconds. Current RSS: ~1497M. Threads: 10. load average: 1.40 1.39 1.37 1/488 586
.
when the verification code is incorrect
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 4 minutes 6.67 seconds. Current RSS: ~1485M. Threads: 10. load average: 1.44 1.40 1.37 1/488 588
.
when user requests a new code
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
resends a new code
# [RSpecRunTime] RSpec elapsed time: 4 minutes 9.77 seconds. Current RSS: ~1472M. Threads: 10. load average: 1.41 1.40 1.37 1/488 590
.
access to verification endpoints
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 4 minutes 13.22 seconds. Current RSS: ~1465M. Threads: 9. load average: 1.41 1.40 1.37 1/488 592
.
behaves like registering a medium risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the user requests a phone verification exemption
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
# [RSpecRunTime] RSpec elapsed time: 4 minutes 30.89 seconds. Current RSS: ~1563M. Threads: 10. load average: 1.32 1.37 1.36 1/488 595
.
access to verification endpoints
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 4 minutes 34.31 seconds. Current RSS: ~1543M. Threads: 10. load average: 1.32 1.37 1.36 1/489 597
.
when all prerequisite verification methods have not been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 4 minutes 37.95 seconds. Current RSS: ~1535M. Threads: 10. load average: 1.30 1.37 1.36 1/488 599
.
behaves like registering a high risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
and the user has a phone verification exemption
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
# [RSpecRunTime] RSpec elapsed time: 4 minutes 55.49 seconds. Current RSS: ~1550M. Threads: 10. load average: 1.35 1.38 1.36 1/487 602
.
access to verification endpoints
when all prerequisite verification methods have been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 5 minutes 1.31 seconds. Current RSS: ~1527M. Threads: 10. load average: 1.32 1.37 1.36 1/488 604
.
when some prerequisite verification methods have not been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 5 minutes 5.52 seconds. Current RSS: ~1482M. Threads: 10. load average: 1.30 1.36 1.36 1/488 606
.
when all prerequisite verification methods have not been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 5 minutes 8.8 seconds. Current RSS: ~1466M. Threads: 10. load average: 1.30 1.36 1.36 1/488 607
.
behaves like allows the user to complete registration when Arkose is unavailable
when Arkose is disabled via feature flag
behaves like allows the user to complete registration
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 5 minutes 16.22 seconds. Current RSS: ~1507M. Threads: 10. load average: 1.47 1.40 1.37 1/487 609
.
when Arkose is down
behaves like allows the user to complete registration
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 5 minutes 23.67 seconds. Current RSS: ~1572M. Threads: 10. load average: 1.44 1.39 1.37 1/488 612
.
when unable to connect to Arkose
behaves like allows the user to complete registration
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 5 minutes 31.01 seconds. Current RSS: ~1574M. Threads: 10. load average: 1.52 1.41 1.37 1/488 614
.
when Arkose returns an unknown client error
behaves like allows the user to complete registration
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 5 minutes 38.45 seconds. Current RSS: ~1572M. Threads: 10. load average: 1.47 1.41 1.37 1/488 616
.
Standard flow
when Arkose is up
behaves like registering a user with identity verification when risk is unavailable
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the verification code is empty
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 5 minutes 49.36 seconds. Current RSS: ~1537M. Threads: 10. load average: 1.55 1.42 1.38 1/489 619
.
when the verification code is invalid
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 5 minutes 52.4 seconds. Current RSS: ~1523M. Threads: 10. load average: 1.50 1.42 1.38 1/489 621
.
when the verification code has expired
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 5 minutes 55.63 seconds. Current RSS: ~1509M. Threads: 10. load average: 1.46 1.41 1.37 1/489 623
.
when the verification code is incorrect
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 5 minutes 58.72 seconds. Current RSS: ~1493M. Threads: 10. load average: 1.46 1.41 1.37 1/489 625
.
when user requests a new code
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
resends a new code
# [RSpecRunTime] RSpec elapsed time: 6 minutes 1.9 seconds. Current RSS: ~1480M. Threads: 10. load average: 1.59 1.44 1.38 1/489 627
.
access to verification endpoints
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 6 minutes 5.2 seconds. Current RSS: ~1476M. Threads: 10. load average: 1.94 1.51 1.41 1/489 629
.
behaves like registering a low risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the verification code is empty
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 6 minutes 16.24 seconds. Current RSS: ~1505M. Threads: 10. load average: 2.03 1.55 1.42 1/492 635
when the verification code is invalid
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 6 minutes 19.42 seconds. Current RSS: ~1501M. Threads: 10. load average: 2.03 1.55 1.42 1/492 637
when the verification code has expired
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 6 minutes 22.58 seconds. Current RSS: ~1488M. Threads: 10. load average: 1.95 1.54 1.42 1/492 639
when the verification code is incorrect
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 6 minutes 25.71 seconds. Current RSS: ~1483M. Threads: 10. load average: 1.87 1.53 1.41 1/492 641
when user requests a new code
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
resends a new code
# [RSpecRunTime] RSpec elapsed time: 6 minutes 28.83 seconds. Current RSS: ~1476M. Threads: 10. load average: 1.87 1.53 1.41 1/492 643
access to verification endpoints
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 6 minutes 32.13 seconds. Current RSS: ~1472M. Threads: 10. load average: 1.88 1.54 1.42 1/492 645
behaves like registering a medium risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the user requests a phone verification exemption
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
# [RSpecRunTime] RSpec elapsed time: 6 minutes 50.32 seconds. Current RSS: ~1520M. Threads: 10. load average: 1.88 1.55 1.42 1/492 649
access to verification endpoints
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 6 minutes 53.53 seconds. Current RSS: ~1515M. Threads: 10. load average: 1.88 1.55 1.42 1/492 650
when all prerequisite verification methods have not been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 6 minutes 56.88 seconds. Current RSS: ~1500M. Threads: 10. load average: 1.81 1.54 1.42 1/492 652
behaves like registering a high risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
and the user has a phone verification exemption
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
# [RSpecRunTime] RSpec elapsed time: 7 minutes 14.84 seconds. Current RSS: ~1526M. Threads: 10. load average: 1.67 1.52 1.42 1/491 656
access to verification endpoints
when all prerequisite verification methods have been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 7 minutes 20.44 seconds. Current RSS: ~1514M. Threads: 10. load average: 1.62 1.51 1.42 1/491 657
when some prerequisite verification methods have not been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 7 minutes 24.59 seconds. Current RSS: ~1491M. Threads: 10. load average: 1.62 1.51 1.42 1/491 658
when all prerequisite verification methods have not been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 7 minutes 27.98 seconds. Current RSS: ~1475M. Threads: 10. load average: 1.57 1.51 1.41 1/491 659
behaves like allows the user to complete registration when Arkose is unavailable
when Arkose is disabled via feature flag
behaves like allows the user to complete registration
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 7 minutes 35.62 seconds. Current RSS: ~1507M. Threads: 10. load average: 1.41 1.47 1.40 1/491 662
when Arkose is down
behaves like allows the user to complete registration
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 7 minutes 43.47 seconds. Current RSS: ~1530M. Threads: 10. load average: 1.29 1.45 1.40 1/491 664
when unable to connect to Arkose
behaves like allows the user to complete registration
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 7 minutes 51.44 seconds. Current RSS: ~1531M. Threads: 10. load average: 1.25 1.43 1.39 1/491 666
when Arkose returns an unknown client error
behaves like allows the user to complete registration
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 7 minutes 59.29 seconds. Current RSS: ~1526M. Threads: 10. load average: 1.23 1.42 1.39 1/491 668
user that already went through identity verification
when the user is medium risk but phone verification feature-flag is turned off
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user with email only
# [RSpecRunTime] RSpec elapsed time: 8 minutes 11.09 seconds. Current RSS: ~1518M. Threads: 10. load average: 1.18 1.40 1.38 1/491 671
Trial flow
when Arkose is up
behaves like registering a user with identity verification when risk is unavailable
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the verification code is empty
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 8 minutes 22.44 seconds. Current RSS: ~1504M. Threads: 10. load average: 1.55 1.47 1.40 1/491 673
when the verification code is invalid
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 8 minutes 25.87 seconds. Current RSS: ~1499M. Threads: 10. load average: 1.50 1.46 1.40 1/490 675
when the verification code has expired
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 8 minutes 29.23 seconds. Current RSS: ~1480M. Threads: 10. load average: 1.50 1.46 1.40 1/491 677
when the verification code is incorrect
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 8 minutes 32.67 seconds. Current RSS: ~1467M. Threads: 10. load average: 1.70 1.51 1.41 1/490 679
when user requests a new code
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
resends a new code
# [RSpecRunTime] RSpec elapsed time: 8 minutes 35.96 seconds. Current RSS: ~1459M. Threads: 10. load average: 1.65 1.50 1.41 1/491 681
access to verification endpoints
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 8 minutes 39.57 seconds. Current RSS: ~1460M. Threads: 10. load average: 1.65 1.50 1.41 1/490 683
behaves like registering a low risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the verification code is empty
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 8 minutes 50.46 seconds. Current RSS: ~1498M. Threads: 10. load average: 1.58 1.49 1.41 1/491 686
when the verification code is invalid
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 8 minutes 53.73 seconds. Current RSS: ~1495M. Threads: 10. load average: 1.58 1.49 1.41 1/491 688
when the verification code has expired
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 8 minutes 57.11 seconds. Current RSS: ~1476M. Threads: 10. load average: 1.62 1.50 1.41 1/491 690
when the verification code is incorrect
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows error message
# [RSpecRunTime] RSpec elapsed time: 9 minutes 0.39 second. Current RSS: ~1465M. Threads: 10. load average: 1.65 1.51 1.42 1/491 692
when user requests a new code
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
resends a new code
# [RSpecRunTime] RSpec elapsed time: 9 minutes 3.67 seconds. Current RSS: ~1461M. Threads: 10. load average: 1.65 1.51 1.42 1/491 694
access to verification endpoints
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 9 minutes 7.27 seconds. Current RSS: ~1463M. Threads: 10. load average: 1.60 1.50 1.42 1/490 696
behaves like registering a medium risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
when the user requests a phone verification exemption
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
# [RSpecRunTime] RSpec elapsed time: 9 minutes 25.44 seconds. Current RSS: ~1492M. Threads: 10. load average: 1.65 1.52 1.42 1/491 702
access to verification endpoints
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 9 minutes 28.83 seconds. Current RSS: ~1495M. Threads: 10. load average: 1.65 1.52 1.42 1/492 704
when all prerequisite verification methods have not been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 9 minutes 32.47 seconds. Current RSS: ~1479M. Threads: 10. load average: 1.84 1.56 1.44 1/491 706
behaves like registering a high risk user with identity verification
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
and the user has a phone verification exemption
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
verifies the user
# [RSpecRunTime] RSpec elapsed time: 9 minutes 50.27 seconds. Current RSS: ~1494M. Threads: 10. load average: 1.67 1.54 1.43 1/491 711
access to verification endpoints
when all prerequisite verification methods have been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :telesign is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 9 minutes 56.38 seconds. Current RSS: ~1482M. Threads: 10. load average: 1.62 1.53 1.43 1/492 713
when some prerequisite verification methods have not been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 10 minutes 0.8 second. Current RSS: ~1469M. Threads: 10. load average: 1.97 1.60 1.45 1/492 715
when all prerequisite verification methods have not been completed
behaves like does not allow unauthorized access to verification endpoints
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to eq 400
# [RSpecRunTime] RSpec elapsed time: 10 minutes 4.3 seconds. Current RSS: ~1460M. Threads: 10. load average: 1.97 1.60 1.45 1/491 716
behaves like allows the user to complete registration when Arkose is unavailable
when Arkose is disabled via feature flag
behaves like allows the user to complete registration
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 10 minutes 12.07 seconds. Current RSS: ~1504M. Threads: 10. load average: 1.82 1.58 1.45 1/491 718
when Arkose is down
behaves like allows the user to complete registration
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 10 minutes 20.98 seconds. Current RSS: ~1547M. Threads: 10. load average: 1.69 1.56 1.44 1/491 720
when unable to connect to Arkose
behaves like allows the user to complete registration
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 10 minutes 28.64 seconds. Current RSS: ~1574M. Threads: 10. load average: 1.88 1.60 1.46 1/491 722
when Arkose returns an unknown client error
behaves like allows the user to complete registration
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
is expected to have text "Welcome to GitLab"
# [RSpecRunTime] RSpec elapsed time: 10 minutes 36.16 seconds. Current RSS: ~1569M. Threads: 10. load average: 1.81 1.60 1.46 1/491 724
# [RSpecRunTime] Finishing example group ee/spec/features/registrations/identity_verification_spec.rb. It took 10 minutes 29.28 seconds. Expected to take 10 minutes 21.87 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/members/manage_groups_spec.rb. Expected to take 2 minutes 23.86 seconds.
Projects > Members > Manage groups
inviting group with restricted email domain
shared project group is the root ancestor
behaves like restricted membership by email domain
shared project group has membership restricted by allowed email domains
shared with group with a subset of allowed email domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 10 minutes 46.59 seconds. Current RSS: ~1529M. Threads: 12. load average: 1.84 1.61 1.46 1/502 740
shared with group containing domains outside the shared group allowed email domains
behaves like inviting group fails with allowed email domain error
is expected to have text "Invited group allowed email domains must contain a subset of the allowed email domains of the root ancestor group"
# [RSpecRunTime] RSpec elapsed time: 10 minutes 51.28 seconds. Current RSS: ~1510M. Threads: 12. load average: 2.01 1.65 1.48 1/502 743
shared with group does not have membership restricted by allowed domains
behaves like inviting group fails with allowed email domain error
is expected to have text "Invited group allowed email domains must contain a subset of the allowed email domains of the root ancestor group"
# [RSpecRunTime] RSpec elapsed time: 10 minutes 55.92 seconds. Current RSS: ~1519M. Threads: 12. load average: 2.09 1.68 1.49 1/502 746
shared project group does not have membership restricted by allowed domains
shared with group has membership restricted by allowed email domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 11 minutes 4.84 seconds. Current RSS: ~1517M. Threads: 12. load average: 2.22 1.72 1.50 1/502 751
shared with group does not have membership restricted by allowed domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 11 minutes 14.2 seconds. Current RSS: ~1520M. Threads: 12. load average: 2.04 1.69 1.49 1/502 755
shared project group is a subgroup
behaves like restricted membership by email domain
shared project group has membership restricted by allowed email domains
shared with group with a subset of allowed email domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 11 minutes 23.93 seconds. Current RSS: ~1522M. Threads: 12. load average: 1.96 1.68 1.49 1/502 761
shared with group containing domains outside the shared group allowed email domains
behaves like inviting group fails with allowed email domain error
is expected to have text "Invited group allowed email domains must contain a subset of the allowed email domains of the root ancestor group"
# [RSpecRunTime] RSpec elapsed time: 11 minutes 29.67 seconds. Current RSS: ~1522M. Threads: 12. load average: 1.88 1.67 1.49 1/503 764
shared with group does not have membership restricted by allowed domains
behaves like inviting group fails with allowed email domain error
is expected to have text "Invited group allowed email domains must contain a subset of the allowed email domains of the root ancestor group"
# [RSpecRunTime] RSpec elapsed time: 11 minutes 35.03 seconds. Current RSS: ~1516M. Threads: 12. load average: 1.74 1.65 1.49 1/503 767
shared project group does not have membership restricted by allowed domains
shared with group has membership restricted by allowed email domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 11 minutes 45.29 seconds. Current RSS: ~1523M. Threads: 12. load average: 1.78 1.66 1.49 2/503 773
shared with group does not have membership restricted by allowed domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 11 minutes 54.32 seconds. Current RSS: ~1517M. Threads: 12. load average: 1.80 1.67 1.50 1/503 778
shared with group is a subgroup
behaves like restricted membership by email domain
shared project group has membership restricted by allowed email domains
shared with group with a subset of allowed email domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 12 minutes 3.21 seconds. Current RSS: ~1514M. Threads: 12. load average: 1.68 1.64 1.49 1/503 782
shared with group containing domains outside the shared group allowed email domains
behaves like inviting group fails with allowed email domain error
is expected to have text "Invited group allowed email domains must contain a subset of the allowed email domains of the root ancestor group"
# [RSpecRunTime] RSpec elapsed time: 12 minutes 8.32 seconds. Current RSS: ~1515M. Threads: 12. load average: 1.62 1.63 1.49 1/503 785
shared with group does not have membership restricted by allowed domains
behaves like inviting group fails with allowed email domain error
is expected to have text "Invited group allowed email domains must contain a subset of the allowed email domains of the root ancestor group"
# [RSpecRunTime] RSpec elapsed time: 12 minutes 13.35 seconds. Current RSS: ~1508M. Threads: 12. load average: 1.57 1.62 1.48 1/503 788
shared project group does not have membership restricted by allowed domains
shared with group has membership restricted by allowed email domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 12 minutes 22.64 seconds. Current RSS: ~1516M. Threads: 12. load average: 1.64 1.64 1.49 1/503 794
shared with group does not have membership restricted by allowed domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 12 minutes 31.35 seconds. Current RSS: ~1514M. Threads: 12. load average: 1.54 1.61 1.48 1/503 799
shared project group and shared with group are subgroups
behaves like restricted membership by email domain
shared project group has membership restricted by allowed email domains
shared with group with a subset of allowed email domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 12 minutes 40.55 seconds. Current RSS: ~1516M. Threads: 12. load average: 1.61 1.63 1.49 1/503 804
shared with group containing domains outside the shared group allowed email domains
behaves like inviting group fails with allowed email domain error
is expected to have text "Invited group allowed email domains must contain a subset of the allowed email domains of the root ancestor group"
# [RSpecRunTime] RSpec elapsed time: 12 minutes 45.99 seconds. Current RSS: ~1515M. Threads: 12. load average: 1.65 1.63 1.49 1/503 807
shared with group does not have membership restricted by allowed domains
behaves like inviting group fails with allowed email domain error
is expected to have text "Invited group allowed email domains must contain a subset of the allowed email domains of the root ancestor group"
# [RSpecRunTime] RSpec elapsed time: 12 minutes 51.52 seconds. Current RSS: ~1511M. Threads: 12. load average: 1.91 1.69 1.51 1/503 810
shared project group does not have membership restricted by allowed domains
shared with group has membership restricted by allowed email domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 13 minutes 1.84 seconds. Current RSS: ~1509M. Threads: 12. load average: 1.85 1.68 1.51 1/504 816
shared with group does not have membership restricted by allowed domains
behaves like adds group without validation error
is expected to have text "Maintainer"
# [RSpecRunTime] RSpec elapsed time: 13 minutes 12.47 seconds. Current RSS: ~1508M. Threads: 12. load average: 1.72 1.66 1.50 1/504 822
# [RSpecRunTime] Finishing example group ee/spec/features/projects/members/manage_groups_spec.rb. It took 2 minutes 36.29 seconds. Expected to take 2 minutes 23.86 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/issues/related_issues_spec.rb. Expected to take 1 minute 45.8 seconds.
Related issues
when user has permission to manage related issues
with "Relates to", "Blocks", "Is blocked by" groupings
when adding a "relates_to" issue
shows "Relates to" heading
shows the added issue
# [RSpecRunTime] RSpec elapsed time: 13 minutes 36.82 seconds. Current RSS: ~1544M. Threads: 25. load average: 1.87 1.70 1.52 1/517 910
when adding a "blocks" issue
shows "Blocks" heading
shows the added issue
# [RSpecRunTime] RSpec elapsed time: 13 minutes 52.8 seconds. Current RSS: ~1542M. Threads: 25. load average: 1.90 1.72 1.53 1/519 949
when adding an "is_blocked_by" issue
shows "Is blocked by" heading
shows the added issue
when clicking the top `Close issue` button in the issue header
shows a modal to confirm closing the issue
# [RSpecRunTime] RSpec elapsed time: 14 minutes 25.23 seconds. Current RSS: ~1550M. Threads: 25. load average: 1.83 1.72 1.54 1/520 1029
when clicking the bottom `Close issue` button below the comment textarea
shows a modal to confirm closing the issue
# [RSpecRunTime] RSpec elapsed time: 14 minutes 41.62 seconds. Current RSS: ~1546M. Threads: 27. load average: 2.41 1.85 1.59 1/520 1070
when adding "relates_to", "blocks", and "is_blocked_by" issues
shows "Blocks", "Is blocked by", and "Relates to" headings
shows all added issues
# [RSpecRunTime] RSpec elapsed time: 15 minutes 4.78 seconds. Current RSS: ~1551M. Threads: 27. load average: 2.85 2.00 1.64 2/520 1109
# [RSpecRunTime] Finishing example group ee/spec/features/issues/related_issues_spec.rb. It took 1 minute 52.48 seconds. Expected to take 1 minute 45.8 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/analytics/cycle_analytics_spec.rb. Expected to take 1 minute 18.39 seconds.
Project > Value stream analytics
with `cycle_analytics_for_projects` disabled
behaves like Unlicensed Value Stream Analytics
does not render the premium features
renders vsa metrics
# [RSpecRunTime] RSpec elapsed time: 15 minutes 19.19 seconds. Current RSS: ~1567M. Threads: 27. load average: 2.73 2.00 1.65 2/521 1163
with cycle_analytics_for_projects licensed feature available
with no value stream
renders the customizable VSA empty state
allows to create a custom value stream
# [RSpecRunTime] RSpec elapsed time: 15 minutes 33.23 seconds. Current RSS: ~1556M. Threads: 27. load average: 2.35 1.95 1.64 1/522 1217
with a custom value stream created
on overview section
Job arguments to ProcessCommitWorker must be native JSON types, but :id is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
displays data
Job arguments to ProcessCommitWorker must be native JSON types, but :id is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
does not render task by type chart
when the user has access to the project's group
Job arguments to ProcessCommitWorker must be native JSON types, but :id is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
displays the link to VSD
# [RSpecRunTime] RSpec elapsed time: 16 minutes 15.46 seconds. Current RSS: ~1529M. Threads: 23. load average: 2.14 1.93 1.64 3/524 3132
on total time chart
when there is no data
renders empty state
# [RSpecRunTime] RSpec elapsed time: 16 minutes 20.35 seconds. Current RSS: ~1545M. Threads: 24. load average: 2.29 1.97 1.66 1/522 3153
when there is data
displays data on chart
# [RSpecRunTime] RSpec elapsed time: 16 minutes 25.44 seconds. Current RSS: ~1537M. Threads: 24. load average: 2.50 2.02 1.68 1/522 3174
# [RSpecRunTime] Finishing example group ee/spec/features/projects/analytics/cycle_analytics_spec.rb. It took 1 minute 20.5 seconds. Expected to take 1 minute 18.39 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/environments/environments_spec.rb. Expected to take 1 minute 6.81 seconds.
Environments page
when an environment is protected and user has access to it
when environment has manual actions
shows an enabled play button
shows a stop button
with external_url
shows an external link button
# [RSpecRunTime] RSpec elapsed time: 16 minutes 39.96 seconds. Current RSS: ~1565M. Threads: 24. load average: 2.86 2.12 1.71 1/526 3366
when terminal is available
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but Environment(id: integer, project_id: integer, name: string, created_at: datetime, updated_at: datetime, external_url: string, environment_type: string, state: string, slug: string, auto_stop_at: timestamptz, auto_delete_at: timestamptz, tier: integer, merge_request_id: integer, cluster_agent_id: integer, kubernetes_namespace: text, flux_resource_path: text) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
shows a terminal button
# [RSpecRunTime] RSpec elapsed time: 16 minutes 45.41 seconds. Current RSS: ~1576M. Threads: 23. load average: 2.71 2.10 1.71 1/525 3437
when environment can be rollback
shows re deploy button
# [RSpecRunTime] RSpec elapsed time: 16 minutes 50.16 seconds. Current RSS: ~1565M. Threads: 23. load average: 2.57 2.08 1.71 1/525 3502
when environment is protected and user does not have access to it
when environment has manual actions
show a disabled play button
does not show a stop button
with external_url
shows an external link button
# [RSpecRunTime] RSpec elapsed time: 17 minutes 3.63 seconds. Current RSS: ~1567M. Threads: 23. load average: 2.25 2.03 1.69 1/526 3695
when terminal is available
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but Environment(id: integer, project_id: integer, name: string, created_at: datetime, updated_at: datetime, external_url: string, environment_type: string, state: string, slug: string, auto_stop_at: timestamptz, auto_delete_at: timestamptz, tier: integer, merge_request_id: integer, cluster_agent_id: integer, kubernetes_namespace: text, flux_resource_path: text) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
does not shows a terminal button
# [RSpecRunTime] RSpec elapsed time: 17 minutes 8.65 seconds. Current RSS: ~1576M. Threads: 23. load average: 2.39 2.06 1.70 1/525 3766
when environment can be rollback
does not show a re deploy button
# [RSpecRunTime] RSpec elapsed time: 17 minutes 12.97 seconds. Current RSS: ~1566M. Threads: 22. load average: 2.28 2.04 1.70 1/525 3831
when environment has an open alert
shows the open alert for the environment row
when user does not have a license for the feature
does not show the open alert for the environment row
# [RSpecRunTime] RSpec elapsed time: 17 minutes 22.68 seconds. Current RSS: ~1574M. Threads: 22. load average: 2.08 2.01 1.69 1/521 3924
# [RSpecRunTime] Finishing example group ee/spec/features/projects/environments/environments_spec.rb. It took 57.21 seconds. Expected to take 1 minute 6.81 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/epics/epic_related_epics_spec.rb. Expected to take 58.05 seconds.
Related Epics
epic body section
user can view related epics section under epic description
# [RSpecRunTime] RSpec elapsed time: 17 minutes 29.32 seconds. Current RSS: ~1551M. Threads: 23. load average: 2.00 1.99 1.69 1/521 3927
related epics add epic form
user can view category selection radio inputs
user can view epic input field
epic input field can autocomplete epics when `&` is input
epic input field does not autocomplete issues when `#` is input
user can view list of added epics as tokens within input field
# [RSpecRunTime] RSpec elapsed time: 17 minutes 53.57 seconds. Current RSS: ~1534M. Threads: 23. load average: 1.82 1.94 1.68 1/520 3930
related epics list
user can add an epic with selected relationship type
user can remove an epic from the list
# [RSpecRunTime] RSpec elapsed time: 18 minutes 8.98 seconds. Current RSS: ~1532M. Threads: 24. load average: 2.25 2.03 1.71 1/520 3933
when related epics is not supported by license
user can not view related epics section under epic description
# [RSpecRunTime] RSpec elapsed time: 18 minutes 17.7 seconds. Current RSS: ~1533M. Threads: 24. load average: 1.98 1.98 1.70 1/521 3935
# [RSpecRunTime] Finishing example group ee/spec/features/epics/epic_related_epics_spec.rb. It took 55.05 seconds. Expected to take 58.05 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. Expected to take 54.93 seconds.
Projects > Settings > Repository settings using custom role
when user is a guest with custom roles that enables handling protected branches
does not show sections not allowed by the custom role
behaves like setting project protected branches
explicit protected branches
2024-09-05 11:22:27 +0000 Rack app ("GET /group73/project-39/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group73' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/
3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/
4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:71:in `organization_detail'*/
5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:446:in `block in root_saml_provider'*/
9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 204 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
10: SELECT "users".* FROM find_users_by_id(203) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 39 AND "project_authorizations"."user_id" = 204 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 39 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(240) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/
15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1095:in `owns_project_organization?'*/
16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/
17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
FROM (VALUES (39, ARRAY[240])) AS project_ids (project_id, namespace_ids),
LATERAL (
SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (members.source_type = 'Project' AND members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (members.source_type = 'Namespace' AND members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id LEFT OUTER JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (
(members.access_level > group_group_links.group_access) OR
(members.access_level = group_group_links.group_access AND members.member_role_id IS NOT NULL)
) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
) AS custom_permissions
GROUP BY project_ids.project_id;
/*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/
21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 39 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 39 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 39 OR "security_orchestration_policy_configurations"."namespace_id" = 240) /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1406:in `security_orchestration_policies_for_scope'*/
33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 39 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 240 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 240 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve" FROM "project_settings" WHERE "project_settings"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/
39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:446:in `block in root_saml_provider'*/
40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/
42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 240 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
UNION
(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 240) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 204 GROUP BY "members"."user_id" /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/
44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1122:in `access_allowed_to?'*/
58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 39 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3579:in `block (2 levels) in fetch_branch_allows_collaboration'*/
62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 240 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 240 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 204 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 204 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
101: SELECT "users".* FROM find_users_by_id(204) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 204) /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 204 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 204 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-05 11:22:27.838486') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-05 11:22:27.842354') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/>
2024-09-05 11:22:33 +0000 Rack app ("GET /group73/project-39/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group73' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/
3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/
4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:71:in `organization_detail'*/
5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:446:in `block in root_saml_provider'*/
9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 204 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
10: SELECT "users".* FROM find_users_by_id(203) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 39 AND "project_authorizations"."user_id" = 204 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 39 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(240) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/
15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1095:in `owns_project_organization?'*/
16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/
17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
FROM (VALUES (39, ARRAY[240])) AS project_ids (project_id, namespace_ids),
LATERAL (
SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (members.source_type = 'Project' AND members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (members.source_type = 'Namespace' AND members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id LEFT OUTER JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (
(members.access_level > group_group_links.group_access) OR
(members.access_level = group_group_links.group_access AND members.member_role_id IS NOT NULL)
) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
) AS custom_permissions
GROUP BY project_ids.project_id;
/*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/
21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 39 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 39 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 39 OR "security_orchestration_policy_configurations"."namespace_id" = 240) /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1406:in `security_orchestration_policies_for_scope'*/
33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 39 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 240 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 2 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 2 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 240 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve" FROM "project_settings" WHERE "project_settings"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/
39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:446:in `block in root_saml_provider'*/
40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/
42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 240 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
UNION
(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 240) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 204 GROUP BY "members"."user_id" /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/
44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1122:in `access_allowed_to?'*/
58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 39 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3579:in `block (2 levels) in fetch_branch_allows_collaboration'*/
62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 240 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 240 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 204 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 204 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
101: SELECT "users".* FROM find_users_by_id(204) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 204) /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 204 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 204 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-05 11:22:33.050081') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-05 11:22:33.053679') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/>
allows creating explicit protected branches (FAILED - 1)
1st Try error in ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:5:
Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group73' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/
3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/
4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:71:in `organization_detail'*/
5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:446:in `block in root_saml_provider'*/
9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 204 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
10: SELECT "users".* FROM find_users_by_id(203) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 39 AND "project_authorizations"."user_id" = 204 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 39 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(240) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/
15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1095:in `owns_project_organization?'*/
16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/
17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
FROM (VALUES (39, ARRAY[240])) AS project_ids (project_id, namespace_ids),
LATERAL (
SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (members.source_type = 'Project' AND members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (members.source_type = 'Namespace' AND members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id LEFT OUTER JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (
(members.access_level > group_group_links.group_access) OR
(members.access_level = group_group_links.group_access AND members.member_role_id IS NOT NULL)
) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
) AS custom_permissions
GROUP BY project_ids.project_id;
/*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/
21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 39 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 39 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 39 OR "security_orchestration_policy_configurations"."namespace_id" = 240) /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1406:in `security_orchestration_policies_for_scope'*/
33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 39 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 240 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 240 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve" FROM "project_settings" WHERE "project_settings"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/
39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:446:in `block in root_saml_provider'*/
40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/
42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 240 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
UNION
(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 240) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 204 GROUP BY "members"."user_id" /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/
44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1122:in `access_allowed_to?'*/
58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 39 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3579:in `block (2 levels) in fetch_branch_allows_collaboration'*/
62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 240 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 39 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 240 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 204 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 204 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
101: SELECT "users".* FROM find_users_by_id(204) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 204) /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 204 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 204 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-05 11:22:27.838486') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-05 11:22:27.842354') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J70YQR3VQ873B8T73FTC09DG,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
Unexpected browser console output:
webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:"
webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
http://127.0.0.1:44761/group73/project-39/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error)
RSpec::Retry: 2nd try ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:5
HTML screenshot: /builds/gitlab-org/gitlab/tmp/capybara/projects_settings_repository_settings_using_custom_role_when_user_is_a_guest_with_custom_roles_that_enables_handling_protected_branches_behaves_like_se.html
Image screenshot: /tmp/capybara/projects_settings_repository_settings_using_custom_role_when_user_is_a_guest_with_custom_roles_that_enables_handling_protected_branches_behaves_like_se.png
shows success alert once protected branch is created
displays the last commit on the matching branch if it exists
displays an error message if the named branch does not exist
# [RSpecRunTime] RSpec elapsed time: 18 minutes 49.59 seconds. Current RSS: ~1551M. Threads: 24. load average: 2.31 2.06 1.74 1/523 4042
wildcard protected branches
allows creating protected branches with a wildcard
displays all the branches matching the wildcard
# [RSpecRunTime] RSpec elapsed time: 19 minutes 6.19 seconds. Current RSS: ~1579M. Threads: 24. load average: 2.07 2.02 1.73 1/526 4166
# [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. It took 48.5 seconds. Expected to take 54.93 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/push_rules_spec.rb. Expected to take 49.99 seconds.
Projects > Push rules
reject_unsigned_commits rule
unlicensed
does not render the setting checkbox
# [RSpecRunTime] RSpec elapsed time: 19 minutes 13.26 seconds. Current RSS: ~1625M. Threads: 23. load average: 2.07 2.02 1.73 1/526 4257
licensed
renders the setting checkbox
with GL.com plans
when disabled
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
does not render the setting checkbox
# [RSpecRunTime] RSpec elapsed time: 19 minutes 24.49 seconds. Current RSS: ~1707M. Threads: 24. load average: 1.90 1.99 1.72 1/526 4439
when enabled
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
renders the setting checkbox
# [RSpecRunTime] RSpec elapsed time: 19 minutes 30.64 seconds. Current RSS: ~1701M. Threads: 23. load average: 1.84 1.97 1.72 3/526 4530
commit_committer_check rule
unlicensed
does not render the setting checkbox
# [RSpecRunTime] RSpec elapsed time: 19 minutes 36.23 seconds. Current RSS: ~1700M. Threads: 23. load average: 2.33 2.07 1.76 1/525 4621
licensed
renders the setting checkbox
with GL.com plans
when disabled
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
does not render the setting checkbox
# [RSpecRunTime] RSpec elapsed time: 19 minutes 49.18 seconds. Current RSS: ~1693M. Threads: 23. load average: 2.13 2.04 1.75 1/525 4803
when enabled
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
renders the setting checkbox
# [RSpecRunTime] RSpec elapsed time: 19 minutes 54.86 seconds. Current RSS: ~1692M. Threads: 23. load average: 2.03 2.02 1.74 1/525 4894
# [RSpecRunTime] Finishing example group ee/spec/features/projects/push_rules_spec.rb. It took 48.64 seconds. Expected to take 49.99 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_sees_approve_via_custom_role_spec.rb. Expected to take 38.7 seconds.
Merge request > User approves via custom role
with a public project
behaves like `admin_merge_request` custom role
when the user has `admin_merge_request` enabled at the project level
allows approving and revoking approval
# [RSpecRunTime] RSpec elapsed time: 20 minutes 15.48 seconds. Current RSS: ~1558M. Threads: 28. load average: 1.95 2.00 1.74 1/530 5101
when the user does not have the `admin_merge_request` permission enabled
prevents approving
with a private project
behaves like `admin_merge_request` custom role
when the user has `admin_merge_request` enabled at the project level
allows approving and revoking approval
# [RSpecRunTime] RSpec elapsed time: 20 minutes 34.55 seconds. Current RSS: ~1578M. Threads: 30. load average: 2.03 2.02 1.75 1/532 5148
when the user does not have the `admin_merge_request` permission enabled
prevents approving
# [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_sees_approve_via_custom_role_spec.rb. It took 40.37 seconds. Expected to take 38.7 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/groups/analytics/ci_cd_analytics_spec.rb. Expected to take 35.8 seconds.
Group CI/CD Analytics
renders statistics about release within the group
DORA charts
behaves like a DORA chart
render the Deployment frequency charts
# [RSpecRunTime] RSpec elapsed time: 20 minutes 47.97 seconds. Current RSS: ~1566M. Threads: 30. load average: 1.89 1.98 1.74 1/528 5151
behaves like a DORA chart
render the Lead time charts
# [RSpecRunTime] RSpec elapsed time: 20 minutes 52.27 seconds. Current RSS: ~1566M. Threads: 30. load average: 1.89 1.98 1.75 1/527 5153
behaves like a DORA chart
render the Time to restore service charts
# [RSpecRunTime] RSpec elapsed time: 20 minutes 56.56 seconds. Current RSS: ~1561M. Threads: 30. load average: 1.82 1.97 1.74 7/528 5155
behaves like a DORA chart
render the Change failure rate charts
# [RSpecRunTime] RSpec elapsed time: 21 minutes 0.86 second. Current RSS: ~1559M. Threads: 30. load average: 1.76 1.95 1.74 1/528 5157
when dora_charts_forecast is disabled
can not toggle data forecasting
# [RSpecRunTime] RSpec elapsed time: 21 minutes 8.54 seconds. Current RSS: ~1553M. Threads: 30. load average: 1.70 1.93 1.73 1/528 5160
# [RSpecRunTime] Finishing example group ee/spec/features/groups/analytics/ci_cd_analytics_spec.rb. It took 33.31 seconds. Expected to take 35.8 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/profiles/usage_quotas_spec.rb. Expected to take 33.2 seconds.
Profile > Usage Quota
is linked within the profile page
shared runners use
shared_runners_enabled: false, used: 300, quota: 500, usage_text: "300 / Not supported units Unlimited"
shows the correct quota status
shows the correct per-project metrics
# [RSpecRunTime] RSpec elapsed time: 21 minutes 16.99 seconds. Current RSS: ~1535M. Threads: 30. load average: 1.75 1.94 1.74 1/528 5162
shared_runners_enabled: true, used: 300, quota: nil, usage_text: "300 / Unlimited units Unlimited"
shows the correct quota status
shows the correct per-project metrics
# [RSpecRunTime] RSpec elapsed time: 21 minutes 21.79 seconds. Current RSS: ~1544M. Threads: 30. load average: 1.69 1.92 1.73 1/528 5163
shared_runners_enabled: true, used: 300, quota: 500, usage_text: "300 / 500 units 60% used"
shows the correct quota status
shows the correct per-project metrics
# [RSpecRunTime] RSpec elapsed time: 21 minutes 26.64 seconds. Current RSS: ~1548M. Threads: 30. load average: 1.87 1.96 1.74 1/528 5164
shared_runners_enabled: true, used: 1000, quota: 500, usage_text: "1000 / 500 units 200% used"
shows the correct quota status
shows the correct per-project metrics
# [RSpecRunTime] RSpec elapsed time: 21 minutes 31.12 seconds. Current RSS: ~1551M. Threads: 30. load average: 2.12 2.01 1.76 1/528 5165
with pagination
on storage tab
behaves like correct pagination
paginates correctly to page 3 and back
# [RSpecRunTime] RSpec elapsed time: 21 minutes 35.62 seconds. Current RSS: ~1548M. Threads: 30. load average: 1.95 1.97 1.75 1/528 5167
on pipelines tab
behaves like correct pagination
paginates correctly to page 3 and back
# [RSpecRunTime] RSpec elapsed time: 21 minutes 40.25 seconds. Current RSS: ~1563M. Threads: 30. load average: 1.88 1.96 1.75 1/528 5169
# [RSpecRunTime] Finishing example group ee/spec/features/profiles/usage_quotas_spec.rb. It took 31.71 seconds. Expected to take 33.2 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/groups/ldap_group_links_spec.rb. Expected to take 26.57 seconds.
Edit group settings
LDAP sync method
when the LDAP group sync filter feature is available
adds new LDAP synchronization
shows the LDAP filter section
shows the LDAP group section
when custom roles are enabled
adds new LDAP group link with a custom role
# [RSpecRunTime] RSpec elapsed time: 21 minutes 56.01 seconds. Current RSS: ~1555M. Threads: 29. load average: 1.99 1.98 1.76 1/527 5176
when the LDAP group sync filter feature is not available
does not show the LDAP search method switcher
shows the LDAP group section
does not shows the LDAP filter section
# [RSpecRunTime] RSpec elapsed time: 22 minutes 2.02 seconds. Current RSS: ~1564M. Threads: 23. load average: 1.99 1.98 1.76 1/528 5180
# [RSpecRunTime] Finishing example group ee/spec/features/groups/ldap_group_links_spec.rb. It took 21.79 seconds. Expected to take 26.57 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/security/vulnerability_report_spec.rb. Expected to take 24.34 seconds.
User sees Vulnerability report
shows the Vulnerability report
shows the Vulnerability report with a filter
when dismissing a vulnerability
dismisses the vulnerability
# [RSpecRunTime] RSpec elapsed time: 22 minutes 25.43 seconds. Current RSS: ~1549M. Threads: 24. load average: 2.14 2.01 1.77 1/524 5275
# [RSpecRunTime] Finishing example group ee/spec/features/projects/security/vulnerability_report_spec.rb. It took 23.4 seconds. Expected to take 24.34 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_edits_multiple_assignees_mr_spec.rb. Expected to take 21.52 seconds.
Merge request > User edits MR with multiple assignees
behaves like multiple assignees widget merge request
updates a MR with multiple assignees
# [RSpecRunTime] RSpec elapsed time: 22 minutes 48.44 seconds. Current RSS: ~1552M. Threads: 25. load average: 1.81 1.94 1.76 1/530 5533
# [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_edits_multiple_assignees_mr_spec.rb. It took 23.0 seconds. Expected to take 21.52 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/settings/packages_spec.rb. Expected to take 18.86 seconds.
Project > Settings > Packages and registries > Dependency proxy for Packages
as owner
passes axe automated accessibility testing
shows available section
allows toggling dependency proxy & adding maven URL
allows filling complete form
shows an error when username is supplied without password
with existing settings
allows clearing username
# [RSpecRunTime] RSpec elapsed time: 23 minutes 7.66 seconds. Current RSS: ~1587M. Threads: 25. load average: 2.10 2.01 1.78 1/523 5543
# [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/packages_spec.rb. It took 19.21 seconds. Expected to take 18.86 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/insights_spec.rb. Expected to take 17.65 seconds.
Project Insights
behaves like Insights page
as a permitted user
with correct license
has correct title
navigation
by default loads the first page
displays correctly when navigating back to insights
hash fragment navigation
loads the correct page
# [RSpecRunTime] RSpec elapsed time: 23 minutes 22.75 seconds. Current RSS: ~1555M. Threads: 25. load average: 2.13 2.02 1.79 1/523 5550
without correct license
returns 404
# [RSpecRunTime] Finishing example group ee/spec/features/projects/insights_spec.rb. It took 15.38 seconds. Expected to take 17.65 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/security/user_creates_security_policy_spec.rb. Expected to take 16.77 seconds.
User creates security policy
behaves like policy editor
can create a policy when a policy project exists
# [RSpecRunTime] RSpec elapsed time: 23 minutes 38.08 seconds. Current RSS: ~1572M. Threads: 25. load average: 1.80 1.96 1.77 1/528 5810
# [RSpecRunTime] Finishing example group ee/spec/features/projects/security/user_creates_security_policy_spec.rb. It took 15.05 seconds. Expected to take 16.77 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/groups/saml_group_links_spec.rb. Expected to take 13.94 seconds.
SAML group links
when SAML group links is available
adds new SAML group link with a standard role
with existing records
lists active links
does not list links for other groups
# [RSpecRunTime] RSpec elapsed time: 23 minutes 45.43 seconds. Current RSS: ~1573M. Threads: 24. load average: 1.68 1.93 1.77 1/528 5814
when custom roles are enabled
adds new SAML group link with a custom role
# [RSpecRunTime] RSpec elapsed time: 23 minutes 49.58 seconds. Current RSS: ~1569M. Threads: 24. load average: 1.68 1.93 1.77 1/522 5818
# [RSpecRunTime] Finishing example group ee/spec/features/groups/saml_group_links_spec.rb. It took 11.51 seconds. Expected to take 13.94 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_sees_closing_issues_message_spec.rb. Expected to take 13.52 seconds.
Merge request > User sees closing issues message
approvals are enabled while closing issues
displays closing issue message exactly one time
# [RSpecRunTime] RSpec elapsed time: 24 minutes 2.09 seconds. Current RSS: ~1567M. Threads: 25. load average: 1.74 1.93 1.77 1/527 6050
# [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_sees_closing_issues_message_spec.rb. It took 12.51 seconds. Expected to take 13.52 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/settings/admin_sets_repository_size_limit_spec.rb. Expected to take 11.07 seconds.
Projects settings > Admin sets repository size limit
admin can set the repository size limit field when in admin mode
admin does not see the repository size limit field when not in admin mode
# [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/admin_sets_repository_size_limit_spec.rb. It took 8.57 seconds. Expected to take 11.07 seconds.
# [RSpecRunTime] RSpec elapsed time: 24 minutes 10.92 seconds. Current RSS: ~1561M. Threads: 25. load average: 1.78 1.93 1.77 1/528 6055
# [RSpecRunTime] Starting example group ee/spec/features/dashboards/activity_spec.rb. Expected to take 9.92 seconds.
Dashboard activity
behaves like dashboard ultimate trial callout
hides promotion callout if not .com
.com
shows dismissable promotion callout if default dashboard for an owner
hides dismissable promotion callout if default dashboard for a non group owner
hides dismissable promotion callout if not default dashboard
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
hides promotion callout if a trial is active
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
hides promotion callout if user owns a paid namespace
# [RSpecRunTime] RSpec elapsed time: 24 minutes 18.24 seconds. Current RSS: ~1576M. Threads: 24. load average: 1.72 1.92 1.77 1/522 6057
# [RSpecRunTime] Finishing example group ee/spec/features/dashboards/activity_spec.rb. It took 7.54 seconds. Expected to take 9.92 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/settings/analytics/user_configures_analytics_custom_dashboards_spec.rb. Expected to take 8.78 seconds.
Project > Settings > Analytics -> Custom dashboard projects
with correct license
allows to select a project for the Analytics Dashboards config
# [RSpecRunTime] RSpec elapsed time: 24 minutes 24.37 seconds. Current RSS: ~1558M. Threads: 24. load average: 1.74 1.92 1.77 1/522 6061
without correct license
does not show the custom dashboard projects config
# [RSpecRunTime] RSpec elapsed time: 24 minutes 26.44 seconds. Current RSS: ~1557M. Threads: 24. load average: 1.68 1.90 1.76 1/522 6063
# [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/analytics/user_configures_analytics_custom_dashboards_spec.rb. It took 8.15 seconds. Expected to take 8.78 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/groups/scim_token_spec.rb. Expected to take 8.39 seconds.
SCIM Token handling
when group has no existing SCIM token
displays generate token form
# [RSpecRunTime] RSpec elapsed time: 24 minutes 29.69 seconds. Current RSS: ~1557M. Threads: 24. load average: 1.68 1.90 1.76 1/522 6065
when group has existing SCIM token
displays the SCIM form with an obfuscated token
when `reset it` button is clicked
displays the SCIM form with an obfuscated token that can be copied or shown
# [RSpecRunTime] RSpec elapsed time: 24 minutes 34.81 seconds. Current RSS: ~1558M. Threads: 24. load average: 1.63 1.89 1.76 1/522 6068
# [RSpecRunTime] Finishing example group ee/spec/features/groups/scim_token_spec.rb. It took 8.38 seconds. Expected to take 8.39 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/groups/settings/merge_requests_settings_spec.rb. Expected to take 6.73 seconds.
Group settings > [EE] General
behaves like MR checks settings
when checkboxes are not locked
shows initial status
# [RSpecRunTime] RSpec elapsed time: 24 minutes 38.95 seconds. Current RSS: ~1551M. Threads: 24. load average: 1.74 1.91 1.77 1/522 6071
when checkboxes are locked
shows disabled status
# [RSpecRunTime] RSpec elapsed time: 24 minutes 41.08 seconds. Current RSS: ~1549M. Threads: 24. load average: 1.68 1.89 1.76 1/522 6073
# [RSpecRunTime] Finishing example group ee/spec/features/groups/settings/merge_requests_settings_spec.rb. It took 6.27 seconds. Expected to take 6.73 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/analytics/issues_analytics_controller_spec.rb. Expected to take 5.35 seconds.
Projects::Analytics::IssuesAnalyticsController
GET /:namespace/:project/-/analytics/issues
loads the chart
# [RSpecRunTime] RSpec elapsed time: 24 minutes 46.34 seconds. Current RSS: ~1555M. Threads: 24. load average: 1.62 1.87 1.76 1/523 6120
# [RSpecRunTime] Finishing example group ee/spec/features/projects/analytics/issues_analytics_controller_spec.rb. It took 5.26 seconds. Expected to take 5.35 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/iterations/iteration_cadences_list_spec.rb. Expected to take 4.45 seconds.
User views project iteration cadences
as authorized user
shows read-only iteration cadences
# [RSpecRunTime] RSpec elapsed time: 24 minutes 51.15 seconds. Current RSS: ~1557M. Threads: 24. load average: 1.73 1.89 1.77 1/523 6122
# [RSpecRunTime] Finishing example group ee/spec/features/projects/iterations/iteration_cadences_list_spec.rb. It took 4.81 seconds. Expected to take 4.45 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/pipelines/pipeline_csp_spec.rb. Expected to take 3.88 seconds.
Pipelines Content Security
when there is no global config
is expected to be blank
# [RSpecRunTime] RSpec elapsed time: 24 minutes 53.92 seconds. Current RSS: ~1559M. Threads: 24. load average: 1.73 1.89 1.77 1/524 6173
when a global CSP config exists
is expected to include "script-src 'self' https://some-cdn.test"
# [RSpecRunTime] RSpec elapsed time: 24 minutes 55.03 seconds. Current RSS: ~1565M. Threads: 24. load average: 1.67 1.88 1.76 1/523 6174
# [RSpecRunTime] Finishing example group ee/spec/features/projects/pipelines/pipeline_csp_spec.rb. It took 3.89 seconds. Expected to take 3.88 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/read_only_spec.rb. Expected to take 1.98 seconds.
Geo read-only message
when on a Geo secondary
behaves like Read-only instance
shows read-only banner
# [RSpecRunTime] RSpec elapsed time: 24 minutes 56.35 seconds. Current RSS: ~1568M. Threads: 24. load average: 1.67 1.88 1.76 1/523 6175
when in maintenance mode
behaves like Read-only instance
shows read-only banner
# [RSpecRunTime] Finishing example group ee/spec/features/read_only_spec.rb. It took 1.76 seconds. Expected to take 1.98 seconds.
auto_explain log contains 1144 entries for main, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-5-16.329.main.ndjson.gz
took 13.578282519
auto_explain log contains 1145 entries for ci, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-5-16.329.ci.ndjson.gz
took 9.383423577
[TEST PROF INFO] EventProf results for sql.active_record
Total time: 03:46.847 of 24:49.844 (15.23%)
Total events: 88191
Top 5 slowest suites (by time):
Identity Verification (./ee/spec/features/registrations/identity_verification_spec.rb:5) – 00:40.035 (20480 / 112) of 10:29.220 (6.36%)
Related issues (./ee/spec/features/issues/related_issues_spec.rb:5) – 00:33.563 (9926 / 10) of 01:52.478 (29.84%)
Projects > Me... Manage groups (./ee/spec/features/projects/members/manage_groups_spec.rb:5) – 00:24.911 (10874 / 20) of 02:36.291 (15.94%)
Project > Val...ream analytics (./ee/spec/features/projects/analytics/cycle_analytics_spec.rb:5) – 00:16.735 (6169 / 9) of 01:20.503 (20.79%)
Merge request...ia custom role (./ee/spec/features/merge_request/user_sees_approve_via_custom_role_spec.rb:5) – 00:14.536 (3859 / 4) of 00:40.369 (36.01%)
Knapsack report was generated. Preview:
"ee/spec/features/registrations/identity_verification_spec.rb": 629.2203016010008,
"ee/spec/features/projects/members/manage_groups_spec.rb": 156.29122709299918,
"ee/spec/features/issues/related_issues_spec.rb": 112.47800685999937,
"ee/spec/features/projects/analytics/cycle_analytics_spec.rb": 80.50306717800049,
"ee/spec/features/projects/environments/environments_spec.rb": 57.21195556099883,
"ee/spec/features/epics/epic_related_epics_spec.rb": 55.053622507999535,
"ee/spec/features/projects/settings/ee/protected_branches_spec.rb": 48.50460714900146,
"ee/spec/features/projects/push_rules_spec.rb": 48.63835254099831,
"ee/spec/features/merge_request/user_sees_approve_via_custom_role_spec.rb": 40.36864215599962,
"ee/spec/features/groups/analytics/ci_cd_analytics_spec.rb": 33.31396972699986,
"ee/spec/features/profiles/usage_quotas_spec.rb": 31.707594556000913,
"ee/spec/features/groups/ldap_group_links_spec.rb": 21.785765024000284,
"ee/spec/features/projects/security/vulnerability_report_spec.rb": 23.397577343001103,
"ee/spec/features/merge_request/user_edits_multiple_assignees_mr_spec.rb": 23.001729072999296,
"ee/spec/features/projects/settings/packages_spec.rb": 19.210521379000056,
"ee/spec/features/projects/insights_spec.rb": 15.381654050001089,
"ee/spec/features/projects/security/user_creates_security_policy_spec.rb": 15.046892723999918,
"ee/spec/features/groups/saml_group_links_spec.rb": 11.513111415000822,
"ee/spec/features/merge_request/user_sees_closing_issues_message_spec.rb": 12.513476015999913,
"ee/spec/features/projects/settings/admin_sets_repository_size_limit_spec.rb": 8.56593588800024,
"ee/spec/features/dashboards/activity_spec.rb": 7.534991671000171,
"ee/spec/features/projects/settings/analytics/user_configures_analytics_custom_dashboards_spec.rb": 8.146459709998453,
"ee/spec/features/groups/scim_token_spec.rb": 8.383652167000037,
"ee/spec/features/groups/settings/merge_requests_settings_spec.rb": 6.26747673600039,
"ee/spec/features/projects/analytics/issues_analytics_controller_spec.rb": 5.257902817000286,
"ee/spec/features/projects/iterations/iteration_cadences_list_spec.rb": 4.813319142000182,
"ee/spec/features/projects/pipelines/pipeline_csp_spec.rb": 3.8919861129998026,
"ee/spec/features/read_only_spec.rb": 1.7566120249994128
Knapsack global time execution for tests: 24m 49s
Failures:
1) Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches
Got 0 failures and 2 other errors:
Shared Example Group: "setting project protected branches" called from ./ee/spec/features/projects/settings/ee/protected_branches_spec.rb:25
1.1) Failure/Error: raise(error) if raise_error?
Gitlab::QueryLimiting::Transaction::ThresholdExceededError:
Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group73' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/
3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/
4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:71:in `organization_detail'*/
5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:446:in `block in root_saml_provider'*/
9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 204 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
10: SELECT "users".* FROM find_users_by_id(203) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 39 AND "project_authorizations"."user_id" = 204 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 39 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(240) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/
15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1095:in `owns_project_organization?'*/
16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/
17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
FROM (VALUES (39, ARRAY[240])) AS project_ids (project_id, namespace_ids),
LATERAL (
SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (members.source_type = 'Project' AND members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (members.source_type = 'Namespace' AND members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" LEFT OUTER JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id LEFT OUTER JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 204 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (
(members.access_level > group_group_links.group_access) OR
(members.access_level = group_group_links.group_access AND members.member_role_id IS NOT NULL)
) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
) AS custom_permissions
GROUP BY project_ids.project_id;
/*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/
21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 39 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 39 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 39 OR "security_orchestration_policy_configurations"."namespace_id" = 240) /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1406:in `security_orchestration_policies_for_scope'*/
33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 39 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 240 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 2 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 2 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 240 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve" FROM "project_settings" WHERE "project_settings"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/
39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 240 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:446:in `block in root_saml_provider'*/
40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/
42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 240 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
UNION
(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 240) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 204 GROUP BY "members"."user_id" /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/
44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group73/project-39' LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(39) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1122:in `access_allowed_to?'*/
58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 39 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3579:in `block (2 levels) in fetch_branch_allows_collaboration'*/
62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 240 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 39 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 39) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 240 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 39 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 240 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 204 LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 204 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 204 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
101: SELECT "users".* FROM find_users_by_id(204) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 204 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 204) /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 204 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 204 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-05 11:22:33.050081') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-05 11:22:33.053679') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J70YQXAMXGTVVZHEPEBY8FKH,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
# ./lib/gitlab/query_limiting/transaction.rb:65:in `act_upon_results'
# ./lib/gitlab/query_limiting/middleware.rb:21:in `call'
# ./lib/gitlab/database/load_balancing/rack_middleware.rb:23:in `call'
# ./lib/gitlab/middleware/go.rb:22:in `call'
# ./lib/gitlab/etag_caching/middleware.rb:21:in `call'
# ./lib/gitlab/middleware/query_analyzer.rb:11:in `block in call'
# ./lib/gitlab/database/query_analyzer.rb:40:in `within'
# ./lib/gitlab/middleware/query_analyzer.rb:11:in `call'
# ./lib/gitlab/middleware/multipart.rb:173:in `call'
# ./lib/gitlab/middleware/read_only/controller.rb:50:in `call'
# ./lib/gitlab/middleware/read_only.rb:18:in `call'
# ./lib/gitlab/middleware/unauthenticated_session_expiry.rb:18:in `call'
# ./lib/gitlab/middleware/strip_cookies.rb:29:in `call'
# ./lib/gitlab/middleware/same_site_cookies.rb:27:in `call'
# ./lib/gitlab/middleware/path_traversal_check.rb:37:in `call'
# ./lib/gitlab/middleware/handle_malformed_strings.rb:21:in `call'
# ./lib/gitlab/middleware/basic_health_check.rb:25:in `call'
# ./lib/gitlab/middleware/handle_ip_spoof_attack_error.rb:25:in `call'
# ./lib/gitlab/middleware/request_context.rb:15:in `call'
# ./lib/gitlab/middleware/webhook_recursion_detection.rb:15:in `call'
# ./config/initializers/fix_local_cache_middleware.rb:11:in `call'
# ./lib/gitlab/middleware/compressed_json.rb:44:in `call'
# ./lib/gitlab/middleware/static.rb:11:in `call'
# ./lib/gitlab/testing/clear_process_memory_cache_middleware.rb:13:in `call'
# ./lib/gitlab/testing/request_inspector_middleware.rb:35:in `call'
# ./lib/gitlab/testing/robots_blocker_middleware.rb:30:in `call'
# ./lib/gitlab/testing/request_blocker_middleware.rb:47:in `call'
# ./lib/gitlab/middleware/rack_multipart_tempfile_factory.rb:19:in `call'
# ./lib/gitlab/middleware/sidekiq_web_static.rb:20:in `call'
# ./lib/gitlab/metrics/requests_rack_middleware.rb:79:in `call'
# ------------------
# --- Caused by: ---
# Selenium::WebDriver::Error::WebDriverError:
# #0 0x556561cc6863 <unknown>
#1 0x5565619bc8c6 <unknown>
#2 0x5565619cc921 <unknown>
#3 0x5565619cd20a <unknown>
#4 0x5565619c2801 <unknown>
#5 0x5565619c0bd1 <unknown>
#6 0x5565619c3bce <unknown>
#7 0x5565619c3c5c <unknown>
#8 0x556561a01ae2 <unknown>
#9 0x556561a295a2 <unknown>
#10 0x5565619fbe98 <unknown>
#11 0x556561a2976e <unknown>
#12 0x556561a47c19 <unknown>
#13 0x556561a29343 <unknown>
#14 0x5565619fa593 <unknown>
#15 0x5565619faf5e <unknown>
#16 0x556561c8a84b <unknown>
#17 0x556561c8e7a5 <unknown>
#18 0x556561c78571 <unknown>
#19 0x556561c8f332 <unknown>
#20 0x556561c5d87f <unknown>
#21 0x556561cb5728 <unknown>
#22 0x556561cb58fb <unknown>
#23 0x556561cc59b4 <unknown>
#24 0x7887adac3134 <unknown>
1.2) Failure/Error: raise BrowserConsoleError, message
BrowserConsoleHelpers::BrowserConsoleError:
Unexpected browser console output:
webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:"
webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
http://127.0.0.1:44761/group73/project-39/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error)
# ./spec/support/helpers/browser_console_helpers.rb:79:in `raise_if_unexpected_browser_console_output'
# ./spec/support/capybara.rb:200:in `block (2 levels) in <top (required)>'
# ./spec/spec_helper.rb:471:in `block (3 levels) in <top (required)>'
# ./lib/gitlab/sidekiq_sharding/validator.rb:42:in `enabled'
# ./spec/spec_helper.rb:470:in `block (2 levels) in <top (required)>'
# ./spec/spec_helper.rb:465:in `block (3 levels) in <top (required)>'
# ./spec/support/sidekiq_middleware.rb:9:in `with_sidekiq_server_middleware'
# ./spec/spec_helper.rb:456:in `block (2 levels) in <top (required)>'
# ./spec/spec_helper.rb:452:in `block (3 levels) in <top (required)>'
# ./lib/gitlab/application_context.rb:92:in `with_raw_context'
# ./spec/spec_helper.rb:452:in `block (2 levels) in <top (required)>'
# ./spec/spec_helper.rb:268:in `block (2 levels) in <top (required)>'
# ./spec/support/system_exit_detected.rb:7:in `block (2 levels) in <top (required)>'
# ./spec/support/fast_quarantine.rb:22:in `block (2 levels) in <top (required)>'
# ./spec/support/database/prevent_cross_joins.rb:106:in `block (3 levels) in <top (required)>'
# ./spec/support/database/prevent_cross_joins.rb:60:in `with_cross_joins_prevented'
# ./spec/support/database/prevent_cross_joins.rb:106:in `block (2 levels) in <top (required)>'
# ./spec/support/capybara.rb:175:in `block (3 levels) in <top (required)>'
# ./config/initializers/forbid_sidekiq_in_transactions.rb:10:in `skipping_transaction_check'
# ./spec/support/capybara.rb:175:in `block (2 levels) in <top (required)>'
Finished in 25 minutes 20 seconds (files took 2 minutes 27.7 seconds to load)
257 examples, 1 failure
Failed examples:
rspec './ee/spec/features/projects/settings/ee/protected_branches_spec.rb[1:1:1:1:1]' # Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches
Randomized with seed 24594
Stopped processing SimpleCov as a previous error not related to SimpleCov has been detected
Failed to write to log, write log/workhorse-test.log: file already closed
RSpec exited with 1.
[job-metrics] Updating job metrics tag for the CI/CD job.
RSPEC_RETRIED_TESTS_REPORT_PATH: rspec/retried_tests-7752792418.txt
Retrying the failing examples in a new RSpec process...
$ gem install junit_merge --no-document --version 0.1.2
Successfully installed nokogiri-1.16.7-x86_64-linux
Successfully installed junit_merge-0.1.2
2 gems installed
==> 'gem install junit_merge --no-document --version 0.1.2' succeeded in 2 seconds.
Running RSpec command: bin/rspec -Ispec -rspec_helper --color --failure-exit-code 1 --error-exit-code 2 --format documentation --format Support::Formatters::JsonFormatter --out rspec/rspec-retry-7752792418.json --format RspecJunitFormatter --out rspec/rspec-retry-7752792418.xml --only-failures --pattern "{ee/}spec/{features}{,/**/}*_spec.rb"
warning: parser/current is loading parser/ruby31, which recognizes 3.1.6-compliant syntax, but you are running 3.1.5.
Please see https://github.com/whitequark/parser#compatibility-with-ruby-mri.
Run options: include {:last_run_status=>"failed"}
# [RSpecRunTime] Starting RSpec timer...
[TEST PROF INFO] EventProf enabled (sql.active_record)
unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String.
unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String.
Test environment set up in 0.885406892 seconds
# [RSpecRunTime] Starting example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. Expected to take 54.93 seconds.
Projects > Settings > Repository settings using custom role
Starting the Capybara driver server...
when user is a guest with custom roles that enables handling protected branches
behaves like setting project protected branches
explicit protected branches
Capybara starting Puma...
* Version 6.4.0, codename: The Eagle of Durango
* Min threads: 0, max threads: 4
* Listening on unix:///tmp/20240905-6192-mkdcr5
allows creating explicit protected branches
# [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. It took 24.14 seconds. Expected to take 54.93 seconds.
auto_explain log contains 1147 entries for main, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-5-16.6192.main.ndjson.gz
took 10.1535596
auto_explain log contains 1147 entries for ci, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-5-16.6192.ci.ndjson.gz
took 10.668100219
[TEST PROF INFO] EventProf results for sql.active_record
Total time: 00:02.784 of 00:24.143 (11.53%)
Total events: 947
Top 5 slowest suites (by time):
Projects > Se...ng custom role (./ee/spec/features/projects/settings/ee/protected_branches_spec.rb:5) – 00:02.784 (947 / 1) of 00:24.143 (11.53%)
Finished in 53.99 seconds (files took 1 minute 29.06 seconds to load)
1 example, 0 failures
Randomized with seed 55385
Failed to write to log, write log/workhorse-test.log: file already closed
Loading rspec/rspec-7752792418.json...
Merged rspec/rspec-retry-7752792418.json adding 5 results.
Saved rspec/rspec-7752792418.json.
A test was flaky and succeeded after being retried. Checking to see if flaky test is part of this MR...
Flaky test was not part of this MR.
Running after_script
Running after script...
$ source scripts/utils.sh
$ log_disk_usage after_script
[log_disk_usage after_script] start
df -h
Filesystem Size Used Avail Use% Mounted on
overlay 95G 25G 70G 27% /
tmpfs 64M 0 64M 0% /dev
shm 64M 0 64M 0% /dev/shm
/dev/sda1 95G 25G 70G 27% /cache
tmpfs 3.9G 0 3.9G 0% /sys/devices/virtual/dmi/id
du -h -d 1
7.3M ./workhorse
148K ./bin
1.2M ./.gitlab
164M ./.git
4.0K ./builds
16M ./coverage
27M ./lib
8.0K ./.vscode
516K ./storybook
25M ./log
1.8M ./data
9.9M ./qa
2.9M ./.rubocop_todo
1.1G ./vendor
919M ./public
58M ./doc
480K ./danger
260K ./rspec
8.0K ./.bundle
536K ./tooling
138M ./ee
1.3M ./knapsack
296K ./patches
4.3M ./changelogs
20K ./haml_lint
28K ./metrics_server
88K ./keeps
48K ./shared
44K ./generator_templates
1.3M ./scripts
1.4G ./tmp
125M ./spec
20K ./file_hooks
16K ./sidekiq_cluster
16M ./gems
1.2M ./fixtures
948K ./rubocop
4.0K ./.go
29M ./db
624K ./auto_explain
12K ./.github
118M ./locale
1.9M ./glfm_specification
17M ./config
80M ./app
16K ./.lefthook
4.1G .
[log_disk_usage after_script] end
$ bundle exec gem list gitlab_quality-test_tooling
gitlab_quality-test_tooling (1.37.0)
$ $ section_start "failed-test-issues" "Report test failures" # collapsed multi-line command
Report test failures
$ $ section_start "flaky-test-issues" "Report test flakiness" # collapsed multi-line command
Report test flakiness
$ $ section_start "slow-test-issues" "Report test slowness" # collapsed multi-line command
Report test slowness
$ $ section_start "slow-test-merge-request-report-note" "Report test slowness in MR note" # collapsed multi-line command
Report test slowness in MR note
$ $ section_start "knapsack-report-issues" "Report test files close to timing out" # collapsed multi-line command
Report test files close to timing out
$ tooling/bin/push_job_metrics || true
[job-metrics] Pushing job metrics file for the CI/CD job.
[job-metrics] Pushed 4 CI job metric entries to InfluxDB.
Saving cache for successful job
Not uploading cache ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-18 due to policy
Uploading artifacts for successful job
Uploading artifacts...
auto_explain/: found 5 matching artifact files and directories
coverage/: found 4 matching artifact files and directories
WARNING: crystalball/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab)
WARNING: deprecations/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab)
knapsack/: found 4 matching artifact files and directories
rspec/: found 15 matching artifact files and directories
tmp/capybara/: found 3 matching artifact files and directories
log/*.log: found 17 matching artifact files and directories
WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/7752792418/artifacts?artifact_format=zip&artifact_type=archive&expire_in=31d new-url=https://gitlab.com
WARNING: Retrying... context=artifacts-uploader error=request redirected
Uploading artifacts as "archive" to coordinator... 201 Created id=7752792418 responseStatus=201 Created token=glcbt-66
Uploading artifacts...
rspec/rspec-*.xml: found 2 matching artifact files and directories
WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/7752792418/artifacts?artifact_format=gzip&artifact_type=junit&expire_in=31d new-url=https://gitlab.com
WARNING: Retrying... context=artifacts-uploader error=request redirected
Uploading artifacts as "junit" to coordinator... 201 Created id=7752792418 responseStatus=201 Created token=glcbt-66
Cleaning up project directory and file based variables
Job succeeded