Running with gitlab-runner 17.4.0~pre.110.g27400594 (27400594)
  on blue-4.shared-gitlab-org.runners-manager.gitlab.com/default 8cwZ3F43, system ID: s_df0f7e24ca8b
  feature flags: FF_NETWORK_PER_BUILD:true
Resolving secrets
section_start:1726162272:prepare_executor
Preparing the "docker+machine" executor
Using Docker executor with image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 ...
Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1...
Authenticating with credentials from job payload (GitLab Registry)
Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1 ...
Using docker image sha256:82f132c22567f8ce17cc132c14b2f9aa3eaf9bb5424d91c2d966912433f0257d for registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:c55e1364ee4327b244a9cfa1750f19feea14fc774eaf792b725967d146eb45f5 ...
WARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 is already created. Ignoring.
WARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 is already created. Ignoring.
Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12...
Authenticating with credentials from job payload (GitLab Registry)
Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 ...
Using docker image sha256:5c5ba5b83d6c60cb0b225bd670b7a43be8c238cc72347d24af57e5027c3648f3 for registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:46aceab84c42d0e819c8e7940f2f98ce9e184785cd7b22d95872024a35f52407 ...
Starting service redis:6.2-alpine...
Pulling docker image redis:6.2-alpine ...
Using docker image sha256:7de0dedd123b8cb2b105ace4e8d00b8bba5ad7be39617dfa229acff315fe4fbf for redis:6.2-alpine with digest redis@sha256:2d1463258f2764328496376f5d965f20c6a67f66ea2b06dc42af351f75248792 ...
WARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 is already created. Ignoring.
WARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 is already created. Ignoring.
Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8...
Authenticating with credentials from job payload (GitLab Registry)
Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 ...
Using docker image sha256:df819140e3df737cdc7b8d6fb73ce804b05058c790e025b5f52840956feb1734 for registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:7bdf349fc3dd9da64bc6581d44c0e906bffd38977ddbd2668ba34adb5dedfe38 ...
Starting service elasticsearch:7.17.6...
Pulling docker image elasticsearch:7.17.6 ...
Using docker image sha256:5fad10241ffd65d817ed0ddfaf6e87eee1f7dc2a7db33db1047835560ea71fda for elasticsearch:7.17.6 with digest elasticsearch@sha256:6c128de5d01c0c130a806022d6bd99b3e4c27a9af5bfc33b6b81861ae117d028 ...
Starting service registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway:v1.15.0...
Authenticating with credentials from job payload (GitLab Registry)
Pulling docker image registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway:v1.15.0 ...
Using docker image sha256:a30dfbd70a5ce5c22a86589004a91775d1058abbf8fc0d6cf08a3024177a0d8e for registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway:v1.15.0 with digest registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway@sha256:067593f7d33000df515b665f8e988768376e97b66123fdcf2e016e23e3a8c5f3 ...
Waiting for services to be up and running (timeout 30 seconds)...

*** WARNING: Service runner-8cwz3f43-project-278964-concurrent-0-b163d417acfbcb18-elasticsearch-4 probably didn't start properly.

Health check error:
service "runner-8cwz3f43-project-278964-concurrent-0-b163d417acfbcb18-elasticsearch-4-wait-for-service" timeout

Health check container logs:
2024-09-12T17:31:22.609380032Z waiting for TCP connection to 7710fdd9a560 on [9200 9300]...
2024-09-12T17:31:22.611888342Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:22.627542721Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:23.635219808Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:23.635268178Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:24.636979377Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:24.637017137Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:25.638741106Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:25.638780675Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:26.639645674Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:26.639689574Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:27.641096623Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:27.641136933Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:28.642865762Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:28.642948742Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:29.644982630Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:29.645043550Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:30.646903489Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:30.646947618Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:31.648846537Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:31.648918037Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:32.650082006Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:32.650118896Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:33.651802645Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:33.651842625Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:34.653527103Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:34.653581153Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:35.654724262Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:35.654773442Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:36.656762631Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:36.656816781Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:37.658559399Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:37.658969390Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:38.659887058Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:38.659923958Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:39.660713397Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:39.660774477Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:40.661655666Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:40.661693366Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:41.662787484Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:41.662828394Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:42.663909023Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:42.664308563Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:43.664872201Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:43.665102191Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:44.666796490Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:44.666840440Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:45.667503378Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:45.667695868Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:46.668892568Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:46.669012908Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:47.670973226Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:47.671010556Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:48.672770634Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:48.672809554Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:49.674543673Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:49.674591563Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:50.675518272Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:50.675825312Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:51.677837890Z dialing 7710fdd9a560:9200...
2024-09-12T17:31:51.677881670Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:52.678825179Z dialing 7710fdd9a560:9300...
2024-09-12T17:31:52.678895839Z dialing 7710fdd9a560:9200...

Service container logs:
2024-09-12T17:31:30.307534189Z {"type": "server", "timestamp": "2024-09-12T17:31:30,270Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "version[7.17.6], pid[8], build[default/docker/f65e9d338dc1d07b642e14a27f338990148ee5b6/2022-08-23T11:08:48.893373482Z], OS[Linux/5.15.154+/amd64], JVM[Oracle Corporation/OpenJDK 64-Bit Server VM/18.0.2/18.0.2+9-61]" }
2024-09-12T17:31:30.308792400Z {"type": "server", "timestamp": "2024-09-12T17:31:30,307Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "JVM home [/usr/share/elasticsearch/jdk], using bundled JDK [true]" }
2024-09-12T17:31:30.309596119Z {"type": "server", "timestamp": "2024-09-12T17:31:30,308Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "JVM arguments [-Xshare:auto, -Des.networkaddress.cache.ttl=60, -Des.networkaddress.cache.negative.ttl=10, -XX:+AlwaysPreTouch, -Xss1m, -Djava.awt.headless=true, -Dfile.encoding=UTF-8, -Djna.nosys=true, -XX:-OmitStackTraceInFastThrow, -XX:+ShowCodeDetailsInExceptionMessages, -Dio.netty.noUnsafe=true, -Dio.netty.noKeySetOptimization=true, -Dio.netty.recycler.maxCapacityPerThread=0, -Dio.netty.allocator.numDirectArenas=0, -Dlog4j.shutdownHookEnabled=false, -Dlog4j2.disable.jmx=true, -Dlog4j2.formatMsgNoLookups=true, -Djava.locale.providers=SPI,COMPAT, --add-opens=java.base/java.io=ALL-UNNAMED, -Djava.security.manager=allow, -XX:+UseG1GC, -Djava.io.tmpdir=/tmp/elasticsearch-7623164299679700715, -XX:+HeapDumpOnOutOfMemoryError, -XX:+ExitOnOutOfMemoryError, -XX:HeapDumpPath=data, -XX:ErrorFile=logs/hs_err_pid%p.log, -Xlog:gc*,gc+age=trace,safepoint:file=logs/gc.log:utctime,pid,tags:filecount=32,filesize=64m, -Des.cgroups.hierarchy.override=/, -Xms256m, -Xmx256m, -XX:MaxDirectMemorySize=134217728, -XX:G1HeapRegionSize=4m, -XX:InitiatingHeapOccupancyPercent=30, -XX:G1ReservePercent=15, -Des.path.home=/usr/share/elasticsearch, -Des.path.conf=/usr/share/elasticsearch/config, -Des.distribution.flavor=default, -Des.distribution.type=docker, -Des.bundled_jdk=true]" }
2024-09-12T17:31:36.733056274Z {"type": "server", "timestamp": "2024-09-12T17:31:36,732Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [aggs-matrix-stats]" }
2024-09-12T17:31:36.733743194Z {"type": "server", "timestamp": "2024-09-12T17:31:36,733Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [analysis-common]" }
2024-09-12T17:31:36.734553654Z {"type": "server", "timestamp": "2024-09-12T17:31:36,733Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [constant-keyword]" }
2024-09-12T17:31:36.734934163Z {"type": "server", "timestamp": "2024-09-12T17:31:36,734Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [frozen-indices]" }
2024-09-12T17:31:36.739442373Z {"type": "server", "timestamp": "2024-09-12T17:31:36,735Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [ingest-common]" }
2024-09-12T17:31:36.739868963Z {"type": "server", "timestamp": "2024-09-12T17:31:36,739Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [ingest-geoip]" }
2024-09-12T17:31:36.741219723Z {"type": "server", "timestamp": "2024-09-12T17:31:36,740Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [ingest-user-agent]" }
2024-09-12T17:31:36.741537593Z {"type": "server", "timestamp": "2024-09-12T17:31:36,741Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [kibana]" }
2024-09-12T17:31:36.741844883Z {"type": "server", "timestamp": "2024-09-12T17:31:36,741Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [lang-expression]" }
2024-09-12T17:31:36.742293933Z {"type": "server", "timestamp": "2024-09-12T17:31:36,742Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [lang-mustache]" }
2024-09-12T17:31:36.742583933Z {"type": "server", "timestamp": "2024-09-12T17:31:36,742Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [lang-painless]" }
2024-09-12T17:31:36.742897493Z {"type": "server", "timestamp": "2024-09-12T17:31:36,742Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [legacy-geo]" }
2024-09-12T17:31:36.743442333Z {"type": "server", "timestamp": "2024-09-12T17:31:36,743Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [mapper-extras]" }
2024-09-12T17:31:36.750984122Z {"type": "server", "timestamp": "2024-09-12T17:31:36,750Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [mapper-version]" }
2024-09-12T17:31:36.751566742Z {"type": "server", "timestamp": "2024-09-12T17:31:36,751Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [parent-join]" }
2024-09-12T17:31:36.751923852Z {"type": "server", "timestamp": "2024-09-12T17:31:36,751Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [percolator]" }
2024-09-12T17:31:36.752761452Z {"type": "server", "timestamp": "2024-09-12T17:31:36,752Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [rank-eval]" }
2024-09-12T17:31:36.753300252Z {"type": "server", "timestamp": "2024-09-12T17:31:36,753Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [reindex]" }
2024-09-12T17:31:36.753657342Z {"type": "server", "timestamp": "2024-09-12T17:31:36,753Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [repositories-metering-api]" }
2024-09-12T17:31:36.754230752Z {"type": "server", "timestamp": "2024-09-12T17:31:36,753Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [repository-encrypted]" }
2024-09-12T17:31:36.754615132Z {"type": "server", "timestamp": "2024-09-12T17:31:36,754Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [repository-url]" }
2024-09-12T17:31:36.755403132Z {"type": "server", "timestamp": "2024-09-12T17:31:36,755Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [runtime-fields-common]" }
2024-09-12T17:31:36.755856062Z {"type": "server", "timestamp": "2024-09-12T17:31:36,755Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [search-business-rules]" }
2024-09-12T17:31:36.756672781Z {"type": "server", "timestamp": "2024-09-12T17:31:36,756Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [searchable-snapshots]" }
2024-09-12T17:31:36.757025961Z {"type": "server", "timestamp": "2024-09-12T17:31:36,756Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [snapshot-repo-test-kit]" }
2024-09-12T17:31:36.757728081Z {"type": "server", "timestamp": "2024-09-12T17:31:36,757Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [spatial]" }
2024-09-12T17:31:36.758279892Z {"type": "server", "timestamp": "2024-09-12T17:31:36,758Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [transform]" }
2024-09-12T17:31:36.758620672Z {"type": "server", "timestamp": "2024-09-12T17:31:36,758Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [transport-netty4]" }
2024-09-12T17:31:36.759097801Z {"type": "server", "timestamp": "2024-09-12T17:31:36,758Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [unsigned-long]" }
2024-09-12T17:31:36.759455041Z {"type": "server", "timestamp": "2024-09-12T17:31:36,759Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [vector-tile]" }
2024-09-12T17:31:36.759788761Z {"type": "server", "timestamp": "2024-09-12T17:31:36,759Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [vectors]" }
2024-09-12T17:31:36.760204481Z {"type": "server", "timestamp": "2024-09-12T17:31:36,759Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [wildcard]" }
2024-09-12T17:31:36.760534131Z {"type": "server", "timestamp": "2024-09-12T17:31:36,760Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-aggregate-metric]" }
2024-09-12T17:31:36.760890721Z {"type": "server", "timestamp": "2024-09-12T17:31:36,760Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-analytics]" }
2024-09-12T17:31:36.761499441Z {"type": "server", "timestamp": "2024-09-12T17:31:36,760Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-async]" }
2024-09-12T17:31:36.761853851Z {"type": "server", "timestamp": "2024-09-12T17:31:36,761Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-async-search]" }
2024-09-12T17:31:36.762214261Z {"type": "server", "timestamp": "2024-09-12T17:31:36,761Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-autoscaling]" }
2024-09-12T17:31:36.762571991Z {"type": "server", "timestamp": "2024-09-12T17:31:36,762Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-ccr]" }
2024-09-12T17:31:36.762900621Z {"type": "server", "timestamp": "2024-09-12T17:31:36,762Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-core]" }
2024-09-12T17:31:36.763152411Z {"type": "server", "timestamp": "2024-09-12T17:31:36,762Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-data-streams]" }
2024-09-12T17:31:36.763416391Z {"type": "server", "timestamp": "2024-09-12T17:31:36,763Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-deprecation]" }
2024-09-12T17:31:36.763606261Z {"type": "server", "timestamp": "2024-09-12T17:31:36,763Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-enrich]" }
2024-09-12T17:31:36.763814871Z {"type": "server", "timestamp": "2024-09-12T17:31:36,763Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-eql]" }
2024-09-12T17:31:36.764022391Z {"type": "server", "timestamp": "2024-09-12T17:31:36,763Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-fleet]" }
2024-09-12T17:31:36.764238621Z {"type": "server", "timestamp": "2024-09-12T17:31:36,763Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-graph]" }
2024-09-12T17:31:36.764440371Z {"type": "server", "timestamp": "2024-09-12T17:31:36,764Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-identity-provider]" }
2024-09-12T17:31:36.764639781Z {"type": "server", "timestamp": "2024-09-12T17:31:36,764Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-ilm]" }
2024-09-12T17:31:36.764869451Z {"type": "server", "timestamp": "2024-09-12T17:31:36,764Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-logstash]" }
2024-09-12T17:31:36.765086861Z {"type": "server", "timestamp": "2024-09-12T17:31:36,764Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-ml]" }
2024-09-12T17:31:36.765330351Z {"type": "server", "timestamp": "2024-09-12T17:31:36,765Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-monitoring]" }
2024-09-12T17:31:36.765564671Z {"type": "server", "timestamp": "2024-09-12T17:31:36,765Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-ql]" }
2024-09-12T17:31:36.765781191Z {"type": "server", "timestamp": "2024-09-12T17:31:36,765Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-rollup]" }
2024-09-12T17:31:36.766028631Z {"type": "server", "timestamp": "2024-09-12T17:31:36,765Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-security]" }
2024-09-12T17:31:36.766244561Z {"type": "server", "timestamp": "2024-09-12T17:31:36,765Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-shutdown]" }
2024-09-12T17:31:36.769550240Z {"type": "server", "timestamp": "2024-09-12T17:31:36,769Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-sql]" }
2024-09-12T17:31:36.769758100Z {"type": "server", "timestamp": "2024-09-12T17:31:36,769Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-stack]" }
2024-09-12T17:31:36.769995400Z {"type": "server", "timestamp": "2024-09-12T17:31:36,769Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-text-structure]" }
2024-09-12T17:31:36.770238550Z {"type": "server", "timestamp": "2024-09-12T17:31:36,769Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-voting-only-node]" }
2024-09-12T17:31:36.770422280Z {"type": "server", "timestamp": "2024-09-12T17:31:36,770Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-watcher]" }
2024-09-12T17:31:36.771073720Z {"type": "server", "timestamp": "2024-09-12T17:31:36,770Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "no plugins loaded" }
2024-09-12T17:31:36.970809822Z {"type": "server", "timestamp": "2024-09-12T17:31:36,964Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "using [1] data paths, mounts [[/ (overlay)]], net usable_space [24.6gb], net total_space [45gb], types [overlay]" }
2024-09-12T17:31:36.973871312Z {"type": "server", "timestamp": "2024-09-12T17:31:36,973Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "heap size [256mb], compressed ordinary object pointers [true]" }
2024-09-12T17:31:37.128655298Z {"type": "server", "timestamp": "2024-09-12T17:31:37,128Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "node name [7710fdd9a560], node ID [akptSJ-hRLil__yn4q2MlQ], cluster name [docker-cluster], roles [transform, data_frozen, master, remote_cluster_client, data, ml, data_content, data_hot, data_warm, data_cold, ingest]" }
2024-09-12T17:31:50.088757626Z {"type": "server", "timestamp": "2024-09-12T17:31:50,087Z", "level": "INFO", "component": "o.e.x.m.p.l.CppLogMessageHandler", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "[controller/211] [Main.cc@122] controller (64 bit): Version 7.17.6 (Build ea0305ae2a3b09) Copyright (c) 2022 Elasticsearch BV" }
2024-09-12T17:31:51.308364974Z {"type": "server", "timestamp": "2024-09-12T17:31:51,307Z", "level": "INFO", "component": "o.e.i.g.ConfigDatabases", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "initialized default databases [[GeoLite2-Country.mmdb, GeoLite2-City.mmdb, GeoLite2-ASN.mmdb]], config databases [[]] and watching [/usr/share/elasticsearch/config/ingest-geoip] for changes" }
2024-09-12T17:31:51.310446364Z {"type": "server", "timestamp": "2024-09-12T17:31:51,310Z", "level": "INFO", "component": "o.e.i.g.DatabaseNodeService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "initialized database registry, using geoip-databases directory [/tmp/elasticsearch-7623164299679700715/geoip-databases/akptSJ-hRLil__yn4q2MlQ]" }
2024-09-12T17:31:52.717145165Z {"type": "server", "timestamp": "2024-09-12T17:31:52,716Z", "level": "INFO", "component": "o.e.t.NettyAllocator", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "creating NettyAllocator with the following configs: [name=unpooled, suggested_max_allocation_size=1mb, factors={es.unsafe.use_unpooled_allocator=null, g1gc_enabled=true, g1gc_region_size=4mb, heap_size=256mb}]" }
2024-09-12T17:31:52.855898362Z {"type": "server", "timestamp": "2024-09-12T17:31:52,855Z", "level": "INFO", "component": "o.e.i.r.RecoverySettings", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "using rate limit [40mb] with [default=40mb, read=0b, write=0b, max=0b]" }
2024-09-12T17:31:53.007780919Z {"type": "server", "timestamp": "2024-09-12T17:31:53,006Z", "level": "INFO", "component": "o.e.d.DiscoveryModule", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "using discovery type [single-node] and seed hosts providers [settings]" }

*********

Authenticating with credentials from job payload (GitLab Registry)
Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 ...
Using docker image sha256:533b69d21cbef3edef3b4fa4c5106d4fe43a2d2e80f65333682de7f2d5ac1800 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14@sha256:b25c1b0aa2724a8dc6571d9ee6edbadc50e2d4eab75d2ce2c3f35f9e2f74acfe ...
section_end:1726162313:prepare_executor
section_start:1726162313:prepare_script
Preparing environment
Running on runner-8cwz3f43-project-278964-concurrent-0 via runner-8cwz3f43-shared-gitlab-org-1726154698-495c6e45...
section_end:1726162314:prepare_script
section_start:1726162314:get_sources
Getting source from Git repository
Skipping Git repository setup
Skipping Git checkout
Skipping Git submodules setup
section_end:1726162315:get_sources
section_start:1726162315:restore_cache
Restoring cache
Checking cache for ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-19...
Downloading cache from https://storage.googleapis.com/gitlab-com-runners-cache/project/278964/ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-19  ETag="d3be8518af533e9e39e20571060155d0"
Successfully extracted cache
section_end:1726162343:restore_cache
section_start:1726162343:download_artifacts
Downloading artifacts
Downloading artifacts for clone-gitlab-repo (7812354413)...
Downloading artifacts from coordinator... ok        host=storage.googleapis.com id=7812354413 responseStatus=200 OK token=glcbt-66
WARNING: Part of .git directory is on the list of files to extract 
WARNING: This may introduce unexpected problems    
Downloading artifacts for compile-test-assets (7812354461)...
Downloading artifacts from coordinator... ok        host=storage.googleapis.com id=7812354461 responseStatus=200 OK token=glcbt-66
Downloading artifacts for retrieve-tests-metadata (7812354510)...
Downloading artifacts from coordinator... ok        host=storage.googleapis.com id=7812354510 responseStatus=200 OK token=glcbt-66
Downloading artifacts for setup-test-env (7812354483)...
Downloading artifacts from coordinator... ok        host=storage.googleapis.com id=7812354483 responseStatus=200 OK token=glcbt-66
section_end:1726162393:download_artifacts
section_start:1726162393:step_script
Executing "step_script" stage of the job script
Using docker image sha256:533b69d21cbef3edef3b4fa4c5106d4fe43a2d2e80f65333682de7f2d5ac1800 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14@sha256:b25c1b0aa2724a8dc6571d9ee6edbadc50e2d4eab75d2ce2c3f35f9e2f74acfe ...
$ echo $FOSS_ONLY

$ [ "$FOSS_ONLY" = "1" ] && rm -rf ee/ qa/spec/ee/ qa/qa/specs/features/ee/ qa/qa/ee/ qa/qa/ee.rb
$ export GOPATH=$CI_PROJECT_DIR/.go
$ mkdir -p $GOPATH
$ source scripts/utils.sh
$ log_disk_usage before_script
[log_disk_usage before_script] start
df -h
Filesystem      Size  Used Avail Use% Mounted on
overlay          46G   24G   22G  54% /
tmpfs            64M     0   64M   0% /dev
shm             256M     0  256M   0% /dev/shm
/dev/sda1        46G   24G   22G  54% /cache
tmpfs           3.9G     0  3.9G   0% /sys/devices/virtual/dmi/id
tmpfs           3.9G     0  3.9G   0% /proc/acpi
tmpfs           3.9G     0  3.9G   0% /proc/scsi
tmpfs           3.9G     0  3.9G   0% /sys/firmware
du -h -d 1
7.4M	./workhorse
148K	./bin
1.2M	./.gitlab
193M	./.git
4.0K	./builds
28M	./lib
8.0K	./.vscode
516K	./storybook
20K	./log
1.8M	./data
9.9M	./qa
2.9M	./.rubocop_todo
1.1G	./vendor
943M	./public
59M	./doc
480K	./danger
108K	./rspec
548K	./tooling
140M	./ee
1.3M	./knapsack
296K	./patches
4.3M	./changelogs
20K	./haml_lint
28K	./metrics_server
88K	./keeps
48K	./shared
44K	./generator_templates
1.2M	./scripts
660M	./tmp
125M	./spec
20K	./file_hooks
16K	./sidekiq_cluster
16M	./gems
1.2M	./fixtures
948K	./rubocop
4.0K	./.go
30M	./db
12K	./.github
125M	./locale
1.9M	./glfm_specification
17M	./config
80M	./app
16K	./.lefthook
3.5G	.
[log_disk_usage before_script] end
$ source scripts/prepare_build.sh
section_start:1726162402:bundle-install[collapsed=true]
Installing gems
3.3.27
Bundler version 2.3.27
production:development
Settings are listed in order of priority. The top value will be used.
clean
Set for your local app (/builds/gitlab-org/gitlab/.bundle/config): true

frozen
Set via BUNDLE_FROZEN: true

gemfile
Set via BUNDLE_GEMFILE: "/builds/gitlab-org/gitlab/Gemfile"

install_flags
Set via BUNDLE_INSTALL_FLAGS: "--jobs=$(nproc) --retry=3"

path
Set for your local app (/builds/gitlab-org/gitlab/.bundle/config): "/builds/gitlab-org/gitlab/vendor"

without
Set via BUNDLE_WITHOUT: [:production, :development]

$ bundle install --jobs=$(nproc) --retry=3 
Don't run Bundler as root. Installing your bundle as root will break this
application for all non-root users on this machine.
Patching bundler with bundler-checksum...
Bundle complete! 363 Gemfile dependencies, 678 gems now installed.
Gems in the groups 'production' and 'development' were not installed.
Bundled gems are installed into `./vendor`
3 installed gems you directly depend on are looking for funding.
  Run `bundle fund` for details
==> 'bundle install --jobs=$(nproc) --retry=3 ' succeeded in 3 seconds.
$ bundle pristine pg
Patching bundler with bundler-checksum...
Installing pg 1.5.6 with native extensions
==> 'bundle pristine pg' succeeded in 21 seconds.
section_end:1726162429:bundle-install

Using decomposed database config (config/database.yml.decomposed-postgresql)
Geo DB will be set up.
Embedding DB will be set up.
section_start:1726162429:setup-db[collapsed=true]
Setting up DBs
CREATE ROLE
GRANT
$ bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes
Dropped database 'gitlabhq_test'
Dropped database 'gitlabhq_test_ci'
Dropped database 'gitlabhq_geo_test'
Dropped database 'gitlabhq_embedding_test'
Created database 'gitlabhq_test'
Created database 'gitlabhq_test_ci'
Created database 'gitlabhq_geo_test'
Created database 'gitlabhq_embedding_test'
embedding: == [advisory_lock_connection] object_id: 127960, pg_backend_pid: 126
embedding: == 20240608215318 DropVertexGitlabDocsTable: migrating ========================
embedding: -- drop_table(:vertex_gitlab_docs)
embedding:    -> 0.0031s
embedding: == 20240608215318 DropVertexGitlabDocsTable: migrated (0.1064s) ===============

embedding: == [advisory_lock_connection] object_id: 127960, pg_backend_pid: 126
==> 'bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes' succeeded in 106 seconds.
SELECT pg_catalog.set_config('search_path', '', false);
CREATE DATABASE praefect_test ENCODING 'UTF8';
section_end:1726162537:setup-db

$ source ./scripts/rspec_helpers.sh
$ run_timed_command "gem install knapsack --no-document"
$ gem install knapsack --no-document
Successfully installed knapsack-4.0.0
1 gem installed
==> 'gem install knapsack --no-document' succeeded in 1 seconds.
$ section_start "gitaly-test-spawn" "Spawning Gitaly"; scripts/gitaly-test-spawn; section_end "gitaly-test-spawn"
section_start:1726162538:gitaly-test-spawn[collapsed=true]
Spawning Gitaly
Trying to connect to gitaly: ........ OK
Trying to connect to gitaly2: ......... OK
Starting Praefect with in-memory election strategyTrying to connect to praefect: ..... OK
section_end:1726162544:gitaly-test-spawn

$ export RSPEC_SKIPPED_TESTS_REPORT_PATH="rspec/skipped_tests-${CI_JOB_ID}.txt"
$ export RSPEC_RETRIED_TESTS_REPORT_PATH="rspec/retried_tests-${CI_JOB_ID}.txt"
$ tooling/bin/create_job_metrics_file || true
[job-metrics] Creating the job metrics file for the CI/CD job.
$ rspec_section rspec_parallelized_job "--fail-fast=${RSPEC_FAIL_FAST_THRESHOLD} --tag ~quarantine --tag ~level:background_migration --tag ~click_house"
section_start:1726162548:rspec[collapsed=false]
RSpec
[17:35:48] Starting rspec_parallelized_job
RETRY_FAILED_TESTS_IN_NEW_PROCESS: true
KNAPSACK_GENERATE_REPORT: true
FLAKY_RSPEC_GENERATE_REPORT: true
KNAPSACK_TEST_FILE_PATTERN: {ee/}spec/{features}{,/**/}*_spec.rb
KNAPSACK_LOG_LEVEL: debug
KNAPSACK_REPORT_PATH: knapsack/rspec-ee_system_pg14_12_16_278964_report.json
FLAKY_RSPEC_SUITE_REPORT_PATH: rspec/flaky/report-suite.json
FLAKY_RSPEC_REPORT_PATH: rspec/flaky/all_rspec-ee_system_pg14_12_16_278964_report.json
NEW_FLAKY_RSPEC_REPORT_PATH: rspec/flaky/new_rspec-ee_system_pg14_12_16_278964_report.json
RSPEC_SKIPPED_TESTS_REPORT_PATH: rspec/skipped_tests-7812354946.txt
CRYSTALBALL: 
RSPEC_TESTS_MAPPING_ENABLED: 
RSPEC_TESTS_FILTER_FILE: 
Shell set options (set -o) enabled:
braceexpand    	on
hashall        	on
interactive-comments	on
pipefail       	on
Knapsack report generator started!
warning: parser/current is loading parser/ruby31, which recognizes 3.1.6-compliant syntax, but you are running 3.1.5.
Please see https://github.com/whitequark/parser#compatibility-with-ruby-mri.
Run options: exclude {:quarantine=>true, :level=>"background_migration", :click_house=>true}

# [RSpecRunTime] Starting RSpec timer...
[TEST PROF INFO] EventProf enabled (sql.active_record)
unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String.
unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String.

Test environment set up in 3.390606462 seconds
# [RSpecRunTime] Starting example group ee/spec/features/groups/analytics/cycle_analytics/filters_and_data_spec.rb. Expected to take 5 minutes 46.08 seconds.

Group value stream analytics filters and data
Starting the Capybara driver server...
  with no value streams
    behaves like empty state
Capybara starting Puma...
* Version 6.4.0, codename: The Eagle of Durango
* Min threads: 0, max threads: 4
* Listening on unix:///tmp/20240912-331-irdj08
      renders the empty state
  with value streams
    without valid query parameters set
      with created_after date > created_before date
        displays empty text
# [RSpecRunTime] RSpec elapsed time: 52.42 seconds. Current RSS: ~1398M. Threads: 12. load average: 1.62 1.52 1.71 2/498 598
.

      with fake parameters
        displays an empty state
# [RSpecRunTime] RSpec elapsed time: 58.94 seconds. Current RSS: ~1436M. Threads: 15. load average: 1.65 1.53 1.71 1/502 635
.

    with valid query parameters set
      with project_ids set
        has the projects dropdown prepopulated
# [RSpecRunTime] RSpec elapsed time: 1 minute 3.31 seconds. Current RSS: ~1465M. Threads: 15. load average: 1.84 1.57 1.73 1/503 638
.

      with created_before and created_after set
        shows predefined date ranges dropdown with `Custom` option selected
        behaves like date range prepopulated
          has the date range prepopulated
# [RSpecRunTime] RSpec elapsed time: 1 minute 12.11 seconds. Current RSS: ~1465M. Threads: 15. load average: 1.79 1.57 1.72 1/500 643
.

    with a group
      behaves like group value stream analytics
        stage table
          displays an empty state and hide stage table
# [RSpecRunTime] RSpec elapsed time: 1 minute 16.9 seconds. Current RSS: ~1455M. Threads: 15. load average: 2.04 1.63 1.74 1/500 646
.

        navigation
          shows the path navigation
          each stage will have median values
          displays the default list of stages
# [RSpecRunTime] RSpec elapsed time: 1 minute 29.95 seconds. Current RSS: ~1470M. Threads: 15. load average: 2.03 1.64 1.74 1/501 653
.

      behaves like has overview metrics
        displays lifecycle metrics
# [RSpecRunTime] RSpec elapsed time: 1 minute 35.25 seconds. Current RSS: ~1462M. Threads: 15. load average: 1.95 1.63 1.74 1/500 656
.

      behaves like has default filters
        shows the projects filter
        shows the filter bar
        shows the predefined date ranges dropdown with `Last 30 days` selected
        does not show the date range picker
# [RSpecRunTime] RSpec elapsed time: 1 minute 54.8 seconds. Current RSS: ~1462M. Threads: 15. load average: 1.91 1.64 1.74 1/501 665
.

      behaves like value streams dashboard link
        renders a link to the group dashboard
# [RSpecRunTime] RSpec elapsed time: 1 minute 59.78 seconds. Current RSS: ~1458M. Threads: 15. load average: 1.84 1.63 1.73 1/501 668
.

    with a sub group
      behaves like group value stream analytics
        stage table
          displays an empty state and hide stage table
# [RSpecRunTime] RSpec elapsed time: 2 minutes 5.38 seconds. Current RSS: ~1459M. Threads: 15. load average: 1.71 1.60 1.73 1/501 671
.

        navigation
          shows the path navigation
          each stage will have median values
          displays the default list of stages
# [RSpecRunTime] RSpec elapsed time: 2 minutes 18.85 seconds. Current RSS: ~1460M. Threads: 15. load average: 1.60 1.58 1.72 1/501 679
.

      behaves like has overview metrics
        displays lifecycle metrics
# [RSpecRunTime] RSpec elapsed time: 2 minutes 23.53 seconds. Current RSS: ~1461M. Threads: 15. load average: 2.03 1.67 1.75 1/501 681
.

      behaves like has default filters
        shows the projects filter
        shows the filter bar
        shows the predefined date ranges dropdown with `Last 30 days` selected
        does not show the date range picker
# [RSpecRunTime] RSpec elapsed time: 2 minutes 41.35 seconds. Current RSS: ~1467M. Threads: 15. load average: 2.18 1.73 1.76 1/501 690
.

      behaves like value streams dashboard link
        renders a link to the group dashboard
# [RSpecRunTime] RSpec elapsed time: 2 minutes 46.07 seconds. Current RSS: ~1468M. Threads: 15. load average: 2.32 1.77 1.78 1/501 693
.

  with a predefined date range
    predefined_date_range: "Last week", expected_events_count: 1
      stage table
        displays the correct number of events when a predefined date range is selected
# [RSpecRunTime] RSpec elapsed time: 2 minutes 56.65 seconds. Current RSS: ~1459M. Threads: 15. load average: 2.36 1.79 1.78 1/501 696
.

    predefined_date_range: "Last 30 days", expected_events_count: 2
      stage table
        displays the correct number of events when a predefined date range is selected
# [RSpecRunTime] RSpec elapsed time: 3 minutes 3.17 seconds. Current RSS: ~1458M. Threads: 15. load average: 2.97 1.93 1.83 1/501 699
.

    predefined_date_range: "Last 90 days", expected_events_count: 3
      stage table
        displays the correct number of events when a predefined date range is selected
# [RSpecRunTime] RSpec elapsed time: 3 minutes 12.78 seconds. Current RSS: ~1444M. Threads: 15. load average: 2.96 1.96 1.84 1/501 702
.

    predefined_date_range: "Last 180 days", expected_events_count: 4
      stage table
        displays the correct number of events when a predefined date range is selected
# [RSpecRunTime] RSpec elapsed time: 3 minutes 22.38 seconds. Current RSS: ~1443M. Threads: 15. load average: 2.66 1.93 1.83 1/501 705
.

  with lots of data
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    each stage with events will display the stage events list when selected
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    each stage will be selectable
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    will not display the stage table on the overview stage
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    displays the duration overview chart on the overview stage
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    will have data available
    with filters applied
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      will filter the data
# [RSpecRunTime] RSpec elapsed time: 5 minutes 22.36 seconds. Current RSS: ~1460M. Threads: 15. load average: 2.24 1.87 1.81 1/501 4502
.


# [RSpecRunTime] Finishing example group ee/spec/features/groups/analytics/cycle_analytics/filters_and_data_spec.rb. It took 5 minutes 15.56 seconds. Expected to take 5 minutes 46.08 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/groups/members/manage_members_spec.rb. Expected to take 3 minutes 18.49 seconds.

Groups > Members > Manage members
  with overage modal concerns
    when adding a member to a free group
      adding one user with a given role doesn't trigger an overage modal
# [RSpecRunTime] RSpec elapsed time: 5 minutes 34.16 seconds. Current RSS: ~1453M. Threads: 15. load average: 2.05 1.84 1.80 1/501 4509
.

    when adding a member to a premium group
      when there is no free spaces in the subscription
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
        shows a modal and invites them to a group if confirmed
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
        shows a modal and invites them to a group if confirmed
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
        shows a modal and invites them to a group if confirmed
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
        shows a modal and invites them to a group if confirmed
# [RSpecRunTime] RSpec elapsed time: 6 minutes 15.23 seconds. Current RSS: ~1485M. Threads: 14. load average: 2.00 1.86 1.81 1/499 4527
.

      when there is one free space in the subscription
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
        adding one user with a given role doesn't trigger an overage modal
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
        adding two users triggers overage modal
# [RSpecRunTime] RSpec elapsed time: 6 minutes 30.82 seconds. Current RSS: ~1479M. Threads: 14. load average: 1.92 1.85 1.81 1/500 4536
.

      when modal is shown
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
        get back to initial modal if not confirmed
# [RSpecRunTime] RSpec elapsed time: 6 minutes 36.33 seconds. Current RSS: ~1480M. Threads: 14. load average: 1.85 1.84 1.81 1/501 4540
.

    when adding a member to a ultimate group with no places left
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      adding one user with a given role doesn't trigger an overage modal
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      shows a modal and invites them to a group if confirmed
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      adding one user with a given role doesn't trigger an overage modal
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      shows a modal and invites them to a group if confirmed
# [RSpecRunTime] RSpec elapsed time: 7 minutes 11.48 seconds. Current RSS: ~1500M. Threads: 14. load average: 2.05 1.90 1.83 1/502 4562
.

    when adding a member to a ultimate group that alerady has an overage
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      shows a modal and invites them to a group if confirmed
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      adding one user with a given role doesn't trigger an overage modal
# [RSpecRunTime] RSpec elapsed time: 7 minutes 29.71 seconds. Current RSS: ~1489M. Threads: 14. load average: 2.27 1.96 1.85 1/502 4572
.

    when adding to a group not eligible for reconciliation
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      adding one user with a given role doesn't trigger an overage modal
# [RSpecRunTime] RSpec elapsed time: 7 minutes 39.89 seconds. Current RSS: ~1494M. Threads: 14. load average: 2.15 1.94 1.84 1/503 4579
.

  with enterprise users
    when domain_verification feature is available for the group
      can disable two-factor authentication
# [RSpecRunTime] RSpec elapsed time: 7 minutes 46.43 seconds. Current RSS: ~1496M. Threads: 14. load average: 2.21 1.96 1.85 1/504 4583
.

  with banned members
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    owner can unban banned users
    when feature flag is disabled
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      owner cannot see banned users
# [RSpecRunTime] RSpec elapsed time: 8 minutes 1.13 seconds. Current RSS: ~1499M. Threads: 14. load average: 2.62 2.06 1.88 1/504 4594
.

    when licensed feature is not available
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      owner cannot see banned users
# [RSpecRunTime] RSpec elapsed time: 8 minutes 4.3 seconds. Current RSS: ~1501M. Threads: 14. load average: 2.62 2.06 1.88 1/504 4598
.

  banning
    allows owner to ban a member
    when non-owner
      behaves like action is not available
        action is not available
# [RSpecRunTime] RSpec elapsed time: 8 minutes 13.76 seconds. Current RSS: ~1506M. Threads: 14. load average: 2.61 2.08 1.89 2/503 4602
.

    when feature flag is disabled
      behaves like action is not available
        action is not available
# [RSpecRunTime] RSpec elapsed time: 8 minutes 16.82 seconds. Current RSS: ~1511M. Threads: 14. load average: 2.48 2.06 1.89 1/504 4605
.

    when licensed feature is not available
      behaves like action is not available
        action is not available
# [RSpecRunTime] RSpec elapsed time: 8 minutes 19.73 seconds. Current RSS: ~1511M. Threads: 14. load average: 2.48 2.06 1.89 2/504 4608
.

  with free user limit
    when at free user limit
      shows the alert notification in the modal
# [RSpecRunTime] RSpec elapsed time: 8 minutes 23.02 seconds. Current RSS: ~1511M. Threads: 13. load average: 2.36 2.04 1.88 1/502 4610
.

    when close to free user limit on new top-level group
      shows the alert notification in the modal
# [RSpecRunTime] RSpec elapsed time: 8 minutes 34.07 seconds. Current RSS: ~1487M. Threads: 13. load average: 2.37 2.05 1.89 1/502 4621
.

  with an active trial
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    shows the active trial unlimited members alert
# [RSpecRunTime] RSpec elapsed time: 8 minutes 37.56 seconds. Current RSS: ~1493M. Threads: 14. load average: 2.26 2.04 1.88 2/503 4625
.


# [RSpecRunTime] Finishing example group ee/spec/features/groups/members/manage_members_spec.rb. It took 3 minutes 15.12 seconds. Expected to take 3 minutes 18.49 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/ci_shared_runner_warnings_spec.rb. Expected to take 2 minutes 41.74 seconds.

CI shared runner limits
  membership_level: :owner, visible: true
    when on a project related page
      warning level
        when there is a notification and minutes still exist
          displays a warning message on pipelines page
          displays a warning message on project homepage
          displays a warning message on a job page
# [RSpecRunTime] RSpec elapsed time: 8 minutes 57.93 seconds. Current RSS: ~1529M. Threads: 15. load average: 2.19 2.03 1.89 2/510 5073
.

      danger level
        when there is a notification and minutes still exist
          displays a warning message on pipelines page
          displays a warning message on project homepage
          displays a warning message on a job page
# [RSpecRunTime] RSpec elapsed time: 9 minutes 13.5 seconds. Current RSS: ~1527M. Threads: 15. load average: 2.29 2.06 1.90 1/510 5482
.

      when limit is exceeded
        displays a warning message on project homepage
        displays a warning message on pipelines page
        displays a warning message on a job page
        when in a subgroup
          displays a warning message on subproject homepage
# [RSpecRunTime] RSpec elapsed time: 9 minutes 37.49 seconds. Current RSS: ~1523M. Threads: 15. load average: 2.35 2.09 1.91 1/510 6177
.

      when limit not yet exceeded
        does not display a warning message on project homepage
        does not display a warning message on pipelines page
        displays a warning message on a job page
# [RSpecRunTime] RSpec elapsed time: 9 minutes 45.63 seconds. Current RSS: ~1535M. Threads: 15. load average: 2.14 2.06 1.90 1/509 6384
.

    when on a group related page
      warning level
        when there is a notification and minutes still exist
          displays a warning message on group information page
# [RSpecRunTime] RSpec elapsed time: 9 minutes 50.64 seconds. Current RSS: ~1534M. Threads: 15. load average: 2.05 2.04 1.90 1/510 6437
.

      danger level
        when there is a notification and minutes still exist
          displays a warning message on group information page
# [RSpecRunTime] RSpec elapsed time: 9 minutes 55.38 seconds. Current RSS: ~1529M. Threads: 15. load average: 2.04 2.04 1.90 1/510 6490
.

      when limit is exceeded
        displays a warning message on group information page
# [RSpecRunTime] RSpec elapsed time: 9 minutes 59.98 seconds. Current RSS: ~1529M. Threads: 15. load average: 2.04 2.04 1.90 1/510 6543
.

      when limit not yet exceeded
        does not display a warning message on group information page
# [RSpecRunTime] RSpec elapsed time: 10 minutes 2.5 seconds. Current RSS: ~1533M. Threads: 15. load average: 2.04 2.04 1.90 1/509 6578
.

  membership_level: :developer, visible: false
    when on a project related page
      warning level
        when there is a notification and minutes still exist
          displays a warning message on pipelines page
          displays a warning message on project homepage
          displays a warning message on a job page
# [RSpecRunTime] RSpec elapsed time: 10 minutes 19.7 seconds. Current RSS: ~1515M. Threads: 15. load average: 2.10 2.05 1.91 1/510 6982
.

      danger level
        when there is a notification and minutes still exist
          displays a warning message on pipelines page
          displays a warning message on project homepage
          displays a warning message on a job page
# [RSpecRunTime] RSpec elapsed time: 10 minutes 34.73 seconds. Current RSS: ~1524M. Threads: 15. load average: 2.00 2.03 1.91 1/510 7400
.

      when limit is exceeded
        displays a warning message on project homepage
        displays a warning message on pipelines page
        displays a warning message on a job page
        when in a subgroup
          displays a warning message on subproject homepage
# [RSpecRunTime] RSpec elapsed time: 10 minutes 57.63 seconds. Current RSS: ~1524M. Threads: 15. load average: 2.06 2.04 1.91 1/509 8094
.

      when limit not yet exceeded
        does not display a warning message on project homepage
        does not display a warning message on pipelines page
        displays a warning message on a job page
# [RSpecRunTime] RSpec elapsed time: 11 minutes 5.7 seconds. Current RSS: ~1544M. Threads: 15. load average: 2.27 2.09 1.93 1/508 8301
.

    when on a group related page
      warning level
        when there is a notification and minutes still exist
          displays a warning message on group information page
# [RSpecRunTime] RSpec elapsed time: 11 minutes 10.01 seconds. Current RSS: ~1547M. Threads: 15. load average: 2.27 2.09 1.93 1/509 8353
.

      danger level
        when there is a notification and minutes still exist
          displays a warning message on group information page
# [RSpecRunTime] RSpec elapsed time: 11 minutes 14.18 seconds. Current RSS: ~1539M. Threads: 15. load average: 2.25 2.09 1.93 1/509 8405
.

      when limit is exceeded
        displays a warning message on group information page
# [RSpecRunTime] RSpec elapsed time: 11 minutes 18.44 seconds. Current RSS: ~1538M. Threads: 15. load average: 2.23 2.09 1.93 1/510 8458
.

      when limit not yet exceeded
        does not display a warning message on group information page
# [RSpecRunTime] RSpec elapsed time: 11 minutes 20.98 seconds. Current RSS: ~1541M. Threads: 14. load average: 2.13 2.07 1.93 1/509 8493
.


# [RSpecRunTime] Finishing example group ee/spec/features/ci_shared_runner_warnings_spec.rb. It took 2 minutes 43.57 seconds. Expected to take 2 minutes 41.74 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/protected_branches_spec.rb. Expected to take 2 minutes 1.5 seconds.

Protected Branches
  protected branches affected by security policies
    makes force push toggle and push input disabled showing "No one"
# [RSpecRunTime] RSpec elapsed time: 11 minutes 33.05 seconds. Current RSS: ~1577M. Threads: 15. load average: 2.27 2.10 1.94 1/510 8835
.

  code owner approval
    when project requires code owner approval
      protect a branch form
        has code owner toggle
        can create new protected branch with code owner disabled
        can create new protected branch with code owner enabled
# [RSpecRunTime] RSpec elapsed time: 12 minutes 0.69 second. Current RSS: ~1636M. Threads: 15. load average: 2.19 2.10 1.94 1/512 8922
.

      protect branch table
        has a protected branch with code owner approval toggled on
          shows code owner approval toggle
          displays toggle on
# [RSpecRunTime] RSpec elapsed time: 12 minutes 12.11 seconds. Current RSS: ~1644M. Threads: 15. load average: 2.17 2.10 1.94 1/511 8954
.

        has a protected branch with code owner approval toggled off
          displays toggle off
# [RSpecRunTime] RSpec elapsed time: 12 minutes 17.1 seconds. Current RSS: ~1625M. Threads: 15. load average: 2.72 2.22 1.98 1/511 8970
.

    when project does not require code owner approval
      does not have code owner approval in the form
      does not have code owner approval in the table
# [RSpecRunTime] RSpec elapsed time: 12 minutes 25.87 seconds. Current RSS: ~1678M. Threads: 15. load average: 2.52 2.19 1.98 1/511 8994
.

  access control
    with ref permissions for users disabled
      allows creating protected branches that Developers + Maintainers can merge to
      allows creating protected branches that Maintainers can merge to
      allows creating protected branches that Instance admins can merge to
      allows creating protected branches that No one can merge to
      with existing access levels
        shows users that can push to the branch
        shows groups that can push to the branch
        shows users that can merge into the branch
        shows groups that have can push to the branch
# [RSpecRunTime] RSpec elapsed time: 13 minutes 18.76 seconds. Current RSS: ~1707M. Threads: 15. load average: 2.06 2.14 1.97 1/511 9165
.

  inherited protected branches
    when project-level item
      all form field are editable
# [RSpecRunTime] RSpec elapsed time: 13 minutes 24.67 seconds. Current RSS: ~1720M. Threads: 15. load average: 1.98 2.12 1.97 1/512 9182
.

    when group-level item
      all form field editable are not editable
# [RSpecRunTime] RSpec elapsed time: 13 minutes 30.57 seconds. Current RSS: ~1704M. Threads: 15. load average: 2.23 2.16 1.99 5/512 9198
.


# [RSpecRunTime] Finishing example group ee/spec/features/protected_branches_spec.rb. It took 2 minutes 9.81 seconds. Expected to take 2 minutes 1.5 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/show_project_spec.rb. Expected to take 1 minute 23.96 seconds.

Project show page
  stat button existence
    populated project
      as a maintainer
        "Kubernetes cluster" button linked to clusters page
# [RSpecRunTime] RSpec elapsed time: 13 minutes 37.09 seconds. Current RSS: ~1659M. Threads: 15. load average: 2.13 2.15 1.98 1/511 9317
.

  pull mirroring information
    for maintainer
      displays mirrored from url
# [RSpecRunTime] RSpec elapsed time: 13 minutes 39.98 seconds. Current RSS: ~1643M. Threads: 15. load average: 2.13 2.15 1.98 1/511 9412
.

    for guest
      does not display mirrored from url
# [RSpecRunTime] RSpec elapsed time: 13 minutes 41.17 seconds. Current RSS: ~1639M. Threads: 15. load average: 2.04 2.13 1.97 1/511 9439
.

  when over free user limit
    with group namespace
      with repository
        behaves like over the free user limit alert
          with enforcement concerns
            when over limit
              shows free user limit warning
              when over storage limits
                with storage size check
                  does not show alerts
# [RSpecRunTime] RSpec elapsed time: 13 minutes 54.59 seconds. Current RSS: ~1594M. Threads: 15. load average: 2.25 2.17 1.99 1/510 9888
.

                without storage size check
                  does show alerts
# [RSpecRunTime] RSpec elapsed time: 13 minutes 56.25 seconds. Current RSS: ~1592M. Threads: 15. load average: 2.15 2.15 1.99 1/509 9913
.

            when at limit
              does not show free user limit warning
# [RSpecRunTime] RSpec elapsed time: 14 minutes 2.53 seconds. Current RSS: ~1594M. Threads: 15. load average: 2.37 2.20 2.00 1/510 10090
.

            when under limit
              does not show free user limit warning
# [RSpecRunTime] RSpec elapsed time: 14 minutes 8.16 seconds. Current RSS: ~1588M. Threads: 15. load average: 2.26 2.18 2.00 1/510 10267
.

      with empty repository
        behaves like over the free user limit alert
          with enforcement concerns
            when over limit
              shows free user limit warning
              when over storage limits
                with storage size check
                  does not show alerts
# [RSpecRunTime] RSpec elapsed time: 14 minutes 14.77 seconds. Current RSS: ~1587M. Threads: 15. load average: 2.16 2.16 1.99 1/511 10372
.

                without storage size check
                  does show alerts
# [RSpecRunTime] RSpec elapsed time: 14 minutes 16.45 seconds. Current RSS: ~1592M. Threads: 15. load average: 2.07 2.14 1.99 1/511 10409
.

            when at limit
              does not show free user limit warning
# [RSpecRunTime] RSpec elapsed time: 14 minutes 19.42 seconds. Current RSS: ~1596M. Threads: 15. load average: 2.07 2.14 1.99 1/510 10448
.

            when under limit
              does not show free user limit warning
# [RSpecRunTime] RSpec elapsed time: 14 minutes 22.42 seconds. Current RSS: ~1597M. Threads: 14. load average: 1.98 2.12 1.98 1/509 10486
.

      without repository
        behaves like over the free user limit alert
          with enforcement concerns
            when over limit
              shows free user limit warning
              when over storage limits
                with storage size check
                  does not show alerts
# [RSpecRunTime] RSpec elapsed time: 14 minutes 28.16 seconds. Current RSS: ~1598M. Threads: 14. load average: 2.15 2.15 1.99 1/506 10490
.

                without storage size check
                  does show alerts
# [RSpecRunTime] RSpec elapsed time: 14 minutes 29.46 seconds. Current RSS: ~1598M. Threads: 14. load average: 2.15 2.15 1.99 1/506 10491
.

            when at limit
              does not show free user limit warning
# [RSpecRunTime] RSpec elapsed time: 14 minutes 32.29 seconds. Current RSS: ~1601M. Threads: 14. load average: 2.05 2.13 1.99 1/505 10494
.

            when under limit
              does not show free user limit warning
# [RSpecRunTime] RSpec elapsed time: 14 minutes 35.0 seconds. Current RSS: ~1594M. Threads: 14. load average: 2.05 2.13 1.99 1/505 10496
.

  when user has no permissions
    does not render settings button if user has no permissions
    renders settings button if user has permissions
# [RSpecRunTime] RSpec elapsed time: 14 minutes 45.15 seconds. Current RSS: ~1597M. Threads: 15. load average: 1.89 2.09 1.98 1/511 10919
.

  all seats used alert
    when all seats are used
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      when the user is an owner
        displays the all seats used alert
# [RSpecRunTime] RSpec elapsed time: 14 minutes 47.36 seconds. Current RSS: ~1592M. Threads: 15. load average: 1.82 2.08 1.97 1/510 10920
.

      when the user is not an owner
        does not display the all seats used alert
    with a free plan
      does not display the all seats used alert
    when not all seats are used
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      does not display the all seats used alert

# [RSpecRunTime] Finishing example group ee/spec/features/projects/show_project_spec.rb. It took 1 minute 18.86 seconds. Expected to take 1 minute 23.96 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/boards/swimlanes/epics_swimlanes_spec.rb. Expected to take 1 minute 18.09 seconds.

epics swimlanes
  link to swimlanes view
    displays epics swimlanes when link to boards with group_by epic in URL
    displays issue not assigned to epic title and unassigned issues lane only on expand
    displays default lists and a label list
# [RSpecRunTime] RSpec elapsed time: 15 minutes 23.53 seconds. Current RSS: ~1594M. Threads: 15. load average: 2.25 2.15 2.00 1/504 10926
.

  switch to swimlanes view
    displays epics swimlanes when selecting Epic in Group by dropdown
    displays issue not assigned to epic title and unassigned issues lane only on expand
# [RSpecRunTime] RSpec elapsed time: 15 minutes 37.08 seconds. Current RSS: ~1511M. Threads: 15. load average: 2.31 2.17 2.01 1/504 10929
.

  issue cards
    highlights an issue card on click
    unhighlights a selected issue card on click
# [RSpecRunTime] RSpec elapsed time: 15 minutes 51.02 seconds. Current RSS: ~1504M. Threads: 14. load average: 2.31 2.18 2.01 1/505 10933
.

  add issue to swimlanes list
    displays new issue button
    shows form in unassigned issues lane when clicking button
    hides form when clicking cancel
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    creates new issue in unassigned issues lane
# [RSpecRunTime] RSpec elapsed time: 16 minutes 20.32 seconds. Current RSS: ~1502M. Threads: 14. load average: 1.90 2.10 1.99 1/505 10937
.


# [RSpecRunTime] Finishing example group ee/spec/features/boards/swimlanes/epics_swimlanes_spec.rb. It took 1 minute 30.5 seconds. Expected to take 1 minute 18.09 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/epics/epic_work_item_sync_spec.rb. Expected to take 1 minute 6.12 seconds.

Epic Work Item sync
  from epic to work item
    when creating and modifying an epic
      creates an epic and a synced work item
      updates the synced work item when the epic is updated
# [RSpecRunTime] RSpec elapsed time: 16 minutes 48.42 seconds. Current RSS: ~1501M. Threads: 23. load average: 1.79 2.05 1.98 1/513 10949
.

    from work item to epic
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      creates work item and a legacy epic that are in sync
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      updates the legacy epic when the work item is updated
# [RSpecRunTime] RSpec elapsed time: 17 minutes 21.96 seconds. Current RSS: ~1499M. Threads: 24. load average: 2.39 2.19 2.03 1/515 10956
.


# [RSpecRunTime] Finishing example group ee/spec/features/epics/epic_work_item_sync_spec.rb. It took 1 minute 1.65 seconds. Expected to take 1 minute 6.12 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/registrations/saas/standard_flow_company_creating_project_spec.rb. Expected to take 58.63 seconds.

Standard flow for user picking company and creating a project
  with regular sign up
    when opting into a trial
Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"glm_source"=>"some_source", "glm_content"=>"some_content", "namespace_id"=>191, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>191, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      registers the user and creates a group and project reaching onboarding
# [RSpecRunTime] RSpec elapsed time: 17 minutes 45.99 seconds. Current RSS: ~1541M. Threads: 24. load average: 2.20 2.16 2.02 1/517 11062
.

  when last name is missing for SSO and has to be filled in
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"namespace_id"=>194, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>194, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    registers the user, has some lead submission failures and creates a group and project reaching onboarding
# [RSpecRunTime] RSpec elapsed time: 18 minutes 5.78 seconds. Current RSS: ~1542M. Threads: 23. load average: 2.50 2.23 2.05 1/516 11163
.

  with sso sign up
    when opting into a trial
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"glm_source"=>"some_source", "glm_content"=>"some_content", "namespace_id"=>197, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>197, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      registers the user and creates a group and project reaching onboarding
# [RSpecRunTime] RSpec elapsed time: 18 minutes 25.95 seconds. Current RSS: ~1553M. Threads: 23. load average: 2.22 2.18 2.03 1/516 11264
.


# [RSpecRunTime] Finishing example group ee/spec/features/registrations/saas/standard_flow_company_creating_project_spec.rb. It took 1 minute 3.98 seconds. Expected to take 58.63 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. Expected to take 53.75 seconds.

Projects > Settings > Repository settings using custom role
  when user is a guest with custom roles that enables handling protected branches
    does not show sections not allowed by the custom role
    behaves like setting project protected branches
      explicit protected branches
2024-09-12 17:57:01 +0000 Rack app ("GET /group45/project-60/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/
3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/
4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/
5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/
15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/
16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
  FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids),
  LATERAL (
    SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
  ) AS custom_permissions
  GROUP BY project_ids.project_id;
 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/
21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/
33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 22 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 22 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/
39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
UNION
(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/
44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/
58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/
62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:01.630592') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:01.634616') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/>
2024-09-12 17:57:07 +0000 Rack app ("GET /group45/project-60/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/
3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/
4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/
5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/
15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/
16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
  FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids),
  LATERAL (
    SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
  ) AS custom_permissions
  GROUP BY project_ids.project_id;
 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/
21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/
33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 23 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 23 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/
39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
UNION
(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/
44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/
58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/
62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.620444') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.624695') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/>
        allows creating explicit protected branches (FAILED - 1)
          
1st Try error in ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:5:
Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/
3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/
4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/
5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/
15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/
16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
  FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids),
  LATERAL (
    SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
  ) AS custom_permissions
  GROUP BY project_ids.project_id;
 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/
21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/
33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 22 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 22 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/
39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
UNION
(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/
44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/
58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/
62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:01.630592') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:01.634616') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
Unexpected browser console output:
webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:"
webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
http://127.0.0.1:39133/group45/project-60/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error)
          
RSpec::Retry: 2nd try ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:5
  HTML screenshot: /builds/gitlab-org/gitlab/tmp/capybara/projects_settings_repository_settings_using_custom_role_when_user_is_a_guest_with_custom_roles_that_enables_handling_protected_branches_behaves_like_se.html
  Image screenshot: /tmp/capybara/projects_settings_repository_settings_using_custom_role_when_user_is_a_guest_with_custom_roles_that_enables_handling_protected_branches_behaves_like_se.png
        shows success alert once protected branch is created
        displays the last commit on the matching branch if it exists
        displays an error message if the named branch does not exist
# [RSpecRunTime] RSpec elapsed time: 18 minutes 57.28 seconds. Current RSS: ~1537M. Threads: 23. load average: 2.33 2.22 2.05 1/514 11370
.

      wildcard protected branches
2024-09-12 17:57:30 +0000 Rack app ("GET /group45/project-60/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/
3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/
4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/
5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/
15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/
16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
  FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids),
  LATERAL (
    SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
  ) AS custom_permissions
  GROUP BY project_ids.project_id;
 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/
21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/
33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/
39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
UNION
(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/
44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/
58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/
62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.644909') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.649527') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/>
        allows creating protected branches with a wildcard
          
1st Try error in ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:59:
Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/
3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/
4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/
5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/
15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/
16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
  FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids),
  LATERAL (
    SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
  ) AS custom_permissions
  GROUP BY project_ids.project_id;
 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/
21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/
33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/
39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
UNION
(WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/
44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/
58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/
62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.644909') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.649527') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
Unexpected browser console output:
webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:"
webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
http://127.0.0.1:39133/group45/project-60/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error)
          
RSpec::Retry: 2nd try ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:59
        displays all the branches matching the wildcard
# [RSpecRunTime] RSpec elapsed time: 19 minutes 20.35 seconds. Current RSS: ~1555M. Threads: 22. load average: 2.28 2.22 2.06 1/517 11495
.


# [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. It took 54.41 seconds. Expected to take 53.75 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_sees_merge_widget_spec.rb. Expected to take 46.3 seconds.

Merge request > User sees merge widget
  when merge pipelines option is enabled at project level configuration
    when the head pipeline is merge request pipeline
Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      does not show any warnings
# [RSpecRunTime] RSpec elapsed time: 19 minutes 35.31 seconds. Current RSS: ~1537M. Threads: 25. load average: 2.14 2.20 2.05 1/519 11717
.

    when the head pipeline is merge train pipeline
      shows head pipeline information
# [RSpecRunTime] RSpec elapsed time: 19 minutes 47.85 seconds. Current RSS: ~1529M. Threads: 25. load average: 2.12 2.19 2.05 1/520 11937
.

    when merge request is submitted from a forked project
      shows a warning that fork project merge request does not create merge request pipelines by default
# [RSpecRunTime] RSpec elapsed time: 20 minutes 2.45 seconds. Current RSS: ~1538M. Threads: 25. load average: 2.70 2.31 2.09 1/520 12185
.


# [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_sees_merge_widget_spec.rb. It took 42.09 seconds. Expected to take 46.3 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/merge_request/code_owner_approval_rules_spec.rb. Expected to take 40.39 seconds.

Code owner approval rules
  when same file is on target branch
    when content is the same
      does not show approval is required from Code Owners
# [RSpecRunTime] RSpec elapsed time: 20 minutes 15.31 seconds. Current RSS: ~1531M. Threads: 25. load average: 2.66 2.32 2.10 2/519 12769
.

    when there are conflicts
      behaves like requires approval from Code Owners
        shows approval is required from Code Owners
# [RSpecRunTime] RSpec elapsed time: 20 minutes 27.07 seconds. Current RSS: ~1524M. Threads: 25. load average: 2.61 2.32 2.10 2/521 13144
.

  when not same file is on target branch
    behaves like requires approval from Code Owners
      shows approval is required from Code Owners
# [RSpecRunTime] RSpec elapsed time: 20 minutes 40.57 seconds. Current RSS: ~1519M. Threads: 25. load average: 2.54 2.32 2.10 1/521 13594
.


# [RSpecRunTime] Finishing example group ee/spec/features/merge_request/code_owner_approval_rules_spec.rb. It took 38.11 seconds. Expected to take 40.39 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_sets_approval_rules_spec.rb. Expected to take 35.56 seconds.

Merge request > User sets approval rules
  with project approval rules
    when from a fork
      shows approval rules from target project
# [RSpecRunTime] RSpec elapsed time: 20 minutes 48.98 seconds. Current RSS: ~1534M. Threads: 25. load average: 2.49 2.31 2.10 1/521 13746
.

    with a private group rule
      shows approval rules
Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      persists hidden groups that author has no access to when creating MR
# [RSpecRunTime] RSpec elapsed time: 21 minutes 13.57 seconds. Current RSS: ~1516M. Threads: 25. load average: 2.39 2.30 2.10 1/521 14238
.


# [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_sets_approval_rules_spec.rb. It took 33.03 seconds. Expected to take 35.56 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/registrations/saas/trial_flow_company_importing_project_spec.rb. Expected to take 32.16 seconds.

Trial flow for user picking company and importing a project
  with sso trial sign up
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"namespace_id"=>226, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>226, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    registers the user and starts to import a project
# [RSpecRunTime] RSpec elapsed time: 21 minutes 28.42 seconds. Current RSS: ~1583M. Threads: 24. load average: 2.56 2.34 2.12 1/516 14239
.

  with regular trial sign up
Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"namespace_id"=>228, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>228, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    registers the user and starts to import a project
# [RSpecRunTime] RSpec elapsed time: 21 minutes 42.46 seconds. Current RSS: ~1588M. Threads: 24. load average: 2.29 2.29 2.10 1/516 14242
.


# [RSpecRunTime] Finishing example group ee/spec/features/registrations/saas/trial_flow_company_importing_project_spec.rb. It took 28.85 seconds. Expected to take 32.16 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/registrations/saas/trial_flow_just_me_importing_project_spec.rb. Expected to take 26.65 seconds.

Trial flow for user picking just me and importing a project
  with regular trial sign up
Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    registers the user and starts to import a project
# [RSpecRunTime] RSpec elapsed time: 21 minutes 57.08 seconds. Current RSS: ~1591M. Threads: 23. load average: 2.00 2.22 2.09 1/515 14244
.

  with sso trial sign up
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    registers the user and starts to import a project
# [RSpecRunTime] RSpec elapsed time: 22 minutes 10.9 seconds. Current RSS: ~1576M. Threads: 23. load average: 1.99 2.21 2.08 1/515 14246
.


# [RSpecRunTime] Finishing example group ee/spec/features/registrations/saas/trial_flow_just_me_importing_project_spec.rb. It took 28.45 seconds. Expected to take 26.65 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/issues/issue_actions_spec.rb. Expected to take 24.25 seconds.

Issue actions
  promote issue to epic action
    when user is unauthorized
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      does not show "Promote to epic" item in issue actions dropdown
# [RSpecRunTime] RSpec elapsed time: 22 minutes 20.27 seconds. Current RSS: ~1543M. Threads: 24. load average: 2.07 2.23 2.09 1/518 14251
.

    when user is authorized
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      clicking "Promote to epic" creates and redirects user to epic
# [RSpecRunTime] RSpec elapsed time: 22 minutes 37.61 seconds. Current RSS: ~1529M. Threads: 25. load average: 2.01 2.20 2.08 1/516 14257
.


# [RSpecRunTime] Finishing example group ee/spec/features/issues/issue_actions_spec.rb. It took 26.76 seconds. Expected to take 24.25 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_multiple_existing_namespace_flow_spec.rb. Expected to take 22.32 seconds.

Duo Enterprise trial lead submission and creation with multiple eligible namespaces
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
  when creating lead and applying trial is successful
    fills out form, submits and lands on the group usage quotas page
    when new trial is selected from within an existing namespace
      fills out form, has the existing namespace preselected, submits and lands on the group usage quotas page
# [RSpecRunTime] RSpec elapsed time: 22 minutes 48.09 seconds. Current RSS: ~1510M. Threads: 25. load average: 2.07 2.21 2.09 1/516 14262
.

  when applying lead fails
    fills out form, submits and sent back to information form with errors and is then resolved
# [RSpecRunTime] RSpec elapsed time: 22 minutes 53.38 seconds. Current RSS: ~1513M. Threads: 25. load average: 2.07 2.20 2.09 1/515 14264
.

  when applying trial fails
    fills out form, submits and is sent to select namespace with errors and is then resolved
# [RSpecRunTime] RSpec elapsed time: 22 minutes 59.04 seconds. Current RSS: ~1521M. Threads: 25. load average: 1.98 2.18 2.08 1/516 14268
.


# [RSpecRunTime] Finishing example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_multiple_existing_namespace_flow_spec.rb. It took 21.37 seconds. Expected to take 22.32 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/dependency_proxy/packages/maven_spec.rb. Expected to take 20.08 seconds.

Dependency Proxy for maven packages
Capybara starting Puma...
* Version 6.4.0, codename: The Eagle of Durango
* Min threads: 0, max threads: 4
* Listening on http://127.0.0.1:46419
  with a maintainer
    with no existing file
      behaves like pulling and caching the remote file
Job arguments to FlushCounterIncrementsWorker must be native JSON types, but :packages_size is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
newLocalFile: remove file "/builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload458988739": remove /builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload458988739: no such file or directory        pulls and caches the remote file
# [RSpecRunTime] RSpec elapsed time: 23 minutes 1.22 seconds. Current RSS: ~1525M. Threads: 31. load average: 1.98 2.18 2.08 1/521 14274
.

    with existing file
newLocalFile: remove file "/builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload554259814": remove /builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload554259814: no such file or directory      deletes the cached file and proxy the remote file
      behaves like returning the cached file
        returns the cached file
# [RSpecRunTime] RSpec elapsed time: 23 minutes 2.77 seconds. Current RSS: ~1533M. Threads: 31. load average: 1.98 2.18 2.08 1/521 14275
.

      with no etag returned
        behaves like returning the cached file
          returns the cached file
  with a reporter
    with no existing file
      pulls the remote file without caching
      with a timeout while getting the remote file
Capybara starting Puma...
* Version 6.4.0, codename: The Eagle of Durango
* Min threads: 0, max threads: 4
* Listening on http://127.0.0.1:33237
        times out and return service unavailable
      behaves like returning bad gateway error when local requests are not allowed
        returns bad gateway error
      when local requests are allowed in settings
        pulls the remote file without caching
    with existing file
      behaves like returning the cached file
        returns the cached file
      behaves like proxying the remote file if the wrong etag is returned
        proxies the remote file
      with no etag returned
        behaves like returning the cached file
          returns the cached file
      with a wrong etag returned
        behaves like returning bad gateway error when local requests are not allowed
          returns bad gateway error
        when local requests are allowed in settings
          behaves like proxying the remote file if the wrong etag is returned
            proxies the remote file
  with a developer
    with no existing file
      behaves like pulling and caching the remote file
newLocalFile: remove file "/builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload2639365366": remove /builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload2639365366: no such file or directory        pulls and caches the remote file
    with existing file
      behaves like returning the cached file
        returns the cached file
      behaves like proxying the remote file if the wrong etag is returned
        proxies the remote file
      with no etag returned
        behaves like returning the cached file
          returns the cached file

# [RSpecRunTime] Finishing example group ee/spec/features/dependency_proxy/packages/maven_spec.rb. It took 10.03 seconds. Expected to take 20.08 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/profiles/account_spec.rb. Expected to take 17.74 seconds.

Profile > Account
  Disconnect Group SAML
Job arguments to Groups::ResetSeatCalloutsWorker must be native JSON types, but #<Group id:248 @test_group> is a Group.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    unlinks account
Job arguments to Groups::ResetSeatCalloutsWorker must be native JSON types, but #<Group id:248 @test_group> is a Group.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    removes access to the group
    group has disabled SAML
Job arguments to Groups::ResetSeatCalloutsWorker must be native JSON types, but #<Group id:248 @test_group> is a Group.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      lets members distrust and unlink authentication
# [RSpecRunTime] RSpec elapsed time: 23 minutes 19.81 seconds. Current RSS: ~1537M. Threads: 37. load average: 1.77 2.12 2.06 1/528 14283
.

    group trial has expired
Job arguments to Groups::ResetSeatCalloutsWorker must be native JSON types, but #<Group id:248 @test_group> is a Group.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      lets members distrust and unlink authentication
# [RSpecRunTime] RSpec elapsed time: 23 minutes 23.04 seconds. Current RSS: ~1529M. Threads: 36. load average: 1.78 2.12 2.06 1/527 14284
.

  Delete account
    on GitLab.com when the user's password is automatically set
      shows that the identity cannot be verified
      does not display a delete button
# [RSpecRunTime] RSpec elapsed time: 23 minutes 24.57 seconds. Current RSS: ~1530M. Threads: 36. load average: 1.78 2.12 2.06 1/527 14285
.


# [RSpecRunTime] Finishing example group ee/spec/features/profiles/account_spec.rb. It took 15.5 seconds. Expected to take 17.74 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/insights_spec.rb. Expected to take 17.5 seconds.

Project Insights
  behaves like Insights page
    as a permitted user
      with correct license
        has correct title
        navigation
          by default loads the first page
          displays correctly when navigating back to insights
          hash fragment navigation
            loads the correct page
# [RSpecRunTime] RSpec elapsed time: 23 minutes 41.4 seconds. Current RSS: ~1533M. Threads: 35. load average: 1.86 2.11 2.06 1/527 14294
.

      without correct license
        returns 404

# [RSpecRunTime] Finishing example group ee/spec/features/projects/insights_spec.rb. It took 17.19 seconds. Expected to take 17.5 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb. Expected to take 14.84 seconds.

Duo Enterprise trial lead submission and creation with one eligible namespace
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
  when creating lead and applying trial is successful
    fills out form, submits and lands on the group usage quotas page
# [RSpecRunTime] RSpec elapsed time: 23 minutes 46.75 seconds. Current RSS: ~1521M. Threads: 35. load average: 1.95 2.12 2.07 1/527 14298
.

  when applying trial fails
    fills out form, submits and is sent back to information form with errors  and is then resolved
# [RSpecRunTime] RSpec elapsed time: 23 minutes 51.46 seconds. Current RSS: ~1518M. Threads: 35. load average: 1.87 2.11 2.06 1/527 14300
.

  when applying lead fails
    fills out form, submits and sent back to information form with errors and is then resolved
# [RSpecRunTime] RSpec elapsed time: 23 minutes 55.85 seconds. Current RSS: ~1516M. Threads: 35. load average: 2.20 2.17 2.08 1/527 14302
.


# [RSpecRunTime] Finishing example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb. It took 14.09 seconds. Expected to take 14.84 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/integrations/user_activates_github_spec.rb. Expected to take 13.06 seconds.

User activates GitHub integration
  without a license
    is excluded from the integrations index
    renders 404 when trying to access integration settings directly
# [RSpecRunTime] RSpec elapsed time: 23 minutes 58.37 seconds. Current RSS: ~1520M. Threads: 35. load average: 2.20 2.17 2.08 1/526 14303
.

  with valid license
    activates integration
    renders a token field of type `password` for masking input
# [RSpecRunTime] RSpec elapsed time: 24 minutes 9.38 seconds. Current RSS: ~1539M. Threads: 34. load average: 2.54 2.25 2.11 1/527 14309
.


# [RSpecRunTime] Finishing example group ee/spec/features/projects/integrations/user_activates_github_spec.rb. It took 13.53 seconds. Expected to take 13.06 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/groups/saml_group_links_spec.rb. Expected to take 12.43 seconds.

SAML group links
  when SAML group links is available
    adds new SAML group link with a standard role
    with existing records
      lists active links
      does not list links for other groups
# [RSpecRunTime] RSpec elapsed time: 24 minutes 17.09 seconds. Current RSS: ~1539M. Threads: 34. load average: 2.30 2.21 2.10 1/525 14313
.

  when custom roles are enabled
    adds new SAML group link with a custom role
# [RSpecRunTime] RSpec elapsed time: 24 minutes 22.12 seconds. Current RSS: ~1531M. Threads: 33. load average: 2.28 2.20 2.09 1/525 14317
.


# [RSpecRunTime] Finishing example group ee/spec/features/groups/saml_group_links_spec.rb. It took 12.72 seconds. Expected to take 12.43 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/dashboards/projects_spec.rb. Expected to take 11.13 seconds.

Dashboard projects
  behaves like dashboard ultimate trial callout
    hides promotion callout if not .com
    .com
      shows dismissable promotion callout if default dashboard for an owner
      hides dismissable promotion callout if default dashboard for a non group owner
      hides dismissable promotion callout if not default dashboard
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      hides promotion callout if a trial is active
Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      hides promotion callout if user owns a paid namespace
# [RSpecRunTime] RSpec elapsed time: 24 minutes 30.44 seconds. Current RSS: ~1539M. Threads: 33. load average: 2.40 2.23 2.10 5/525 14319
.


# [RSpecRunTime] Finishing example group ee/spec/features/dashboards/projects_spec.rb. It took 8.68 seconds. Expected to take 11.13 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/security/dashboard_access_spec.rb. Expected to take 9.37 seconds.

Dashboard access
  GET /dashboard
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    is expected to be allowed for auditor
  GET /dashboard/issues
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    is expected to be allowed for auditor
  GET /dashboard/merge_requests
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    is expected to be allowed for auditor
  GET /dashboard/projects/starred
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    is expected to be allowed for auditor
  GET /help
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    is expected to be allowed for auditor
  GET /projects/new
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    is expected to be allowed for auditor
  GET /groups/new
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    is expected to be allowed for auditor
  GET /dashboard/groups
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    is expected to be allowed for auditor

# [RSpecRunTime] Finishing example group ee/spec/features/security/dashboard_access_spec.rb. It took 6.53 seconds. Expected to take 9.37 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/gitlab_subscriptions/trials/duo_pro/access_denied_spec.rb. Expected to take 8.48 seconds.

Duo Pro trial access denied flow
  behaves like duo access denied flow
    signs in and experiences the entire duo access denied flow
# [RSpecRunTime] RSpec elapsed time: 24 minutes 49.38 seconds. Current RSS: ~1525M. Threads: 33. load average: 2.09 2.17 2.09 1/527 14324
.


# [RSpecRunTime] Finishing example group ee/spec/features/gitlab_subscriptions/trials/duo_pro/access_denied_spec.rb. It took 12.15 seconds. Expected to take 8.48 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/security/project/snippet/public_access_spec.rb. Expected to take 7.93 seconds.

Public Project Snippets Access
  GET /:project_path/snippets
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
    is expected to be allowed for auditor
# [RSpecRunTime] RSpec elapsed time: 24 minutes 52.44 seconds. Current RSS: ~1528M. Threads: 32. load average: 2.00 2.15 2.08 2/525 14325
.

  GET /:project_path/snippets/new
    is expected to be denied for auditor
  GET /:project_path/snippets/:id
    for a public snippet
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      is expected to be allowed for auditor
# [RSpecRunTime] RSpec elapsed time: 24 minutes 54.19 seconds. Current RSS: ~1532M. Threads: 32. load average: 2.00 2.15 2.08 1/524 14326
.

    for an internal snippet
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      is expected to be allowed for auditor
    for a private snippet
Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class.
See https://github.com/sidekiq/sidekiq/wiki/Best-Practices
To disable this error, add `Sidekiq.strict_args!(false)` to your initializer.
      is expected to be allowed for auditor
# [RSpecRunTime] RSpec elapsed time: 24 minutes 57.5 seconds. Current RSS: ~1538M. Threads: 32. load average: 1.92 2.13 2.07 1/524 14327
.

  GET /:project_path/snippets/:id/raw
    for a public snippet
      is expected to be allowed for auditor
    for an internal snippet
      is expected to be allowed for auditor
    for a private snippet
      is expected to be allowed for auditor

# [RSpecRunTime] Finishing example group ee/spec/features/security/project/snippet/public_access_spec.rb. It took 9.59 seconds. Expected to take 7.93 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/merge_request/sidebar_spec.rb. Expected to take 6.15 seconds.

Merge Request sidebar
  when epics available
    does not show epics in MR sidebar
# [RSpecRunTime] RSpec elapsed time: 25 minutes 2.41 seconds. Current RSS: ~1546M. Threads: 32. load average: 1.85 2.11 2.07 1/530 14482
.

  when epics unavailable
    does not show epics promotion in MR sidebar
# [RSpecRunTime] RSpec elapsed time: 25 minutes 5.01 seconds. Current RSS: ~1560M. Threads: 32. load average: 1.85 2.11 2.07 1/530 14636
.


# [RSpecRunTime] Finishing example group ee/spec/features/merge_request/sidebar_spec.rb. It took 5.94 seconds. Expected to take 6.15 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/projects/security/user_edits_on_demand_scan_spec.rb. Expected to take 5.99 seconds.

User edits On-demand Scan
  shows edit scan page

# [RSpecRunTime] Finishing example group ee/spec/features/projects/security/user_edits_on_demand_scan_spec.rb. It took 6.97 seconds. Expected to take 5.99 seconds.
# [RSpecRunTime] RSpec elapsed time: 25 minutes 12.24 seconds. Current RSS: ~1603M. Threads: 34. load average: 1.80 2.09 2.06 1/531 14725
.

# [RSpecRunTime] Starting example group ee/spec/features/admin/admin_show_new_user_signups_cap_alert_spec.rb. Expected to take 4.26 seconds.

displays new user signups cap alert
  when reached active users cap
    displays and dismiss alert
# [RSpecRunTime] RSpec elapsed time: 25 minutes 16.31 seconds. Current RSS: ~1584M. Threads: 34. load average: 1.73 2.07 2.06 1/531 14727
.


# [RSpecRunTime] Finishing example group ee/spec/features/admin/admin_show_new_user_signups_cap_alert_spec.rb. It took 4.25 seconds. Expected to take 4.26 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/groups/show_spec.rb. Expected to take 3.89 seconds.

Group show page
  with free tier badge
    renders the tier badge and popover when clicked
# [RSpecRunTime] RSpec elapsed time: 25 minutes 20.13 seconds. Current RSS: ~1578M. Threads: 34. load average: 1.73 2.07 2.06 1/530 14729
.


# [RSpecRunTime] Finishing example group ee/spec/features/groups/show_spec.rb. It took 3.84 seconds. Expected to take 3.89 seconds.
# [RSpecRunTime] Starting example group ee/spec/features/analytics/group_analytics_spec.rb. Expected to take 1.66 seconds.

GroupAnalytics
  renders the container

# [RSpecRunTime] Finishing example group ee/spec/features/analytics/group_analytics_spec.rb. It took 1.55 seconds. Expected to take 1.66 seconds.
# [RSpecRunTime] RSpec elapsed time: 25 minutes 21.97 seconds. Current RSS: ~1560M. Threads: 33. load average: 1.68 2.05 2.05 1/525 14730
.

auto_explain log contains 1302 entries for main, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-12-16.331.main.ndjson.gz
took 21.912592528
auto_explain log contains 1304 entries for ci, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-12-16.331.ci.ndjson.gz
took 17.355043214
[TEST PROF INFO] EventProf results for sql.active_record

Total time: 04:54.724 of 25:14.848 (19.46%)
Total events: 108305

Top 5 slowest suites (by time):

Group value s...lters and data (./ee/spec/features/groups/analytics/cycle_analytics/filters_and_data_spec.rb:5) – 01:12.562 (25381 / 36) of 05:15.532 (23.0%)
CI shared runner limits (./ee/spec/features/ci_shared_runner_warnings_spec.rb:5) – 00:31.846 (13096 / 34) of 02:43.568 (19.47%)
epics swimlanes (./ee/spec/features/boards/swimlanes/epics_swimlanes_spec.rb:5) – 00:25.734 (8184 / 11) of 01:30.499 (28.44%)
Protected Branches (./ee/spec/features/protected_branches_spec.rb:5) – 00:25.371 (8803 / 19) of 02:09.812 (19.54%)
Groups > Memb...Manage members (./ee/spec/features/groups/members/manage_members_spec.rb:5) – 00:25.296 (9941 / 26) of 03:15.117 (12.96%)

Knapsack report was generated. Preview:
{
  "ee/spec/features/groups/analytics/cycle_analytics/filters_and_data_spec.rb": 315.53218820500115,
  "ee/spec/features/groups/members/manage_members_spec.rb": 195.11717592899913,
  "ee/spec/features/ci_shared_runner_warnings_spec.rb": 163.568068210001,
  "ee/spec/features/protected_branches_spec.rb": 129.81223046000014,
  "ee/spec/features/projects/show_project_spec.rb": 78.86218845700023,
  "ee/spec/features/boards/swimlanes/epics_swimlanes_spec.rb": 90.49881776300026,
  "ee/spec/features/epics/epic_work_item_sync_spec.rb": 61.64575186500042,
  "ee/spec/features/registrations/saas/standard_flow_company_creating_project_spec.rb": 63.98351444400032,
  "ee/spec/features/projects/settings/ee/protected_branches_spec.rb": 54.40984095600106,
  "ee/spec/features/merge_request/user_sees_merge_widget_spec.rb": 42.09179246200074,
  "ee/spec/features/merge_request/code_owner_approval_rules_spec.rb": 38.10902390699994,
  "ee/spec/features/merge_request/user_sets_approval_rules_spec.rb": 33.03322338200087,
  "ee/spec/features/registrations/saas/trial_flow_company_importing_project_spec.rb": 28.853911278998567,
  "ee/spec/features/registrations/saas/trial_flow_just_me_importing_project_spec.rb": 28.451320768001096,
  "ee/spec/features/issues/issue_actions_spec.rb": 26.760483866000868,
  "ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_multiple_existing_namespace_flow_spec.rb": 21.373760382999535,
  "ee/spec/features/dependency_proxy/packages/maven_spec.rb": 10.024515682000128,
  "ee/spec/features/profiles/account_spec.rb": 15.501297417000387,
  "ee/spec/features/projects/insights_spec.rb": 17.190692100000888,
  "ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb": 14.093772232001356,
  "ee/spec/features/projects/integrations/user_activates_github_spec.rb": 13.531638393998946,
  "ee/spec/features/groups/saml_group_links_spec.rb": 12.721905547999995,
  "ee/spec/features/dashboards/projects_spec.rb": 8.682388956000068,
  "ee/spec/features/security/dashboard_access_spec.rb": 6.5248322439983895,
  "ee/spec/features/gitlab_subscriptions/trials/duo_pro/access_denied_spec.rb": 12.152476228000523,
  "ee/spec/features/security/project/snippet/public_access_spec.rb": 9.591337372999988,
  "ee/spec/features/merge_request/sidebar_spec.rb": 5.944461437000427,
  "ee/spec/features/projects/security/user_edits_on_demand_scan_spec.rb": 6.971912331999192,
  "ee/spec/features/admin/admin_show_new_user_signups_cap_alert_spec.rb": 4.253759420998904,
  "ee/spec/features/groups/show_spec.rb": 3.8423393290013337,
  "ee/spec/features/analytics/group_analytics_spec.rb": 1.5495974980003666
}

Knapsack global time execution for tests: 25m 14s

Failures:

  1) Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches
     Got 0 failures and 2 other errors:
     Shared Example Group: "setting project protected branches" called from ./ee/spec/features/projects/settings/ee/protected_branches_spec.rb:25

     1.1) Failure/Error: raise(error) if raise_error?

          Gitlab::QueryLimiting::Transaction::ThresholdExceededError:
            Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed
            0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
            1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
            2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/
            3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/
            4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/
            5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
            6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
            7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
            9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/
            10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/
            12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
            13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/
            15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/
            16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
            17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project
              FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids),
              LATERAL (
                SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project
              ) AS custom_permissions
              GROUP BY project_ids.project_id;
             /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/
            21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/
            28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/
            29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
            30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/
            31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/
            32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/
            33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/
            34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
            35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 23 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
            36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 23 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/
            37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/
            38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/
            39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/
            40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/
            41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/
            42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5))
            UNION
            (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/
            43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/
            44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/
            45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
            49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
            50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/
            51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/
            52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/
            53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/
            54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/
            58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/
            62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/
            63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/
            64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/
            68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/
            96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/
            97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/
            98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/
            99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/
            100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/
            101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/
            102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/
            103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/
            104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/
            105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.620444') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
            106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.624695') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/
          # ./lib/gitlab/query_limiting/transaction.rb:65:in `act_upon_results'
          # ./lib/gitlab/query_limiting/middleware.rb:21:in `call'
          # ./lib/gitlab/database/load_balancing/rack_middleware.rb:23:in `call'
          # ./lib/gitlab/middleware/go.rb:21:in `call'
          # ./lib/gitlab/etag_caching/middleware.rb:21:in `call'
          # ./lib/gitlab/middleware/query_analyzer.rb:11:in `block in call'
          # ./lib/gitlab/database/query_analyzer.rb:40:in `within'
          # ./lib/gitlab/middleware/query_analyzer.rb:11:in `call'
          # ./lib/gitlab/middleware/multipart.rb:173:in `call'
          # ./lib/gitlab/middleware/read_only/controller.rb:50:in `call'
          # ./lib/gitlab/middleware/read_only.rb:18:in `call'
          # ./lib/gitlab/middleware/unauthenticated_session_expiry.rb:18:in `call'
          # ./lib/gitlab/middleware/strip_cookies.rb:29:in `call'
          # ./lib/gitlab/middleware/same_site_cookies.rb:27:in `call'
          # ./lib/gitlab/middleware/path_traversal_check.rb:40:in `call'
          # ./lib/gitlab/middleware/handle_malformed_strings.rb:21:in `call'
          # ./lib/gitlab/middleware/basic_health_check.rb:25:in `call'
          # ./lib/gitlab/middleware/handle_ip_spoof_attack_error.rb:25:in `call'
          # ./lib/gitlab/middleware/request_context.rb:15:in `call'
          # ./lib/gitlab/middleware/webhook_recursion_detection.rb:15:in `call'
          # ./config/initializers/fix_local_cache_middleware.rb:11:in `call'
          # ./lib/gitlab/middleware/compressed_json.rb:44:in `call'
          # ./lib/gitlab/middleware/static.rb:11:in `call'
          # ./lib/gitlab/testing/clear_process_memory_cache_middleware.rb:13:in `call'
          # ./lib/gitlab/testing/request_inspector_middleware.rb:35:in `call'
          # ./lib/gitlab/testing/robots_blocker_middleware.rb:30:in `call'
          # ./lib/gitlab/testing/request_blocker_middleware.rb:47:in `call'
          # ./lib/gitlab/middleware/rack_multipart_tempfile_factory.rb:19:in `call'
          # ./lib/gitlab/middleware/sidekiq_web_static.rb:20:in `call'
          # ./lib/gitlab/metrics/requests_rack_middleware.rb:79:in `call'
          # ------------------
          # --- Caused by: ---
          # Selenium::WebDriver::Error::WebDriverError:
          #   #0 0x5ce5c4cfe863 <unknown>
#1 0x5ce5c49f48c6 <unknown>
#2 0x5ce5c49dbb32 <unknown>
#3 0x5ce5c49da55b <unknown>
#4 0x5ce5c49dab9f <unknown>
#5 0x5ce5c4a04c46 <unknown>
#6 0x5ce5c4a0520a <unknown>
#7 0x5ce5c49fa801 <unknown>
#8 0x5ce5c49f8bd1 <unknown>
#9 0x5ce5c49fbbce <unknown>
#10 0x5ce5c49fbc5c <unknown>
#11 0x5ce5c4a39ae2 <unknown>
#12 0x5ce5c4a615a2 <unknown>
#13 0x5ce5c4a33e98 <unknown>
#14 0x5ce5c4a6176e <unknown>
#15 0x5ce5c4a7fc19 <unknown>
#16 0x5ce5c4a61343 <unknown>
#17 0x5ce5c4a32593 <unknown>
#18 0x5ce5c4a32f5e <unknown>
#19 0x5ce5c4cc284b <unknown>
#20 0x5ce5c4cc67a5 <unknown>
#21 0x5ce5c4cb0571 <unknown>
#22 0x5ce5c4cc7332 <unknown>
#23 0x5ce5c4c9587f <unknown>
#24 0x5ce5c4ced728 <unknown>
#25 0x5ce5c4ced8fb <unknown>
#26 0x5ce5c4cfd9b4 <unknown>
#27 0x7a8dc98f8134 <unknown>


     1.2) Failure/Error: raise BrowserConsoleError, message

          BrowserConsoleHelpers::BrowserConsoleError:
            Unexpected browser console output:
            webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:"
            webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
            webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object
            http://127.0.0.1:39133/group45/project-60/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error)
          # ./spec/support/helpers/browser_console_helpers.rb:79:in `raise_if_unexpected_browser_console_output'
          # ./spec/support/capybara.rb:200:in `block (2 levels) in <top (required)>'
          # ./spec/spec_helper.rb:473:in `block (3 levels) in <top (required)>'
          # ./lib/gitlab/sidekiq_sharding/validator.rb:42:in `enabled'
          # ./spec/spec_helper.rb:472:in `block (2 levels) in <top (required)>'
          # ./spec/spec_helper.rb:467:in `block (3 levels) in <top (required)>'
          # ./spec/support/sidekiq_middleware.rb:9:in `with_sidekiq_server_middleware'
          # ./spec/spec_helper.rb:458:in `block (2 levels) in <top (required)>'
          # ./spec/spec_helper.rb:454:in `block (3 levels) in <top (required)>'
          # ./lib/gitlab/application_context.rb:92:in `with_raw_context'
          # ./spec/spec_helper.rb:454:in `block (2 levels) in <top (required)>'
          # ./spec/spec_helper.rb:270:in `block (2 levels) in <top (required)>'
          # ./spec/support/system_exit_detected.rb:7:in `block (2 levels) in <top (required)>'
          # ./spec/support/fast_quarantine.rb:22:in `block (2 levels) in <top (required)>'
          # ./spec/support/database/prevent_cross_joins.rb:106:in `block (3 levels) in <top (required)>'
          # ./spec/support/database/prevent_cross_joins.rb:60:in `with_cross_joins_prevented'
          # ./spec/support/database/prevent_cross_joins.rb:106:in `block (2 levels) in <top (required)>'
          # ./spec/support/capybara.rb:175:in `block (3 levels) in <top (required)>'
          # ./config/initializers/forbid_sidekiq_in_transactions.rb:10:in `skipping_transaction_check'
          # ./spec/support/capybara.rb:175:in `block (2 levels) in <top (required)>'

Finished in 26 minutes 2 seconds (files took 2 minutes 36.1 seconds to load)
251 examples, 1 failure

Failed examples:

rspec './ee/spec/features/projects/settings/ee/protected_branches_spec.rb[1:1:1:1:1]' # Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches

Randomized with seed 22197

Stopped processing SimpleCov as a previous error not related to SimpleCov has been detected
Failed to write to log, write log/workhorse-test.log: file already closed
RSpec exited with 1.
[job-metrics] Updating job metrics tag for the CI/CD job.
RSPEC_RETRIED_TESTS_REPORT_PATH: rspec/retried_tests-7812354946.txt
Retrying the failing examples in a new RSpec process...
$ gem install junit_merge --no-document --version 0.1.2
Successfully installed nokogiri-1.16.7-x86_64-linux
Successfully installed junit_merge-0.1.2
2 gems installed
==> 'gem install junit_merge --no-document --version 0.1.2' succeeded in 2 seconds.
Running RSpec command: bin/rspec -Ispec -rspec_helper --color --failure-exit-code 1 --error-exit-code 2 --format documentation --format Support::Formatters::JsonFormatter --out rspec/rspec-retry-7812354946.json --format RspecJunitFormatter --out rspec/rspec-retry-7812354946.xml --only-failures --pattern "{ee/}spec/{features}{,/**/}*_spec.rb"
warning: parser/current is loading parser/ruby31, which recognizes 3.1.6-compliant syntax, but you are running 3.1.5.
Please see https://github.com/whitequark/parser#compatibility-with-ruby-mri.
Run options: include {:last_run_status=>"failed"}

# [RSpecRunTime] Starting RSpec timer...
[TEST PROF INFO] EventProf enabled (sql.active_record)
unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String.
unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String.

Test environment set up in 2.461126644 seconds
# [RSpecRunTime] Starting example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. Expected to take 53.75 seconds.

Projects > Settings > Repository settings using custom role
Starting the Capybara driver server...
  when user is a guest with custom roles that enables handling protected branches
    behaves like setting project protected branches
      explicit protected branches
Capybara starting Puma...
* Version 6.4.0, codename: The Eagle of Durango
* Min threads: 0, max threads: 4
* Listening on unix:///tmp/20240912-14747-vhxu5s
        allows creating explicit protected branches

# [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. It took 26.56 seconds. Expected to take 53.75 seconds.
auto_explain log contains 1304 entries for main, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-12-16.14747.main.ndjson.gz
took 17.567536654
auto_explain log contains 1304 entries for ci, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-12-16.14747.ci.ndjson.gz
took 17.721523781
[TEST PROF INFO] EventProf results for sql.active_record

Total time: 00:03.018 of 00:26.564 (11.36%)
Total events: 939

Top 5 slowest suites (by time):

Projects > Se...ng custom role (./ee/spec/features/projects/settings/ee/protected_branches_spec.rb:5) – 00:03.018 (939 / 1) of 00:26.564 (11.36%)


Finished in 1 minute 13.95 seconds (files took 1 minute 32.9 seconds to load)
1 example, 0 failures

Randomized with seed 24720

Failed to write to log, write log/workhorse-test.log: file already closed
Loading rspec/rspec-7812354946.json...
Merged rspec/rspec-retry-7812354946.json adding 5 results.
Saved rspec/rspec-7812354946.json.
A test was flaky and succeeded after being retried. Checking to see if flaky test is part of this MR...
Flaky test was not part of this MR.
section_end:1726164483:step_script
section_start:1726164483:after_script
Running after_script
Running after script...
$ source scripts/utils.sh
$ log_disk_usage after_script
[log_disk_usage after_script] start
df -h
Filesystem      Size  Used Avail Use% Mounted on
overlay          46G   26G   20G  57% /
tmpfs            64M     0   64M   0% /dev
shm             256M     0  256M   0% /dev/shm
/dev/sda1        46G   26G   20G  57% /cache
tmpfs           3.9G     0  3.9G   0% /sys/devices/virtual/dmi/id
tmpfs           3.9G     0  3.9G   0% /proc/acpi
tmpfs           3.9G     0  3.9G   0% /proc/scsi
tmpfs           3.9G     0  3.9G   0% /sys/firmware
du -h -d 1
7.4M	./workhorse
148K	./bin
1.2M	./.gitlab
193M	./.git
4.0K	./builds
16M	./coverage
28M	./lib
8.0K	./.vscode
516K	./storybook
37M	./log
1.8M	./data
9.9M	./qa
2.9M	./.rubocop_todo
1.1G	./vendor
943M	./public
59M	./doc
480K	./danger
260K	./rspec
8.0K	./.bundle
548K	./tooling
140M	./ee
1.3M	./knapsack
296K	./patches
4.3M	./changelogs
20K	./haml_lint
28K	./metrics_server
88K	./keeps
216K	./shared
44K	./generator_templates
1.2M	./scripts
1.4G	./tmp
125M	./spec
20K	./file_hooks
16K	./sidekiq_cluster
16M	./gems
1.2M	./fixtures
948K	./rubocop
4.0K	./.go
30M	./db
876K	./auto_explain
12K	./.github
125M	./locale
1.9M	./glfm_specification
17M	./config
80M	./app
16K	./.lefthook
4.3G	.
[log_disk_usage after_script] end
$ bundle exec gem list gitlab_quality-test_tooling
gitlab_quality-test_tooling (1.38.1)
$ section_start "failed-test-issues" "Report test failures" # collapsed multi-line command
section_start:1726164495:failed-test-issues[collapsed=true]
Report test failures
Reporting tests in `rspec/rspec-retry-7812354946.json` as issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`.
=> Processing 1 tests in rspec/rspec-retry-7812354946.json
 => Reported 0 failed tests.
section_end:1726164498:failed-test-issues

$ section_start "flaky-test-issues" "Report test flakiness" # collapsed multi-line command
section_start:1726164498:flaky-test-issues[collapsed=true]
Report test flakiness
Reporting tests in `rspec/rspec-retry-7812354946.json` as issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`.
=> Processing 1 tests in rspec/rspec-retry-7812354946.json
 => Reporting flaky test 'Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches'...
   => Reporting flaky test to existing issue: https://gitlab.com/gitlab-org/gitlab/-/issues/482781
 => Reported 1 flaky tests.
section_end:1726164503:flaky-test-issues

$ section_start "slow-test-issues" "Report test slowness" # collapsed multi-line command
section_start:1726164503:slow-test-issues[collapsed=true]
Report test slowness
Reporting tests in `rspec/rspec-*.json` as issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`.
=> Processing 1 tests in rspec/rspec-7812354946.json
 => Reported 0 slow tests.
=> Processing 1 tests in rspec/rspec-retry-7812354946.json
 => Reported 0 slow tests.
section_end:1726164505:slow-test-issues

$ section_start "slow-test-merge-request-report-note" "Report test slowness in MR note" # collapsed multi-line command
section_start:1726164505:slow-test-merge-request-report-note[collapsed=true]
Report test slowness in MR note
Not reporting test slowness in MR note because $ADD_SLOW_TEST_NOTE_TO_MERGE_REQUEST != 'true'
section_end:1726164505:slow-test-merge-request-report-note

$ section_start "knapsack-report-issues" "Report test files close to timing out" # collapsed multi-line command
section_start:1726164505:knapsack-report-issues[collapsed=true]
Report test files close to timing out
Reporting spec file exceeding Knapsack expectaton issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`.
=> Reporting 0 spec files exceeding Knapsack expectation.
section_end:1726164507:knapsack-report-issues

$ tooling/bin/push_job_metrics || true
[job-metrics] Pushing job metrics file for the CI/CD job.
[job-metrics] Pushed 4 CI job metric entries to InfluxDB.
section_end:1726164508:after_script
section_start:1726164508:archive_cache
Saving cache for successful job
Not uploading cache ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-19 due to policy
section_end:1726164509:archive_cache
section_start:1726164509:upload_artifacts_on_success
Uploading artifacts for successful job
Uploading artifacts...
auto_explain/: found 5 matching artifact files and directories 
coverage/: found 4 matching artifact files and directories 
WARNING: crystalball/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 
WARNING: deprecations/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 
knapsack/: found 4 matching artifact files and directories 
rspec/: found 15 matching artifact files and directories 
tmp/capybara/: found 3 matching artifact files and directories 
log/*.log: found 17 matching artifact files and directories 
WARNING: Upload request redirected                  location=https://gitlab.com/api/v4/jobs/7812354946/artifacts?artifact_format=zip&artifact_type=archive&expire_in=31d new-url=https://gitlab.com
WARNING: Retrying...                                context=artifacts-uploader error=request redirected
Uploading artifacts as "archive" to coordinator... 201 Created  id=7812354946 responseStatus=201 Created token=glcbt-66
Uploading artifacts...
rspec/rspec-*.xml: found 2 matching artifact files and directories 
WARNING: Upload request redirected                  location=https://gitlab.com/api/v4/jobs/7812354946/artifacts?artifact_format=gzip&artifact_type=junit&expire_in=31d new-url=https://gitlab.com
WARNING: Retrying...                                context=artifacts-uploader error=request redirected
Uploading artifacts as "junit" to coordinator... 201 Created  id=7812354946 responseStatus=201 Created token=glcbt-66
section_end:1726164519:upload_artifacts_on_success
section_start:1726164519:cleanup_file_variables
Cleaning up project directory and file based variables
section_end:1726164519:cleanup_file_variables
Job succeeded