[0KRunning with gitlab-runner 17.4.0~pre.110.g27400594 (27400594)[0;m [0K on blue-4.private.runners-manager.gitlab.com/gitlab.com/gitlab-org tDjA3Sp3, system ID: s_96a8ae3d1050[0;m [0K feature flags: FF_NETWORK_PER_BUILD:true[0;m [0K[36;1mResolving secrets[0;m[0;m section_start:1725759774:prepare_executor [0K[0K[36;1mPreparing the "docker+machine" executor[0;m[0;m [0KUsing Docker executor with image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 ...[0;m [0KStarting service registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1...[0;m [0KAuthenticating with credentials from job payload (GitLab Registry)[0;m [0KPulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1 ...[0;m [0KUsing docker image sha256:82f132c22567f8ce17cc132c14b2f9aa3eaf9bb5424d91c2d966912433f0257d for registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:c55e1364ee4327b244a9cfa1750f19feea14fc774eaf792b725967d146eb45f5 ...[0;m [0;33mWARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 is already created. Ignoring.[0;m [0;33mWARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 is already created. Ignoring.[0;m [0KStarting service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12...[0;m [0KAuthenticating with credentials from job payload (GitLab Registry)[0;m [0KPulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 ...[0;m [0KUsing docker image sha256:5c5ba5b83d6c60cb0b225bd670b7a43be8c238cc72347d24af57e5027c3648f3 for registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:46aceab84c42d0e819c8e7940f2f98ce9e184785cd7b22d95872024a35f52407 ...[0;m [0KStarting service redis:6.2-alpine...[0;m [0KPulling docker image redis:6.2-alpine ...[0;m [0KUsing docker image sha256:7de0dedd123b8cb2b105ace4e8d00b8bba5ad7be39617dfa229acff315fe4fbf for redis:6.2-alpine with digest redis@sha256:fd1b5400ca24adc2ff77abdf00acb72c3aae85b94e43557ab2606d29a74bfa01 ...[0;m [0;33mWARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 is already created. Ignoring.[0;m [0;33mWARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 is already created. Ignoring.[0;m [0KStarting service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8...[0;m [0KAuthenticating with credentials from job payload (GitLab Registry)[0;m [0KPulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 ...[0;m [0KUsing docker image sha256:df819140e3df737cdc7b8d6fb73ce804b05058c790e025b5f52840956feb1734 for registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:7bdf349fc3dd9da64bc6581d44c0e906bffd38977ddbd2668ba34adb5dedfe38 ...[0;m [0KStarting service opensearchproject/opensearch:1.3.18...[0;m [0KPulling docker image opensearchproject/opensearch:1.3.18 ...[0;m [0KUsing docker image sha256:bd106c378e301285e941e1b142de217e4071ed2723e1e975a851aae2476ec9ad for opensearchproject/opensearch:1.3.18 with digest opensearchproject/opensearch@sha256:1855346450f5f9311daf911c17239899ccecd7c5699adb1178f919d2f054124b ...[0;m [0KWaiting for services to be up and running (timeout 30 seconds)...[0;m [0KAuthenticating with credentials from job payload (GitLab Registry)[0;m [0KPulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 ...[0;m [0KUsing docker image sha256:533b69d21cbef3edef3b4fa4c5106d4fe43a2d2e80f65333682de7f2d5ac1800 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14@sha256:b25c1b0aa2724a8dc6571d9ee6edbadc50e2d4eab75d2ce2c3f35f9e2f74acfe ...[0;m section_end:1725759815:prepare_executor [0Ksection_start:1725759815:prepare_script [0K[0K[36;1mPreparing environment[0;m[0;m Running on runner-tdja3sp3-project-278964-concurrent-0 via runner-tdja3sp3-private-1725756230-eef95fac... section_end:1725759815:prepare_script [0Ksection_start:1725759815:get_sources [0K[0K[36;1mGetting source from Git repository[0;m[0;m [32;1mSkipping Git repository setup[0;m [32;1mSkipping Git checkout[0;m [32;1mSkipping Git submodules setup[0;m section_end:1725759816:get_sources [0Ksection_start:1725759816:restore_cache [0K[0K[36;1mRestoring cache[0;m[0;m [32;1mChecking cache for ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-19...[0;m Downloading cache from https://storage.googleapis.com/gitlab-com-runners-cache/project/278964/ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-19[0;m ETag[0;m="a7b8c4fa0f172b30988f792d6cdc3afc" [32;1mSuccessfully extracted cache[0;m section_end:1725759833:restore_cache [0Ksection_start:1725759833:download_artifacts [0K[0K[36;1mDownloading artifacts[0;m[0;m [32;1mDownloading artifacts for clone-gitlab-repo (7770642434)...[0;m Downloading artifacts from coordinator... ok [0;m host[0;m=storage.googleapis.com id[0;m=7770642434 responseStatus[0;m=200 OK token[0;m=glcbt-66 [0;33mWARNING: Part of .git directory is on the list of files to extract[0;m [0;33mWARNING: This may introduce unexpected problems [0;m [32;1mDownloading artifacts for compile-test-assets (7770642494)...[0;m Downloading artifacts from coordinator... ok [0;m host[0;m=storage.googleapis.com id[0;m=7770642494 responseStatus[0;m=200 OK token[0;m=glcbt-66 [32;1mDownloading artifacts for retrieve-tests-metadata (7770642537)...[0;m Downloading artifacts from coordinator... ok [0;m host[0;m=storage.googleapis.com id[0;m=7770642537 responseStatus[0;m=200 OK token[0;m=glcbt-66 [32;1mDownloading artifacts for setup-test-env (7770642504)...[0;m Downloading artifacts from coordinator... ok [0;m host[0;m=storage.googleapis.com id[0;m=7770642504 responseStatus[0;m=200 OK token[0;m=glcbt-66 section_end:1725759874:download_artifacts [0Ksection_start:1725759874:step_script [0K[0K[36;1mExecuting "step_script" stage of the job script[0;m[0;m [0KUsing docker image sha256:533b69d21cbef3edef3b4fa4c5106d4fe43a2d2e80f65333682de7f2d5ac1800 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14@sha256:b25c1b0aa2724a8dc6571d9ee6edbadc50e2d4eab75d2ce2c3f35f9e2f74acfe ...[0;m [32;1m$ echo $FOSS_ONLY[0;m [32;1m$ [ "$FOSS_ONLY" = "1" ] && rm -rf ee/ qa/spec/ee/ qa/qa/specs/features/ee/ qa/qa/ee/ qa/qa/ee.rb[0;m [32;1m$ export GOPATH=$CI_PROJECT_DIR/.go[0;m [32;1m$ mkdir -p $GOPATH[0;m [32;1m$ source scripts/utils.sh[0;m [32;1m$ log_disk_usage before_script[0;m [log_disk_usage before_script] start df -h Filesystem Size Used Avail Use% Mounted on overlay 95G 25G 70G 26% / tmpfs 64M 0 64M 0% /dev shm 64M 0 64M 0% /dev/shm /dev/sda1 95G 25G 70G 26% /cache tmpfs 3.9G 0 3.9G 0% /sys/devices/virtual/dmi/id du -h -d 1 7.3M ./workhorse 148K ./bin 1.2M ./.gitlab 168M ./.git 4.0K ./builds 27M ./lib 8.0K ./.vscode 516K ./storybook 20K ./log 1.8M ./data 9.9M ./qa 2.9M ./.rubocop_todo 1.1G ./vendor 934M ./public 59M ./doc 480K ./danger 104K ./rspec 536K ./tooling 139M ./ee 1.3M ./knapsack 296K ./patches 4.3M ./changelogs 20K ./haml_lint 28K ./metrics_server 88K ./keeps 48K ./shared 44K ./generator_templates 1.2M ./scripts 651M ./tmp 125M ./spec 20K ./file_hooks 16K ./sidekiq_cluster 16M ./gems 1.2M ./fixtures 948K ./rubocop 4.0K ./.go 29M ./db 12K ./.github 125M ./locale 1.9M ./glfm_specification 16M ./config 80M ./app 16K ./.lefthook 3.4G . [log_disk_usage before_script] end [32;1m$ source scripts/prepare_build.sh[0;m section_start:1725759878:bundle-install[collapsed=true] [0KInstalling gems 3.3.27 Bundler version 2.3.27 production:development Settings are listed in order of priority. The top value will be used. clean Set for your local app (/builds/gitlab-org/gitlab/.bundle/config): true frozen Set via BUNDLE_FROZEN: true gemfile Set via BUNDLE_GEMFILE: "/builds/gitlab-org/gitlab/Gemfile" install_flags Set via BUNDLE_INSTALL_FLAGS: "--jobs=$(nproc) --retry=3" path Set for your local app (/builds/gitlab-org/gitlab/.bundle/config): "/builds/gitlab-org/gitlab/vendor" without Set via BUNDLE_WITHOUT: [:production, :development] [0;32m$ bundle install --jobs=$(nproc) --retry=3 [0mDon't run Bundler as root. Installing your bundle as root will break this application for all non-root users on this machine. Patching bundler with bundler-checksum... Bundle complete! 363 Gemfile dependencies, 678 gems now installed. Gems in the groups 'production' and 'development' were not installed. Bundled gems are installed into `./vendor` 3 installed gems you directly depend on are looking for funding. Run `bundle fund` for details [0;32m==> 'bundle install --jobs=$(nproc) --retry=3 ' succeeded in 3 seconds. [0m[0;32m$ bundle pristine pg [0mPatching bundler with bundler-checksum... Installing pg 1.5.6 with native extensions [0;32m==> 'bundle pristine pg' succeeded in 20 seconds. [0msection_end:1725759906:bundle-install [0K Using decomposed database config (config/database.yml.decomposed-postgresql) [0;33mGeo DB will be set up. [0m[0;33mEmbedding DB will be set up. [0msection_start:1725759906:setup-db[collapsed=true] [0KSetting up DBs CREATE ROLE GRANT [0;32m$ bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes [0mDropped database 'gitlabhq_test' Dropped database 'gitlabhq_test_ci' Dropped database 'gitlabhq_geo_test' Dropped database 'gitlabhq_embedding_test' Created database 'gitlabhq_test' Created database 'gitlabhq_test_ci' Created database 'gitlabhq_geo_test' Created database 'gitlabhq_embedding_test' [0;32m==> 'bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes' succeeded in 113 seconds. [0mSELECT pg_catalog.set_config('search_path', '', false); CREATE DATABASE praefect_test ENCODING 'UTF8'; section_end:1725760020:setup-db [0K [32;1m$ source ./scripts/rspec_helpers.sh[0;m [32;1m$ run_timed_command "gem install knapsack --no-document"[0;m [0;32m$ gem install knapsack --no-document [0mSuccessfully installed knapsack-4.0.0 1 gem installed [0;32m==> 'gem install knapsack --no-document' succeeded in 3 seconds. [0m[32;1m$ section_start "gitaly-test-spawn" "Spawning Gitaly"; scripts/gitaly-test-spawn; section_end "gitaly-test-spawn"[0;m section_start:1725760023:gitaly-test-spawn[collapsed=true] [0KSpawning Gitaly Trying to connect to gitaly: ....... OK Trying to connect to gitaly2: ........ OK Starting Praefect with in-memory election strategyTrying to connect to praefect: ....... OK section_end:1725760029:gitaly-test-spawn [0K [32;1m$ export RSPEC_SKIPPED_TESTS_REPORT_PATH="rspec/skipped_tests-${CI_JOB_ID}.txt"[0;m [32;1m$ export RSPEC_RETRIED_TESTS_REPORT_PATH="rspec/retried_tests-${CI_JOB_ID}.txt"[0;m [32;1m$ tooling/bin/create_job_metrics_file || true[0;m [job-metrics] Creating the job metrics file for the CI/CD job. [32;1m$ rspec_section rspec_parallelized_job "--fail-fast=${RSPEC_FAIL_FAST_THRESHOLD} --tag ~quarantine --tag ~level:background_migration --tag ~click_house"[0;m section_start:1725760032:rspec[collapsed=false] [0KRSpec [01:47:12] Starting rspec_parallelized_job [0;33mRETRY_FAILED_TESTS_IN_NEW_PROCESS: true [0m[0;33mKNAPSACK_GENERATE_REPORT: true [0m[0;33mFLAKY_RSPEC_GENERATE_REPORT: true [0m[0;33mKNAPSACK_TEST_FILE_PATTERN: {ee/}spec/{features}{,/**/}*_spec.rb [0m[0;33mKNAPSACK_LOG_LEVEL: debug [0m[0;33mKNAPSACK_REPORT_PATH: knapsack/rspec-ee_system_pg14_opensearch1_11_16_278964_report.json [0m[0;33mFLAKY_RSPEC_SUITE_REPORT_PATH: rspec/flaky/report-suite.json [0m[0;33mFLAKY_RSPEC_REPORT_PATH: rspec/flaky/all_rspec-ee_system_pg14_opensearch1_11_16_278964_report.json [0m[0;33mNEW_FLAKY_RSPEC_REPORT_PATH: rspec/flaky/new_rspec-ee_system_pg14_opensearch1_11_16_278964_report.json [0m[0;33mRSPEC_SKIPPED_TESTS_REPORT_PATH: rspec/skipped_tests-7770644366.txt [0m[0;33mCRYSTALBALL: true [0m[0;33mRSPEC_TESTS_MAPPING_ENABLED: [0m[0;33mRSPEC_TESTS_FILTER_FILE: [0m[0;33mShell set options (set -o) enabled: [0m[0;33mbraceexpand on hashall on interactive-comments on pipefail on [0mKnapsack report generator started! warning: parser/current is loading parser/ruby31, which recognizes 3.1.6-compliant syntax, but you are running 3.1.5. Please see https://github.com/whitequark/parser#compatibility-with-ruby-mri. RSpec's reporter has already been initialized with #<IO:<STDERR>> as the deprecation stream, so your change to `deprecation_stream` will be ignored. You should configure it earlier for it to take effect, or use the `--deprecation-out` CLI option. (Called from /builds/gitlab-org/gitlab/spec/support/rspec.rb:59:in `block in <top (required)>') Run options: exclude {:quarantine=>true, :level=>"background_migration", :click_house=>true} # [RSpecRunTime] Starting RSpec timer... [TEST PROF INFO] EventProf enabled (sql.active_record) unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String. unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String. Test environment set up in 3.656391662 seconds # [RSpecRunTime] Starting example group ee/spec/features/projects/analytics/dashboards_spec.rb. Expected to take 5 minutes 46.0 seconds. Analytics Dashboard - Product Analytics Starting the Capybara driver server... behaves like product analytics dashboards with the required application settings when default enabled with the licensed feature disabled behaves like does not render the product analytics list item Capybara starting Puma... * Version 6.4.0, codename: The Eagle of Durango * Min threads: 0, max threads: 4 * Listening on unix:///tmp/20240908-336-55dih0 is expected not to have text "Product Analytics" with the licensed feature enabled with reporter permissions behaves like does not render the product analytics list item is expected not to have text "Product Analytics" # [RSpecRunTime] RSpec elapsed time: 44.71 seconds. Current RSS: ~1447M. Threads: 12. load average: 1.31 1.54 1.62 1/449 578 . with developer permissions renders the onboarding list item does not allow onboarding # [RSpecRunTime] RSpec elapsed time: 58.17 seconds. Current RSS: ~1507M. Threads: 15. load average: 1.24 1.51 1.61 1/463 630 . with the correct user permissions renders the onboarding list item when setting up a new instance renders the provider selection view and selecting a self-managed provider renders the creating instance loading screen and then the instrumentation setup page # [RSpecRunTime] RSpec elapsed time: 1 minute 11.12 seconds. Current RSS: ~1660M. Threads: 15. load average: 1.21 1.49 1.60 1/463 665 . when the instance is loading renders the loading view # [RSpecRunTime] RSpec elapsed time: 1 minute 14.49 seconds. Current RSS: ~1670M. Threads: 15. load average: 1.19 1.48 1.60 1/464 677 . when waiting for events when the cube API returns an unhandled error renders the error alert # [RSpecRunTime] RSpec elapsed time: 1 minute 17.53 seconds. Current RSS: ~1674M. Threads: 15. load average: 1.33 1.51 1.61 1/465 689 . when the clickhouse database does not exist behaves like renders the setup view is expected to have text "Waiting for events" # [RSpecRunTime] RSpec elapsed time: 1 minute 20.89 seconds. Current RSS: ~1705M. Threads: 15. load average: 1.33 1.51 1.61 1/464 700 . when the cube API returns zero data behaves like renders the setup view is expected to have text "Waiting for events" # [RSpecRunTime] RSpec elapsed time: 1 minute 24.53 seconds. Current RSS: ~1710M. Threads: 15. load average: 1.31 1.50 1.60 1/465 712 . when the cube API returns data behaves like renders the product analytics dashboards is expected to have text "Understand your audience" # [RSpecRunTime] RSpec elapsed time: 1 minute 28.34 seconds. Current RSS: ~1703M. Threads: 15. load average: 1.36 1.51 1.60 1/467 808 . when the cube API returns data while onboarding renders the dashboard view after polling # [RSpecRunTime] RSpec elapsed time: 1 minute 34.93 seconds. Current RSS: ~1690M. Threads: 15. load average: 1.33 1.50 1.60 1/466 910 . with the setup completed behaves like renders the product analytics dashboards is expected to have text "Understand your audience" # [RSpecRunTime] RSpec elapsed time: 1 minute 38.27 seconds. Current RSS: ~1669M. Threads: 15. load average: 1.31 1.49 1.60 1/467 1006 . when on a dashboards page has the dashboards page breadcrumb # [RSpecRunTime] RSpec elapsed time: 1 minute 42.53 seconds. Current RSS: ~1674M. Threads: 15. load average: 1.28 1.48 1.59 1/467 1102 . and a custom dashboard pointer is set behaves like renders the new dashboard button is expected to have text "New dashboard" # [RSpecRunTime] RSpec elapsed time: 1 minute 46.31 seconds. Current RSS: ~1662M. Threads: 15. load average: 1.26 1.47 1.59 1/468 1109 . and the default custom dashboard location is used user can clone existing dashboard behaves like renders the new dashboard button is expected to have text "New dashboard" # [RSpecRunTime] RSpec elapsed time: 1 minute 55.71 seconds. Current RSS: ~1648M. Threads: 15. load average: 1.24 1.47 1.59 1/467 1542 . # [RSpecRunTime] Finishing example group ee/spec/features/projects/analytics/dashboards_spec.rb. It took 1 minute 48.08 seconds. Expected to take 5 minutes 46.0 seconds. # [RSpecRunTime] Starting example group ee/spec/features/projects/analytics/dashboards_spec.rb. Expected to take 5 minutes 46.0 seconds. Analytics Dashboard - Value Streams Dashboard renders a 404 error for a user without permission with a valid user with combined_project_analytics_dashboards and project_level_analytics_dashboard license for dashboard listing renders the dashboard list correctly behaves like has value streams dashboard link renders the value streams dashboard link # [RSpecRunTime] RSpec elapsed time: 2 minutes 3.55 seconds. Current RSS: ~1689M. Threads: 15. load average: 1.20 1.45 1.58 4/469 1634 . for Value streams dashboard with default configuration does not render dora performers score panel behaves like VSD renders as an analytics dashboard renders as an analytics dashboard does not render the group dashboard listing # [RSpecRunTime] RSpec elapsed time: 2 minutes 36.97 seconds. Current RSS: ~1587M. Threads: 15. load average: 1.57 1.53 1.60 2/468 1754 . behaves like renders link to the feedback survey renders feedback survey # [RSpecRunTime] RSpec elapsed time: 2 minutes 48.19 seconds. Current RSS: ~1594M. Threads: 15. load average: 1.48 1.51 1.60 1/468 1795 . behaves like does not render contributor count does not render the contributor count metric # [RSpecRunTime] RSpec elapsed time: 2 minutes 59.49 seconds. Current RSS: ~1583M. Threads: 15. load average: 1.56 1.52 1.60 1/468 1835 . behaves like renders usage overview background aggregation not enabled alert renders background aggregation not enabled alert # [RSpecRunTime] RSpec elapsed time: 3 minutes 10.92 seconds. Current RSS: ~1574M. Threads: 15. load average: 1.69 1.56 1.61 1/468 1876 . with usage overview background aggregation enabled behaves like does not render usage overview background aggregation not enabled alert does not render background aggregation not enabled alert # [RSpecRunTime] RSpec elapsed time: 3 minutes 22.19 seconds. Current RSS: ~1588M. Threads: 15. load average: 1.76 1.58 1.62 2/472 1920 . for comparison table behaves like renders metrics comparison table renders the metrics comparison visualization renders the available metrics # [RSpecRunTime] RSpec elapsed time: 5 minutes 2.21 seconds. Current RSS: ~1611M. Threads: 15. load average: 1.62 1.57 1.61 1/467 6491 . for usage overview panel when background aggregation is disabled with data behaves like renders usage overview metrics renders the metrics panel renders each of the available metrics with the correct values # [RSpecRunTime] RSpec elapsed time: 5 minutes 25.08 seconds. Current RSS: ~1618M. Threads: 15. load average: 2.26 1.71 1.66 1/470 6573 . without data behaves like renders usage overview metrics with empty values behaves like renders usage overview metrics renders the metrics panel renders each of the available metrics with the correct values # [RSpecRunTime] RSpec elapsed time: 5 minutes 47.99 seconds. Current RSS: ~1625M. Threads: 15. load average: 2.14 1.72 1.66 1/470 6654 . when background aggregation is enabled with data behaves like renders usage overview metrics renders the metrics panel renders each of the available metrics with the correct values # [RSpecRunTime] RSpec elapsed time: 6 minutes 11.27 seconds. Current RSS: ~1623M. Threads: 15. load average: 2.08 1.74 1.67 1/472 6735 . without data behaves like renders usage overview metrics with zero values behaves like renders usage overview metrics renders the metrics panel renders each of the available metrics with the correct values # [RSpecRunTime] RSpec elapsed time: 6 minutes 36.51 seconds. Current RSS: ~1631M. Threads: 15. load average: 1.85 1.72 1.66 1/473 6816 . with project_analytics_dashboard_dynamic_vsd feature flag disabled does not render the value streams dashboard link # [RSpecRunTime] RSpec elapsed time: 6 minutes 38.11 seconds. Current RSS: ~1640M. Threads: 15. load average: 1.85 1.72 1.66 1/468 6820 . # [RSpecRunTime] Finishing example group ee/spec/features/projects/analytics/dashboards_spec.rb. It took 4 minutes 42.38 seconds. Expected to take 5 minutes 46.0 seconds. # [RSpecRunTime] Starting example group ee/spec/features/groups/members/manage_members_spec.rb. Expected to take 3 minutes 30.06 seconds. Groups > Members > Manage members with overage modal concerns when adding a member to a free group adding one user with a given role doesn't trigger an overage modal # [RSpecRunTime] RSpec elapsed time: 6 minutes 50.25 seconds. Current RSS: ~1626M. Threads: 14. load average: 2.28 1.81 1.69 1/469 6830 . when adding a member to a premium group when there is no free spaces in the subscription Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed # [RSpecRunTime] RSpec elapsed time: 7 minutes 28.79 seconds. Current RSS: ~1618M. Threads: 14. load average: 2.30 1.88 1.72 3/469 6864 . when there is one free space in the subscription Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding one user with a given role doesn't trigger an overage modal Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding two users triggers overage modal # [RSpecRunTime] RSpec elapsed time: 7 minutes 46.99 seconds. Current RSS: ~1656M. Threads: 14. load average: 1.93 1.82 1.70 1/470 6880 . when modal is shown Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. get back to initial modal if not confirmed # [RSpecRunTime] RSpec elapsed time: 7 minutes 53.06 seconds. Current RSS: ~1653M. Threads: 14. load average: 1.85 1.81 1.70 2/471 6888 . when adding a member to a ultimate group with no places left Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding one user with a given role doesn't trigger an overage modal Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding one user with a given role doesn't trigger an overage modal Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed # [RSpecRunTime] RSpec elapsed time: 8 minutes 35.76 seconds. Current RSS: ~1716M. Threads: 14. load average: 1.73 1.79 1.70 1/469 6921 . when adding a member to a ultimate group that alerady has an overage Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding one user with a given role doesn't trigger an overage modal # [RSpecRunTime] RSpec elapsed time: 8 minutes 57.89 seconds. Current RSS: ~1742M. Threads: 14. load average: 1.54 1.75 1.69 1/469 6940 . when adding to a group not eligible for reconciliation Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding one user with a given role doesn't trigger an overage modal # [RSpecRunTime] RSpec elapsed time: 9 minutes 8.38 seconds. Current RSS: ~1830M. Threads: 14. load average: 1.75 1.79 1.70 1/470 6948 . with enterprise users when domain_verification feature is available for the group can disable two-factor authentication # [RSpecRunTime] RSpec elapsed time: 9 minutes 14.75 seconds. Current RSS: ~1877M. Threads: 14. load average: 1.69 1.77 1.70 1/470 6955 . with banned members Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. owner can unban banned users when feature flag is disabled Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. owner cannot see banned users # [RSpecRunTime] RSpec elapsed time: 9 minutes 27.53 seconds. Current RSS: ~1939M. Threads: 14. load average: 1.61 1.75 1.69 1/471 6971 . when licensed feature is not available Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. owner cannot see banned users # [RSpecRunTime] RSpec elapsed time: 9 minutes 31.81 seconds. Current RSS: ~1987M. Threads: 14. load average: 1.56 1.74 1.69 1/470 6977 . banning allows owner to ban a member when non-owner behaves like action is not available action is not available # [RSpecRunTime] RSpec elapsed time: 9 minutes 41.56 seconds. Current RSS: ~2033M. Threads: 14. load average: 1.47 1.71 1.68 1/474 6993 . when feature flag is disabled behaves like action is not available action is not available # [RSpecRunTime] RSpec elapsed time: 9 minutes 45.01 seconds. Current RSS: ~2029M. Threads: 14. load average: 1.47 1.71 1.68 1/474 7000 . when licensed feature is not available behaves like action is not available action is not available # [RSpecRunTime] RSpec elapsed time: 9 minutes 50.58 seconds. Current RSS: ~2061M. Threads: 13. load average: 1.43 1.70 1.68 1/474 7006 . with free user limit when at free user limit shows the alert notification in the modal # [RSpecRunTime] RSpec elapsed time: 9 minutes 54.52 seconds. Current RSS: ~2086M. Threads: 13. load average: 1.40 1.69 1.67 1/473 7012 . when close to free user limit on new top-level group shows the alert notification in the modal # [RSpecRunTime] RSpec elapsed time: 10 minutes 6.76 seconds. Current RSS: ~2065M. Threads: 13. load average: 1.98 1.80 1.71 1/475 7027 . with an active trial Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows the active trial unlimited members alert # [RSpecRunTime] RSpec elapsed time: 10 minutes 11.0 seconds. Current RSS: ~2050M. Threads: 14. load average: 1.98 1.80 1.71 1/474 7034 . # [RSpecRunTime] Finishing example group ee/spec/features/groups/members/manage_members_spec.rb. It took 3 minutes 32.93 seconds. Expected to take 3 minutes 30.06 seconds. # [RSpecRunTime] Starting example group ee/spec/features/ci_shared_runner_warnings_spec.rb. Expected to take 2 minutes 47.1 seconds. CI shared runner limits membership_level: :owner, visible: true when on a project related page warning level when there is a notification and minutes still exist displays a warning message on pipelines page displays a warning message on project homepage displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 10 minutes 33.51 seconds. Current RSS: ~2016M. Threads: 15. load average: 2.06 1.84 1.72 1/479 7460 . danger level when there is a notification and minutes still exist displays a warning message on pipelines page displays a warning message on project homepage displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 10 minutes 52.88 seconds. Current RSS: ~2057M. Threads: 14. load average: 2.14 1.86 1.74 1/479 7883 . when limit is exceeded displays a warning message on project homepage displays a warning message on pipelines page displays a warning message on a job page when in a subgroup displays a warning message on subproject homepage # [RSpecRunTime] RSpec elapsed time: 11 minutes 19.42 seconds. Current RSS: ~2032M. Threads: 14. load average: 2.23 1.89 1.75 1/480 8589 . when limit not yet exceeded does not display a warning message on project homepage does not display a warning message on pipelines page displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 11 minutes 29.13 seconds. Current RSS: ~2112M. Threads: 14. load average: 2.12 1.88 1.75 1/478 8805 . when on a group related page warning level when there is a notification and minutes still exist displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 11 minutes 35.54 seconds. Current RSS: ~2122M. Threads: 15. load average: 2.03 1.87 1.74 1/479 8861 . danger level when there is a notification and minutes still exist displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 11 minutes 40.06 seconds. Current RSS: ~2126M. Threads: 15. load average: 2.10 1.88 1.75 1/479 8917 . when limit is exceeded displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 11 minutes 45.06 seconds. Current RSS: ~2103M. Threads: 15. load average: 2.02 1.87 1.74 1/480 8973 . when limit not yet exceeded does not display a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 11 minutes 48.13 seconds. Current RSS: ~2108M. Threads: 15. load average: 1.93 1.85 1.74 1/478 9011 . membership_level: :developer, visible: false when on a project related page warning level when there is a notification and minutes still exist displays a warning message on pipelines page displays a warning message on project homepage displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 12 minutes 4.96 seconds. Current RSS: ~2078M. Threads: 15. load average: 2.38 1.96 1.78 1/480 9424 . danger level when there is a notification and minutes still exist displays a warning message on pipelines page displays a warning message on project homepage displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 12 minutes 22.88 seconds. Current RSS: ~2076M. Threads: 14. load average: 2.61 2.03 1.80 1/479 9844 . when limit is exceeded displays a warning message on project homepage displays a warning message on pipelines page displays a warning message on a job page when in a subgroup displays a warning message on subproject homepage # [RSpecRunTime] RSpec elapsed time: 12 minutes 48.64 seconds. Current RSS: ~2041M. Threads: 15. load average: 2.20 1.98 1.79 1/480 10542 . when limit not yet exceeded does not display a warning message on project homepage does not display a warning message on pipelines page displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 12 minutes 58.86 seconds. Current RSS: ~2104M. Threads: 14. load average: 2.31 2.01 1.81 1/478 10758 . when on a group related page warning level when there is a notification and minutes still exist displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 13 minutes 4.31 seconds. Current RSS: ~2130M. Threads: 15. load average: 2.21 1.99 1.80 1/479 10813 . danger level when there is a notification and minutes still exist displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 13 minutes 9.08 seconds. Current RSS: ~2118M. Threads: 15. load average: 2.11 1.98 1.80 1/479 10868 . when limit is exceeded displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 13 minutes 13.78 seconds. Current RSS: ~2111M. Threads: 15. load average: 2.02 1.96 1.79 1/479 10923 . when limit not yet exceeded does not display a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 13 minutes 16.66 seconds. Current RSS: ~2116M. Threads: 15. load average: 1.94 1.94 1.79 1/477 10961 . # [RSpecRunTime] Finishing example group ee/spec/features/ci_shared_runner_warnings_spec.rb. It took 3 minutes 5.64 seconds. Expected to take 2 minutes 47.1 seconds. # [RSpecRunTime] Starting example group ee/spec/features/billings/billing_plans_spec.rb. Expected to take 2 minutes 3.96 seconds. Billing plan pages users profile billing page on free displays the correct call to action behaves like does not display the billing plans does not display the plans # [RSpecRunTime] RSpec elapsed time: 13 minutes 23.02 seconds. Current RSS: ~2143M. Threads: 14. load average: 1.86 1.93 1.78 1/475 10969 . behaves like plan with subscription table displays subscription table # [RSpecRunTime] RSpec elapsed time: 13 minutes 26.25 seconds. Current RSS: ~2155M. Threads: 14. load average: 1.79 1.91 1.78 1/473 10973 . on bronze plan behaves like plan with header Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays header # [RSpecRunTime] RSpec elapsed time: 13 minutes 28.66 seconds. Current RSS: ~2155M. Threads: 14. load average: 1.79 1.91 1.78 1/473 10977 . behaves like downgradable plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays the downgrade link # [RSpecRunTime] RSpec elapsed time: 13 minutes 31.08 seconds. Current RSS: ~2141M. Threads: 14. load average: 1.79 1.91 1.78 1/473 10981 . behaves like can not contact sales Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not render in-app hand raise lead # [RSpecRunTime] RSpec elapsed time: 13 minutes 33.39 seconds. Current RSS: ~2143M. Threads: 14. load average: 1.73 1.90 1.77 1/473 10985 . behaves like plan with subscription table Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays subscription table # [RSpecRunTime] RSpec elapsed time: 13 minutes 35.79 seconds. Current RSS: ~2135M. Threads: 14. load average: 1.73 1.90 1.77 1/473 10989 . with an active deprecated plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. renders the plan card marked as Legacy # [RSpecRunTime] RSpec elapsed time: 13 minutes 38.3 seconds. Current RSS: ~2133M. Threads: 14. load average: 1.67 1.88 1.77 1/473 10993 . on premium plan behaves like plan with header Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays header # [RSpecRunTime] RSpec elapsed time: 13 minutes 42.73 seconds. Current RSS: ~2150M. Threads: 14. load average: 1.62 1.87 1.77 1/473 10998 . behaves like downgradable plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays the downgrade link # [RSpecRunTime] RSpec elapsed time: 13 minutes 45.55 seconds. Current RSS: ~2177M. Threads: 14. load average: 1.62 1.87 1.77 1/473 11003 . behaves like upgradable plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays the upgrade link # [RSpecRunTime] RSpec elapsed time: 13 minutes 48.02 seconds. Current RSS: ~2187M. Threads: 14. load average: 1.57 1.85 1.76 1/473 11007 . behaves like can not contact sales Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not render in-app hand raise lead # [RSpecRunTime] RSpec elapsed time: 13 minutes 50.52 seconds. Current RSS: ~2183M. Threads: 13. load average: 1.57 1.85 1.76 1/472 11011 . behaves like plan with subscription table Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays subscription table # [RSpecRunTime] RSpec elapsed time: 13 minutes 53.18 seconds. Current RSS: ~2202M. Threads: 13. load average: 1.52 1.84 1.76 1/472 11015 . on ultimate plan behaves like plan with header Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays header # [RSpecRunTime] RSpec elapsed time: 13 minutes 55.83 seconds. Current RSS: ~2222M. Threads: 13. load average: 1.52 1.84 1.76 1/472 11019 . behaves like downgradable plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays the downgrade link # [RSpecRunTime] RSpec elapsed time: 13 minutes 58.21 seconds. Current RSS: ~2227M. Threads: 13. load average: 1.48 1.82 1.75 1/472 11023 . behaves like non-upgradable plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not display the upgrade link # [RSpecRunTime] RSpec elapsed time: 14 minutes 0.66 second. Current RSS: ~2222M. Threads: 13. load average: 1.48 1.82 1.75 1/472 11027 . behaves like plan with subscription table Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays subscription table # [RSpecRunTime] RSpec elapsed time: 14 minutes 3.01 seconds. Current RSS: ~2225M. Threads: 13. load average: 1.44 1.81 1.75 1/472 11031 . when CustomersDot is unavailable Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. renders an error page # [RSpecRunTime] RSpec elapsed time: 14 minutes 5.19 seconds. Current RSS: ~2231M. Threads: 13. load average: 1.44 1.81 1.75 1/471 11035 . users profile billing page with a trial on free behaves like does not display the billing plans does not display the plans # [RSpecRunTime] RSpec elapsed time: 14 minutes 7.51 seconds. Current RSS: ~2233M. Threads: 13. load average: 1.41 1.80 1.74 1/471 11039 . on bronze plan behaves like plan with header Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays header # [RSpecRunTime] RSpec elapsed time: 14 minutes 9.88 seconds. Current RSS: ~2222M. Threads: 13. load average: 1.41 1.80 1.74 1/471 11043 . behaves like downgradable plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays the downgrade link # [RSpecRunTime] RSpec elapsed time: 14 minutes 12.31 seconds. Current RSS: ~2222M. Threads: 13. load average: 1.69 1.85 1.76 1/471 11047 . behaves like can not contact sales Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not render in-app hand raise lead # [RSpecRunTime] RSpec elapsed time: 14 minutes 15.08 seconds. Current RSS: ~2215M. Threads: 13. load average: 1.69 1.85 1.76 1/471 11051 . on ultimate plan behaves like plan with header Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays header # [RSpecRunTime] RSpec elapsed time: 14 minutes 17.59 seconds. Current RSS: ~2214M. Threads: 13. load average: 1.64 1.84 1.76 1/471 11055 . behaves like downgradable plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays the downgrade link # [RSpecRunTime] RSpec elapsed time: 14 minutes 19.78 seconds. Current RSS: ~2220M. Threads: 13. load average: 1.64 1.84 1.76 1/471 11059 . behaves like non-upgradable plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not display the upgrade link # [RSpecRunTime] RSpec elapsed time: 14 minutes 22.14 seconds. Current RSS: ~2219M. Threads: 13. load average: 1.91 1.89 1.77 1/470 11063 . group billing page when a group is the top-level group on ultimate Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays plan header behaves like does not display the billing plans Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not display the plans # [RSpecRunTime] RSpec elapsed time: 14 minutes 27.95 seconds. Current RSS: ~2202M. Threads: 15. load average: 1.83 1.87 1.77 1/471 11073 . behaves like plan with subscription table Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays subscription table # [RSpecRunTime] RSpec elapsed time: 14 minutes 31.55 seconds. Current RSS: ~2198M. Threads: 15. load average: 1.77 1.86 1.77 1/472 11079 . behaves like subscription table with management buttons Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays subscription table # [RSpecRunTime] RSpec elapsed time: 14 minutes 35.27 seconds. Current RSS: ~2175M. Threads: 15. load average: 1.77 1.86 1.77 1/472 11085 . on premium Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. renders in-app hand raise lead for code suggestions # [RSpecRunTime] RSpec elapsed time: 14 minutes 40.73 seconds. Current RSS: ~2150M. Threads: 15. load average: 1.71 1.84 1.76 1/472 11092 . on bronze Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays plan header Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does display the billing plans table when submitting hand raise lead Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays the in-app hand raise lead # [RSpecRunTime] RSpec elapsed time: 14 minutes 52.95 seconds. Current RSS: ~2112M. Threads: 14. load average: 1.86 1.87 1.77 1/472 11107 . behaves like plan with subscription table Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays subscription table # [RSpecRunTime] RSpec elapsed time: 14 minutes 58.52 seconds. Current RSS: ~2116M. Threads: 14. load average: 1.79 1.85 1.77 1/472 11114 . on free submits hand raise lead form # [RSpecRunTime] RSpec elapsed time: 15 minutes 3.4 seconds. Current RSS: ~2107M. Threads: 14. load average: 1.97 1.89 1.78 1/472 11120 . on trial Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays the billing plans table behaves like non-upgradable plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not display the upgrade link # [RSpecRunTime] RSpec elapsed time: 15 minutes 12.14 seconds. Current RSS: ~2089M. Threads: 14. load average: 2.13 1.93 1.79 1/472 11132 . behaves like used seats rendering for non paid subscriptions Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays the number of seats # [RSpecRunTime] RSpec elapsed time: 15 minutes 17.7 seconds. Current RSS: ~2078M. Threads: 15. load average: 2.04 1.91 1.79 1/473 11140 . behaves like plan with subscription table Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays subscription table # [RSpecRunTime] RSpec elapsed time: 15 minutes 23.16 seconds. Current RSS: ~2070M. Threads: 15. load average: 2.28 1.96 1.81 1/473 11147 . behaves like subscription table with management buttons Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays subscription table # [RSpecRunTime] RSpec elapsed time: 15 minutes 28.56 seconds. Current RSS: ~2061M. Threads: 15. load average: 2.17 1.95 1.80 1/473 11154 . with auditor user behaves like does not display the billing plans Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not display the plans # [RSpecRunTime] RSpec elapsed time: 15 minutes 30.52 seconds. Current RSS: ~2068M. Threads: 15. load average: 2.17 1.95 1.80 1/472 11158 . behaves like plan with subscription table Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays subscription table # [RSpecRunTime] RSpec elapsed time: 15 minutes 34.31 seconds. Current RSS: ~2074M. Threads: 15. load average: 2.08 1.93 1.80 1/473 11163 . behaves like subscription table without management buttons Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays subscription table # [RSpecRunTime] RSpec elapsed time: 15 minutes 37.97 seconds. Current RSS: ~2101M. Threads: 15. load average: 1.99 1.91 1.79 1/473 11168 . when a group is the subgroup shows the subgroup page context for billing # [RSpecRunTime] RSpec elapsed time: 15 minutes 42.15 seconds. Current RSS: ~2102M. Threads: 15. load average: 2.15 1.95 1.80 1/473 11174 . seat refresh button Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. updates seat counts on click # [RSpecRunTime] RSpec elapsed time: 15 minutes 47.24 seconds. Current RSS: ~2100M. Threads: 15. load average: 2.06 1.93 1.80 1/473 11180 . with unexpected JSON Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. renders no header for missing plan Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays all plans # [RSpecRunTime] RSpec elapsed time: 15 minutes 51.88 seconds. Current RSS: ~2092M. Threads: 14. load average: 1.98 1.92 1.80 1/472 11188 . # [RSpecRunTime] Finishing example group ee/spec/features/billings/billing_plans_spec.rb. It took 2 minutes 35.25 seconds. Expected to take 2 minutes 3.96 seconds. # [RSpecRunTime] Starting example group ee/spec/features/boards/swimlanes/epics_swimlanes_drag_drop_spec.rb. Expected to take 1 minute 39.17 seconds. epics swimlanes when no epic is displayed user can drag and drop between columns # [RSpecRunTime] RSpec elapsed time: 16 minutes 32.88 seconds. Current RSS: ~1972M. Threads: 14. load average: 1.40 1.78 1.76 1/471 11194 . drag and drop issue Job arguments to Epics::NewEpicIssueWorker must be native JSON types, but :user_id is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. between epics from epic to unassigned issues lane Job arguments to Epics::NewEpicIssueWorker must be native JSON types, but :user_id is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. from unassigned issues lane to epic between lists within epic lane between lists within unassigned lane Job arguments to Epics::NewEpicIssueWorker must be native JSON types, but :user_id is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. between lists and epics # [RSpecRunTime] RSpec elapsed time: 17 minutes 34.92 seconds. Current RSS: ~2010M. Threads: 15. load average: 1.78 1.81 1.76 1/473 11226 . drag and drop list re-orders lists # [RSpecRunTime] RSpec elapsed time: 17 minutes 43.97 seconds. Current RSS: ~2014M. Threads: 15. load average: 1.82 1.82 1.77 1/473 11232 . # [RSpecRunTime] Finishing example group ee/spec/features/boards/swimlanes/epics_swimlanes_drag_drop_spec.rb. It took 1 minute 52.09 seconds. Expected to take 1 minute 39.17 seconds. # [RSpecRunTime] Starting example group ee/spec/features/epics/gfm_autocomplete_spec.rb. Expected to take 1 minute 6.38 seconds. GFM autocomplete for a new epic opens quick action autocomplete in the description field # [RSpecRunTime] RSpec elapsed time: 17 minutes 48.81 seconds. Current RSS: ~2007M. Threads: 15. load average: 1.76 1.80 1.76 1/474 11237 . for an existing epic opens quick action autocomplete when updating description issuables issues shows issues of group # [RSpecRunTime] RSpec elapsed time: 18 minutes 2.4 seconds. Current RSS: ~2038M. Threads: 25. load average: 1.75 1.80 1.76 1/483 11282 . merge requests shows merge requests of group # [RSpecRunTime] RSpec elapsed time: 18 minutes 9.72 seconds. Current RSS: ~2041M. Threads: 25. load average: 1.69 1.78 1.76 1/489 11438 . epics shows epics # [RSpecRunTime] RSpec elapsed time: 18 minutes 15.4 seconds. Current RSS: ~2029M. Threads: 25. load average: 1.95 1.84 1.77 1/489 11443 . milestone shows group milestones # [RSpecRunTime] RSpec elapsed time: 18 minutes 21.07 seconds. Current RSS: ~2015M. Threads: 26. load average: 2.04 1.86 1.78 1/484 11448 . labels when no labels are assigned shows all labels for ~ shows all labels for /label ~ shows all labels for /relabel ~ shows no labels for /unlabel ~ # [RSpecRunTime] RSpec elapsed time: 18 minutes 42.65 seconds. Current RSS: ~2080M. Threads: 26. load average: 1.68 1.79 1.76 1/485 11463 . when some labels are assigned shows all labels for ~ shows all labels for /relabel ~ # [RSpecRunTime] RSpec elapsed time: 18 minutes 52.98 seconds. Current RSS: ~2066M. Threads: 26. load average: 1.82 1.81 1.77 1/485 11472 . when all labels are assigned shows all labels for ~ shows all labels for /relabel ~ # [RSpecRunTime] RSpec elapsed time: 19 minutes 3.25 seconds. Current RSS: ~2074M. Threads: 26. load average: 1.77 1.80 1.76 1/485 11481 . # [RSpecRunTime] Finishing example group ee/spec/features/epics/gfm_autocomplete_spec.rb. It took 1 minute 19.28 seconds. Expected to take 1 minute 6.38 seconds. # [RSpecRunTime] Starting example group ee/spec/features/registrations/saas/standard_flow_company_creating_project_spec.rb. Expected to take 57.86 seconds. Standard flow for user picking company and creating a project with sso sign up when opting into a trial Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"glm_source"=>"some_source", "glm_content"=>"some_content", "namespace_id"=>311, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>311, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}} is a ActiveSupport::HashWithIndifferentAccess. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user and creates a group and project reaching onboarding # [RSpecRunTime] RSpec elapsed time: 19 minutes 27.31 seconds. Current RSS: ~2077M. Threads: 25. load average: 1.94 1.83 1.78 1/486 11587 . when last name is missing for SSO and has to be filled in Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"namespace_id"=>314, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>314, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}} is a ActiveSupport::HashWithIndifferentAccess. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user, has some lead submission failures and creates a group and project reaching onboarding # [RSpecRunTime] RSpec elapsed time: 19 minutes 48.76 seconds. Current RSS: ~2082M. Threads: 25. load average: 2.09 1.88 1.79 1/486 11693 . with regular sign up when opting into a trial Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"glm_source"=>"some_source", "glm_content"=>"some_content", "namespace_id"=>317, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>317, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}} is a ActiveSupport::HashWithIndifferentAccess. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user and creates a group and project reaching onboarding # [RSpecRunTime] RSpec elapsed time: 20 minutes 9.75 seconds. Current RSS: ~2085M. Threads: 23. load average: 1.78 1.82 1.77 1/484 11798 . # [RSpecRunTime] Finishing example group ee/spec/features/registrations/saas/standard_flow_company_creating_project_spec.rb. It took 1 minute 6.49 seconds. Expected to take 57.86 seconds. # [RSpecRunTime] Starting example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. Expected to take 53.9 seconds. Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches does not show sections not allowed by the custom role behaves like setting project protected branches explicit protected branches 2024-09-08 02:10:02 +0000 Rack app ("GET /group83/project-78/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group83' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:71:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 169 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(168) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 81 AND "project_authorizations"."user_id" = 169 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 81 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(319) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1095:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (81, ARRAY[319])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 81 OR "security_orchestration_policy_configurations"."namespace_id" = 319) /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1410:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 81 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled" FROM "project_settings" WHERE "project_settings"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 319 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 319) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 169 GROUP BY "members"."user_id" /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1122:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 81 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3590:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 319 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 319 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 169 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 169 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(169) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 169) /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 169 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 169 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:02.811784') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:02.815797') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/> 2024-09-08 02:10:08 +0000 Rack app ("GET /group83/project-78/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group83' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:71:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 169 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(168) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 81 AND "project_authorizations"."user_id" = 169 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 81 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(319) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1095:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (81, ARRAY[319])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 81 OR "security_orchestration_policy_configurations"."namespace_id" = 319) /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1410:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 81 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 2 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 2 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled" FROM "project_settings" WHERE "project_settings"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 319 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 319) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 169 GROUP BY "members"."user_id" /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1122:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 81 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3590:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 319 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 319 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 169 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 169 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(169) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 169) /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 169 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 169 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:08.417224') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:08.421811') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/> allows creating explicit protected branches (FAILED - 1) 1st Try error in ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:5: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group83' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:71:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 169 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(168) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 81 AND "project_authorizations"."user_id" = 169 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 81 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(319) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1095:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (81, ARRAY[319])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 81 OR "security_orchestration_policy_configurations"."namespace_id" = 319) /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1410:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 81 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled" FROM "project_settings" WHERE "project_settings"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 319 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 319) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 169 GROUP BY "members"."user_id" /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1122:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 81 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3590:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 319 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 81 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 319 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 169 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 169 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(169) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 169) /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 169 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 169 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:02.811784') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:02.815797') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PACVFBP55QNEP1Z2QPHYW,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ Unexpected browser console output: webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:" webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object http://127.0.0.1:33439/group83/project-78/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error) RSpec::Retry: 2nd try ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:5 [0;33mHTML screenshot: /builds/gitlab-org/gitlab/tmp/capybara/projects_settings_repository_settings_using_custom_role_when_user_is_a_guest_with_custom_roles_that_enables_handling_protected_branches_behaves_like_se.html[0m [0;33mImage screenshot: /tmp/capybara/projects_settings_repository_settings_using_custom_role_when_user_is_a_guest_with_custom_roles_that_enables_handling_protected_branches_behaves_like_se.png[0m shows success alert once protected branch is created displays the last commit on the matching branch if it exists displays an error message if the named branch does not exist # [RSpecRunTime] RSpec elapsed time: 20 minutes 44.12 seconds. Current RSS: ~2084M. Threads: 24. load average: 1.72 1.81 1.77 1/485 11919 . wildcard protected branches 2024-09-08 02:10:35 +0000 Rack app ("GET /group83/project-78/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group83' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:71:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 169 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(168) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 81 AND "project_authorizations"."user_id" = 169 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 81 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(319) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1095:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (81, ARRAY[319])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 81 OR "security_orchestration_policy_configurations"."namespace_id" = 319) /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1410:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 81 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 6 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 6 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled" FROM "project_settings" WHERE "project_settings"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 319 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 319) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 169 GROUP BY "members"."user_id" /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1122:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 81 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3590:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 319 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 319 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 169 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 169 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(169) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 169) /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 169 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 169 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:35.401867') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:35.406189') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/> allows creating protected branches with a wildcard 1st Try error in ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:59: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group83' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:71:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 169 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(168) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 81 AND "project_authorizations"."user_id" = 169 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 81 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(319) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1095:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (81, ARRAY[319])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 81 OR "security_orchestration_policy_configurations"."namespace_id" = 319) /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1410:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 81 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 6 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 6 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled" FROM "project_settings" WHERE "project_settings"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 319 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 319) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 169 GROUP BY "members"."user_id" /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1122:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 81 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3590:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 319 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 81 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 319 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 169 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 169 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(169) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 169) /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 169 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 169 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:35.401867') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:35.406189') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PBAGC6ZR5W2MP6GH82Z1V,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ Unexpected browser console output: webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:" webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object http://127.0.0.1:33439/group83/project-78/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error) RSpec::Retry: 2nd try ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:59 displays all the branches matching the wildcard # [RSpecRunTime] RSpec elapsed time: 21 minutes 9.89 seconds. Current RSS: ~2098M. Threads: 24. load average: 1.83 1.83 1.78 1/488 12049 . # [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. It took 1 minute 0.15 second. Expected to take 53.9 seconds. # [RSpecRunTime] Starting example group ee/spec/features/boards/group_boards/multiple_boards_spec.rb. Expected to take 51.37 seconds. Multiple Issue Boards with multiple group issue boards disabled hides the link to create a new board shows a license warning when group has more than one board # [RSpecRunTime] RSpec elapsed time: 21 minutes 19.19 seconds. Current RSS: ~2122M. Threads: 23. load average: 1.70 1.81 1.77 1/484 12058 . with multiple group issue boards enabled behaves like multiple issue boards authorized user shows current board name shows a list of boards switches current board creates new board without detailed configuration adds a list to the none default board maintains sidebar state over board switch switches current board back # [RSpecRunTime] RSpec elapsed time: 21 minutes 52.67 seconds. Current RSS: ~2106M. Threads: 24. load average: 1.93 1.86 1.79 1/483 12085 . unauthorized user shows current board name shows a list of boards switches current board does not show action links # [RSpecRunTime] RSpec elapsed time: 22 minutes 7.39 seconds. Current RSS: ~2124M. Threads: 24. load average: 1.86 1.85 1.79 1/483 12098 . # [RSpecRunTime] Finishing example group ee/spec/features/boards/group_boards/multiple_boards_spec.rb. It took 57.52 seconds. Expected to take 51.37 seconds. # [RSpecRunTime] Starting example group ee/spec/features/projects/work_items/work_item_spec.rb. Expected to take 38.59 seconds. Work item for signed in user behaves like work items iteration Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. has the work item iteration with edit Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. passes axe automated accessibility testing in closed state Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. passes axe automated accessibility testing in open state when edit is clicked Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. selects and updates the right iteration Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. searches and sets or removes iteration for the work item # [RSpecRunTime] RSpec elapsed time: 22 minutes 47.18 seconds. Current RSS: ~2233M. Threads: 24. load average: 1.72 1.82 1.78 1/483 12120 . # [RSpecRunTime] Finishing example group ee/spec/features/projects/work_items/work_item_spec.rb. It took 39.77 seconds. Expected to take 38.59 seconds. # [RSpecRunTime] Starting example group ee/spec/features/groups/iterations/user_views_iteration_spec.rb. Expected to take 37.69 seconds. User views iteration with license when user has edit permissions shows iteration cadence title in the breadcrumb behaves like shows iteration info shows iteration info # [RSpecRunTime] RSpec elapsed time: 22 minutes 58.39 seconds. Current RSS: ~2306M. Threads: 23. load average: 1.83 1.84 1.79 1/484 12127 . when iteration cadence is manually scheduled can delete iteration # [RSpecRunTime] RSpec elapsed time: 23 minutes 2.86 seconds. Current RSS: ~2314M. Threads: 23. load average: 1.76 1.83 1.79 1/484 12132 . when iteration cadence is automatically scheduled cannot delete iteration # [RSpecRunTime] RSpec elapsed time: 23 minutes 6.42 seconds. Current RSS: ~2340M. Threads: 23. load average: 1.70 1.81 1.78 1/484 12136 . when user does not have edit permissions behaves like shows iteration info shows iteration info # [RSpecRunTime] RSpec elapsed time: 23 minutes 11.37 seconds. Current RSS: ~2363M. Threads: 23. load average: 1.64 1.80 1.78 1/484 12141 . when iteration cadence is manually scheduled cannot edit iteration # [RSpecRunTime] RSpec elapsed time: 23 minutes 17.0 seconds. Current RSS: ~2382M. Threads: 24. load average: 1.83 1.83 1.79 1/485 12147 . when grouping by label behaves like iteration report group by label groups by label shows ungrouped issues when `Group by: None` is selected again shows ungrouped issues when label `x` is clicked to remove it # [RSpecRunTime] RSpec elapsed time: 23 minutes 32.02 seconds. Current RSS: ~2406M. Threads: 23. load average: 1.87 1.84 1.79 1/484 12157 . without license shows page not found # [RSpecRunTime] Finishing example group ee/spec/features/groups/iterations/user_views_iteration_spec.rb. It took 45.81 seconds. Expected to take 37.69 seconds. # [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_sets_approval_rules_spec.rb. Expected to take 31.18 seconds. Merge request > User sets approval rules with project approval rules when from a fork shows approval rules from target project # [RSpecRunTime] RSpec elapsed time: 23 minutes 42.61 seconds. Current RSS: ~2468M. Threads: 23. load average: 1.89 1.85 1.80 1/490 12313 . with a private group rule shows approval rules Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. persists hidden groups that author has no access to when creating MR # [RSpecRunTime] RSpec elapsed time: 24 minutes 9.6 seconds. Current RSS: ~2464M. Threads: 25. load average: 1.77 1.83 1.79 1/492 12807 . # [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_sets_approval_rules_spec.rb. It took 36.63 seconds. Expected to take 31.18 seconds. # [RSpecRunTime] Starting example group ee/spec/features/projects_spec.rb. Expected to take 28.22 seconds. Project immediately deleting a project marked for deletion deletes the project immediately # [RSpecRunTime] RSpec elapsed time: 24 minutes 18.85 seconds. Current RSS: ~2447M. Threads: 25. load average: 1.72 1.81 1.79 1/486 12814 . delete project container text when `feature_available_on_instance` is enabled renders the marked for removal message # [RSpecRunTime] RSpec elapsed time: 24 minutes 23.83 seconds. Current RSS: ~2475M. Threads: 24. load average: 1.75 1.82 1.79 1/486 12820 . when `feature_available_on_instance` is disabled renders the permanently delete message # [RSpecRunTime] RSpec elapsed time: 24 minutes 28.09 seconds. Current RSS: ~2520M. Threads: 24. load average: 1.68 1.80 1.78 2/486 12826 . storage pre_enforcement alert when storage is over the notification limit displays the alert in the project page does not display the alert in a paid group project page when in a subgroup project page displays the alert # [RSpecRunTime] RSpec elapsed time: 24 minutes 38.99 seconds. Current RSS: ~2467M. Threads: 24. load average: 1.58 1.78 1.78 1/486 12840 . when in a user namespace project page displays the alert # [RSpecRunTime] RSpec elapsed time: 24 minutes 42.57 seconds. Current RSS: ~2475M. Threads: 24. load average: 1.53 1.76 1.77 1/486 12846 . when storage is under the notification limit does not display the alert in the group page # [RSpecRunTime] RSpec elapsed time: 24 minutes 45.68 seconds. Current RSS: ~2515M. Threads: 24. load average: 1.53 1.76 1.77 1/486 12852 . # [RSpecRunTime] Finishing example group ee/spec/features/projects_spec.rb. It took 36.06 seconds. Expected to take 28.22 seconds. # [RSpecRunTime] Starting example group ee/spec/features/groups/ldap_group_links_spec.rb. Expected to take 24.61 seconds. Edit group settings LDAP sync method when the LDAP group sync filter feature is available adds new LDAP synchronization shows the LDAP filter section shows the LDAP group section when custom roles are enabled adds new LDAP group link with a custom role # [RSpecRunTime] RSpec elapsed time: 25 minutes 5.45 seconds. Current RSS: ~2525M. Threads: 23. load average: 1.65 1.78 1.78 1/485 12874 . when the LDAP group sync filter feature is not available does not show the LDAP search method switcher shows the LDAP group section does not shows the LDAP filter section # [RSpecRunTime] RSpec elapsed time: 25 minutes 14.27 seconds. Current RSS: ~2629M. Threads: 23. load average: 1.55 1.75 1.77 1/485 12889 . # [RSpecRunTime] Finishing example group ee/spec/features/groups/ldap_group_links_spec.rb. It took 28.6 seconds. Expected to take 24.61 seconds. # [RSpecRunTime] Starting example group ee/spec/features/registrations/saas/standard_flow_just_me_joining_project_spec.rb. Expected to take 23.78 seconds. Standard flow for user picking just me and joining a project with regular sign up Job arguments to Onboarding::CreateIterableTriggerWorker must be native JSON types, but :provider is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user and sends them to a project listing page # [RSpecRunTime] RSpec elapsed time: 25 minutes 28.87 seconds. Current RSS: ~2697M. Threads: 21. load average: 1.43 1.72 1.75 1/483 12896 . with sso sign up Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to Onboarding::CreateIterableTriggerWorker must be native JSON types, but :provider is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user and sends them to a project listing page # [RSpecRunTime] RSpec elapsed time: 25 minutes 40.35 seconds. Current RSS: ~2711M. Threads: 21. load average: 1.50 1.72 1.76 1/483 12902 . # [RSpecRunTime] Finishing example group ee/spec/features/registrations/saas/standard_flow_just_me_joining_project_spec.rb. It took 26.08 seconds. Expected to take 23.78 seconds. # [RSpecRunTime] Starting example group ee/spec/features/epic_boards/multiple_epic_boards_spec.rb. Expected to take 19.71 seconds. epic boards multiple epic boards shows current epic board name shows a list of epic boards switches current epic board creates new epic board without detailed configuration deletes an epic board # [RSpecRunTime] RSpec elapsed time: 26 minutes 2.43 seconds. Current RSS: ~2678M. Threads: 24. load average: 1.46 1.70 1.75 1/485 12924 . # [RSpecRunTime] Finishing example group ee/spec/features/epic_boards/multiple_epic_boards_spec.rb. It took 22.08 seconds. Expected to take 19.71 seconds. # [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_creates_multiple_reviewers_mr_spec.rb. Expected to take 19.01 seconds. Merge request > User creates MR with multiple reviewers behaves like multiple reviewers merge request Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. creates a MR with multiple reviewers # [RSpecRunTime] RSpec elapsed time: 26 minutes 22.12 seconds. Current RSS: ~2585M. Threads: 23. load average: 1.57 1.70 1.75 1/491 13112 . # [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_creates_multiple_reviewers_mr_spec.rb. It took 19.68 seconds. Expected to take 19.01 seconds. # [RSpecRunTime] Starting example group ee/spec/features/projects/settings/analytics/user_configures_analytics_instance_settings_spec.rb. Expected to take 15.93 seconds. Project > Settings > Analytics -> Data sources -> Product analytics instance settings when product analytics is disabled on an instance does not show product analytics configuration options # [RSpecRunTime] RSpec elapsed time: 26 minutes 26.2 seconds. Current RSS: ~2577M. Threads: 23. load average: 1.57 1.70 1.75 1/490 13118 . without correct license does not show product analytics configuration options # [RSpecRunTime] RSpec elapsed time: 26 minutes 29.47 seconds. Current RSS: ~2564M. Threads: 23. load average: 1.60 1.71 1.75 1/489 13123 . with valid license and toggle shows product analytics options saves configuration options # [RSpecRunTime] RSpec elapsed time: 26 minutes 39.24 seconds. Current RSS: ~2629M. Threads: 23. load average: 1.59 1.70 1.74 1/486 13135 . when product analytics toggle is disabled does not show product analytics configuration options # [RSpecRunTime] RSpec elapsed time: 26 minutes 42.36 seconds. Current RSS: ~2629M. Threads: 23. load average: 1.54 1.69 1.74 1/486 13141 . # [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/analytics/user_configures_analytics_instance_settings_spec.rb. It took 20.24 seconds. Expected to take 15.93 seconds. # [RSpecRunTime] Starting example group ee/spec/features/ai_agents_spec.rb. Expected to take 15.91 seconds. AI Agents with an authenticated user with reporter permissions shows the AI Agents empty state screen when no agents exist shows a list of AI Agents when they exist for a project shows the view screen when clicking on an agent name shows the create screen when the button is clicked creates an AI agent when the data is supplied and the button clicked # [RSpecRunTime] RSpec elapsed time: 27 minutes 1.3 seconds. Current RSS: ~2575M. Threads: 22. load average: 1.57 1.69 1.74 1/484 13165 . # [RSpecRunTime] Finishing example group ee/spec/features/ai_agents_spec.rb. It took 18.94 seconds. Expected to take 15.91 seconds. # [RSpecRunTime] Starting example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb. Expected to take 13.2 seconds. Duo Enterprise trial lead submission and creation with one eligible namespace Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. when applying trial fails fills out form, submits and is sent back to information form with errors and is then resolved # [RSpecRunTime] RSpec elapsed time: 27 minutes 8.02 seconds. Current RSS: ~2557M. Threads: 23. load average: 1.49 1.66 1.73 1/485 13172 . when creating lead and applying trial is successful fills out form, submits and lands on the group usage quotas page # [RSpecRunTime] RSpec elapsed time: 27 minutes 12.19 seconds. Current RSS: ~2524M. Threads: 24. load average: 1.61 1.69 1.74 1/486 13179 . when applying lead fails fills out form, submits and sent back to information form with errors and is then resolved # [RSpecRunTime] RSpec elapsed time: 27 minutes 17.57 seconds. Current RSS: ~2566M. Threads: 24. load average: 1.88 1.74 1.75 1/487 13186 . # [RSpecRunTime] Finishing example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb. It took 16.24 seconds. Expected to take 13.2 seconds. # [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_sees_closing_issues_message_spec.rb. Expected to take 12.89 seconds. Merge request > User sees closing issues message approvals are enabled while closing issues displays closing issue message exactly one time # [RSpecRunTime] RSpec elapsed time: 27 minutes 33.67 seconds. Current RSS: ~2649M. Threads: 25. load average: 1.91 1.75 1.76 1/492 13422 . # [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_sees_closing_issues_message_spec.rb. It took 16.13 seconds. Expected to take 12.89 seconds. # [RSpecRunTime] Starting example group ee/spec/features/registrations/start_trial_from_external_site_without_confirmation_spec.rb. Expected to take 10.59 seconds. Start trial from external site without confirmation Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"glm_source"=>"some_source", "glm_content"=>"some_content", "namespace_id"=>389, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>389, "name"=>"Group name", "path"=>"group-name", "kind"=>"group", "trial_ends_on"=>nil}} is a ActiveSupport::HashWithIndifferentAccess. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. passes glm parameters until user is onboarded # [RSpecRunTime] Finishing example group ee/spec/features/registrations/start_trial_from_external_site_without_confirmation_spec.rb. It took 11.61 seconds. Expected to take 10.59 seconds. # [RSpecRunTime] RSpec elapsed time: 27 minutes 45.59 seconds. Current RSS: ~2607M. Threads: 25. load average: 2.08 1.80 1.77 1/490 13524 . # [RSpecRunTime] Starting example group ee/spec/features/projects/integrations/google_cloud_platform/user_activates_workload_identity_federation_spec.rb. Expected to take 9.47 seconds. User activates Workload Identity Federation activates integration # [RSpecRunTime] Finishing example group ee/spec/features/projects/integrations/google_cloud_platform/user_activates_workload_identity_federation_spec.rb. It took 8.99 seconds. Expected to take 9.47 seconds. # [RSpecRunTime] RSpec elapsed time: 27 minutes 54.71 seconds. Current RSS: ~2590M. Threads: 24. load average: 1.91 1.77 1.76 1/487 13532 . # [RSpecRunTime] Starting example group ee/spec/features/trials/show_trial_banner_spec.rb. Expected to take 9.13 seconds. Show trial banner when user's trial is active Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. renders congratulations banner for user in profile billing page # [RSpecRunTime] RSpec elapsed time: 27 minutes 58.33 seconds. Current RSS: ~2602M. Threads: 24. load average: 2.32 1.86 1.79 1/486 13537 . when group's trial is active Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. renders congratulations banner for group in group details page Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not render congratulations banner for group in group billing page # [RSpecRunTime] RSpec elapsed time: 28 minutes 5.93 seconds. Current RSS: ~2658M. Threads: 25. load average: 2.22 1.84 1.79 1/488 13548 . # [RSpecRunTime] Finishing example group ee/spec/features/trials/show_trial_banner_spec.rb. It took 11.41 seconds. Expected to take 9.13 seconds. # [RSpecRunTime] Starting example group ee/spec/features/groups/iterations/user_views_iteration_cadence_spec.rb. Expected to take 7.34 seconds. User views iteration cadences shows iteration cadences with iterations when expanded only shows completed iterations on Done tab shows inherited cadences in subgroup # [RSpecRunTime] Finishing example group ee/spec/features/groups/iterations/user_views_iteration_cadence_spec.rb. It took 9.5 seconds. Expected to take 7.34 seconds. # [RSpecRunTime] RSpec elapsed time: 28 minutes 15.75 seconds. Current RSS: ~2684M. Threads: 25. load average: 2.27 1.86 1.79 1/486 13558 . # [RSpecRunTime] Starting example group ee/spec/features/groups/settings/user_configures_insights_spec.rb. Expected to take 7.0 seconds. Groups > Settings > Analytics > User configures Insights without correct license does not show the Insight config # [RSpecRunTime] RSpec elapsed time: 28 minutes 17.93 seconds. Current RSS: ~2684M. Threads: 25. load average: 2.25 1.87 1.79 1/486 13562 . with correct license allows to select a project in a subgroup for the Insights config # [RSpecRunTime] RSpec elapsed time: 28 minutes 24.0 seconds. Current RSS: ~2710M. Threads: 24. load average: 2.15 1.85 1.79 1/486 13569 . # [RSpecRunTime] Finishing example group ee/spec/features/groups/settings/user_configures_insights_spec.rb. It took 8.42 seconds. Expected to take 7.0 seconds. # [RSpecRunTime] Starting example group ee/spec/features/registrations/welcome_spec.rb. Expected to take 6.12 seconds. Welcome screen on SaaS with email opt in does not show the email opt in checkbox when setting up for a company shows the email opt in checkbox when setting up for just me # [RSpecRunTime] RSpec elapsed time: 28 minutes 31.42 seconds. Current RSS: ~2740M. Threads: 24. load average: 2.04 1.84 1.79 1/486 13578 . # [RSpecRunTime] Finishing example group ee/spec/features/registrations/welcome_spec.rb. It took 7.42 seconds. Expected to take 6.12 seconds. # [RSpecRunTime] Starting example group ee/spec/features/security/project/snippet/private_access_spec.rb. Expected to take 4.92 seconds. Private Project Snippets Access GET /:project_path/snippets Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor # [RSpecRunTime] RSpec elapsed time: 28 minutes 34.16 seconds. Current RSS: ~2751M. Threads: 24. load average: 2.04 1.84 1.79 1/485 13582 . GET /:project_path/snippets/new is expected to be denied for auditor # [RSpecRunTime] RSpec elapsed time: 28 minutes 35.38 seconds. Current RSS: ~2776M. Threads: 24. load average: 2.04 1.84 1.79 1/485 13586 . GET /:project_path/snippets/:id for a private snippet Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor # [RSpecRunTime] RSpec elapsed time: 28 minutes 37.07 seconds. Current RSS: ~2796M. Threads: 24. load average: 1.96 1.83 1.78 3/486 13590 . GET /:project_path/snippets/:id/raw for a private snippet is expected to be allowed for auditor # [RSpecRunTime] RSpec elapsed time: 28 minutes 38.42 seconds. Current RSS: ~2792M. Threads: 24. load average: 1.96 1.83 1.78 1/485 13594 . # [RSpecRunTime] Finishing example group ee/spec/features/security/project/snippet/private_access_spec.rb. It took 7.01 seconds. Expected to take 4.92 seconds. # [RSpecRunTime] Starting example group ee/spec/features/groups/show_spec.rb. Expected to take 3.59 seconds. Group show page with free tier badge renders the tier badge and popover when clicked # [RSpecRunTime] RSpec elapsed time: 28 minutes 43.01 seconds. Current RSS: ~2817M. Threads: 25. load average: 1.96 1.83 1.78 2/486 13600 . # [RSpecRunTime] Finishing example group ee/spec/features/groups/show_spec.rb. It took 4.6 seconds. Expected to take 3.59 seconds. # [RSpecRunTime] Starting example group ee/spec/features/groups/user_updates_comment_template_spec.rb. Expected to take 3.39 seconds. Groups > Comment templates > User updated comment template updates a comment template # [RSpecRunTime] Finishing example group ee/spec/features/groups/user_updates_comment_template_spec.rb. It took 4.22 seconds. Expected to take 3.39 seconds. # [RSpecRunTime] RSpec elapsed time: 28 minutes 47.57 seconds. Current RSS: ~2799M. Threads: 25. load average: 1.89 1.81 1.78 1/487 13606 . auto_explain log contains 1223 entries for main, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-opensearch1-11-16.336.main.ndjson.gz took 14.908189139 auto_explain log contains 1224 entries for ci, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-opensearch1-11-16.336.ci.ndjson.gz took 12.282213007 [TEST PROF INFO] EventProf results for sql.active_record Total time: 05:04.960 of 28:39.889 (17.73%) Total events: 101995 Top 5 slowest suites (by time): Analytics Das...eams Dashboard (./ee/spec/features/projects/analytics/dashboards_spec.rb:32) – 01:14.555 (23043 / 21) of 04:42.378 (26.4%) CI shared runner limits (./ee/spec/features/ci_shared_runner_warnings_spec.rb:5) – 00:35.790 (13144 / 34) of 03:05.636 (19.28%) Groups > Memb...Manage members (./ee/spec/features/groups/members/manage_members_spec.rb:5) – 00:27.818 (9995 / 26) of 03:32.926 (13.06%) Billing plan pages (./ee/spec/features/billings/billing_plans_spec.rb:5) – 00:20.729 (8460 / 47) of 02:35.247 (13.35%) epics swimlanes (./ee/spec/features/boards/swimlanes/epics_swimlanes_drag_drop_spec.rb:5) – 00:20.566 (6316 / 8) of 01:52.088 (18.35%) Knapsack report was generated. Preview: { "ee/spec/features/projects/analytics/dashboards_spec.rb": 390.4617237829998, "ee/spec/features/groups/members/manage_members_spec.rb": 212.9260189229999, "ee/spec/features/ci_shared_runner_warnings_spec.rb": 185.6364941769998, "ee/spec/features/billings/billing_plans_spec.rb": 155.24740510500033, "ee/spec/features/boards/swimlanes/epics_swimlanes_drag_drop_spec.rb": 112.08782994300054, "ee/spec/features/epics/gfm_autocomplete_spec.rb": 79.28221309200035, "ee/spec/features/registrations/saas/standard_flow_company_creating_project_spec.rb": 66.48721256300087, "ee/spec/features/projects/settings/ee/protected_branches_spec.rb": 60.150778684000215, "ee/spec/features/boards/group_boards/multiple_boards_spec.rb": 57.522115330000815, "ee/spec/features/projects/work_items/work_item_spec.rb": 39.77042754000013, "ee/spec/features/groups/iterations/user_views_iteration_spec.rb": 45.81356061899987, "ee/spec/features/merge_request/user_sets_approval_rules_spec.rb": 36.629860805000135, "ee/spec/features/projects_spec.rb": 36.05892251900059, "ee/spec/features/groups/ldap_group_links_spec.rb": 28.60094546900018, "ee/spec/features/registrations/saas/standard_flow_just_me_joining_project_spec.rb": 26.07936127799985, "ee/spec/features/epic_boards/multiple_epic_boards_spec.rb": 22.084187501000088, "ee/spec/features/merge_request/user_creates_multiple_reviewers_mr_spec.rb": 19.677654074999737, "ee/spec/features/projects/settings/analytics/user_configures_analytics_instance_settings_spec.rb": 20.242427993000092, "ee/spec/features/ai_agents_spec.rb": 18.94298530299966, "ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb": 16.237215505000677, "ee/spec/features/merge_request/user_sees_closing_issues_message_spec.rb": 16.126022228999318, "ee/spec/features/registrations/start_trial_from_external_site_without_confirmation_spec.rb": 11.607325073000538, "ee/spec/features/projects/integrations/google_cloud_platform/user_activates_workload_identity_federation_spec.rb": 8.990930052999829, "ee/spec/features/trials/show_trial_banner_spec.rb": 11.40920267599995, "ee/spec/features/groups/iterations/user_views_iteration_cadence_spec.rb": 9.501272941000025, "ee/spec/features/groups/settings/user_configures_insights_spec.rb": 8.418675965000148, "ee/spec/features/registrations/welcome_spec.rb": 7.420686929000112, "ee/spec/features/security/project/snippet/private_access_spec.rb": 7.014044169000044, "ee/spec/features/groups/show_spec.rb": 4.60141084299994, "ee/spec/features/groups/user_updates_comment_template_spec.rb": 4.217005943000004 } Knapsack global time execution for tests: 28m 39s Failures: 1) Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches Got 0 failures and 2 other errors: Shared Example Group: "setting project protected branches" called from ./ee/spec/features/projects/settings/ee/protected_branches_spec.rb:25 1.1) Failure/Error: raise(error) if raise_error? Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group83' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:71:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 169 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(168) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 81 AND "project_authorizations"."user_id" = 169 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 81 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(319) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1095:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (81, ARRAY[319])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 169 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 81 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 81 OR "security_orchestration_policy_configurations"."namespace_id" = 319) /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1410:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 81 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 2 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 2 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 319 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled" FROM "project_settings" WHERE "project_settings"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 319 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:84:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 319 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 319) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 169 GROUP BY "members"."user_id" /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group83/project-78' LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(81) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1122:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 81 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3590:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 319 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 81 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 81) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 319 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 81 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 319 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 169 LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 169 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 169 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(169) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 169 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 169) /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 169 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 169 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:08.417224') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-08 02:10:08.421811') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J77PAJDPDR9XZBCKD4FJX6B7,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ # ./lib/gitlab/query_limiting/transaction.rb:65:in `act_upon_results' # ./lib/gitlab/query_limiting/middleware.rb:21:in `call' # ./lib/gitlab/database/load_balancing/rack_middleware.rb:23:in `call' # ./lib/gitlab/middleware/go.rb:22:in `call' # ./lib/gitlab/etag_caching/middleware.rb:21:in `call' # ./lib/gitlab/middleware/query_analyzer.rb:11:in `block in call' # ./lib/gitlab/database/query_analyzer.rb:40:in `within' # ./lib/gitlab/middleware/query_analyzer.rb:11:in `call' # ./lib/gitlab/middleware/multipart.rb:173:in `call' # ./lib/gitlab/middleware/read_only/controller.rb:50:in `call' # ./lib/gitlab/middleware/read_only.rb:18:in `call' # ./lib/gitlab/middleware/unauthenticated_session_expiry.rb:18:in `call' # ./lib/gitlab/middleware/strip_cookies.rb:29:in `call' # ./lib/gitlab/middleware/same_site_cookies.rb:27:in `call' # ./lib/gitlab/middleware/path_traversal_check.rb:37:in `call' # ./lib/gitlab/middleware/handle_malformed_strings.rb:21:in `call' # ./lib/gitlab/middleware/basic_health_check.rb:25:in `call' # ./lib/gitlab/middleware/handle_ip_spoof_attack_error.rb:25:in `call' # ./lib/gitlab/middleware/request_context.rb:15:in `call' # ./lib/gitlab/middleware/webhook_recursion_detection.rb:15:in `call' # ./config/initializers/fix_local_cache_middleware.rb:11:in `call' # ./lib/gitlab/middleware/compressed_json.rb:44:in `call' # ./lib/gitlab/middleware/static.rb:11:in `call' # ./lib/gitlab/testing/clear_process_memory_cache_middleware.rb:13:in `call' # ./lib/gitlab/testing/request_inspector_middleware.rb:35:in `call' # ./lib/gitlab/testing/robots_blocker_middleware.rb:30:in `call' # ./lib/gitlab/testing/request_blocker_middleware.rb:47:in `call' # ./lib/gitlab/middleware/rack_multipart_tempfile_factory.rb:19:in `call' # ./lib/gitlab/middleware/sidekiq_web_static.rb:20:in `call' # ./lib/gitlab/metrics/requests_rack_middleware.rb:79:in `call' # ------------------ # --- Caused by: --- # Capybara::ExpectationNotMet: # expected to find text "some->branch" in "There are currently no protected branches, to protect a branch start by creating a new one above." # ./spec/support/capybara_slow_finder.rb:18:in `synchronize' 1.2) Failure/Error: raise BrowserConsoleError, message BrowserConsoleHelpers::BrowserConsoleError: Unexpected browser console output: webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:" webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object http://127.0.0.1:33439/group83/project-78/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error) # ./spec/support/helpers/browser_console_helpers.rb:79:in `raise_if_unexpected_browser_console_output' # ./spec/support/capybara.rb:200:in `block (2 levels) in <top (required)>' # ./spec/spec_helper.rb:471:in `block (3 levels) in <top (required)>' # ./lib/gitlab/sidekiq_sharding/validator.rb:42:in `enabled' # ./spec/spec_helper.rb:470:in `block (2 levels) in <top (required)>' # ./spec/spec_helper.rb:465:in `block (3 levels) in <top (required)>' # ./spec/support/sidekiq_middleware.rb:9:in `with_sidekiq_server_middleware' # ./spec/spec_helper.rb:456:in `block (2 levels) in <top (required)>' # ./spec/spec_helper.rb:452:in `block (3 levels) in <top (required)>' # ./lib/gitlab/application_context.rb:92:in `with_raw_context' # ./spec/spec_helper.rb:452:in `block (2 levels) in <top (required)>' # ./spec/spec_helper.rb:268:in `block (2 levels) in <top (required)>' # ./spec/support/system_exit_detected.rb:7:in `block (2 levels) in <top (required)>' # ./spec/support/fast_quarantine.rb:22:in `block (2 levels) in <top (required)>' # ./spec/support/database/prevent_cross_joins.rb:106:in `block (3 levels) in <top (required)>' # ./spec/support/database/prevent_cross_joins.rb:60:in `with_cross_joins_prevented' # ./spec/support/database/prevent_cross_joins.rb:106:in `block (2 levels) in <top (required)>' # ./spec/support/capybara.rb:175:in `block (3 levels) in <top (required)>' # ./config/initializers/forbid_sidekiq_in_transactions.rb:10:in `skipping_transaction_check' # ./spec/support/capybara.rb:175:in `block (2 levels) in <top (required)>' Finished in 29 minutes 16 seconds (files took 2 minutes 27.9 seconds to load) 264 examples, 1 failure Failed examples: rspec './ee/spec/features/projects/settings/ee/protected_branches_spec.rb[1:1:1:1:1]' # Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches Randomized with seed 40915 Stopped processing SimpleCov as a previous error not related to SimpleCov has been detected Failed to write to log, write log/workhorse-test.log: file already closed [0;33mRSpec exited with 1. [0m[job-metrics] Updating job metrics tag for the CI/CD job. [0;33mRSPEC_RETRIED_TESTS_REPORT_PATH: rspec/retried_tests-7770644366.txt [0m[0;33mRetrying the failing examples in a new RSpec process... [0m[0;32m$ gem install junit_merge --no-document --version 0.1.2 [0mSuccessfully installed nokogiri-1.16.7-x86_64-linux Successfully installed junit_merge-0.1.2 2 gems installed [0;32m==> 'gem install junit_merge --no-document --version 0.1.2' succeeded in 2 seconds. [0m[0;33mRunning RSpec command: bin/rspec -Ispec -rspec_helper --color --failure-exit-code 1 --error-exit-code 2 --format documentation --format Support::Formatters::JsonFormatter --out rspec/rspec-retry-7770644366.json --format RspecJunitFormatter --out rspec/rspec-retry-7770644366.xml --only-failures --pattern "{ee/}spec/{features}{,/**/}*_spec.rb" [0mwarning: parser/current is loading parser/ruby31, which recognizes 3.1.6-compliant syntax, but you are running 3.1.5. Please see https://github.com/whitequark/parser#compatibility-with-ruby-mri. RSpec's reporter has already been initialized with #<IO:<STDERR>> as the deprecation stream, so your change to `deprecation_stream` will be ignored. You should configure it earlier for it to take effect, or use the `--deprecation-out` CLI option. (Called from /builds/gitlab-org/gitlab/spec/support/rspec.rb:59:in `block in <main>') Run options: include {:last_run_status=>"failed"} # [RSpecRunTime] Starting RSpec timer... [TEST PROF INFO] EventProf enabled (sql.active_record) unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String. unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String. Test environment set up in 1.546323224 seconds # [RSpecRunTime] Starting example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. Expected to take 53.9 seconds. Projects > Settings > Repository settings using custom role Starting the Capybara driver server... when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches Capybara starting Puma... * Version 6.4.0, codename: The Eagle of Durango * Min threads: 0, max threads: 4 * Listening on unix:///tmp/20240908-13623-1mrmal allows creating explicit protected branches # [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. It took 27.83 seconds. Expected to take 53.9 seconds. auto_explain log contains 1225 entries for main, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-opensearch1-11-16.13623.main.ndjson.gz took 11.123735553 auto_explain log contains 1224 entries for ci, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-opensearch1-11-16.13623.ci.ndjson.gz took 11.201281821 [TEST PROF INFO] EventProf results for sql.active_record Total time: 00:03.119 of 00:27.826 (11.21%) Total events: 953 Top 5 slowest suites (by time): Projects > Se...ng custom role (./ee/spec/features/projects/settings/ee/protected_branches_spec.rb:5) – 00:03.119 (953 / 1) of 00:27.826 (11.21%) Finished in 1 minute 0.93 seconds (files took 1 minute 50.76 seconds to load) 1 example, 0 failures Randomized with seed 6433 Failed to write to log, write log/workhorse-test.log: file already closed Loading rspec/rspec-7770644366.json... Merged rspec/rspec-retry-7770644366.json adding 5 results. Saved rspec/rspec-7770644366.json. [0;33mA test was flaky and succeeded after being retried. Checking to see if flaky test is part of this MR... [0m[0;33mFlaky test was not part of this MR. [0msection_end:1725762175:step_script [0Ksection_start:1725762175:after_script [0K[0K[36;1mRunning after_script[0;m[0;m [32;1mRunning after script...[0;m [32;1m$ source scripts/utils.sh[0;m [32;1m$ log_disk_usage after_script[0;m [log_disk_usage after_script] start df -h Filesystem Size Used Avail Use% Mounted on overlay 95G 27G 69G 28% / tmpfs 64M 0 64M 0% /dev shm 64M 0 64M 0% /dev/shm /dev/sda1 95G 27G 69G 28% /cache tmpfs 3.9G 0 3.9G 0% /sys/devices/virtual/dmi/id du -h -d 1 7.3M ./workhorse 148K ./bin 1.2M ./.gitlab 168M ./.git 4.0K ./builds 16M ./coverage 27M ./lib 8.0K ./.vscode 516K ./storybook 39M ./log 1.8M ./data 9.9M ./qa 2.9M ./.rubocop_todo 1.1G ./vendor 934M ./public 59M ./doc 480K ./danger 380K ./rspec 8.0K ./.bundle 536K ./tooling 139M ./ee 1.3M ./knapsack 296K ./patches 4.3M ./changelogs 20K ./haml_lint 28K ./metrics_server 88K ./keeps 48K ./shared 44K ./generator_templates 1.2M ./scripts 1.5G ./tmp 125M ./spec 20K ./file_hooks 1.9M ./crystalball 16K ./sidekiq_cluster 16M ./gems 1.2M ./fixtures 948K ./rubocop 4.0K ./.go 29M ./db 752K ./auto_explain 12K ./.github 125M ./locale 1.9M ./glfm_specification 17M ./config 80M ./app 16K ./.lefthook 4.3G . [log_disk_usage after_script] end [32;1m$ bundle exec gem list gitlab_quality-test_tooling[0;m gitlab_quality-test_tooling (1.38.0) [32;1m$ section_start "failed-test-issues" "Report test failures" # collapsed multi-line command[0;m section_start:1725762188:failed-test-issues[collapsed=true] [0KReport test failures Reporting tests in `rspec/rspec-retry-7770644366.json` as issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`. => Processing 1 tests in rspec/rspec-retry-7770644366.json => Reported 0 failed tests. section_end:1725762190:failed-test-issues [0K [32;1m$ section_start "flaky-test-issues" "Report test flakiness" # collapsed multi-line command[0;m section_start:1725762190:flaky-test-issues[collapsed=true] [0KReport test flakiness Reporting tests in `rspec/rspec-retry-7770644366.json` as issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`. => Processing 1 tests in rspec/rspec-retry-7770644366.json => Reporting flaky test 'Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches'... => Reporting flaky test to existing issue: https://gitlab.com/gitlab-org/gitlab/-/issues/482781 => Reported 1 flaky tests. section_end:1725762195:flaky-test-issues [0K [32;1m$ section_start "slow-test-issues" "Report test slowness" # collapsed multi-line command[0;m section_start:1725762195:slow-test-issues[collapsed=true] [0KReport test slowness Reporting tests in `rspec/rspec-*.json` as issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`. => Processing 1 tests in rspec/rspec-7770644366.json => Reported 0 slow tests. => Processing 1 tests in rspec/rspec-retry-7770644366.json => Reported 0 slow tests. section_end:1725762197:slow-test-issues [0K [32;1m$ section_start "slow-test-merge-request-report-note" "Report test slowness in MR note" # collapsed multi-line command[0;m section_start:1725762197:slow-test-merge-request-report-note[collapsed=true] [0KReport test slowness in MR note [0;33mNot reporting test slowness in MR note because $ADD_SLOW_TEST_NOTE_TO_MERGE_REQUEST != 'true' [0msection_end:1725762197:slow-test-merge-request-report-note [0K [32;1m$ section_start "knapsack-report-issues" "Report test files close to timing out" # collapsed multi-line command[0;m section_start:1725762197:knapsack-report-issues[collapsed=true] [0KReport test files close to timing out Reporting spec file exceeding Knapsack expectaton issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`. => Reporting 0 spec files exceeding Knapsack expectation. section_end:1725762199:knapsack-report-issues [0K [32;1m$ tooling/bin/push_job_metrics || true[0;m [job-metrics] Pushing job metrics file for the CI/CD job. [job-metrics] Pushed 4 CI job metric entries to InfluxDB. section_end:1725762200:after_script [0Ksection_start:1725762200:archive_cache [0K[0K[36;1mSaving cache for successful job[0;m[0;m [32;1mNot uploading cache ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-19 due to policy[0;m section_end:1725762202:archive_cache [0Ksection_start:1725762202:upload_artifacts_on_success [0K[0K[36;1mUploading artifacts for successful job[0;m[0;m [32;1mUploading artifacts...[0;m auto_explain/: found 5 matching artifact files and directories[0;m coverage/: found 4 matching artifact files and directories[0;m crystalball/: found 5 matching artifact files and directories[0;m [0;33mWARNING: deprecations/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab)[0;m knapsack/: found 4 matching artifact files and directories[0;m rspec/: found 17 matching artifact files and directories[0;m tmp/capybara/: found 3 matching artifact files and directories[0;m log/*.log: found 16 matching artifact files and directories[0;m [0;33mWARNING: Upload request redirected [0;m [0;33mlocation[0;m=https://gitlab.com/api/v4/jobs/7770644366/artifacts?artifact_format=zip&artifact_type=archive&expire_in=31d [0;33mnew-url[0;m=https://gitlab.com [0;33mWARNING: Retrying... [0;m [0;33mcontext[0;m=artifacts-uploader [0;33merror[0;m=request redirected Uploading artifacts as "archive" to coordinator... 201 Created[0;m id[0;m=7770644366 responseStatus[0;m=201 Created token[0;m=glcbt-66 [32;1mUploading artifacts...[0;m rspec/rspec-*.xml: found 2 matching artifact files and directories[0;m [0;33mWARNING: Upload request redirected [0;m [0;33mlocation[0;m=https://gitlab.com/api/v4/jobs/7770644366/artifacts?artifact_format=gzip&artifact_type=junit&expire_in=31d [0;33mnew-url[0;m=https://gitlab.com [0;33mWARNING: Retrying... [0;m [0;33mcontext[0;m=artifacts-uploader [0;33merror[0;m=request redirected Uploading artifacts as "junit" to coordinator... 201 Created[0;m id[0;m=7770644366 responseStatus[0;m=201 Created token[0;m=glcbt-66 section_end:1725762211:upload_artifacts_on_success [0Ksection_start:1725762211:cleanup_file_variables [0K[0K[36;1mCleaning up project directory and file based variables[0;m[0;m section_end:1725762211:cleanup_file_variables [0K[32;1mJob succeeded[0;m