186: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
287: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
489: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
590: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
792: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
893: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1095: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
1196: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
1297: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
1398: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
1499: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
15100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
16101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
17102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
18103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
19104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
20105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.620444') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
21106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.624695') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/>
348: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
359: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
3610: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
3711: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
3812: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
4115: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/
4216: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
4317: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
4418: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
4620: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
47 FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids),
49 SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
5321: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
5422: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
5624: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
5725: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
5927: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
6028: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
6129: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
6230: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
6331: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
6432: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/
6533: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
6634: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
6735: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 22 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
6836: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 22 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
6937: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
7139: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
7240: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
7341: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
7442: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
76(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
7844: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
7945: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8046: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8248: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
8349: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
8450: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
8551: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
8753: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
8854: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8955: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
9157: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/
9258: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
9359: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
9561: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/
9662: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
9763: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
9864: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
9965: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
10167: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
10268: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
10369: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
10571: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
10672: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
10874: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
10975: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11177: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11278: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11480: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11581: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11783: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11884: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
12086: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
12187: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
12389: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
12490: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
12692: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
12793: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
12995: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
13096: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
13197: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
13298: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
13399: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
134100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
135101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
136102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
137103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
138104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
139105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:01.630592') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
140106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:01.634616') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
142webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:"
143webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
144webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
1562024-09-12 17:57:30 +0000 Rack app ("GET /group45/project-60/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
1570: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
1658: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
1669: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
16710: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
16811: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
16912: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
17215: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/
17316: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
17417: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
17518: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
17720: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
178 FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids),
180 SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
18421: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18522: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18724: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18825: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
19027: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
19128: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
19229: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
19330: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
19431: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
19532: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/
19633: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
19734: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
19835: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
19936: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
20037: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
20239: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
20340: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
20441: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
20542: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
207(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
20944: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
21045: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
21146: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
21348: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
21449: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
21550: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
21651: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
21853: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
21954: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22055: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22257: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/
22358: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22459: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22661: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/
22762: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
22863: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
22964: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23065: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23267: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
23368: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23469: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23671: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23772: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23974: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24075: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24277: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24378: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24580: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24681: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24883: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24984: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25186: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25287: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25489: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25590: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25792: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25893: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
26095: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
26196: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
26297: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
26398: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
26499: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
265100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
266101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
267102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
268103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
269104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
270105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.644909') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
271106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.649527') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/>
272 allows creating protected branches with a wildcard
2848: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
2859: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
28610: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
28711: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
28812: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
29115: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/
29216: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
29317: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
29418: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
29620: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
297 FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids),
299 SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
30321: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
30422: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
30624: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
30725: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
30927: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
31028: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
31129: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31230: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31331: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
31432: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/
31533: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
31634: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
31735: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
31836: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
31937: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
32139: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
32240: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
32341: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
32442: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
326(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
32844: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
32945: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
33046: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
33248: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
33349: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
33450: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
33551: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
33753: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
33854: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
33955: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
34157: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/
34258: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
34359: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
34561: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/
34662: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
34763: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
34864: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
34965: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
35167: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
35268: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
35369: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
35571: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
35672: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
35874: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
35975: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
36177: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
36278: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
36480: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
36581: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
36783: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
36884: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
37086: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
37187: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
37389: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
37490: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
37692: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
37793: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
37995: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
38096: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
38197: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
38298: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
38399: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
384100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
385101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
386102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
387103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
388104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
389105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.644909') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
390106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.649527') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
392webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:"
393webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
394webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
401# [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. It took 54.41 seconds. Expected to take 53.75 seconds.
402# [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_sees_merge_widget_spec.rb. Expected to take 46.3 seconds.
420# [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_sees_merge_widget_spec.rb. It took 42.09 seconds. Expected to take 46.3 seconds.
421# [RSpecRunTime] Starting example group ee/spec/features/merge_request/code_owner_approval_rules_spec.rb. Expected to take 40.39 seconds.
438# [RSpecRunTime] Finishing example group ee/spec/features/merge_request/code_owner_approval_rules_spec.rb. It took 38.11 seconds. Expected to take 40.39 seconds.
439# [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_sets_approval_rules_spec.rb. Expected to take 35.56 seconds.
457# [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_sets_approval_rules_spec.rb. It took 33.03 seconds. Expected to take 35.56 seconds.
458# [RSpecRunTime] Starting example group ee/spec/features/registrations/saas/trial_flow_company_importing_project_spec.rb. Expected to take 32.16 seconds.
459Trial flow for user picking company and importing a project
469To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
470Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"namespace_id"=>226, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>226, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess.
479To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
480Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"namespace_id"=>228, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>228, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess.
486# [RSpecRunTime] Finishing example group ee/spec/features/registrations/saas/trial_flow_company_importing_project_spec.rb. It took 28.85 seconds. Expected to take 32.16 seconds.
487# [RSpecRunTime] Starting example group ee/spec/features/registrations/saas/trial_flow_just_me_importing_project_spec.rb. Expected to take 26.65 seconds.
488Trial flow for user picking just me and importing a project
509# [RSpecRunTime] Finishing example group ee/spec/features/registrations/saas/trial_flow_just_me_importing_project_spec.rb. It took 28.45 seconds. Expected to take 26.65 seconds.
510# [RSpecRunTime] Starting example group ee/spec/features/issues/issue_actions_spec.rb. Expected to take 24.25 seconds.
545# [RSpecRunTime] Finishing example group ee/spec/features/issues/issue_actions_spec.rb. It took 26.76 seconds. Expected to take 24.25 seconds.
546# [RSpecRunTime] Starting example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_multiple_existing_namespace_flow_spec.rb. Expected to take 22.32 seconds.
547Duo Enterprise trial lead submission and creation with multiple eligible namespaces
548Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
568# [RSpecRunTime] Finishing example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_multiple_existing_namespace_flow_spec.rb. It took 21.37 seconds. Expected to take 22.32 seconds.
569# [RSpecRunTime] Starting example group ee/spec/features/dependency_proxy/packages/maven_spec.rb. Expected to take 20.08 seconds.
580To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
581newLocalFile: remove file "/builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload458988739": remove /builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload458988739: no such file or directory pulls and caches the remote file
585newLocalFile: remove file "/builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload554259814": remove /builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload554259814: no such file or directory deletes the cached file and proxy the remote file
622 behaves like pulling and caching the remote file
623newLocalFile: remove file "/builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload2639365366": remove /builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload2639365366: no such file or directory pulls and caches the remote file
632# [RSpecRunTime] Finishing example group ee/spec/features/dependency_proxy/packages/maven_spec.rb. It took 10.03 seconds. Expected to take 20.08 seconds.
633# [RSpecRunTime] Starting example group ee/spec/features/profiles/account_spec.rb. Expected to take 17.74 seconds.
680# [RSpecRunTime] Finishing example group ee/spec/features/projects/insights_spec.rb. It took 17.19 seconds. Expected to take 17.5 seconds.
681# [RSpecRunTime] Starting example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb. Expected to take 14.84 seconds.
682Duo Enterprise trial lead submission and creation with one eligible namespace
683Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
698# [RSpecRunTime] Finishing example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb. It took 14.09 seconds. Expected to take 14.84 seconds.
699# [RSpecRunTime] Starting example group ee/spec/features/projects/integrations/user_activates_github_spec.rb. Expected to take 13.06 seconds.
711# [RSpecRunTime] Finishing example group ee/spec/features/projects/integrations/user_activates_github_spec.rb. It took 13.53 seconds. Expected to take 13.06 seconds.
712# [RSpecRunTime] Starting example group ee/spec/features/groups/saml_group_links_spec.rb. Expected to take 12.43 seconds.
794# [RSpecRunTime] Finishing example group ee/spec/features/gitlab_subscriptions/trials/duo_pro/access_denied_spec.rb. It took 12.15 seconds. Expected to take 8.48 seconds.
795# [RSpecRunTime] Starting example group ee/spec/features/security/project/snippet/public_access_spec.rb. Expected to take 7.93 seconds.
833# [RSpecRunTime] Finishing example group ee/spec/features/security/project/snippet/public_access_spec.rb. It took 9.59 seconds. Expected to take 7.93 seconds.
834# [RSpecRunTime] Starting example group ee/spec/features/merge_request/sidebar_spec.rb. Expected to take 6.15 seconds.
848# [RSpecRunTime] Finishing example group ee/spec/features/projects/security/user_edits_on_demand_scan_spec.rb. It took 6.97 seconds. Expected to take 5.99 seconds.
857# [RSpecRunTime] Finishing example group ee/spec/features/admin/admin_show_new_user_signups_cap_alert_spec.rb. It took 4.25 seconds. Expected to take 4.26 seconds.
858# [RSpecRunTime] Starting example group ee/spec/features/groups/show_spec.rb. Expected to take 3.89 seconds.
879Group value s...lters and data (./ee/spec/features/groups/analytics/cycle_analytics/filters_and_data_spec.rb:5) – 01:12.562 (25381 / 36) of 05:15.532 (23.0%)
920 1) Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches
934 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
935 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
936 10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
937 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
938 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
941 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/
942 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
943 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
944 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
946 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
947 FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids),
949 SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
953 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
954 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
956 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
957 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
959 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
960 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
961 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
962 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
963 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
964 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/
965 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
966 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
967 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 23 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
968 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 23 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
969 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
971 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
972 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
973 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
974 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
976 (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
978 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
979 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
980 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
982 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
983 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
984 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
985 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
987 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
988 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
989 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
991 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/
992 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
993 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
995 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/
996 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
997 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
998 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
999 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1001 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
1002 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1003 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1005 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1006 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1008 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1009 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1011 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1012 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1014 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1015 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1017 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1018 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1020 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1021 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1023 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1024 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1026 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1027 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1029 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
1030 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
1031 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
1032 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
1033 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
1034 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
1035 101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
1036 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
1037 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
1038 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
1039 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.620444') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
1040 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.624695') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
1105 webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:"
1106 webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
1107 webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
1132rspec './ee/spec/features/projects/settings/ee/protected_branches_spec.rb[1:1:1:1:1]' # Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches
1165# [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. It took 26.56 seconds. Expected to take 53.75 seconds.
1166auto_explain log contains 1304 entries for main, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-12-16.14747.main.ndjson.gz