[0KRunning with gitlab-runner 17.4.0~pre.110.g27400594 (27400594)[0;m [0K on blue-4.shared-gitlab-org.runners-manager.gitlab.com/default 8cwZ3F43, system ID: s_df0f7e24ca8b[0;m [0K feature flags: FF_NETWORK_PER_BUILD:true[0;m [0K[36;1mResolving secrets[0;m[0;m section_start:1726162272:prepare_executor [0K[0K[36;1mPreparing the "docker+machine" executor[0;m[0;m [0KUsing Docker executor with image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 ...[0;m [0KStarting service registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1...[0;m [0KAuthenticating with credentials from job payload (GitLab Registry)[0;m [0KPulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1 ...[0;m [0KUsing docker image sha256:82f132c22567f8ce17cc132c14b2f9aa3eaf9bb5424d91c2d966912433f0257d for registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-14-pgvector-0.4.1 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:c55e1364ee4327b244a9cfa1750f19feea14fc774eaf792b725967d146eb45f5 ...[0;m [0;33mWARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 is already created. Ignoring.[0;m [0;33mWARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 is already created. Ignoring.[0;m [0KStarting service registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12...[0;m [0KAuthenticating with credentials from job payload (GitLab Registry)[0;m [0KPulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 ...[0;m [0KUsing docker image sha256:5c5ba5b83d6c60cb0b225bd670b7a43be8c238cc72347d24af57e5027c3648f3 for registry.gitlab.com/gitlab-org/gitlab-build-images:redis-cluster-6.2.12 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:46aceab84c42d0e819c8e7940f2f98ce9e184785cd7b22d95872024a35f52407 ...[0;m [0KStarting service redis:6.2-alpine...[0;m [0KPulling docker image redis:6.2-alpine ...[0;m [0KUsing docker image sha256:7de0dedd123b8cb2b105ace4e8d00b8bba5ad7be39617dfa229acff315fe4fbf for redis:6.2-alpine with digest redis@sha256:2d1463258f2764328496376f5d965f20c6a67f66ea2b06dc42af351f75248792 ...[0;m [0;33mWARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 is already created. Ignoring.[0;m [0;33mWARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 is already created. Ignoring.[0;m [0KStarting service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8...[0;m [0KAuthenticating with credentials from job payload (GitLab Registry)[0;m [0KPulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 ...[0;m [0KUsing docker image sha256:df819140e3df737cdc7b8d6fb73ce804b05058c790e025b5f52840956feb1734 for registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.8 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:7bdf349fc3dd9da64bc6581d44c0e906bffd38977ddbd2668ba34adb5dedfe38 ...[0;m [0KStarting service elasticsearch:7.17.6...[0;m [0KPulling docker image elasticsearch:7.17.6 ...[0;m [0KUsing docker image sha256:5fad10241ffd65d817ed0ddfaf6e87eee1f7dc2a7db33db1047835560ea71fda for elasticsearch:7.17.6 with digest elasticsearch@sha256:6c128de5d01c0c130a806022d6bd99b3e4c27a9af5bfc33b6b81861ae117d028 ...[0;m [0KStarting service registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway:v1.15.0...[0;m [0KAuthenticating with credentials from job payload (GitLab Registry)[0;m [0KPulling docker image registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway:v1.15.0 ...[0;m [0KUsing docker image sha256:a30dfbd70a5ce5c22a86589004a91775d1058abbf8fc0d6cf08a3024177a0d8e for registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway:v1.15.0 with digest registry.gitlab.com/gitlab-org/modelops/applied-ml/code-suggestions/ai-assist/model-gateway@sha256:067593f7d33000df515b665f8e988768376e97b66123fdcf2e016e23e3a8c5f3 ...[0;m [0KWaiting for services to be up and running (timeout 30 seconds)...[0;m [0;33m*** WARNING:[0;m Service runner-8cwz3f43-project-278964-concurrent-0-b163d417acfbcb18-elasticsearch-4 probably didn't start properly. Health check error: service "runner-8cwz3f43-project-278964-concurrent-0-b163d417acfbcb18-elasticsearch-4-wait-for-service" timeout Health check container logs: 2024-09-12T17:31:22.609380032Z waiting for TCP connection to 7710fdd9a560 on [9200 9300]... 2024-09-12T17:31:22.611888342Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:22.627542721Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:23.635219808Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:23.635268178Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:24.636979377Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:24.637017137Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:25.638741106Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:25.638780675Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:26.639645674Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:26.639689574Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:27.641096623Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:27.641136933Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:28.642865762Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:28.642948742Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:29.644982630Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:29.645043550Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:30.646903489Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:30.646947618Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:31.648846537Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:31.648918037Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:32.650082006Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:32.650118896Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:33.651802645Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:33.651842625Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:34.653527103Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:34.653581153Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:35.654724262Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:35.654773442Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:36.656762631Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:36.656816781Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:37.658559399Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:37.658969390Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:38.659887058Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:38.659923958Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:39.660713397Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:39.660774477Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:40.661655666Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:40.661693366Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:41.662787484Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:41.662828394Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:42.663909023Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:42.664308563Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:43.664872201Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:43.665102191Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:44.666796490Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:44.666840440Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:45.667503378Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:45.667695868Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:46.668892568Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:46.669012908Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:47.670973226Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:47.671010556Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:48.672770634Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:48.672809554Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:49.674543673Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:49.674591563Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:50.675518272Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:50.675825312Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:51.677837890Z dialing 7710fdd9a560:9200... 2024-09-12T17:31:51.677881670Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:52.678825179Z dialing 7710fdd9a560:9300... 2024-09-12T17:31:52.678895839Z dialing 7710fdd9a560:9200... Service container logs: 2024-09-12T17:31:30.307534189Z {"type": "server", "timestamp": "2024-09-12T17:31:30,270Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "version[7.17.6], pid[8], build[default/docker/f65e9d338dc1d07b642e14a27f338990148ee5b6/2022-08-23T11:08:48.893373482Z], OS[Linux/5.15.154+/amd64], JVM[Oracle Corporation/OpenJDK 64-Bit Server VM/18.0.2/18.0.2+9-61]" } 2024-09-12T17:31:30.308792400Z {"type": "server", "timestamp": "2024-09-12T17:31:30,307Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "JVM home [/usr/share/elasticsearch/jdk], using bundled JDK [true]" } 2024-09-12T17:31:30.309596119Z {"type": "server", "timestamp": "2024-09-12T17:31:30,308Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "JVM arguments [-Xshare:auto, -Des.networkaddress.cache.ttl=60, -Des.networkaddress.cache.negative.ttl=10, -XX:+AlwaysPreTouch, -Xss1m, -Djava.awt.headless=true, -Dfile.encoding=UTF-8, -Djna.nosys=true, -XX:-OmitStackTraceInFastThrow, -XX:+ShowCodeDetailsInExceptionMessages, -Dio.netty.noUnsafe=true, -Dio.netty.noKeySetOptimization=true, -Dio.netty.recycler.maxCapacityPerThread=0, -Dio.netty.allocator.numDirectArenas=0, -Dlog4j.shutdownHookEnabled=false, -Dlog4j2.disable.jmx=true, -Dlog4j2.formatMsgNoLookups=true, -Djava.locale.providers=SPI,COMPAT, --add-opens=java.base/java.io=ALL-UNNAMED, -Djava.security.manager=allow, -XX:+UseG1GC, -Djava.io.tmpdir=/tmp/elasticsearch-7623164299679700715, -XX:+HeapDumpOnOutOfMemoryError, -XX:+ExitOnOutOfMemoryError, -XX:HeapDumpPath=data, -XX:ErrorFile=logs/hs_err_pid%p.log, -Xlog:gc*,gc+age=trace,safepoint:file=logs/gc.log:utctime,pid,tags:filecount=32,filesize=64m, -Des.cgroups.hierarchy.override=/, -Xms256m, -Xmx256m, -XX:MaxDirectMemorySize=134217728, -XX:G1HeapRegionSize=4m, -XX:InitiatingHeapOccupancyPercent=30, -XX:G1ReservePercent=15, -Des.path.home=/usr/share/elasticsearch, -Des.path.conf=/usr/share/elasticsearch/config, -Des.distribution.flavor=default, -Des.distribution.type=docker, -Des.bundled_jdk=true]" } 2024-09-12T17:31:36.733056274Z {"type": "server", "timestamp": "2024-09-12T17:31:36,732Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [aggs-matrix-stats]" } 2024-09-12T17:31:36.733743194Z {"type": "server", "timestamp": "2024-09-12T17:31:36,733Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [analysis-common]" } 2024-09-12T17:31:36.734553654Z {"type": "server", "timestamp": "2024-09-12T17:31:36,733Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [constant-keyword]" } 2024-09-12T17:31:36.734934163Z {"type": "server", "timestamp": "2024-09-12T17:31:36,734Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [frozen-indices]" } 2024-09-12T17:31:36.739442373Z {"type": "server", "timestamp": "2024-09-12T17:31:36,735Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [ingest-common]" } 2024-09-12T17:31:36.739868963Z {"type": "server", "timestamp": "2024-09-12T17:31:36,739Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [ingest-geoip]" } 2024-09-12T17:31:36.741219723Z {"type": "server", "timestamp": "2024-09-12T17:31:36,740Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [ingest-user-agent]" } 2024-09-12T17:31:36.741537593Z {"type": "server", "timestamp": "2024-09-12T17:31:36,741Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [kibana]" } 2024-09-12T17:31:36.741844883Z {"type": "server", "timestamp": "2024-09-12T17:31:36,741Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [lang-expression]" } 2024-09-12T17:31:36.742293933Z {"type": "server", "timestamp": "2024-09-12T17:31:36,742Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [lang-mustache]" } 2024-09-12T17:31:36.742583933Z {"type": "server", "timestamp": "2024-09-12T17:31:36,742Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [lang-painless]" } 2024-09-12T17:31:36.742897493Z {"type": "server", "timestamp": "2024-09-12T17:31:36,742Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [legacy-geo]" } 2024-09-12T17:31:36.743442333Z {"type": "server", "timestamp": "2024-09-12T17:31:36,743Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [mapper-extras]" } 2024-09-12T17:31:36.750984122Z {"type": "server", "timestamp": "2024-09-12T17:31:36,750Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [mapper-version]" } 2024-09-12T17:31:36.751566742Z {"type": "server", "timestamp": "2024-09-12T17:31:36,751Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [parent-join]" } 2024-09-12T17:31:36.751923852Z {"type": "server", "timestamp": "2024-09-12T17:31:36,751Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [percolator]" } 2024-09-12T17:31:36.752761452Z {"type": "server", "timestamp": "2024-09-12T17:31:36,752Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [rank-eval]" } 2024-09-12T17:31:36.753300252Z {"type": "server", "timestamp": "2024-09-12T17:31:36,753Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [reindex]" } 2024-09-12T17:31:36.753657342Z {"type": "server", "timestamp": "2024-09-12T17:31:36,753Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [repositories-metering-api]" } 2024-09-12T17:31:36.754230752Z {"type": "server", "timestamp": "2024-09-12T17:31:36,753Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [repository-encrypted]" } 2024-09-12T17:31:36.754615132Z {"type": "server", "timestamp": "2024-09-12T17:31:36,754Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [repository-url]" } 2024-09-12T17:31:36.755403132Z {"type": "server", "timestamp": "2024-09-12T17:31:36,755Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [runtime-fields-common]" } 2024-09-12T17:31:36.755856062Z {"type": "server", "timestamp": "2024-09-12T17:31:36,755Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [search-business-rules]" } 2024-09-12T17:31:36.756672781Z {"type": "server", "timestamp": "2024-09-12T17:31:36,756Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [searchable-snapshots]" } 2024-09-12T17:31:36.757025961Z {"type": "server", "timestamp": "2024-09-12T17:31:36,756Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [snapshot-repo-test-kit]" } 2024-09-12T17:31:36.757728081Z {"type": "server", "timestamp": "2024-09-12T17:31:36,757Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [spatial]" } 2024-09-12T17:31:36.758279892Z {"type": "server", "timestamp": "2024-09-12T17:31:36,758Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [transform]" } 2024-09-12T17:31:36.758620672Z {"type": "server", "timestamp": "2024-09-12T17:31:36,758Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [transport-netty4]" } 2024-09-12T17:31:36.759097801Z {"type": "server", "timestamp": "2024-09-12T17:31:36,758Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [unsigned-long]" } 2024-09-12T17:31:36.759455041Z {"type": "server", "timestamp": "2024-09-12T17:31:36,759Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [vector-tile]" } 2024-09-12T17:31:36.759788761Z {"type": "server", "timestamp": "2024-09-12T17:31:36,759Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [vectors]" } 2024-09-12T17:31:36.760204481Z {"type": "server", "timestamp": "2024-09-12T17:31:36,759Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [wildcard]" } 2024-09-12T17:31:36.760534131Z {"type": "server", "timestamp": "2024-09-12T17:31:36,760Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-aggregate-metric]" } 2024-09-12T17:31:36.760890721Z {"type": "server", "timestamp": "2024-09-12T17:31:36,760Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-analytics]" } 2024-09-12T17:31:36.761499441Z {"type": "server", "timestamp": "2024-09-12T17:31:36,760Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-async]" } 2024-09-12T17:31:36.761853851Z {"type": "server", "timestamp": "2024-09-12T17:31:36,761Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-async-search]" } 2024-09-12T17:31:36.762214261Z {"type": "server", "timestamp": "2024-09-12T17:31:36,761Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-autoscaling]" } 2024-09-12T17:31:36.762571991Z {"type": "server", "timestamp": "2024-09-12T17:31:36,762Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-ccr]" } 2024-09-12T17:31:36.762900621Z {"type": "server", "timestamp": "2024-09-12T17:31:36,762Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-core]" } 2024-09-12T17:31:36.763152411Z {"type": "server", "timestamp": "2024-09-12T17:31:36,762Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-data-streams]" } 2024-09-12T17:31:36.763416391Z {"type": "server", "timestamp": "2024-09-12T17:31:36,763Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-deprecation]" } 2024-09-12T17:31:36.763606261Z {"type": "server", "timestamp": "2024-09-12T17:31:36,763Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-enrich]" } 2024-09-12T17:31:36.763814871Z {"type": "server", "timestamp": "2024-09-12T17:31:36,763Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-eql]" } 2024-09-12T17:31:36.764022391Z {"type": "server", "timestamp": "2024-09-12T17:31:36,763Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-fleet]" } 2024-09-12T17:31:36.764238621Z {"type": "server", "timestamp": "2024-09-12T17:31:36,763Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-graph]" } 2024-09-12T17:31:36.764440371Z {"type": "server", "timestamp": "2024-09-12T17:31:36,764Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-identity-provider]" } 2024-09-12T17:31:36.764639781Z {"type": "server", "timestamp": "2024-09-12T17:31:36,764Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-ilm]" } 2024-09-12T17:31:36.764869451Z {"type": "server", "timestamp": "2024-09-12T17:31:36,764Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-logstash]" } 2024-09-12T17:31:36.765086861Z {"type": "server", "timestamp": "2024-09-12T17:31:36,764Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-ml]" } 2024-09-12T17:31:36.765330351Z {"type": "server", "timestamp": "2024-09-12T17:31:36,765Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-monitoring]" } 2024-09-12T17:31:36.765564671Z {"type": "server", "timestamp": "2024-09-12T17:31:36,765Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-ql]" } 2024-09-12T17:31:36.765781191Z {"type": "server", "timestamp": "2024-09-12T17:31:36,765Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-rollup]" } 2024-09-12T17:31:36.766028631Z {"type": "server", "timestamp": "2024-09-12T17:31:36,765Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-security]" } 2024-09-12T17:31:36.766244561Z {"type": "server", "timestamp": "2024-09-12T17:31:36,765Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-shutdown]" } 2024-09-12T17:31:36.769550240Z {"type": "server", "timestamp": "2024-09-12T17:31:36,769Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-sql]" } 2024-09-12T17:31:36.769758100Z {"type": "server", "timestamp": "2024-09-12T17:31:36,769Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-stack]" } 2024-09-12T17:31:36.769995400Z {"type": "server", "timestamp": "2024-09-12T17:31:36,769Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-text-structure]" } 2024-09-12T17:31:36.770238550Z {"type": "server", "timestamp": "2024-09-12T17:31:36,769Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-voting-only-node]" } 2024-09-12T17:31:36.770422280Z {"type": "server", "timestamp": "2024-09-12T17:31:36,770Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "loaded module [x-pack-watcher]" } 2024-09-12T17:31:36.771073720Z {"type": "server", "timestamp": "2024-09-12T17:31:36,770Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "no plugins loaded" } 2024-09-12T17:31:36.970809822Z {"type": "server", "timestamp": "2024-09-12T17:31:36,964Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "using [1] data paths, mounts [[/ (overlay)]], net usable_space [24.6gb], net total_space [45gb], types [overlay]" } 2024-09-12T17:31:36.973871312Z {"type": "server", "timestamp": "2024-09-12T17:31:36,973Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "heap size [256mb], compressed ordinary object pointers [true]" } 2024-09-12T17:31:37.128655298Z {"type": "server", "timestamp": "2024-09-12T17:31:37,128Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "node name [7710fdd9a560], node ID [akptSJ-hRLil__yn4q2MlQ], cluster name [docker-cluster], roles [transform, data_frozen, master, remote_cluster_client, data, ml, data_content, data_hot, data_warm, data_cold, ingest]" } 2024-09-12T17:31:50.088757626Z {"type": "server", "timestamp": "2024-09-12T17:31:50,087Z", "level": "INFO", "component": "o.e.x.m.p.l.CppLogMessageHandler", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "[controller/211] [Main.cc@122] controller (64 bit): Version 7.17.6 (Build ea0305ae2a3b09) Copyright (c) 2022 Elasticsearch BV" } 2024-09-12T17:31:51.308364974Z {"type": "server", "timestamp": "2024-09-12T17:31:51,307Z", "level": "INFO", "component": "o.e.i.g.ConfigDatabases", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "initialized default databases [[GeoLite2-Country.mmdb, GeoLite2-City.mmdb, GeoLite2-ASN.mmdb]], config databases [[]] and watching [/usr/share/elasticsearch/config/ingest-geoip] for changes" } 2024-09-12T17:31:51.310446364Z {"type": "server", "timestamp": "2024-09-12T17:31:51,310Z", "level": "INFO", "component": "o.e.i.g.DatabaseNodeService", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "initialized database registry, using geoip-databases directory [/tmp/elasticsearch-7623164299679700715/geoip-databases/akptSJ-hRLil__yn4q2MlQ]" } 2024-09-12T17:31:52.717145165Z {"type": "server", "timestamp": "2024-09-12T17:31:52,716Z", "level": "INFO", "component": "o.e.t.NettyAllocator", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "creating NettyAllocator with the following configs: [name=unpooled, suggested_max_allocation_size=1mb, factors={es.unsafe.use_unpooled_allocator=null, g1gc_enabled=true, g1gc_region_size=4mb, heap_size=256mb}]" } 2024-09-12T17:31:52.855898362Z {"type": "server", "timestamp": "2024-09-12T17:31:52,855Z", "level": "INFO", "component": "o.e.i.r.RecoverySettings", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "using rate limit [40mb] with [default=40mb, read=0b, write=0b, max=0b]" } 2024-09-12T17:31:53.007780919Z {"type": "server", "timestamp": "2024-09-12T17:31:53,006Z", "level": "INFO", "component": "o.e.d.DiscoveryModule", "cluster.name": "docker-cluster", "node.name": "7710fdd9a560", "message": "using discovery type [single-node] and seed hosts providers [settings]" } [0;33m*********[0;m [0KAuthenticating with credentials from job payload (GitLab Registry)[0;m [0KPulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 ...[0;m [0KUsing docker image sha256:533b69d21cbef3edef3b4fa4c5106d4fe43a2d2e80f65333682de7f2d5ac1800 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14@sha256:b25c1b0aa2724a8dc6571d9ee6edbadc50e2d4eab75d2ce2c3f35f9e2f74acfe ...[0;m section_end:1726162313:prepare_executor [0Ksection_start:1726162313:prepare_script [0K[0K[36;1mPreparing environment[0;m[0;m Running on runner-8cwz3f43-project-278964-concurrent-0 via runner-8cwz3f43-shared-gitlab-org-1726154698-495c6e45... section_end:1726162314:prepare_script [0Ksection_start:1726162314:get_sources [0K[0K[36;1mGetting source from Git repository[0;m[0;m [32;1mSkipping Git repository setup[0;m [32;1mSkipping Git checkout[0;m [32;1mSkipping Git submodules setup[0;m section_end:1726162315:get_sources [0Ksection_start:1726162315:restore_cache [0K[0K[36;1mRestoring cache[0;m[0;m [32;1mChecking cache for ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-19...[0;m Downloading cache from https://storage.googleapis.com/gitlab-com-runners-cache/project/278964/ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-19[0;m ETag[0;m="d3be8518af533e9e39e20571060155d0" [32;1mSuccessfully extracted cache[0;m section_end:1726162343:restore_cache [0Ksection_start:1726162343:download_artifacts [0K[0K[36;1mDownloading artifacts[0;m[0;m [32;1mDownloading artifacts for clone-gitlab-repo (7812354413)...[0;m Downloading artifacts from coordinator... ok [0;m host[0;m=storage.googleapis.com id[0;m=7812354413 responseStatus[0;m=200 OK token[0;m=glcbt-66 [0;33mWARNING: Part of .git directory is on the list of files to extract[0;m [0;33mWARNING: This may introduce unexpected problems [0;m [32;1mDownloading artifacts for compile-test-assets (7812354461)...[0;m Downloading artifacts from coordinator... ok [0;m host[0;m=storage.googleapis.com id[0;m=7812354461 responseStatus[0;m=200 OK token[0;m=glcbt-66 [32;1mDownloading artifacts for retrieve-tests-metadata (7812354510)...[0;m Downloading artifacts from coordinator... ok [0;m host[0;m=storage.googleapis.com id[0;m=7812354510 responseStatus[0;m=200 OK token[0;m=glcbt-66 [32;1mDownloading artifacts for setup-test-env (7812354483)...[0;m Downloading artifacts from coordinator... ok [0;m host[0;m=storage.googleapis.com id[0;m=7812354483 responseStatus[0;m=200 OK token[0;m=glcbt-66 section_end:1726162393:download_artifacts [0Ksection_start:1726162393:step_script [0K[0K[36;1mExecuting "step_script" stage of the job script[0;m[0;m [0KUsing docker image sha256:533b69d21cbef3edef3b4fa4c5106d4fe43a2d2e80f65333682de7f2d5ac1800 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14:rubygems-3.4-git-2.45-lfs-2.9-chrome-123-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bookworm-ruby-3.1.5-golang-1.22-rust-1.73-node-20.12-postgresql-14@sha256:b25c1b0aa2724a8dc6571d9ee6edbadc50e2d4eab75d2ce2c3f35f9e2f74acfe ...[0;m [32;1m$ echo $FOSS_ONLY[0;m [32;1m$ [ "$FOSS_ONLY" = "1" ] && rm -rf ee/ qa/spec/ee/ qa/qa/specs/features/ee/ qa/qa/ee/ qa/qa/ee.rb[0;m [32;1m$ export GOPATH=$CI_PROJECT_DIR/.go[0;m [32;1m$ mkdir -p $GOPATH[0;m [32;1m$ source scripts/utils.sh[0;m [32;1m$ log_disk_usage before_script[0;m [log_disk_usage before_script] start df -h Filesystem Size Used Avail Use% Mounted on overlay 46G 24G 22G 54% / tmpfs 64M 0 64M 0% /dev shm 256M 0 256M 0% /dev/shm /dev/sda1 46G 24G 22G 54% /cache tmpfs 3.9G 0 3.9G 0% /sys/devices/virtual/dmi/id tmpfs 3.9G 0 3.9G 0% /proc/acpi tmpfs 3.9G 0 3.9G 0% /proc/scsi tmpfs 3.9G 0 3.9G 0% /sys/firmware du -h -d 1 7.4M ./workhorse 148K ./bin 1.2M ./.gitlab 193M ./.git 4.0K ./builds 28M ./lib 8.0K ./.vscode 516K ./storybook 20K ./log 1.8M ./data 9.9M ./qa 2.9M ./.rubocop_todo 1.1G ./vendor 943M ./public 59M ./doc 480K ./danger 108K ./rspec 548K ./tooling 140M ./ee 1.3M ./knapsack 296K ./patches 4.3M ./changelogs 20K ./haml_lint 28K ./metrics_server 88K ./keeps 48K ./shared 44K ./generator_templates 1.2M ./scripts 660M ./tmp 125M ./spec 20K ./file_hooks 16K ./sidekiq_cluster 16M ./gems 1.2M ./fixtures 948K ./rubocop 4.0K ./.go 30M ./db 12K ./.github 125M ./locale 1.9M ./glfm_specification 17M ./config 80M ./app 16K ./.lefthook 3.5G . [log_disk_usage before_script] end [32;1m$ source scripts/prepare_build.sh[0;m section_start:1726162402:bundle-install[collapsed=true] [0KInstalling gems 3.3.27 Bundler version 2.3.27 production:development Settings are listed in order of priority. The top value will be used. clean Set for your local app (/builds/gitlab-org/gitlab/.bundle/config): true frozen Set via BUNDLE_FROZEN: true gemfile Set via BUNDLE_GEMFILE: "/builds/gitlab-org/gitlab/Gemfile" install_flags Set via BUNDLE_INSTALL_FLAGS: "--jobs=$(nproc) --retry=3" path Set for your local app (/builds/gitlab-org/gitlab/.bundle/config): "/builds/gitlab-org/gitlab/vendor" without Set via BUNDLE_WITHOUT: [:production, :development] [0;32m$ bundle install --jobs=$(nproc) --retry=3 [0mDon't run Bundler as root. Installing your bundle as root will break this application for all non-root users on this machine. Patching bundler with bundler-checksum... Bundle complete! 363 Gemfile dependencies, 678 gems now installed. Gems in the groups 'production' and 'development' were not installed. Bundled gems are installed into `./vendor` 3 installed gems you directly depend on are looking for funding. Run `bundle fund` for details [0;32m==> 'bundle install --jobs=$(nproc) --retry=3 ' succeeded in 3 seconds. [0m[0;32m$ bundle pristine pg [0mPatching bundler with bundler-checksum... Installing pg 1.5.6 with native extensions [0;32m==> 'bundle pristine pg' succeeded in 21 seconds. [0msection_end:1726162429:bundle-install [0K Using decomposed database config (config/database.yml.decomposed-postgresql) [0;33mGeo DB will be set up. [0m[0;33mEmbedding DB will be set up. [0msection_start:1726162429:setup-db[collapsed=true] [0KSetting up DBs CREATE ROLE GRANT [0;32m$ bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes [0mDropped database 'gitlabhq_test' Dropped database 'gitlabhq_test_ci' Dropped database 'gitlabhq_geo_test' Dropped database 'gitlabhq_embedding_test' Created database 'gitlabhq_test' Created database 'gitlabhq_test_ci' Created database 'gitlabhq_geo_test' Created database 'gitlabhq_embedding_test' embedding: == [advisory_lock_connection] object_id: 127960, pg_backend_pid: 126 embedding: == 20240608215318 DropVertexGitlabDocsTable: migrating ======================== embedding: -- drop_table(:vertex_gitlab_docs) embedding: -> 0.0031s embedding: == 20240608215318 DropVertexGitlabDocsTable: migrated (0.1064s) =============== embedding: == [advisory_lock_connection] object_id: 127960, pg_backend_pid: 126 [0;32m==> 'bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes' succeeded in 106 seconds. [0mSELECT pg_catalog.set_config('search_path', '', false); CREATE DATABASE praefect_test ENCODING 'UTF8'; section_end:1726162537:setup-db [0K [32;1m$ source ./scripts/rspec_helpers.sh[0;m [32;1m$ run_timed_command "gem install knapsack --no-document"[0;m [0;32m$ gem install knapsack --no-document [0mSuccessfully installed knapsack-4.0.0 1 gem installed [0;32m==> 'gem install knapsack --no-document' succeeded in 1 seconds. [0m[32;1m$ section_start "gitaly-test-spawn" "Spawning Gitaly"; scripts/gitaly-test-spawn; section_end "gitaly-test-spawn"[0;m section_start:1726162538:gitaly-test-spawn[collapsed=true] [0KSpawning Gitaly Trying to connect to gitaly: ........ OK Trying to connect to gitaly2: ......... OK Starting Praefect with in-memory election strategyTrying to connect to praefect: ..... OK section_end:1726162544:gitaly-test-spawn [0K [32;1m$ export RSPEC_SKIPPED_TESTS_REPORT_PATH="rspec/skipped_tests-${CI_JOB_ID}.txt"[0;m [32;1m$ export RSPEC_RETRIED_TESTS_REPORT_PATH="rspec/retried_tests-${CI_JOB_ID}.txt"[0;m [32;1m$ tooling/bin/create_job_metrics_file || true[0;m [job-metrics] Creating the job metrics file for the CI/CD job. [32;1m$ rspec_section rspec_parallelized_job "--fail-fast=${RSPEC_FAIL_FAST_THRESHOLD} --tag ~quarantine --tag ~level:background_migration --tag ~click_house"[0;m section_start:1726162548:rspec[collapsed=false] [0KRSpec [17:35:48] Starting rspec_parallelized_job [0;33mRETRY_FAILED_TESTS_IN_NEW_PROCESS: true [0m[0;33mKNAPSACK_GENERATE_REPORT: true [0m[0;33mFLAKY_RSPEC_GENERATE_REPORT: true [0m[0;33mKNAPSACK_TEST_FILE_PATTERN: {ee/}spec/{features}{,/**/}*_spec.rb [0m[0;33mKNAPSACK_LOG_LEVEL: debug [0m[0;33mKNAPSACK_REPORT_PATH: knapsack/rspec-ee_system_pg14_12_16_278964_report.json [0m[0;33mFLAKY_RSPEC_SUITE_REPORT_PATH: rspec/flaky/report-suite.json [0m[0;33mFLAKY_RSPEC_REPORT_PATH: rspec/flaky/all_rspec-ee_system_pg14_12_16_278964_report.json [0m[0;33mNEW_FLAKY_RSPEC_REPORT_PATH: rspec/flaky/new_rspec-ee_system_pg14_12_16_278964_report.json [0m[0;33mRSPEC_SKIPPED_TESTS_REPORT_PATH: rspec/skipped_tests-7812354946.txt [0m[0;33mCRYSTALBALL: [0m[0;33mRSPEC_TESTS_MAPPING_ENABLED: [0m[0;33mRSPEC_TESTS_FILTER_FILE: [0m[0;33mShell set options (set -o) enabled: [0m[0;33mbraceexpand on hashall on interactive-comments on pipefail on [0mKnapsack report generator started! warning: parser/current is loading parser/ruby31, which recognizes 3.1.6-compliant syntax, but you are running 3.1.5. Please see https://github.com/whitequark/parser#compatibility-with-ruby-mri. Run options: exclude {:quarantine=>true, :level=>"background_migration", :click_house=>true} # [RSpecRunTime] Starting RSpec timer... [TEST PROF INFO] EventProf enabled (sql.active_record) unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String. unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String. Test environment set up in 3.390606462 seconds # [RSpecRunTime] Starting example group ee/spec/features/groups/analytics/cycle_analytics/filters_and_data_spec.rb. Expected to take 5 minutes 46.08 seconds. Group value stream analytics filters and data Starting the Capybara driver server... with no value streams behaves like empty state Capybara starting Puma... * Version 6.4.0, codename: The Eagle of Durango * Min threads: 0, max threads: 4 * Listening on unix:///tmp/20240912-331-irdj08 renders the empty state with value streams without valid query parameters set with created_after date > created_before date displays empty text # [RSpecRunTime] RSpec elapsed time: 52.42 seconds. Current RSS: ~1398M. Threads: 12. load average: 1.62 1.52 1.71 2/498 598 . with fake parameters displays an empty state # [RSpecRunTime] RSpec elapsed time: 58.94 seconds. Current RSS: ~1436M. Threads: 15. load average: 1.65 1.53 1.71 1/502 635 . with valid query parameters set with project_ids set has the projects dropdown prepopulated # [RSpecRunTime] RSpec elapsed time: 1 minute 3.31 seconds. Current RSS: ~1465M. Threads: 15. load average: 1.84 1.57 1.73 1/503 638 . with created_before and created_after set shows predefined date ranges dropdown with `Custom` option selected behaves like date range prepopulated has the date range prepopulated # [RSpecRunTime] RSpec elapsed time: 1 minute 12.11 seconds. Current RSS: ~1465M. Threads: 15. load average: 1.79 1.57 1.72 1/500 643 . with a group behaves like group value stream analytics stage table displays an empty state and hide stage table # [RSpecRunTime] RSpec elapsed time: 1 minute 16.9 seconds. Current RSS: ~1455M. Threads: 15. load average: 2.04 1.63 1.74 1/500 646 . navigation shows the path navigation each stage will have median values displays the default list of stages # [RSpecRunTime] RSpec elapsed time: 1 minute 29.95 seconds. Current RSS: ~1470M. Threads: 15. load average: 2.03 1.64 1.74 1/501 653 . behaves like has overview metrics displays lifecycle metrics # [RSpecRunTime] RSpec elapsed time: 1 minute 35.25 seconds. Current RSS: ~1462M. Threads: 15. load average: 1.95 1.63 1.74 1/500 656 . behaves like has default filters shows the projects filter shows the filter bar shows the predefined date ranges dropdown with `Last 30 days` selected does not show the date range picker # [RSpecRunTime] RSpec elapsed time: 1 minute 54.8 seconds. Current RSS: ~1462M. Threads: 15. load average: 1.91 1.64 1.74 1/501 665 . behaves like value streams dashboard link renders a link to the group dashboard # [RSpecRunTime] RSpec elapsed time: 1 minute 59.78 seconds. Current RSS: ~1458M. Threads: 15. load average: 1.84 1.63 1.73 1/501 668 . with a sub group behaves like group value stream analytics stage table displays an empty state and hide stage table # [RSpecRunTime] RSpec elapsed time: 2 minutes 5.38 seconds. Current RSS: ~1459M. Threads: 15. load average: 1.71 1.60 1.73 1/501 671 . navigation shows the path navigation each stage will have median values displays the default list of stages # [RSpecRunTime] RSpec elapsed time: 2 minutes 18.85 seconds. Current RSS: ~1460M. Threads: 15. load average: 1.60 1.58 1.72 1/501 679 . behaves like has overview metrics displays lifecycle metrics # [RSpecRunTime] RSpec elapsed time: 2 minutes 23.53 seconds. Current RSS: ~1461M. Threads: 15. load average: 2.03 1.67 1.75 1/501 681 . behaves like has default filters shows the projects filter shows the filter bar shows the predefined date ranges dropdown with `Last 30 days` selected does not show the date range picker # [RSpecRunTime] RSpec elapsed time: 2 minutes 41.35 seconds. Current RSS: ~1467M. Threads: 15. load average: 2.18 1.73 1.76 1/501 690 . behaves like value streams dashboard link renders a link to the group dashboard # [RSpecRunTime] RSpec elapsed time: 2 minutes 46.07 seconds. Current RSS: ~1468M. Threads: 15. load average: 2.32 1.77 1.78 1/501 693 . with a predefined date range predefined_date_range: "Last week", expected_events_count: 1 stage table displays the correct number of events when a predefined date range is selected # [RSpecRunTime] RSpec elapsed time: 2 minutes 56.65 seconds. Current RSS: ~1459M. Threads: 15. load average: 2.36 1.79 1.78 1/501 696 . predefined_date_range: "Last 30 days", expected_events_count: 2 stage table displays the correct number of events when a predefined date range is selected # [RSpecRunTime] RSpec elapsed time: 3 minutes 3.17 seconds. Current RSS: ~1458M. Threads: 15. load average: 2.97 1.93 1.83 1/501 699 . predefined_date_range: "Last 90 days", expected_events_count: 3 stage table displays the correct number of events when a predefined date range is selected # [RSpecRunTime] RSpec elapsed time: 3 minutes 12.78 seconds. Current RSS: ~1444M. Threads: 15. load average: 2.96 1.96 1.84 1/501 702 . predefined_date_range: "Last 180 days", expected_events_count: 4 stage table displays the correct number of events when a predefined date range is selected # [RSpecRunTime] RSpec elapsed time: 3 minutes 22.38 seconds. Current RSS: ~1443M. Threads: 15. load average: 2.66 1.93 1.83 1/501 705 . with lots of data Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. each stage with events will display the stage events list when selected Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. each stage will be selectable Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. will not display the stage table on the overview stage Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. displays the duration overview chart on the overview stage Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. will have data available with filters applied Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::CloseIssueWorker must be native JSON types, but :skip_authorization is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. will filter the data # [RSpecRunTime] RSpec elapsed time: 5 minutes 22.36 seconds. Current RSS: ~1460M. Threads: 15. load average: 2.24 1.87 1.81 1/501 4502 . # [RSpecRunTime] Finishing example group ee/spec/features/groups/analytics/cycle_analytics/filters_and_data_spec.rb. It took 5 minutes 15.56 seconds. Expected to take 5 minutes 46.08 seconds. # [RSpecRunTime] Starting example group ee/spec/features/groups/members/manage_members_spec.rb. Expected to take 3 minutes 18.49 seconds. Groups > Members > Manage members with overage modal concerns when adding a member to a free group adding one user with a given role doesn't trigger an overage modal # [RSpecRunTime] RSpec elapsed time: 5 minutes 34.16 seconds. Current RSS: ~1453M. Threads: 15. load average: 2.05 1.84 1.80 1/501 4509 . when adding a member to a premium group when there is no free spaces in the subscription Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed # [RSpecRunTime] RSpec elapsed time: 6 minutes 15.23 seconds. Current RSS: ~1485M. Threads: 14. load average: 2.00 1.86 1.81 1/499 4527 . when there is one free space in the subscription Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding one user with a given role doesn't trigger an overage modal Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding two users triggers overage modal # [RSpecRunTime] RSpec elapsed time: 6 minutes 30.82 seconds. Current RSS: ~1479M. Threads: 14. load average: 1.92 1.85 1.81 1/500 4536 . when modal is shown Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. get back to initial modal if not confirmed # [RSpecRunTime] RSpec elapsed time: 6 minutes 36.33 seconds. Current RSS: ~1480M. Threads: 14. load average: 1.85 1.84 1.81 1/501 4540 . when adding a member to a ultimate group with no places left Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding one user with a given role doesn't trigger an overage modal Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding one user with a given role doesn't trigger an overage modal Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed # [RSpecRunTime] RSpec elapsed time: 7 minutes 11.48 seconds. Current RSS: ~1500M. Threads: 14. load average: 2.05 1.90 1.83 1/502 4562 . when adding a member to a ultimate group that alerady has an overage Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows a modal and invites them to a group if confirmed Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding one user with a given role doesn't trigger an overage modal # [RSpecRunTime] RSpec elapsed time: 7 minutes 29.71 seconds. Current RSS: ~1489M. Threads: 14. load average: 2.27 1.96 1.85 1/502 4572 . when adding to a group not eligible for reconciliation Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. adding one user with a given role doesn't trigger an overage modal # [RSpecRunTime] RSpec elapsed time: 7 minutes 39.89 seconds. Current RSS: ~1494M. Threads: 14. load average: 2.15 1.94 1.84 1/503 4579 . with enterprise users when domain_verification feature is available for the group can disable two-factor authentication # [RSpecRunTime] RSpec elapsed time: 7 minutes 46.43 seconds. Current RSS: ~1496M. Threads: 14. load average: 2.21 1.96 1.85 1/504 4583 . with banned members Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. owner can unban banned users when feature flag is disabled Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. owner cannot see banned users # [RSpecRunTime] RSpec elapsed time: 8 minutes 1.13 seconds. Current RSS: ~1499M. Threads: 14. load average: 2.62 2.06 1.88 1/504 4594 . when licensed feature is not available Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. owner cannot see banned users # [RSpecRunTime] RSpec elapsed time: 8 minutes 4.3 seconds. Current RSS: ~1501M. Threads: 14. load average: 2.62 2.06 1.88 1/504 4598 . banning allows owner to ban a member when non-owner behaves like action is not available action is not available # [RSpecRunTime] RSpec elapsed time: 8 minutes 13.76 seconds. Current RSS: ~1506M. Threads: 14. load average: 2.61 2.08 1.89 2/503 4602 . when feature flag is disabled behaves like action is not available action is not available # [RSpecRunTime] RSpec elapsed time: 8 minutes 16.82 seconds. Current RSS: ~1511M. Threads: 14. load average: 2.48 2.06 1.89 1/504 4605 . when licensed feature is not available behaves like action is not available action is not available # [RSpecRunTime] RSpec elapsed time: 8 minutes 19.73 seconds. Current RSS: ~1511M. Threads: 14. load average: 2.48 2.06 1.89 2/504 4608 . with free user limit when at free user limit shows the alert notification in the modal # [RSpecRunTime] RSpec elapsed time: 8 minutes 23.02 seconds. Current RSS: ~1511M. Threads: 13. load average: 2.36 2.04 1.88 1/502 4610 . when close to free user limit on new top-level group shows the alert notification in the modal # [RSpecRunTime] RSpec elapsed time: 8 minutes 34.07 seconds. Current RSS: ~1487M. Threads: 13. load average: 2.37 2.05 1.89 1/502 4621 . with an active trial Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. shows the active trial unlimited members alert # [RSpecRunTime] RSpec elapsed time: 8 minutes 37.56 seconds. Current RSS: ~1493M. Threads: 14. load average: 2.26 2.04 1.88 2/503 4625 . # [RSpecRunTime] Finishing example group ee/spec/features/groups/members/manage_members_spec.rb. It took 3 minutes 15.12 seconds. Expected to take 3 minutes 18.49 seconds. # [RSpecRunTime] Starting example group ee/spec/features/ci_shared_runner_warnings_spec.rb. Expected to take 2 minutes 41.74 seconds. CI shared runner limits membership_level: :owner, visible: true when on a project related page warning level when there is a notification and minutes still exist displays a warning message on pipelines page displays a warning message on project homepage displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 8 minutes 57.93 seconds. Current RSS: ~1529M. Threads: 15. load average: 2.19 2.03 1.89 2/510 5073 . danger level when there is a notification and minutes still exist displays a warning message on pipelines page displays a warning message on project homepage displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 9 minutes 13.5 seconds. Current RSS: ~1527M. Threads: 15. load average: 2.29 2.06 1.90 1/510 5482 . when limit is exceeded displays a warning message on project homepage displays a warning message on pipelines page displays a warning message on a job page when in a subgroup displays a warning message on subproject homepage # [RSpecRunTime] RSpec elapsed time: 9 minutes 37.49 seconds. Current RSS: ~1523M. Threads: 15. load average: 2.35 2.09 1.91 1/510 6177 . when limit not yet exceeded does not display a warning message on project homepage does not display a warning message on pipelines page displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 9 minutes 45.63 seconds. Current RSS: ~1535M. Threads: 15. load average: 2.14 2.06 1.90 1/509 6384 . when on a group related page warning level when there is a notification and minutes still exist displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 9 minutes 50.64 seconds. Current RSS: ~1534M. Threads: 15. load average: 2.05 2.04 1.90 1/510 6437 . danger level when there is a notification and minutes still exist displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 9 minutes 55.38 seconds. Current RSS: ~1529M. Threads: 15. load average: 2.04 2.04 1.90 1/510 6490 . when limit is exceeded displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 9 minutes 59.98 seconds. Current RSS: ~1529M. Threads: 15. load average: 2.04 2.04 1.90 1/510 6543 . when limit not yet exceeded does not display a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 10 minutes 2.5 seconds. Current RSS: ~1533M. Threads: 15. load average: 2.04 2.04 1.90 1/509 6578 . membership_level: :developer, visible: false when on a project related page warning level when there is a notification and minutes still exist displays a warning message on pipelines page displays a warning message on project homepage displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 10 minutes 19.7 seconds. Current RSS: ~1515M. Threads: 15. load average: 2.10 2.05 1.91 1/510 6982 . danger level when there is a notification and minutes still exist displays a warning message on pipelines page displays a warning message on project homepage displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 10 minutes 34.73 seconds. Current RSS: ~1524M. Threads: 15. load average: 2.00 2.03 1.91 1/510 7400 . when limit is exceeded displays a warning message on project homepage displays a warning message on pipelines page displays a warning message on a job page when in a subgroup displays a warning message on subproject homepage # [RSpecRunTime] RSpec elapsed time: 10 minutes 57.63 seconds. Current RSS: ~1524M. Threads: 15. load average: 2.06 2.04 1.91 1/509 8094 . when limit not yet exceeded does not display a warning message on project homepage does not display a warning message on pipelines page displays a warning message on a job page # [RSpecRunTime] RSpec elapsed time: 11 minutes 5.7 seconds. Current RSS: ~1544M. Threads: 15. load average: 2.27 2.09 1.93 1/508 8301 . when on a group related page warning level when there is a notification and minutes still exist displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 11 minutes 10.01 seconds. Current RSS: ~1547M. Threads: 15. load average: 2.27 2.09 1.93 1/509 8353 . danger level when there is a notification and minutes still exist displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 11 minutes 14.18 seconds. Current RSS: ~1539M. Threads: 15. load average: 2.25 2.09 1.93 1/509 8405 . when limit is exceeded displays a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 11 minutes 18.44 seconds. Current RSS: ~1538M. Threads: 15. load average: 2.23 2.09 1.93 1/510 8458 . when limit not yet exceeded does not display a warning message on group information page # [RSpecRunTime] RSpec elapsed time: 11 minutes 20.98 seconds. Current RSS: ~1541M. Threads: 14. load average: 2.13 2.07 1.93 1/509 8493 . # [RSpecRunTime] Finishing example group ee/spec/features/ci_shared_runner_warnings_spec.rb. It took 2 minutes 43.57 seconds. Expected to take 2 minutes 41.74 seconds. # [RSpecRunTime] Starting example group ee/spec/features/protected_branches_spec.rb. Expected to take 2 minutes 1.5 seconds. Protected Branches protected branches affected by security policies makes force push toggle and push input disabled showing "No one" # [RSpecRunTime] RSpec elapsed time: 11 minutes 33.05 seconds. Current RSS: ~1577M. Threads: 15. load average: 2.27 2.10 1.94 1/510 8835 . code owner approval when project requires code owner approval protect a branch form has code owner toggle can create new protected branch with code owner disabled can create new protected branch with code owner enabled # [RSpecRunTime] RSpec elapsed time: 12 minutes 0.69 second. Current RSS: ~1636M. Threads: 15. load average: 2.19 2.10 1.94 1/512 8922 . protect branch table has a protected branch with code owner approval toggled on shows code owner approval toggle displays toggle on # [RSpecRunTime] RSpec elapsed time: 12 minutes 12.11 seconds. Current RSS: ~1644M. Threads: 15. load average: 2.17 2.10 1.94 1/511 8954 . has a protected branch with code owner approval toggled off displays toggle off # [RSpecRunTime] RSpec elapsed time: 12 minutes 17.1 seconds. Current RSS: ~1625M. Threads: 15. load average: 2.72 2.22 1.98 1/511 8970 . when project does not require code owner approval does not have code owner approval in the form does not have code owner approval in the table # [RSpecRunTime] RSpec elapsed time: 12 minutes 25.87 seconds. Current RSS: ~1678M. Threads: 15. load average: 2.52 2.19 1.98 1/511 8994 . access control with ref permissions for users disabled allows creating protected branches that Developers + Maintainers can merge to allows creating protected branches that Maintainers can merge to allows creating protected branches that Instance admins can merge to allows creating protected branches that No one can merge to with existing access levels shows users that can push to the branch shows groups that can push to the branch shows users that can merge into the branch shows groups that have can push to the branch # [RSpecRunTime] RSpec elapsed time: 13 minutes 18.76 seconds. Current RSS: ~1707M. Threads: 15. load average: 2.06 2.14 1.97 1/511 9165 . inherited protected branches when project-level item all form field are editable # [RSpecRunTime] RSpec elapsed time: 13 minutes 24.67 seconds. Current RSS: ~1720M. Threads: 15. load average: 1.98 2.12 1.97 1/512 9182 . when group-level item all form field editable are not editable # [RSpecRunTime] RSpec elapsed time: 13 minutes 30.57 seconds. Current RSS: ~1704M. Threads: 15. load average: 2.23 2.16 1.99 5/512 9198 . # [RSpecRunTime] Finishing example group ee/spec/features/protected_branches_spec.rb. It took 2 minutes 9.81 seconds. Expected to take 2 minutes 1.5 seconds. # [RSpecRunTime] Starting example group ee/spec/features/projects/show_project_spec.rb. Expected to take 1 minute 23.96 seconds. Project show page stat button existence populated project as a maintainer "Kubernetes cluster" button linked to clusters page # [RSpecRunTime] RSpec elapsed time: 13 minutes 37.09 seconds. Current RSS: ~1659M. Threads: 15. load average: 2.13 2.15 1.98 1/511 9317 . pull mirroring information for maintainer displays mirrored from url # [RSpecRunTime] RSpec elapsed time: 13 minutes 39.98 seconds. Current RSS: ~1643M. Threads: 15. load average: 2.13 2.15 1.98 1/511 9412 . for guest does not display mirrored from url # [RSpecRunTime] RSpec elapsed time: 13 minutes 41.17 seconds. Current RSS: ~1639M. Threads: 15. load average: 2.04 2.13 1.97 1/511 9439 . when over free user limit with group namespace with repository behaves like over the free user limit alert with enforcement concerns when over limit shows free user limit warning when over storage limits with storage size check does not show alerts # [RSpecRunTime] RSpec elapsed time: 13 minutes 54.59 seconds. Current RSS: ~1594M. Threads: 15. load average: 2.25 2.17 1.99 1/510 9888 . without storage size check does show alerts # [RSpecRunTime] RSpec elapsed time: 13 minutes 56.25 seconds. Current RSS: ~1592M. Threads: 15. load average: 2.15 2.15 1.99 1/509 9913 . when at limit does not show free user limit warning # [RSpecRunTime] RSpec elapsed time: 14 minutes 2.53 seconds. Current RSS: ~1594M. Threads: 15. load average: 2.37 2.20 2.00 1/510 10090 . when under limit does not show free user limit warning # [RSpecRunTime] RSpec elapsed time: 14 minutes 8.16 seconds. Current RSS: ~1588M. Threads: 15. load average: 2.26 2.18 2.00 1/510 10267 . with empty repository behaves like over the free user limit alert with enforcement concerns when over limit shows free user limit warning when over storage limits with storage size check does not show alerts # [RSpecRunTime] RSpec elapsed time: 14 minutes 14.77 seconds. Current RSS: ~1587M. Threads: 15. load average: 2.16 2.16 1.99 1/511 10372 . without storage size check does show alerts # [RSpecRunTime] RSpec elapsed time: 14 minutes 16.45 seconds. Current RSS: ~1592M. Threads: 15. load average: 2.07 2.14 1.99 1/511 10409 . when at limit does not show free user limit warning # [RSpecRunTime] RSpec elapsed time: 14 minutes 19.42 seconds. Current RSS: ~1596M. Threads: 15. load average: 2.07 2.14 1.99 1/510 10448 . when under limit does not show free user limit warning # [RSpecRunTime] RSpec elapsed time: 14 minutes 22.42 seconds. Current RSS: ~1597M. Threads: 14. load average: 1.98 2.12 1.98 1/509 10486 . without repository behaves like over the free user limit alert with enforcement concerns when over limit shows free user limit warning when over storage limits with storage size check does not show alerts # [RSpecRunTime] RSpec elapsed time: 14 minutes 28.16 seconds. Current RSS: ~1598M. Threads: 14. load average: 2.15 2.15 1.99 1/506 10490 . without storage size check does show alerts # [RSpecRunTime] RSpec elapsed time: 14 minutes 29.46 seconds. Current RSS: ~1598M. Threads: 14. load average: 2.15 2.15 1.99 1/506 10491 . when at limit does not show free user limit warning # [RSpecRunTime] RSpec elapsed time: 14 minutes 32.29 seconds. Current RSS: ~1601M. Threads: 14. load average: 2.05 2.13 1.99 1/505 10494 . when under limit does not show free user limit warning # [RSpecRunTime] RSpec elapsed time: 14 minutes 35.0 seconds. Current RSS: ~1594M. Threads: 14. load average: 2.05 2.13 1.99 1/505 10496 . when user has no permissions does not render settings button if user has no permissions renders settings button if user has permissions # [RSpecRunTime] RSpec elapsed time: 14 minutes 45.15 seconds. Current RSS: ~1597M. Threads: 15. load average: 1.89 2.09 1.98 1/511 10919 . all seats used alert when all seats are used Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. when the user is an owner displays the all seats used alert # [RSpecRunTime] RSpec elapsed time: 14 minutes 47.36 seconds. Current RSS: ~1592M. Threads: 15. load average: 1.82 2.08 1.97 1/510 10920 . when the user is not an owner does not display the all seats used alert with a free plan does not display the all seats used alert when not all seats are used Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not display the all seats used alert # [RSpecRunTime] Finishing example group ee/spec/features/projects/show_project_spec.rb. It took 1 minute 18.86 seconds. Expected to take 1 minute 23.96 seconds. # [RSpecRunTime] Starting example group ee/spec/features/boards/swimlanes/epics_swimlanes_spec.rb. Expected to take 1 minute 18.09 seconds. epics swimlanes link to swimlanes view displays epics swimlanes when link to boards with group_by epic in URL displays issue not assigned to epic title and unassigned issues lane only on expand displays default lists and a label list # [RSpecRunTime] RSpec elapsed time: 15 minutes 23.53 seconds. Current RSS: ~1594M. Threads: 15. load average: 2.25 2.15 2.00 1/504 10926 . switch to swimlanes view displays epics swimlanes when selecting Epic in Group by dropdown displays issue not assigned to epic title and unassigned issues lane only on expand # [RSpecRunTime] RSpec elapsed time: 15 minutes 37.08 seconds. Current RSS: ~1511M. Threads: 15. load average: 2.31 2.17 2.01 1/504 10929 . issue cards highlights an issue card on click unhighlights a selected issue card on click # [RSpecRunTime] RSpec elapsed time: 15 minutes 51.02 seconds. Current RSS: ~1504M. Threads: 14. load average: 2.31 2.18 2.01 1/505 10933 . add issue to swimlanes list displays new issue button shows form in unassigned issues lane when clicking button hides form when clicking cancel Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. creates new issue in unassigned issues lane # [RSpecRunTime] RSpec elapsed time: 16 minutes 20.32 seconds. Current RSS: ~1502M. Threads: 14. load average: 1.90 2.10 1.99 1/505 10937 . # [RSpecRunTime] Finishing example group ee/spec/features/boards/swimlanes/epics_swimlanes_spec.rb. It took 1 minute 30.5 seconds. Expected to take 1 minute 18.09 seconds. # [RSpecRunTime] Starting example group ee/spec/features/epics/epic_work_item_sync_spec.rb. Expected to take 1 minute 6.12 seconds. Epic Work Item sync from epic to work item when creating and modifying an epic creates an epic and a synced work item updates the synced work item when the epic is updated # [RSpecRunTime] RSpec elapsed time: 16 minutes 48.42 seconds. Current RSS: ~1501M. Threads: 23. load average: 1.79 2.05 1.98 1/513 10949 . from work item to epic Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. creates work item and a legacy epic that are in sync Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. updates the legacy epic when the work item is updated # [RSpecRunTime] RSpec elapsed time: 17 minutes 21.96 seconds. Current RSS: ~1499M. Threads: 24. load average: 2.39 2.19 2.03 1/515 10956 . # [RSpecRunTime] Finishing example group ee/spec/features/epics/epic_work_item_sync_spec.rb. It took 1 minute 1.65 seconds. Expected to take 1 minute 6.12 seconds. # [RSpecRunTime] Starting example group ee/spec/features/registrations/saas/standard_flow_company_creating_project_spec.rb. Expected to take 58.63 seconds. Standard flow for user picking company and creating a project with regular sign up when opting into a trial Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"glm_source"=>"some_source", "glm_content"=>"some_content", "namespace_id"=>191, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>191, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user and creates a group and project reaching onboarding # [RSpecRunTime] RSpec elapsed time: 17 minutes 45.99 seconds. Current RSS: ~1541M. Threads: 24. load average: 2.20 2.16 2.02 1/517 11062 . when last name is missing for SSO and has to be filled in Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"namespace_id"=>194, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>194, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user, has some lead submission failures and creates a group and project reaching onboarding # [RSpecRunTime] RSpec elapsed time: 18 minutes 5.78 seconds. Current RSS: ~1542M. Threads: 23. load average: 2.50 2.23 2.05 1/516 11163 . with sso sign up when opting into a trial Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"glm_source"=>"some_source", "glm_content"=>"some_content", "namespace_id"=>197, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>197, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user and creates a group and project reaching onboarding # [RSpecRunTime] RSpec elapsed time: 18 minutes 25.95 seconds. Current RSS: ~1553M. Threads: 23. load average: 2.22 2.18 2.03 1/516 11264 . # [RSpecRunTime] Finishing example group ee/spec/features/registrations/saas/standard_flow_company_creating_project_spec.rb. It took 1 minute 3.98 seconds. Expected to take 58.63 seconds. # [RSpecRunTime] Starting example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. Expected to take 53.75 seconds. Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches does not show sections not allowed by the custom role behaves like setting project protected branches explicit protected branches 2024-09-12 17:57:01 +0000 Rack app ("GET /group45/project-60/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 22 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 22 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:01.630592') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:01.634616') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/> 2024-09-12 17:57:07 +0000 Rack app ("GET /group45/project-60/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 23 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 23 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.620444') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.624695') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/> allows creating explicit protected branches (FAILED - 1) 1st Try error in ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:5: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 22 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 22 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:01.630592') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:01.634616') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP37YX3SY1ZAQ46DQXTT2Q,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ Unexpected browser console output: webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:" webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object http://127.0.0.1:39133/group45/project-60/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error) RSpec::Retry: 2nd try ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:5 [0;33mHTML screenshot: /builds/gitlab-org/gitlab/tmp/capybara/projects_settings_repository_settings_using_custom_role_when_user_is_a_guest_with_custom_roles_that_enables_handling_protected_branches_behaves_like_se.html[0m [0;33mImage screenshot: /tmp/capybara/projects_settings_repository_settings_using_custom_role_when_user_is_a_guest_with_custom_roles_that_enables_handling_protected_branches_behaves_like_se.png[0m shows success alert once protected branch is created displays the last commit on the matching branch if it exists displays an error message if the named branch does not exist # [RSpecRunTime] RSpec elapsed time: 18 minutes 57.28 seconds. Current RSS: ~1537M. Threads: 23. load average: 2.33 2.22 2.05 1/514 11370 . wildcard protected branches 2024-09-12 17:57:30 +0000 Rack app ("GET /group45/project-60/-/settings/repository" - (127.0.0.1)): #<Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.644909') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.649527') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/> allows creating protected branches with a wildcard 1st Try error in ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:59: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 27 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.644909') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:30.649527') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP44DS7DF4S3NZHJH0N18D,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ Unexpected browser console output: webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:" webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object http://127.0.0.1:39133/group45/project-60/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error) RSpec::Retry: 2nd try ./spec/support/shared_examples/projects/protected_branches_shared_examples.rb:59 displays all the branches matching the wildcard # [RSpecRunTime] RSpec elapsed time: 19 minutes 20.35 seconds. Current RSS: ~1555M. Threads: 22. load average: 2.28 2.22 2.06 1/517 11495 . # [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. It took 54.41 seconds. Expected to take 53.75 seconds. # [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_sees_merge_widget_spec.rb. Expected to take 46.3 seconds. Merge request > User sees merge widget when merge pipelines option is enabled at project level configuration when the head pipeline is merge request pipeline Job arguments to PipelineNotificationWorker must be native JSON types, but :ref_status is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not show any warnings # [RSpecRunTime] RSpec elapsed time: 19 minutes 35.31 seconds. Current RSS: ~1537M. Threads: 25. load average: 2.14 2.20 2.05 1/519 11717 . when the head pipeline is merge train pipeline shows head pipeline information # [RSpecRunTime] RSpec elapsed time: 19 minutes 47.85 seconds. Current RSS: ~1529M. Threads: 25. load average: 2.12 2.19 2.05 1/520 11937 . when merge request is submitted from a forked project shows a warning that fork project merge request does not create merge request pipelines by default # [RSpecRunTime] RSpec elapsed time: 20 minutes 2.45 seconds. Current RSS: ~1538M. Threads: 25. load average: 2.70 2.31 2.09 1/520 12185 . # [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_sees_merge_widget_spec.rb. It took 42.09 seconds. Expected to take 46.3 seconds. # [RSpecRunTime] Starting example group ee/spec/features/merge_request/code_owner_approval_rules_spec.rb. Expected to take 40.39 seconds. Code owner approval rules when same file is on target branch when content is the same does not show approval is required from Code Owners # [RSpecRunTime] RSpec elapsed time: 20 minutes 15.31 seconds. Current RSS: ~1531M. Threads: 25. load average: 2.66 2.32 2.10 2/519 12769 . when there are conflicts behaves like requires approval from Code Owners shows approval is required from Code Owners # [RSpecRunTime] RSpec elapsed time: 20 minutes 27.07 seconds. Current RSS: ~1524M. Threads: 25. load average: 2.61 2.32 2.10 2/521 13144 . when not same file is on target branch behaves like requires approval from Code Owners shows approval is required from Code Owners # [RSpecRunTime] RSpec elapsed time: 20 minutes 40.57 seconds. Current RSS: ~1519M. Threads: 25. load average: 2.54 2.32 2.10 1/521 13594 . # [RSpecRunTime] Finishing example group ee/spec/features/merge_request/code_owner_approval_rules_spec.rb. It took 38.11 seconds. Expected to take 40.39 seconds. # [RSpecRunTime] Starting example group ee/spec/features/merge_request/user_sets_approval_rules_spec.rb. Expected to take 35.56 seconds. Merge request > User sets approval rules with project approval rules when from a fork shows approval rules from target project # [RSpecRunTime] RSpec elapsed time: 20 minutes 48.98 seconds. Current RSS: ~1534M. Threads: 25. load average: 2.49 2.31 2.10 1/521 13746 . with a private group rule shows approval rules Job arguments to Integrations::GroupMentionWorker must be native JSON types, but :mentionable_type is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to MergeRequests::SyncCodeOwnerApprovalRulesWorker must be native JSON types, but :expire_unapproved_key is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. persists hidden groups that author has no access to when creating MR # [RSpecRunTime] RSpec elapsed time: 21 minutes 13.57 seconds. Current RSS: ~1516M. Threads: 25. load average: 2.39 2.30 2.10 1/521 14238 . # [RSpecRunTime] Finishing example group ee/spec/features/merge_request/user_sets_approval_rules_spec.rb. It took 33.03 seconds. Expected to take 35.56 seconds. # [RSpecRunTime] Starting example group ee/spec/features/registrations/saas/trial_flow_company_importing_project_spec.rb. Expected to take 32.16 seconds. Trial flow for user picking company and importing a project with sso trial sign up Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"namespace_id"=>226, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>226, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user and starts to import a project # [RSpecRunTime] RSpec elapsed time: 21 minutes 28.42 seconds. Current RSS: ~1583M. Threads: 24. load average: 2.56 2.34 2.12 1/516 14239 . with regular trial sign up Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to GitlabSubscriptions::Trials::ApplyTrialWorker must be native JSON types, but {"namespace_id"=>228, "gitlab_com_trial"=>true, "sync_to_gl"=>true, "namespace"=>{"id"=>228, "name"=>"Test Group", "path"=>"test-group", "kind"=>"group", "trial_ends_on"=>nil}, "with_add_on"=>true, "add_on"=>"duo_enterprise"} is a ActiveSupport::HashWithIndifferentAccess. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user and starts to import a project # [RSpecRunTime] RSpec elapsed time: 21 minutes 42.46 seconds. Current RSS: ~1588M. Threads: 24. load average: 2.29 2.29 2.10 1/516 14242 . # [RSpecRunTime] Finishing example group ee/spec/features/registrations/saas/trial_flow_company_importing_project_spec.rb. It took 28.85 seconds. Expected to take 32.16 seconds. # [RSpecRunTime] Starting example group ee/spec/features/registrations/saas/trial_flow_just_me_importing_project_spec.rb. Expected to take 26.65 seconds. Trial flow for user picking just me and importing a project with regular trial sign up Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user and starts to import a project # [RSpecRunTime] RSpec elapsed time: 21 minutes 57.08 seconds. Current RSS: ~1591M. Threads: 23. load average: 2.00 2.22 2.09 1/515 14244 . with sso trial sign up Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_global_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to AntiAbuse::TrustScoreWorker must be native JSON types, but :arkose_custom_score is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to Groups::CreateEventWorker must be native JSON types, but :created is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. registers the user and starts to import a project # [RSpecRunTime] RSpec elapsed time: 22 minutes 10.9 seconds. Current RSS: ~1576M. Threads: 23. load average: 1.99 2.21 2.08 1/515 14246 . # [RSpecRunTime] Finishing example group ee/spec/features/registrations/saas/trial_flow_just_me_importing_project_spec.rb. It took 28.45 seconds. Expected to take 26.65 seconds. # [RSpecRunTime] Starting example group ee/spec/features/issues/issue_actions_spec.rb. Expected to take 24.25 seconds. Issue actions promote issue to epic action when user is unauthorized Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. does not show "Promote to epic" item in issue actions dropdown # [RSpecRunTime] RSpec elapsed time: 22 minutes 20.27 seconds. Current RSS: ~1543M. Threads: 24. load average: 2.07 2.23 2.09 1/518 14251 . when user is authorized Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ReactiveCachingWorker must be native JSON types, but WorkItems::Type(id: integer, base_type: integer, cached_markdown_version: integer, name: text, description: text, description_html: text, icon_name: text, created_at: timestamptz, updated_at: timestamptz) is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. clicking "Promote to epic" creates and redirects user to epic # [RSpecRunTime] RSpec elapsed time: 22 minutes 37.61 seconds. Current RSS: ~1529M. Threads: 25. load average: 2.01 2.20 2.08 1/516 14257 . # [RSpecRunTime] Finishing example group ee/spec/features/issues/issue_actions_spec.rb. It took 26.76 seconds. Expected to take 24.25 seconds. # [RSpecRunTime] Starting example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_multiple_existing_namespace_flow_spec.rb. Expected to take 22.32 seconds. Duo Enterprise trial lead submission and creation with multiple eligible namespaces Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. when creating lead and applying trial is successful fills out form, submits and lands on the group usage quotas page when new trial is selected from within an existing namespace fills out form, has the existing namespace preselected, submits and lands on the group usage quotas page # [RSpecRunTime] RSpec elapsed time: 22 minutes 48.09 seconds. Current RSS: ~1510M. Threads: 25. load average: 2.07 2.21 2.09 1/516 14262 . when applying lead fails fills out form, submits and sent back to information form with errors and is then resolved # [RSpecRunTime] RSpec elapsed time: 22 minutes 53.38 seconds. Current RSS: ~1513M. Threads: 25. load average: 2.07 2.20 2.09 1/515 14264 . when applying trial fails fills out form, submits and is sent to select namespace with errors and is then resolved # [RSpecRunTime] RSpec elapsed time: 22 minutes 59.04 seconds. Current RSS: ~1521M. Threads: 25. load average: 1.98 2.18 2.08 1/516 14268 . # [RSpecRunTime] Finishing example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_multiple_existing_namespace_flow_spec.rb. It took 21.37 seconds. Expected to take 22.32 seconds. # [RSpecRunTime] Starting example group ee/spec/features/dependency_proxy/packages/maven_spec.rb. Expected to take 20.08 seconds. Dependency Proxy for maven packages Capybara starting Puma... * Version 6.4.0, codename: The Eagle of Durango * Min threads: 0, max threads: 4 * Listening on http://127.0.0.1:46419 with a maintainer with no existing file behaves like pulling and caching the remote file Job arguments to FlushCounterIncrementsWorker must be native JSON types, but :packages_size is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. newLocalFile: remove file "/builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload458988739": remove /builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload458988739: no such file or directory pulls and caches the remote file # [RSpecRunTime] RSpec elapsed time: 23 minutes 1.22 seconds. Current RSS: ~1525M. Threads: 31. load average: 1.98 2.18 2.08 1/521 14274 . with existing file newLocalFile: remove file "/builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload554259814": remove /builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload554259814: no such file or directory deletes the cached file and proxy the remote file behaves like returning the cached file returns the cached file # [RSpecRunTime] RSpec elapsed time: 23 minutes 2.77 seconds. Current RSS: ~1533M. Threads: 31. load average: 1.98 2.18 2.08 1/521 14275 . with no etag returned behaves like returning the cached file returns the cached file with a reporter with no existing file pulls the remote file without caching with a timeout while getting the remote file Capybara starting Puma... * Version 6.4.0, codename: The Eagle of Durango * Min threads: 0, max threads: 4 * Listening on http://127.0.0.1:33237 times out and return service unavailable behaves like returning bad gateway error when local requests are not allowed returns bad gateway error when local requests are allowed in settings pulls the remote file without caching with existing file behaves like returning the cached file returns the cached file behaves like proxying the remote file if the wrong etag is returned proxies the remote file with no etag returned behaves like returning the cached file returns the cached file with a wrong etag returned behaves like returning bad gateway error when local requests are not allowed returns bad gateway error when local requests are allowed in settings behaves like proxying the remote file if the wrong etag is returned proxies the remote file with a developer with no existing file behaves like pulling and caching the remote file newLocalFile: remove file "/builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload2639365366": remove /builds/gitlab-org/gitlab/shared/packages/tmp/uploads/gitlab-workhorse-upload2639365366: no such file or directory pulls and caches the remote file with existing file behaves like returning the cached file returns the cached file behaves like proxying the remote file if the wrong etag is returned proxies the remote file with no etag returned behaves like returning the cached file returns the cached file # [RSpecRunTime] Finishing example group ee/spec/features/dependency_proxy/packages/maven_spec.rb. It took 10.03 seconds. Expected to take 20.08 seconds. # [RSpecRunTime] Starting example group ee/spec/features/profiles/account_spec.rb. Expected to take 17.74 seconds. Profile > Account Disconnect Group SAML Job arguments to Groups::ResetSeatCalloutsWorker must be native JSON types, but #<Group id:248 @test_group> is a Group. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. unlinks account Job arguments to Groups::ResetSeatCalloutsWorker must be native JSON types, but #<Group id:248 @test_group> is a Group. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. removes access to the group group has disabled SAML Job arguments to Groups::ResetSeatCalloutsWorker must be native JSON types, but #<Group id:248 @test_group> is a Group. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. lets members distrust and unlink authentication # [RSpecRunTime] RSpec elapsed time: 23 minutes 19.81 seconds. Current RSS: ~1537M. Threads: 37. load average: 1.77 2.12 2.06 1/528 14283 . group trial has expired Job arguments to Groups::ResetSeatCalloutsWorker must be native JSON types, but #<Group id:248 @test_group> is a Group. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. lets members distrust and unlink authentication # [RSpecRunTime] RSpec elapsed time: 23 minutes 23.04 seconds. Current RSS: ~1529M. Threads: 36. load average: 1.78 2.12 2.06 1/527 14284 . Delete account on GitLab.com when the user's password is automatically set shows that the identity cannot be verified does not display a delete button # [RSpecRunTime] RSpec elapsed time: 23 minutes 24.57 seconds. Current RSS: ~1530M. Threads: 36. load average: 1.78 2.12 2.06 1/527 14285 . # [RSpecRunTime] Finishing example group ee/spec/features/profiles/account_spec.rb. It took 15.5 seconds. Expected to take 17.74 seconds. # [RSpecRunTime] Starting example group ee/spec/features/projects/insights_spec.rb. Expected to take 17.5 seconds. Project Insights behaves like Insights page as a permitted user with correct license has correct title navigation by default loads the first page displays correctly when navigating back to insights hash fragment navigation loads the correct page # [RSpecRunTime] RSpec elapsed time: 23 minutes 41.4 seconds. Current RSS: ~1533M. Threads: 35. load average: 1.86 2.11 2.06 1/527 14294 . without correct license returns 404 # [RSpecRunTime] Finishing example group ee/spec/features/projects/insights_spec.rb. It took 17.19 seconds. Expected to take 17.5 seconds. # [RSpecRunTime] Starting example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb. Expected to take 14.84 seconds. Duo Enterprise trial lead submission and creation with one eligible namespace Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. when creating lead and applying trial is successful fills out form, submits and lands on the group usage quotas page # [RSpecRunTime] RSpec elapsed time: 23 minutes 46.75 seconds. Current RSS: ~1521M. Threads: 35. load average: 1.95 2.12 2.07 1/527 14298 . when applying trial fails fills out form, submits and is sent back to information form with errors and is then resolved # [RSpecRunTime] RSpec elapsed time: 23 minutes 51.46 seconds. Current RSS: ~1518M. Threads: 35. load average: 1.87 2.11 2.06 1/527 14300 . when applying lead fails fills out form, submits and sent back to information form with errors and is then resolved # [RSpecRunTime] RSpec elapsed time: 23 minutes 55.85 seconds. Current RSS: ~1516M. Threads: 35. load average: 2.20 2.17 2.08 1/527 14302 . # [RSpecRunTime] Finishing example group ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb. It took 14.09 seconds. Expected to take 14.84 seconds. # [RSpecRunTime] Starting example group ee/spec/features/projects/integrations/user_activates_github_spec.rb. Expected to take 13.06 seconds. User activates GitHub integration without a license is excluded from the integrations index renders 404 when trying to access integration settings directly # [RSpecRunTime] RSpec elapsed time: 23 minutes 58.37 seconds. Current RSS: ~1520M. Threads: 35. load average: 2.20 2.17 2.08 1/526 14303 . with valid license activates integration renders a token field of type `password` for masking input # [RSpecRunTime] RSpec elapsed time: 24 minutes 9.38 seconds. Current RSS: ~1539M. Threads: 34. load average: 2.54 2.25 2.11 1/527 14309 . # [RSpecRunTime] Finishing example group ee/spec/features/projects/integrations/user_activates_github_spec.rb. It took 13.53 seconds. Expected to take 13.06 seconds. # [RSpecRunTime] Starting example group ee/spec/features/groups/saml_group_links_spec.rb. Expected to take 12.43 seconds. SAML group links when SAML group links is available adds new SAML group link with a standard role with existing records lists active links does not list links for other groups # [RSpecRunTime] RSpec elapsed time: 24 minutes 17.09 seconds. Current RSS: ~1539M. Threads: 34. load average: 2.30 2.21 2.10 1/525 14313 . when custom roles are enabled adds new SAML group link with a custom role # [RSpecRunTime] RSpec elapsed time: 24 minutes 22.12 seconds. Current RSS: ~1531M. Threads: 33. load average: 2.28 2.20 2.09 1/525 14317 . # [RSpecRunTime] Finishing example group ee/spec/features/groups/saml_group_links_spec.rb. It took 12.72 seconds. Expected to take 12.43 seconds. # [RSpecRunTime] Starting example group ee/spec/features/dashboards/projects_spec.rb. Expected to take 11.13 seconds. Dashboard projects behaves like dashboard ultimate trial callout hides promotion callout if not .com .com shows dismissable promotion callout if default dashboard for an owner hides dismissable promotion callout if default dashboard for a non group owner hides dismissable promotion callout if not default dashboard Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. hides promotion callout if a trial is active Job arguments to ElasticNamespaceIndexerWorker must be native JSON types, but :index is a Symbol. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. hides promotion callout if user owns a paid namespace # [RSpecRunTime] RSpec elapsed time: 24 minutes 30.44 seconds. Current RSS: ~1539M. Threads: 33. load average: 2.40 2.23 2.10 5/525 14319 . # [RSpecRunTime] Finishing example group ee/spec/features/dashboards/projects_spec.rb. It took 8.68 seconds. Expected to take 11.13 seconds. # [RSpecRunTime] Starting example group ee/spec/features/security/dashboard_access_spec.rb. Expected to take 9.37 seconds. Dashboard access GET /dashboard Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor GET /dashboard/issues Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor GET /dashboard/merge_requests Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor GET /dashboard/projects/starred Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor GET /help Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor GET /projects/new Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor GET /groups/new Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor GET /dashboard/groups Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor # [RSpecRunTime] Finishing example group ee/spec/features/security/dashboard_access_spec.rb. It took 6.53 seconds. Expected to take 9.37 seconds. # [RSpecRunTime] Starting example group ee/spec/features/gitlab_subscriptions/trials/duo_pro/access_denied_spec.rb. Expected to take 8.48 seconds. Duo Pro trial access denied flow behaves like duo access denied flow signs in and experiences the entire duo access denied flow # [RSpecRunTime] RSpec elapsed time: 24 minutes 49.38 seconds. Current RSS: ~1525M. Threads: 33. load average: 2.09 2.17 2.09 1/527 14324 . # [RSpecRunTime] Finishing example group ee/spec/features/gitlab_subscriptions/trials/duo_pro/access_denied_spec.rb. It took 12.15 seconds. Expected to take 8.48 seconds. # [RSpecRunTime] Starting example group ee/spec/features/security/project/snippet/public_access_spec.rb. Expected to take 7.93 seconds. Public Project Snippets Access GET /:project_path/snippets Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor # [RSpecRunTime] RSpec elapsed time: 24 minutes 52.44 seconds. Current RSS: ~1528M. Threads: 32. load average: 2.00 2.15 2.08 2/525 14325 . GET /:project_path/snippets/new is expected to be denied for auditor GET /:project_path/snippets/:id for a public snippet Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor # [RSpecRunTime] RSpec elapsed time: 24 minutes 54.19 seconds. Current RSS: ~1532M. Threads: 32. load average: 2.00 2.15 2.08 1/524 14326 . for an internal snippet Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor for a private snippet Job arguments to ExternalServiceReactiveCachingWorker must be native JSON types, but VersionCheck is a Class. See https://github.com/sidekiq/sidekiq/wiki/Best-Practices To disable this error, add `Sidekiq.strict_args!(false)` to your initializer. is expected to be allowed for auditor # [RSpecRunTime] RSpec elapsed time: 24 minutes 57.5 seconds. Current RSS: ~1538M. Threads: 32. load average: 1.92 2.13 2.07 1/524 14327 . GET /:project_path/snippets/:id/raw for a public snippet is expected to be allowed for auditor for an internal snippet is expected to be allowed for auditor for a private snippet is expected to be allowed for auditor # [RSpecRunTime] Finishing example group ee/spec/features/security/project/snippet/public_access_spec.rb. It took 9.59 seconds. Expected to take 7.93 seconds. # [RSpecRunTime] Starting example group ee/spec/features/merge_request/sidebar_spec.rb. Expected to take 6.15 seconds. Merge Request sidebar when epics available does not show epics in MR sidebar # [RSpecRunTime] RSpec elapsed time: 25 minutes 2.41 seconds. Current RSS: ~1546M. Threads: 32. load average: 1.85 2.11 2.07 1/530 14482 . when epics unavailable does not show epics promotion in MR sidebar # [RSpecRunTime] RSpec elapsed time: 25 minutes 5.01 seconds. Current RSS: ~1560M. Threads: 32. load average: 1.85 2.11 2.07 1/530 14636 . # [RSpecRunTime] Finishing example group ee/spec/features/merge_request/sidebar_spec.rb. It took 5.94 seconds. Expected to take 6.15 seconds. # [RSpecRunTime] Starting example group ee/spec/features/projects/security/user_edits_on_demand_scan_spec.rb. Expected to take 5.99 seconds. User edits On-demand Scan shows edit scan page # [RSpecRunTime] Finishing example group ee/spec/features/projects/security/user_edits_on_demand_scan_spec.rb. It took 6.97 seconds. Expected to take 5.99 seconds. # [RSpecRunTime] RSpec elapsed time: 25 minutes 12.24 seconds. Current RSS: ~1603M. Threads: 34. load average: 1.80 2.09 2.06 1/531 14725 . # [RSpecRunTime] Starting example group ee/spec/features/admin/admin_show_new_user_signups_cap_alert_spec.rb. Expected to take 4.26 seconds. displays new user signups cap alert when reached active users cap displays and dismiss alert # [RSpecRunTime] RSpec elapsed time: 25 minutes 16.31 seconds. Current RSS: ~1584M. Threads: 34. load average: 1.73 2.07 2.06 1/531 14727 . # [RSpecRunTime] Finishing example group ee/spec/features/admin/admin_show_new_user_signups_cap_alert_spec.rb. It took 4.25 seconds. Expected to take 4.26 seconds. # [RSpecRunTime] Starting example group ee/spec/features/groups/show_spec.rb. Expected to take 3.89 seconds. Group show page with free tier badge renders the tier badge and popover when clicked # [RSpecRunTime] RSpec elapsed time: 25 minutes 20.13 seconds. Current RSS: ~1578M. Threads: 34. load average: 1.73 2.07 2.06 1/530 14729 . # [RSpecRunTime] Finishing example group ee/spec/features/groups/show_spec.rb. It took 3.84 seconds. Expected to take 3.89 seconds. # [RSpecRunTime] Starting example group ee/spec/features/analytics/group_analytics_spec.rb. Expected to take 1.66 seconds. GroupAnalytics renders the container # [RSpecRunTime] Finishing example group ee/spec/features/analytics/group_analytics_spec.rb. It took 1.55 seconds. Expected to take 1.66 seconds. # [RSpecRunTime] RSpec elapsed time: 25 minutes 21.97 seconds. Current RSS: ~1560M. Threads: 33. load average: 1.68 2.05 2.05 1/525 14730 . auto_explain log contains 1302 entries for main, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-12-16.331.main.ndjson.gz took 21.912592528 auto_explain log contains 1304 entries for ci, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-12-16.331.ci.ndjson.gz took 17.355043214 [TEST PROF INFO] EventProf results for sql.active_record Total time: 04:54.724 of 25:14.848 (19.46%) Total events: 108305 Top 5 slowest suites (by time): Group value s...lters and data (./ee/spec/features/groups/analytics/cycle_analytics/filters_and_data_spec.rb:5) – 01:12.562 (25381 / 36) of 05:15.532 (23.0%) CI shared runner limits (./ee/spec/features/ci_shared_runner_warnings_spec.rb:5) – 00:31.846 (13096 / 34) of 02:43.568 (19.47%) epics swimlanes (./ee/spec/features/boards/swimlanes/epics_swimlanes_spec.rb:5) – 00:25.734 (8184 / 11) of 01:30.499 (28.44%) Protected Branches (./ee/spec/features/protected_branches_spec.rb:5) – 00:25.371 (8803 / 19) of 02:09.812 (19.54%) Groups > Memb...Manage members (./ee/spec/features/groups/members/manage_members_spec.rb:5) – 00:25.296 (9941 / 26) of 03:15.117 (12.96%) Knapsack report was generated. Preview: { "ee/spec/features/groups/analytics/cycle_analytics/filters_and_data_spec.rb": 315.53218820500115, "ee/spec/features/groups/members/manage_members_spec.rb": 195.11717592899913, "ee/spec/features/ci_shared_runner_warnings_spec.rb": 163.568068210001, "ee/spec/features/protected_branches_spec.rb": 129.81223046000014, "ee/spec/features/projects/show_project_spec.rb": 78.86218845700023, "ee/spec/features/boards/swimlanes/epics_swimlanes_spec.rb": 90.49881776300026, "ee/spec/features/epics/epic_work_item_sync_spec.rb": 61.64575186500042, "ee/spec/features/registrations/saas/standard_flow_company_creating_project_spec.rb": 63.98351444400032, "ee/spec/features/projects/settings/ee/protected_branches_spec.rb": 54.40984095600106, "ee/spec/features/merge_request/user_sees_merge_widget_spec.rb": 42.09179246200074, "ee/spec/features/merge_request/code_owner_approval_rules_spec.rb": 38.10902390699994, "ee/spec/features/merge_request/user_sets_approval_rules_spec.rb": 33.03322338200087, "ee/spec/features/registrations/saas/trial_flow_company_importing_project_spec.rb": 28.853911278998567, "ee/spec/features/registrations/saas/trial_flow_just_me_importing_project_spec.rb": 28.451320768001096, "ee/spec/features/issues/issue_actions_spec.rb": 26.760483866000868, "ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_multiple_existing_namespace_flow_spec.rb": 21.373760382999535, "ee/spec/features/dependency_proxy/packages/maven_spec.rb": 10.024515682000128, "ee/spec/features/profiles/account_spec.rb": 15.501297417000387, "ee/spec/features/projects/insights_spec.rb": 17.190692100000888, "ee/spec/features/gitlab_subscriptions/trials/duo_enterprise/creation_with_one_existing_namespace_flow_spec.rb": 14.093772232001356, "ee/spec/features/projects/integrations/user_activates_github_spec.rb": 13.531638393998946, "ee/spec/features/groups/saml_group_links_spec.rb": 12.721905547999995, "ee/spec/features/dashboards/projects_spec.rb": 8.682388956000068, "ee/spec/features/security/dashboard_access_spec.rb": 6.5248322439983895, "ee/spec/features/gitlab_subscriptions/trials/duo_pro/access_denied_spec.rb": 12.152476228000523, "ee/spec/features/security/project/snippet/public_access_spec.rb": 9.591337372999988, "ee/spec/features/merge_request/sidebar_spec.rb": 5.944461437000427, "ee/spec/features/projects/security/user_edits_on_demand_scan_spec.rb": 6.971912331999192, "ee/spec/features/admin/admin_show_new_user_signups_cap_alert_spec.rb": 4.253759420998904, "ee/spec/features/groups/show_spec.rb": 3.8423393290013337, "ee/spec/features/analytics/group_analytics_spec.rb": 1.5495974980003666 } Knapsack global time execution for tests: 25m 14s Failures: 1) Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches Got 0 failures and 2 other errors: Shared Example Group: "setting project protected branches" called from ./ee/spec/features/projects/settings/ee/protected_branches_spec.rb:25 1.1) Failure/Error: raise(error) if raise_error? Gitlab::QueryLimiting::Transaction::ThresholdExceededError: Too many SQL queries were executed in Projects::Settings::RepositoryController#show: a maximum of 100 is allowed but 107 SQL queries were executed 0: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 1: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 2: SELECT "organizations".* FROM "organizations" INNER JOIN "namespaces" ON "namespaces"."organization_id" = "organizations"."id" INNER JOIN "routes" "route" ON "route"."source_type" = 'Namespace' AND "route"."source_id" = "namespaces"."id" WHERE "route"."path" = 'group45' ORDER BY "organizations"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/current/organization.rb:35:in `from_group_params'*/ 3: SELECT "user_preferences"."id", "user_preferences"."user_id", "user_preferences"."issue_notes_filter", "user_preferences"."merge_request_notes_filter", "user_preferences"."created_at", "user_preferences"."updated_at", "user_preferences"."epics_sort", "user_preferences"."roadmap_epics_state", "user_preferences"."epic_notes_filter", "user_preferences"."issues_sort", "user_preferences"."merge_requests_sort", "user_preferences"."roadmaps_sort", "user_preferences"."first_day_of_week", "user_preferences"."timezone", "user_preferences"."time_display_relative", "user_preferences"."projects_sort", "user_preferences"."show_whitespace_in_diffs", "user_preferences"."sourcegraph_enabled", "user_preferences"."setup_for_company", "user_preferences"."render_whitespace_in_code", "user_preferences"."tab_width", "user_preferences"."view_diffs_file_by_file", "user_preferences"."gitpod_enabled", "user_preferences"."markdown_surround_selection", "user_preferences"."diffs_deletion_color", "user_preferences"."diffs_addition_color", "user_preferences"."markdown_automatic_lists", "user_preferences"."use_new_navigation", "user_preferences"."achievements_enabled", "user_preferences"."pinned_nav_items", "user_preferences"."pass_user_identities_to_ci_jwt", "user_preferences"."enabled_following", "user_preferences"."visibility_pipeline_id_type", "user_preferences"."project_shortcut_buttons", "user_preferences"."enabled_zoekt", "user_preferences"."keyboard_shortcuts_enabled", "user_preferences"."time_display_format", "user_preferences"."home_organization_id", "user_preferences"."early_access_program_participant", "user_preferences"."early_access_program_tracking", "user_preferences"."extensions_marketplace_opt_in_status", "user_preferences"."organization_groups_projects_sort", "user_preferences"."organization_groups_projects_display", "user_preferences"."dpop_enabled", "user_preferences"."use_work_items_view" FROM "user_preferences" WHERE "user_preferences"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2300:in `user_preference'*/ 4: SELECT "organization_details".* FROM "organization_details" WHERE "organization_details"."organization_id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:72:in `organization_detail'*/ 5: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 6: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 7: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."type" = 'Group' AND "namespaces"."id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 8: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 9: SELECT "namespace_bans".* FROM "namespace_bans" WHERE "namespace_bans"."user_id" = 114 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/policies/ee/project_policy.rb:194:in `block (2 levels) in <module:ProjectPolicy>'*/ 10: SELECT "users".* FROM find_users_by_id(113) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 11: SELECT MAX("project_authorizations"."access_level") AS "maximum_access_level", "project_authorizations"."user_id" AS "project_authorizations_user_id" FROM "project_authorizations" WHERE "project_authorizations"."project_id" = 63 AND "project_authorizations"."user_id" = 114 GROUP BY "project_authorizations"."user_id" /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project_team.rb:198:in `block in max_member_access_for_user_ids'*/ 12: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 63 AND "routes"."source_type" = 'Project' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 13: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM find_namespaces_by_id(199) AS namespaces WHERE ("namespaces"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 14: SELECT "namespace_settings"."created_at", "namespace_settings"."updated_at", "namespace_settings"."namespace_id", "namespace_settings"."prevent_forking_outside_group", "namespace_settings"."allow_mfa_for_subgroups", "namespace_settings"."default_branch_name", "namespace_settings"."repository_read_only", "namespace_settings"."resource_access_token_creation_allowed", "namespace_settings"."prevent_sharing_groups_outside_hierarchy", "namespace_settings"."new_user_signups_cap", "namespace_settings"."setup_for_company", "namespace_settings"."jobs_to_be_done", "namespace_settings"."runner_token_expiration_interval", "namespace_settings"."subgroup_runner_token_expiration_interval", "namespace_settings"."project_runner_token_expiration_interval", "namespace_settings"."show_diff_preview_in_email", "namespace_settings"."enabled_git_access_protocol", "namespace_settings"."unique_project_download_limit", "namespace_settings"."unique_project_download_limit_interval_in_seconds", "namespace_settings"."unique_project_download_limit_allowlist", "namespace_settings"."auto_ban_user_on_excessive_projects_download", "namespace_settings"."only_allow_merge_if_pipeline_succeeds", "namespace_settings"."allow_merge_on_skipped_pipeline", "namespace_settings"."only_allow_merge_if_all_discussions_are_resolved", "namespace_settings"."default_compliance_framework_id", "namespace_settings"."runner_registration_enabled", "namespace_settings"."allow_runner_registration_token", "namespace_settings"."unique_project_download_limit_alertlist", "namespace_settings"."emails_enabled", "namespace_settings"."experiment_features_enabled", "namespace_settings"."default_branch_protection_defaults", "namespace_settings"."service_access_tokens_expiration_enforced", "namespace_settings"."product_analytics_enabled", "namespace_settings"."allow_merge_without_pipeline", "namespace_settings"."enforce_ssh_certificates", "namespace_settings"."math_rendering_limits_enabled", "namespace_settings"."lock_math_rendering_limits_enabled", "namespace_settings"."duo_features_enabled", "namespace_settings"."lock_duo_features_enabled", "namespace_settings"."disable_personal_access_tokens", "namespace_settings"."enable_auto_assign_gitlab_duo_pro_seats", "namespace_settings"."early_access_program_participant", "namespace_settings"."remove_dormant_members", "namespace_settings"."remove_dormant_members_period", "namespace_settings"."early_access_program_joined_by_id", "namespace_settings"."seat_control", "namespace_settings"."last_dormant_member_review_at", "namespace_settings"."enterprise_users_extensions_marketplace_opt_in_status", "namespace_settings"."spp_repository_pipeline_access", "namespace_settings"."lock_spp_repository_pipeline_access" FROM "namespace_settings" WHERE "namespace_settings"."namespace_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/gon_helper.rb:115:in `push_namespace_setting'*/ 15: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1096:in `owns_project_organization?'*/ 16: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 17: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 18: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 19: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 20: SELECT project_ids.project_id, bool_or(custom_permissions.admin_cicd_variables) AS admin_cicd_variables, bool_or(custom_permissions.admin_compliance_framework) AS admin_compliance_framework, bool_or(custom_permissions.admin_integrations) AS admin_integrations, bool_or(custom_permissions.admin_merge_request) AS admin_merge_request, bool_or(custom_permissions.admin_protected_branch) AS admin_protected_branch, bool_or(custom_permissions.admin_push_rules) AS admin_push_rules, bool_or(custom_permissions.admin_runners) AS admin_runners, bool_or(custom_permissions.admin_terraform_state) AS admin_terraform_state, bool_or(custom_permissions.admin_vulnerability) AS admin_vulnerability, bool_or(custom_permissions.admin_web_hook) AS admin_web_hook, bool_or(custom_permissions.archive_project) AS archive_project, bool_or(custom_permissions.manage_deploy_tokens) AS manage_deploy_tokens, bool_or(custom_permissions.manage_merge_request_settings) AS manage_merge_request_settings, bool_or(custom_permissions.manage_project_access_tokens) AS manage_project_access_tokens, bool_or(custom_permissions.manage_security_policy_link) AS manage_security_policy_link, bool_or(custom_permissions.read_code) AS read_code, bool_or(custom_permissions.read_dependency) AS read_dependency, bool_or(custom_permissions.read_runners) AS read_runners, bool_or(custom_permissions.read_vulnerability) AS read_vulnerability, bool_or(custom_permissions.remove_project) AS remove_project FROM (VALUES (63, ARRAY[199])) AS project_ids (project_id, namespace_ids), LATERAL ( SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = group_group_links.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level > group_access) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" JOIN group_group_links ON members.source_id = group_group_links.shared_with_group_id JOIN member_roles ON member_roles.id = members.member_role_id WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND (group_group_links.shared_group_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) AND (access_level = group_access) AND "group_group_links"."member_role_id" IS NOT NULL UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Project' AND (members.source_id = project_ids.project_id) UNION ALL SELECT (member_roles.permissions -> 'admin_cicd_variables')::BOOLEAN as admin_cicd_variables, (member_roles.permissions -> 'admin_compliance_framework')::BOOLEAN as admin_compliance_framework, (member_roles.permissions -> 'admin_integrations')::BOOLEAN as admin_integrations, (member_roles.permissions -> 'admin_merge_request')::BOOLEAN as admin_merge_request, (member_roles.permissions -> 'admin_protected_branch')::BOOLEAN as admin_protected_branch, (member_roles.permissions -> 'admin_push_rules')::BOOLEAN as admin_push_rules, (member_roles.permissions -> 'admin_runners')::BOOLEAN as admin_runners, (member_roles.permissions -> 'admin_terraform_state')::BOOLEAN as admin_terraform_state, (member_roles.permissions -> 'admin_vulnerability')::BOOLEAN as admin_vulnerability, (member_roles.permissions -> 'admin_web_hook')::BOOLEAN as admin_web_hook, (member_roles.permissions -> 'archive_project')::BOOLEAN as archive_project, (member_roles.permissions -> 'manage_deploy_tokens')::BOOLEAN as manage_deploy_tokens, (member_roles.permissions -> 'manage_merge_request_settings')::BOOLEAN as manage_merge_request_settings, (member_roles.permissions -> 'manage_project_access_tokens')::BOOLEAN as manage_project_access_tokens, (member_roles.permissions -> 'manage_security_policy_link')::BOOLEAN as manage_security_policy_link, (member_roles.permissions -> 'read_code')::BOOLEAN as read_code, (member_roles.permissions -> 'read_dependency')::BOOLEAN as read_dependency, (member_roles.permissions -> 'read_runners')::BOOLEAN as read_runners, (member_roles.permissions -> 'read_vulnerability')::BOOLEAN as read_vulnerability, (member_roles.permissions -> 'remove_project')::BOOLEAN as remove_project FROM "members" INNER JOIN "member_roles" ON "member_roles"."id" = "members"."member_role_id" WHERE "members"."user_id" = 114 AND (member_roles.permissions @> ('{"admin_cicd_variables":true}')::jsonb OR member_roles.permissions @> ('{"admin_compliance_framework":true}')::jsonb OR member_roles.permissions @> ('{"admin_integrations":true}')::jsonb OR member_roles.permissions @> ('{"admin_merge_request":true}')::jsonb OR member_roles.permissions @> ('{"admin_protected_branch":true}')::jsonb OR member_roles.permissions @> ('{"admin_push_rules":true}')::jsonb OR member_roles.permissions @> ('{"admin_runners":true}')::jsonb OR member_roles.permissions @> ('{"admin_terraform_state":true}')::jsonb OR member_roles.permissions @> ('{"admin_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"admin_web_hook":true}')::jsonb OR member_roles.permissions @> ('{"archive_project":true}')::jsonb OR member_roles.permissions @> ('{"manage_deploy_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_merge_request_settings":true}')::jsonb OR member_roles.permissions @> ('{"manage_project_access_tokens":true}')::jsonb OR member_roles.permissions @> ('{"manage_security_policy_link":true}')::jsonb OR member_roles.permissions @> ('{"read_code":true}')::jsonb OR member_roles.permissions @> ('{"read_dependency":true}')::jsonb OR member_roles.permissions @> ('{"read_runners":true}')::jsonb OR member_roles.permissions @> ('{"read_vulnerability":true}')::jsonb OR member_roles.permissions @> ('{"remove_project":true}')::jsonb) AND "members"."source_type" = 'Namespace' AND (members.source_id IN (SELECT UNNEST(project_ids.namespace_ids) as ids)) UNION ALL SELECT false AS admin_cicd_variables, false AS admin_compliance_framework, false AS admin_integrations, false AS admin_merge_request, false AS admin_protected_branch, false AS admin_push_rules, false AS admin_runners, false AS admin_terraform_state, false AS admin_vulnerability, false AS admin_web_hook, false AS archive_project, false AS manage_deploy_tokens, false AS manage_merge_request_settings, false AS manage_project_access_tokens, false AS manage_security_policy_link, false AS read_code, false AS read_dependency, false AS read_runners, false AS read_vulnerability, false AS remove_project ) AS custom_permissions GROUP BY project_ids.project_id; /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/preloaders/user_member_roles_in_projects_preloader.rb:54:in `abilities_for_user_grouped_by_project'*/ 21: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 22: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 23: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 24: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 25: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 26: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 27: SELECT "push_rules".* FROM "push_rules" WHERE "push_rules"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/controllers/ee/projects/settings/repository_controller.rb:22:in `push_rule'*/ 28: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 ORDER BY "protected_tags"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:101:in `reduce'*/ 29: SELECT "protected_tags".* FROM "protected_tags" WHERE "protected_tags"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 30: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/protectable_dropdown.rb:43:in `reject'*/ 31: SELECT "protected_branches".* FROM "protected_branches" WHERE "protected_branches"."project_id" = 63 ORDER BY "protected_branches"."name" ASC LIMIT 20 OFFSET 0 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/services/security/security_orchestration_policies/protected_branches_deletion_check_service.rb:9:in `reject'*/ 32: SELECT "security_orchestration_policy_configurations"."id", "security_orchestration_policy_configurations"."project_id", "security_orchestration_policy_configurations"."security_policy_management_project_id", "security_orchestration_policy_configurations"."created_at", "security_orchestration_policy_configurations"."updated_at", "security_orchestration_policy_configurations"."configured_at", "security_orchestration_policy_configurations"."namespace_id" FROM "security_orchestration_policy_configurations" WHERE ("security_orchestration_policy_configurations"."project_id" = 63 OR "security_orchestration_policy_configurations"."namespace_id" = 199) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/project.rb:1426:in `security_orchestration_policies_for_scope'*/ 33: SELECT "remote_mirrors".* FROM "remote_mirrors" WHERE "remote_mirrors"."project_id" = 63 ORDER BY "remote_mirrors"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/controllers/projects/settings/repository_controller.rb:111:in `remote_mirror'*/ 34: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 35: SELECT "protected_branch_merge_access_levels".* FROM "protected_branch_merge_access_levels" WHERE "protected_branch_merge_access_levels"."protected_branch_id" = 23 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 36: SELECT "protected_branch_push_access_levels".* FROM "protected_branch_push_access_levels" WHERE "protected_branch_push_access_levels"."protected_branch_id" = 23 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/helpers/ee/branches_helper.rb:17:in `map'*/ 37: SELECT "routes".* FROM "routes" WHERE "routes"."source_id" = 199 AND "routes"."source_type" = 'Namespace' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:163:in `full_attribute'*/ 38: SELECT "project_settings"."project_id", "project_settings"."created_at", "project_settings"."updated_at", "project_settings"."push_rule_id", "project_settings"."show_default_award_emojis", "project_settings"."allow_merge_on_skipped_pipeline", "project_settings"."squash_option", "project_settings"."has_confluence", "project_settings"."has_vulnerabilities", "project_settings"."prevent_merge_without_jira_issue", "project_settings"."cve_id_request_enabled", "project_settings"."mr_default_target_self", "project_settings"."previous_default_branch", "project_settings"."warn_about_potentially_unwanted_characters", "project_settings"."merge_commit_template", "project_settings"."has_shimo", "project_settings"."squash_commit_template", "project_settings"."legacy_open_source_license_available", "project_settings"."target_platforms", "project_settings"."enforce_auth_checks_on_uploads", "project_settings"."selective_code_owner_removals", "project_settings"."issue_branch_template", "project_settings"."show_diff_preview_in_email", "project_settings"."suggested_reviewers_enabled", "project_settings"."only_allow_merge_if_all_status_checks_passed", "project_settings"."mirror_branch_regex", "project_settings"."allow_pipeline_trigger_approve_deployment", "project_settings"."emails_enabled", "project_settings"."pages_unique_domain_enabled", "project_settings"."pages_unique_domain", "project_settings"."runner_registration_enabled", "project_settings"."product_analytics_instrumentation_key", "project_settings"."product_analytics_data_collector_host", "project_settings"."cube_api_base_url", "project_settings"."encrypted_cube_api_key", "project_settings"."encrypted_cube_api_key_iv", "project_settings"."encrypted_product_analytics_configurator_connection_string", "project_settings"."encrypted_product_analytics_configurator_connection_string_iv", "project_settings"."pages_multiple_versions_enabled", "project_settings"."allow_merge_without_pipeline", "project_settings"."duo_features_enabled", "project_settings"."require_reauthentication_to_approve", "project_settings"."observability_alerts_enabled", "project_settings"."spp_repository_pipeline_access" FROM "project_settings" WHERE "project_settings"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1211:in `project_setting'*/ 39: SELECT "saml_providers".* FROM "saml_providers" WHERE "saml_providers"."group_id" = 199 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/app/models/ee/group.rb:448:in `block in root_saml_provider'*/ 40: SELECT "organizations".* FROM "organizations" WHERE "organizations"."id" = 1 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:742:in `max_member_access_for_user'*/ 41: SELECT "organization_users"."user_id" FROM "organization_users" WHERE "organization_users"."organization_id" = 1 AND "organization_users"."access_level" = 50 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/organizations/organization.rb:85:in `owner_user_ids'*/ 42: SELECT MAX("members"."access_level") AS "maximum_access_level", "members"."user_id" AS "members_user_id" FROM ((SELECT "members"."id", "members"."access_level", "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."source_id" = 199 AND "members"."state" = 0 AND "members"."requested_at" IS NULL AND "members"."invite_token" IS NULL AND (members.access_level > 5)) UNION (WITH "group_group_links_cte" AS MATERIALIZED (SELECT "group_group_links".* FROM "group_group_links" WHERE "group_group_links"."shared_group_id" = 199) SELECT "members"."id", LEAST("group_group_links"."group_access", "members"."access_level") AS access_level, "members"."source_id", "members"."source_type", "members"."user_id", "members"."notification_level", "members"."type", "members"."created_at", "members"."updated_at", "members"."created_by_id", "members"."invite_email", "members"."invite_token", "members"."invite_accepted_at", "members"."requested_at", "members"."expires_at", "members"."ldap", "members"."override", "members"."state", "members"."invite_email_success", "members"."member_namespace_id", "members"."member_role_id", "members"."expiry_notified_at", "members"."request_accepted_at", "members"."last_activity_on" FROM "members", "group_group_links_cte" AS "group_group_links" WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."source_id" = "group_group_links"."shared_with_group_id" AND "members"."source_type" = 'Namespace' AND "members"."state" = 0 AND (members.access_level > 5))) members WHERE "members"."type" = 'GroupMember' AND "members"."source_type" = 'Namespace' AND "members"."user_id" = 114 GROUP BY "members"."user_id" /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:1034:in `block in max_member_access'*/ 43: SELECT "user_details"."user_id", "user_details"."job_title", "user_details"."bio", "user_details"."webauthn_xid", "user_details"."provisioned_by_group_id", "user_details"."pronouns", "user_details"."pronunciation", "user_details"."registration_objective", "user_details"."phone", "user_details"."linkedin", "user_details"."twitter", "user_details"."skype", "user_details"."website_url", "user_details"."location", "user_details"."organization", "user_details"."password_last_changed_at", "user_details"."discord", "user_details"."enterprise_group_id", "user_details"."enterprise_group_associated_at", "user_details"."email_reset_offered_at", "user_details"."mastodon", "user_details"."project_authorizations_recalculated_at", "user_details"."onboarding_status", "user_details"."bluesky" FROM "user_details" WHERE "user_details"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2304:in `user_detail'*/ 44: SELECT "project_mirror_data".* FROM "project_mirror_data" WHERE "project_mirror_data"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:1239:in `import_in_progress?'*/ 45: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 46: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 47: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 48: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 49: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 50: SELECT "plans".* FROM "plans" WHERE "plans"."name" = 'default' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/plan.rb:19:in `block in default'*/ 51: SELECT "routes".* FROM "routes" WHERE "routes"."source_type" = 'Project' AND "routes"."path" = 'group45/project-60' LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/routable.rb:34:in `find_by_full_path'*/ 52: SELECT "projects"."id", "projects"."name", "projects"."path", "projects"."description", "projects"."created_at", "projects"."updated_at", "projects"."creator_id", "projects"."namespace_id", "projects"."last_activity_at", "projects"."import_url", "projects"."visibility_level", "projects"."archived", "projects"."avatar", "projects"."merge_requests_template", "projects"."star_count", "projects"."merge_requests_rebase_enabled", "projects"."import_type", "projects"."import_source", "projects"."approvals_before_merge", "projects"."reset_approvals_on_push", "projects"."merge_requests_ff_only_enabled", "projects"."issues_template", "projects"."mirror", "projects"."mirror_last_update_at", "projects"."mirror_last_successful_update_at", "projects"."mirror_user_id", "projects"."shared_runners_enabled", "projects"."runners_token", "projects"."build_allow_git_fetch", "projects"."build_timeout", "projects"."mirror_trigger_builds", "projects"."pending_delete", "projects"."public_builds", "projects"."last_repository_check_failed", "projects"."last_repository_check_at", "projects"."only_allow_merge_if_pipeline_succeeds", "projects"."has_external_issue_tracker", "projects"."repository_storage", "projects"."repository_read_only", "projects"."request_access_enabled", "projects"."has_external_wiki", "projects"."ci_config_path", "projects"."lfs_enabled", "projects"."description_html", "projects"."only_allow_merge_if_all_discussions_are_resolved", "projects"."repository_size_limit", "projects"."printing_merge_request_link_enabled", "projects"."auto_cancel_pending_pipelines", "projects"."service_desk_enabled", "projects"."cached_markdown_version", "projects"."delete_error", "projects"."last_repository_updated_at", "projects"."disable_overriding_approvers_per_merge_request", "projects"."storage_version", "projects"."resolve_outdated_diff_discussions", "projects"."remote_mirror_available_overridden", "projects"."only_mirror_protected_branches", "projects"."pull_mirror_available_overridden", "projects"."jobs_cache_index", "projects"."external_authorization_classification_label", "projects"."mirror_overwrites_diverged_branches", "projects"."pages_https_only", "projects"."external_webhook_token", "projects"."packages_enabled", "projects"."merge_requests_author_approval", "projects"."pool_repository_id", "projects"."runners_token_encrypted", "projects"."bfg_object_map", "projects"."detected_repository_languages", "projects"."merge_requests_disable_committers_approval", "projects"."require_password_to_approve", "projects"."max_pages_size", "projects"."max_artifacts_size", "projects"."pull_mirror_branch_prefix", "projects"."remove_source_branch_after_merge", "projects"."marked_for_deletion_at", "projects"."marked_for_deletion_by_user_id", "projects"."autoclose_referenced_issues", "projects"."suggestion_commit_message", "projects"."project_namespace_id", "projects"."hidden", "projects"."organization_id" FROM find_projects_by_id(63) AS projects WHERE ("projects"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:14:in `_query_by_sql'*/ 53: SELECT "appearances".* FROM "appearances" ORDER BY "appearances"."id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/appearance.rb:68:in `current_without_cache'*/ 54: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 55: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 56: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 57: SELECT "project_features".* FROM "project_features" WHERE "project_features"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/policies/project_policy.rb:1123:in `access_allowed_to?'*/ 58: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 59: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 60: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 61: SELECT "merge_requests".* FROM "merge_requests" WHERE "merge_requests"."source_project_id" = 63 AND (source_project_id <> target_project_id) AND "merge_requests"."state_id" = 1 AND "merge_requests"."allow_maintainer_to_push" = TRUE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/project.rb:3591:in `block (2 levels) in fetch_branch_allows_collaboration'*/ 62: SELECT 1 AS one FROM "onboarding_progresses" WHERE "onboarding_progresses"."namespace_id" = 199 AND "onboarding_progresses"."ended_at" IS NULL LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/onboarding/progress.rb:70:in `onboarding?'*/ 63: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Zentao' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/ee/lib/ee/sidebars/projects/menus/issues_menu.rb:119:in `zentao_integration'*/ 64: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 65: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 66: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 67: SELECT "integrations".* FROM "integrations" WHERE "integrations"."type_new" = 'Integrations::Harbor' AND "integrations"."project_id" = 63 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/sidebars/projects/menus/packages_registries_menu.rb:79:in `harbor_registry_menu_item'*/ 68: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 69: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 70: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 71: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 72: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 73: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 74: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 75: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 76: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 77: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 78: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 79: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 80: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 81: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 82: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 83: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 84: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 85: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 86: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 87: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 88: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 89: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 90: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 91: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 92: SELECT namespaces.*, root_query.project_id as source_id FROM "namespaces" INNER JOIN (SELECT "projects"."id", "projects"."namespace_id", projects.id as project_id, namespaces.traversal_ids[1] as root_id FROM "projects" INNER JOIN "namespaces" ON "namespaces"."id" = "projects"."namespace_id" WHERE "projects"."id" = 63) as root_query ON root_query.root_id = namespaces.id /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 93: SELECT "projects"."id", "projects"."namespace_id" FROM "projects" WHERE "projects"."id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 94: SELECT "namespaces"."id", "namespaces"."name", "namespaces"."path", "namespaces"."owner_id", "namespaces"."created_at", "namespaces"."updated_at", "namespaces"."type", "namespaces"."description", "namespaces"."avatar", "namespaces"."membership_lock", "namespaces"."share_with_group_lock", "namespaces"."visibility_level", "namespaces"."request_access_enabled", "namespaces"."ldap_sync_status", "namespaces"."ldap_sync_error", "namespaces"."ldap_sync_last_update_at", "namespaces"."ldap_sync_last_successful_update_at", "namespaces"."ldap_sync_last_sync_at", "namespaces"."description_html", "namespaces"."lfs_enabled", "namespaces"."parent_id", "namespaces"."shared_runners_minutes_limit", "namespaces"."repository_size_limit", "namespaces"."require_two_factor_authentication", "namespaces"."two_factor_grace_period", "namespaces"."cached_markdown_version", "namespaces"."project_creation_level", "namespaces"."runners_token", "namespaces"."file_template_project_id", "namespaces"."saml_discovery_token", "namespaces"."runners_token_encrypted", "namespaces"."custom_project_templates_group_id", "namespaces"."auto_devops_enabled", "namespaces"."extra_shared_runners_minutes_limit", "namespaces"."last_ci_minutes_notification_at", "namespaces"."last_ci_minutes_usage_notification_level", "namespaces"."subgroup_creation_level", "namespaces"."max_pages_size", "namespaces"."max_artifacts_size", "namespaces"."mentions_disabled", "namespaces"."default_branch_protection", "namespaces"."max_personal_access_token_lifetime", "namespaces"."push_rule_id", "namespaces"."shared_runners_enabled", "namespaces"."allow_descendants_override_disabled_shared_runners", "namespaces"."traversal_ids", "namespaces"."organization_id" FROM "namespaces" WHERE "namespaces"."id" = 199 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 95: SELECT COUNT(*) FROM "issues" WHERE "issues"."state_id" = 1 AND "issues"."confidential" = FALSE AND "issues"."project_id" = 63 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/services/base_count_service.rb:26:in `uncached_count'*/ 96: SELECT "members".* FROM "members" WHERE "members"."type" = 'GroupMember' AND "members"."source_id" = 199 AND "members"."source_type" = 'Namespace' AND "members"."requested_at" IS NULL AND "members"."access_level" = 50 ORDER BY "members"."user_id" ASC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/group.rb:860:in `first_owner'*/ 97: SELECT "application_setting_terms".* FROM "application_setting_terms" ORDER BY "application_setting_terms"."id" DESC LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/application_setting/term.rb:14:in `latest'*/ 98: SELECT "user_statuses".* FROM "user_statuses" WHERE "user_statuses"."user_id" = 114 LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/helpers/sidebars_helper.rb:205:in `user_status_menu_data'*/ 99: SELECT COUNT(*) FROM "issues" INNER JOIN "projects" ON "projects"."id" = "issues"."project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (issues.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 10)) OR projects.visibility_level IN (10,20)) AND ("project_features"."issues_access_level" IS NULL OR "project_features"."issues_access_level" IN (20,30) OR ("project_features"."issues_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 10)))) AND "issues"."state_id" = 1 AND EXISTS (SELECT "issue_assignees".* FROM "issue_assignees" WHERE "issue_assignees"."user_id" = 114 AND (issue_id = issues.id)) AND ("issues"."project_id" IS NULL OR "projects"."archived" = FALSE) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2064:in `block in assigned_open_issues_count'*/ 100: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND EXISTS (SELECT "merge_request_assignees".* FROM "merge_request_assignees" WHERE "merge_request_assignees"."user_id" = 114 AND (merge_request_id = merge_requests.id)) AND "projects"."archived" = FALSE /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2048:in `block in assigned_open_merge_requests_count'*/ 101: SELECT "users".* FROM find_users_by_id(114) AS users WHERE ("users"."id" IS NOT NULL) LIMIT 1 /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/concerns/use_sql_function_for_primary_key_lookups.rb:12:in `_query_by_sql'*/ 102: SELECT COUNT(*) FROM "merge_requests" INNER JOIN "projects" ON "projects"."id" = "merge_requests"."target_project_id" LEFT JOIN project_features ON projects.id = project_features.project_id WHERE (NOT EXISTS (SELECT 1 FROM "banned_users" WHERE (merge_requests.author_id = banned_users.user_id))) AND (EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = projects.id) AND (project_authorizations.access_level >= 20)) OR projects.visibility_level IN (10,20)) AND ("project_features"."merge_requests_access_level" IS NULL OR "project_features"."merge_requests_access_level" IN (20,30) OR ("project_features"."merge_requests_access_level" = 10 AND EXISTS (SELECT 1 FROM "project_authorizations" WHERE "project_authorizations"."user_id" = 114 AND (project_authorizations.project_id = project_features.project_id) AND (project_authorizations.access_level >= 20)))) AND "merge_requests"."state_id" = 1 AND "projects"."archived" = FALSE AND EXISTS (SELECT true FROM "merge_request_reviewers" WHERE merge_request_id = merge_requests.id AND "merge_request_reviewers"."user_id" = 114) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2057:in `block in review_requested_open_merge_requests_count'*/ 103: SELECT COUNT(*) FROM "todos" LEFT JOIN banned_users ON todos.author_id = banned_users.user_id WHERE "todos"."user_id" = 114 AND ("todos"."state" IN ('pending')) AND "banned_users"."user_id" IS NULL AND ("todos"."state" IN ('pending')) /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2076:in `block in todos_pending_count'*/ 104: SELECT COUNT(*) FROM "projects" INNER JOIN "namespaces" ON "projects"."namespace_id" = "namespaces"."id" WHERE "namespaces"."owner_id" = 114 AND "namespaces"."type" = 'User' /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/app/models/user.rb:2082:in `block in personal_projects_count'*/ 105: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.620444') AND "broadcast_messages"."broadcast_type" = 1 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ 106: SELECT "broadcast_messages".* FROM "broadcast_messages" WHERE (ends_at > '2024-09-12 17:57:07.624695') AND "broadcast_messages"."broadcast_type" = 2 ORDER BY "broadcast_messages"."id" ASC /*application:test,correlation_id:01J7KP3E09F73AHKR5WBGPN0T1,endpoint_id:Projects::Settings::RepositoryController#show,db_config_name:main,line:/lib/gitlab/cache/json_caches/json_keyed.rb:24:in `write_raw'*/ # ./lib/gitlab/query_limiting/transaction.rb:65:in `act_upon_results' # ./lib/gitlab/query_limiting/middleware.rb:21:in `call' # ./lib/gitlab/database/load_balancing/rack_middleware.rb:23:in `call' # ./lib/gitlab/middleware/go.rb:21:in `call' # ./lib/gitlab/etag_caching/middleware.rb:21:in `call' # ./lib/gitlab/middleware/query_analyzer.rb:11:in `block in call' # ./lib/gitlab/database/query_analyzer.rb:40:in `within' # ./lib/gitlab/middleware/query_analyzer.rb:11:in `call' # ./lib/gitlab/middleware/multipart.rb:173:in `call' # ./lib/gitlab/middleware/read_only/controller.rb:50:in `call' # ./lib/gitlab/middleware/read_only.rb:18:in `call' # ./lib/gitlab/middleware/unauthenticated_session_expiry.rb:18:in `call' # ./lib/gitlab/middleware/strip_cookies.rb:29:in `call' # ./lib/gitlab/middleware/same_site_cookies.rb:27:in `call' # ./lib/gitlab/middleware/path_traversal_check.rb:40:in `call' # ./lib/gitlab/middleware/handle_malformed_strings.rb:21:in `call' # ./lib/gitlab/middleware/basic_health_check.rb:25:in `call' # ./lib/gitlab/middleware/handle_ip_spoof_attack_error.rb:25:in `call' # ./lib/gitlab/middleware/request_context.rb:15:in `call' # ./lib/gitlab/middleware/webhook_recursion_detection.rb:15:in `call' # ./config/initializers/fix_local_cache_middleware.rb:11:in `call' # ./lib/gitlab/middleware/compressed_json.rb:44:in `call' # ./lib/gitlab/middleware/static.rb:11:in `call' # ./lib/gitlab/testing/clear_process_memory_cache_middleware.rb:13:in `call' # ./lib/gitlab/testing/request_inspector_middleware.rb:35:in `call' # ./lib/gitlab/testing/robots_blocker_middleware.rb:30:in `call' # ./lib/gitlab/testing/request_blocker_middleware.rb:47:in `call' # ./lib/gitlab/middleware/rack_multipart_tempfile_factory.rb:19:in `call' # ./lib/gitlab/middleware/sidekiq_web_static.rb:20:in `call' # ./lib/gitlab/metrics/requests_rack_middleware.rb:79:in `call' # ------------------ # --- Caused by: --- # Selenium::WebDriver::Error::WebDriverError: # #0 0x5ce5c4cfe863 <unknown> #1 0x5ce5c49f48c6 <unknown> #2 0x5ce5c49dbb32 <unknown> #3 0x5ce5c49da55b <unknown> #4 0x5ce5c49dab9f <unknown> #5 0x5ce5c4a04c46 <unknown> #6 0x5ce5c4a0520a <unknown> #7 0x5ce5c49fa801 <unknown> #8 0x5ce5c49f8bd1 <unknown> #9 0x5ce5c49fbbce <unknown> #10 0x5ce5c49fbc5c <unknown> #11 0x5ce5c4a39ae2 <unknown> #12 0x5ce5c4a615a2 <unknown> #13 0x5ce5c4a33e98 <unknown> #14 0x5ce5c4a6176e <unknown> #15 0x5ce5c4a7fc19 <unknown> #16 0x5ce5c4a61343 <unknown> #17 0x5ce5c4a32593 <unknown> #18 0x5ce5c4a32f5e <unknown> #19 0x5ce5c4cc284b <unknown> #20 0x5ce5c4cc67a5 <unknown> #21 0x5ce5c4cb0571 <unknown> #22 0x5ce5c4cc7332 <unknown> #23 0x5ce5c4c9587f <unknown> #24 0x5ce5c4ced728 <unknown> #25 0x5ce5c4ced8fb <unknown> #26 0x5ce5c4cfd9b4 <unknown> #27 0x7a8dc98f8134 <unknown> 1.2) Failure/Error: raise BrowserConsoleError, message BrowserConsoleHelpers::BrowserConsoleError: Unexpected browser console output: webpack-internal:///ntxz 76:16 "[@gitlab/ui] The following translations have not been given, so will fall back to their default US English strings:" webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object webpack-internal:///7F3p 19:12 "[Sentry stub]" "captureException(...) called with:" Object http://127.0.0.1:39133/group45/project-60/-/settings/repository - Failed to load resource: the server responded with a status of 500 (Internal Server Error) # ./spec/support/helpers/browser_console_helpers.rb:79:in `raise_if_unexpected_browser_console_output' # ./spec/support/capybara.rb:200:in `block (2 levels) in <top (required)>' # ./spec/spec_helper.rb:473:in `block (3 levels) in <top (required)>' # ./lib/gitlab/sidekiq_sharding/validator.rb:42:in `enabled' # ./spec/spec_helper.rb:472:in `block (2 levels) in <top (required)>' # ./spec/spec_helper.rb:467:in `block (3 levels) in <top (required)>' # ./spec/support/sidekiq_middleware.rb:9:in `with_sidekiq_server_middleware' # ./spec/spec_helper.rb:458:in `block (2 levels) in <top (required)>' # ./spec/spec_helper.rb:454:in `block (3 levels) in <top (required)>' # ./lib/gitlab/application_context.rb:92:in `with_raw_context' # ./spec/spec_helper.rb:454:in `block (2 levels) in <top (required)>' # ./spec/spec_helper.rb:270:in `block (2 levels) in <top (required)>' # ./spec/support/system_exit_detected.rb:7:in `block (2 levels) in <top (required)>' # ./spec/support/fast_quarantine.rb:22:in `block (2 levels) in <top (required)>' # ./spec/support/database/prevent_cross_joins.rb:106:in `block (3 levels) in <top (required)>' # ./spec/support/database/prevent_cross_joins.rb:60:in `with_cross_joins_prevented' # ./spec/support/database/prevent_cross_joins.rb:106:in `block (2 levels) in <top (required)>' # ./spec/support/capybara.rb:175:in `block (3 levels) in <top (required)>' # ./config/initializers/forbid_sidekiq_in_transactions.rb:10:in `skipping_transaction_check' # ./spec/support/capybara.rb:175:in `block (2 levels) in <top (required)>' Finished in 26 minutes 2 seconds (files took 2 minutes 36.1 seconds to load) 251 examples, 1 failure Failed examples: rspec './ee/spec/features/projects/settings/ee/protected_branches_spec.rb[1:1:1:1:1]' # Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches Randomized with seed 22197 Stopped processing SimpleCov as a previous error not related to SimpleCov has been detected Failed to write to log, write log/workhorse-test.log: file already closed [0;33mRSpec exited with 1. [0m[job-metrics] Updating job metrics tag for the CI/CD job. [0;33mRSPEC_RETRIED_TESTS_REPORT_PATH: rspec/retried_tests-7812354946.txt [0m[0;33mRetrying the failing examples in a new RSpec process... [0m[0;32m$ gem install junit_merge --no-document --version 0.1.2 [0mSuccessfully installed nokogiri-1.16.7-x86_64-linux Successfully installed junit_merge-0.1.2 2 gems installed [0;32m==> 'gem install junit_merge --no-document --version 0.1.2' succeeded in 2 seconds. [0m[0;33mRunning RSpec command: bin/rspec -Ispec -rspec_helper --color --failure-exit-code 1 --error-exit-code 2 --format documentation --format Support::Formatters::JsonFormatter --out rspec/rspec-retry-7812354946.json --format RspecJunitFormatter --out rspec/rspec-retry-7812354946.xml --only-failures --pattern "{ee/}spec/{features}{,/**/}*_spec.rb" [0mwarning: parser/current is loading parser/ruby31, which recognizes 3.1.6-compliant syntax, but you are running 3.1.5. Please see https://github.com/whitequark/parser#compatibility-with-ruby-mri. Run options: include {:last_run_status=>"failed"} # [RSpecRunTime] Starting RSpec timer... [TEST PROF INFO] EventProf enabled (sql.active_record) unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String. unknown OID 2249: failed to recognize type of 'pg_stat_file'. It will be treated as String. Test environment set up in 2.461126644 seconds # [RSpecRunTime] Starting example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. Expected to take 53.75 seconds. Projects > Settings > Repository settings using custom role Starting the Capybara driver server... when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches Capybara starting Puma... * Version 6.4.0, codename: The Eagle of Durango * Min threads: 0, max threads: 4 * Listening on unix:///tmp/20240912-14747-vhxu5s allows creating explicit protected branches # [RSpecRunTime] Finishing example group ee/spec/features/projects/settings/ee/protected_branches_spec.rb. It took 26.56 seconds. Expected to take 53.75 seconds. auto_explain log contains 1304 entries for main, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-12-16.14747.main.ndjson.gz took 17.567536654 auto_explain log contains 1304 entries for ci, writing to /builds/gitlab-org/gitlab/auto_explain/rspec-ee-system-pg14-12-16.14747.ci.ndjson.gz took 17.721523781 [TEST PROF INFO] EventProf results for sql.active_record Total time: 00:03.018 of 00:26.564 (11.36%) Total events: 939 Top 5 slowest suites (by time): Projects > Se...ng custom role (./ee/spec/features/projects/settings/ee/protected_branches_spec.rb:5) – 00:03.018 (939 / 1) of 00:26.564 (11.36%) Finished in 1 minute 13.95 seconds (files took 1 minute 32.9 seconds to load) 1 example, 0 failures Randomized with seed 24720 Failed to write to log, write log/workhorse-test.log: file already closed Loading rspec/rspec-7812354946.json... Merged rspec/rspec-retry-7812354946.json adding 5 results. Saved rspec/rspec-7812354946.json. [0;33mA test was flaky and succeeded after being retried. Checking to see if flaky test is part of this MR... [0m[0;33mFlaky test was not part of this MR. [0msection_end:1726164483:step_script [0Ksection_start:1726164483:after_script [0K[0K[36;1mRunning after_script[0;m[0;m [32;1mRunning after script...[0;m [32;1m$ source scripts/utils.sh[0;m [32;1m$ log_disk_usage after_script[0;m [log_disk_usage after_script] start df -h Filesystem Size Used Avail Use% Mounted on overlay 46G 26G 20G 57% / tmpfs 64M 0 64M 0% /dev shm 256M 0 256M 0% /dev/shm /dev/sda1 46G 26G 20G 57% /cache tmpfs 3.9G 0 3.9G 0% /sys/devices/virtual/dmi/id tmpfs 3.9G 0 3.9G 0% /proc/acpi tmpfs 3.9G 0 3.9G 0% /proc/scsi tmpfs 3.9G 0 3.9G 0% /sys/firmware du -h -d 1 7.4M ./workhorse 148K ./bin 1.2M ./.gitlab 193M ./.git 4.0K ./builds 16M ./coverage 28M ./lib 8.0K ./.vscode 516K ./storybook 37M ./log 1.8M ./data 9.9M ./qa 2.9M ./.rubocop_todo 1.1G ./vendor 943M ./public 59M ./doc 480K ./danger 260K ./rspec 8.0K ./.bundle 548K ./tooling 140M ./ee 1.3M ./knapsack 296K ./patches 4.3M ./changelogs 20K ./haml_lint 28K ./metrics_server 88K ./keeps 216K ./shared 44K ./generator_templates 1.2M ./scripts 1.4G ./tmp 125M ./spec 20K ./file_hooks 16K ./sidekiq_cluster 16M ./gems 1.2M ./fixtures 948K ./rubocop 4.0K ./.go 30M ./db 876K ./auto_explain 12K ./.github 125M ./locale 1.9M ./glfm_specification 17M ./config 80M ./app 16K ./.lefthook 4.3G . [log_disk_usage after_script] end [32;1m$ bundle exec gem list gitlab_quality-test_tooling[0;m gitlab_quality-test_tooling (1.38.1) [32;1m$ section_start "failed-test-issues" "Report test failures" # collapsed multi-line command[0;m section_start:1726164495:failed-test-issues[collapsed=true] [0KReport test failures Reporting tests in `rspec/rspec-retry-7812354946.json` as issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`. => Processing 1 tests in rspec/rspec-retry-7812354946.json => Reported 0 failed tests. section_end:1726164498:failed-test-issues [0K [32;1m$ section_start "flaky-test-issues" "Report test flakiness" # collapsed multi-line command[0;m section_start:1726164498:flaky-test-issues[collapsed=true] [0KReport test flakiness Reporting tests in `rspec/rspec-retry-7812354946.json` as issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`. => Processing 1 tests in rspec/rspec-retry-7812354946.json => Reporting flaky test 'Projects > Settings > Repository settings using custom role when user is a guest with custom roles that enables handling protected branches behaves like setting project protected branches explicit protected branches allows creating explicit protected branches'... => Reporting flaky test to existing issue: https://gitlab.com/gitlab-org/gitlab/-/issues/482781 => Reported 1 flaky tests. section_end:1726164503:flaky-test-issues [0K [32;1m$ section_start "slow-test-issues" "Report test slowness" # collapsed multi-line command[0;m section_start:1726164503:slow-test-issues[collapsed=true] [0KReport test slowness Reporting tests in `rspec/rspec-*.json` as issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`. => Processing 1 tests in rspec/rspec-7812354946.json => Reported 0 slow tests. => Processing 1 tests in rspec/rspec-retry-7812354946.json => Reported 0 slow tests. section_end:1726164505:slow-test-issues [0K [32;1m$ section_start "slow-test-merge-request-report-note" "Report test slowness in MR note" # collapsed multi-line command[0;m section_start:1726164505:slow-test-merge-request-report-note[collapsed=true] [0KReport test slowness in MR note [0;33mNot reporting test slowness in MR note because $ADD_SLOW_TEST_NOTE_TO_MERGE_REQUEST != 'true' [0msection_end:1726164505:slow-test-merge-request-report-note [0K [32;1m$ section_start "knapsack-report-issues" "Report test files close to timing out" # collapsed multi-line command[0;m section_start:1726164505:knapsack-report-issues[collapsed=true] [0KReport test files close to timing out Reporting spec file exceeding Knapsack expectaton issues in project `gitlab-org/gitlab` via the API at `https://gitlab.com/api/v4`. => Reporting 0 spec files exceeding Knapsack expectation. section_end:1726164507:knapsack-report-issues [0K [32;1m$ tooling/bin/push_job_metrics || true[0;m [job-metrics] Pushing job metrics file for the CI/CD job. [job-metrics] Pushed 4 CI job metric entries to InfluxDB. section_end:1726164508:after_script [0Ksection_start:1726164508:archive_cache [0K[0K[36;1mSaving cache for successful job[0;m[0;m [32;1mNot uploading cache ruby-gems-debian-bookworm-ruby-3.1.5-gemfile-Gemfile-19 due to policy[0;m section_end:1726164509:archive_cache [0Ksection_start:1726164509:upload_artifacts_on_success [0K[0K[36;1mUploading artifacts for successful job[0;m[0;m [32;1mUploading artifacts...[0;m auto_explain/: found 5 matching artifact files and directories[0;m coverage/: found 4 matching artifact files and directories[0;m [0;33mWARNING: crystalball/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab)[0;m [0;33mWARNING: deprecations/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab)[0;m knapsack/: found 4 matching artifact files and directories[0;m rspec/: found 15 matching artifact files and directories[0;m tmp/capybara/: found 3 matching artifact files and directories[0;m log/*.log: found 17 matching artifact files and directories[0;m [0;33mWARNING: Upload request redirected [0;m [0;33mlocation[0;m=https://gitlab.com/api/v4/jobs/7812354946/artifacts?artifact_format=zip&artifact_type=archive&expire_in=31d [0;33mnew-url[0;m=https://gitlab.com [0;33mWARNING: Retrying... [0;m [0;33mcontext[0;m=artifacts-uploader [0;33merror[0;m=request redirected Uploading artifacts as "archive" to coordinator... 201 Created[0;m id[0;m=7812354946 responseStatus[0;m=201 Created token[0;m=glcbt-66 [32;1mUploading artifacts...[0;m rspec/rspec-*.xml: found 2 matching artifact files and directories[0;m [0;33mWARNING: Upload request redirected [0;m [0;33mlocation[0;m=https://gitlab.com/api/v4/jobs/7812354946/artifacts?artifact_format=gzip&artifact_type=junit&expire_in=31d [0;33mnew-url[0;m=https://gitlab.com [0;33mWARNING: Retrying... [0;m [0;33mcontext[0;m=artifacts-uploader [0;33merror[0;m=request redirected Uploading artifacts as "junit" to coordinator... 201 Created[0;m id[0;m=7812354946 responseStatus[0;m=201 Created token[0;m=glcbt-66 section_end:1726164519:upload_artifacts_on_success [0Ksection_start:1726164519:cleanup_file_variables [0K[0K[36;1mCleaning up project directory and file based variables[0;m[0;m section_end:1726164519:cleanup_file_variables [0K[32;1mJob succeeded[0;m