[INFO] Scanning for projects... [INFO] [INFO] ---------------------< org.folio:mod-permissions >---------------------- [INFO] Building mod-permissions 5.14.0-SNAPSHOT [INFO] --------------------------------[ jar ]--------------------------------- [INFO] [INFO] --- maven-clean-plugin:2.5:clean (default-clean) @ mod-permissions --- [INFO] Deleting /home/adam/folio/mod-permissions/target [INFO] [INFO] --- build-helper-maven-plugin:3.0.0:add-source (add_generated_sources_folder) @ mod-permissions --- [INFO] Source directory: /home/adam/folio/mod-permissions/target/generated-sources/raml-jaxrs added. [INFO] [INFO] --- exec-maven-plugin:1.5.0:exec (git submodule update) @ mod-permissions --- [INFO] [INFO] --- domain-models-maven-plugin:33.0.0-SNAPSHOT:java (generate_interfaces) @ mod-permissions --- DomainModelsMojo.execute() generateInterfaces=true generateClients=false project.baseDir = /home/adam/folio/mod-permissions project.name = mod-permissions project.actifactId = mod-permissions Artifacts: [] ArtifactMap: {} ramlDirs.size=0 schemaPaths.size=0 GenerateRunner.generate Input directory /home/adam/folio/mod-permissions/target/classes/ramls org/folio/rest/jaxrs/model/PermissionNameObject.java org/folio/rest/jaxrs/model/Metadata.java org/folio/rest/jaxrs/model/PermissionUpload.java org/folio/rest/jaxrs/model/Metadata.java org/folio/rest/jaxrs/model/Permission.java org/folio/rest/jaxrs/model/PermissionListObject.java org/folio/rest/jaxrs/model/Metadata.java org/folio/rest/jaxrs/model/PermissionUser.java org/folio/rest/jaxrs/model/Metadata.java org/folio/rest/jaxrs/model/PermissionUser.java org/folio/rest/jaxrs/model/PermissionUserListObject.java org/folio/rest/jaxrs/model/Metadata.java org/folio/rest/jaxrs/model/Permission.java org/folio/rest/jaxrs/model/PermissionNameListObject.java org/folio/rest/jaxrs/model/Error.java org/folio/rest/jaxrs/model/Errors.java org/folio/rest/jaxrs/model/Parameter.java [INFO] Reading from pom.xml [INFO] module name: mod_permissions, version: 5.14.0 org/folio/rest/jaxrs/model/OkapiPermission.java org/folio/rest/jaxrs/model/OkapiPermissionSet.java org/folio/rest/jaxrs/model/OkapiPermission.java org/folio/rest/jaxrs/model/Error.java org/folio/rest/jaxrs/model/Errors.java org/folio/rest/jaxrs/model/Parameter.java [INFO] [INFO] --- maven-resources-plugin:3.0.1:copy-resources (filter-descriptor-inputs) @ mod-permissions --- [INFO] Using 'UTF-8' encoding to copy filtered resources. [INFO] Copying 2 resources [INFO] [INFO] --- copy-rename-maven-plugin:1.0:rename (rename-descriptor-outputs) @ mod-permissions --- [INFO] Renamed /home/adam/folio/mod-permissions/target/ModuleDescriptor-template.json to /home/adam/folio/mod-permissions/target/ModuleDescriptor.json [INFO] Renamed /home/adam/folio/mod-permissions/target/DeploymentDescriptor-template.json to /home/adam/folio/mod-permissions/target/DeploymentDescriptor.json [INFO] [INFO] --- maven-resources-plugin:3.0.1:resources (default-resources) @ mod-permissions --- [INFO] Using 'UTF-8' encoding to copy filtered resources. [INFO] Copying 3 resources [INFO] [INFO] --- maven-resources-plugin:3.0.1:copy-resources (copy-resources) @ mod-permissions --- [INFO] Using 'UTF-8' encoding to copy filtered resources. [INFO] Copying 103 resources [INFO] [INFO] --- maven-resources-plugin:3.0.1:copy-resources (copy-sample-data) @ mod-permissions --- [INFO] Using 'UTF-8' encoding to copy filtered resources. [INFO] Copying 300 resources [INFO] [INFO] --- maven-compiler-plugin:3.8.1:compile (default-compile) @ mod-permissions --- [INFO] Changes detected - recompiling the module! [INFO] Compiling 22 source files to /home/adam/folio/mod-permissions/target/classes [INFO] /home/adam/folio/mod-permissions/src/main/java/org/folio/rest/impl/PermsAPI.java: Some input files use or override a deprecated API. [INFO] /home/adam/folio/mod-permissions/src/main/java/org/folio/rest/impl/PermsAPI.java: Recompile with -Xlint:deprecation for details. [INFO] /home/adam/folio/mod-permissions/src/main/java/org/folio/rest/impl/PermsAPI.java: /home/adam/folio/mod-permissions/src/main/java/org/folio/rest/impl/PermsAPI.java uses unchecked or unsafe operations. [INFO] /home/adam/folio/mod-permissions/src/main/java/org/folio/rest/impl/PermsAPI.java: Recompile with -Xlint:unchecked for details. [INFO] [INFO] --- aspectj-maven-plugin:1.12.6:compile (default) @ mod-permissions --- [INFO] Showing AJC message detail for messages of types: [error, warning, fail] [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.getPermsUsers(int, int, java.lang.String, java.lang.String, java.lang.String, io.vertx.ext.web.RoutingContext, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:116) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.postPermsUsers(org.folio.rest.jaxrs.model.PermissionUser, io.vertx.ext.web.RoutingContext, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:126) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.getPermsUsersById(java.lang.String, java.lang.String, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:232) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.putPermsUsersById(java.lang.String, org.folio.rest.jaxrs.model.PermissionUser, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:261) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.deletePermsUsersById(java.lang.String, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:378) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.getPermsUsersPermissionsById(java.lang.String, java.lang.String, java.lang.String, java.lang.String, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:470) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.postPermsUsersPermissionsById(java.lang.String, java.lang.String, org.folio.rest.jaxrs.model.PermissionNameObject, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:509) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.deletePermsUsersPermissionsByIdAndPermissionname(java.lang.String, java.lang.String, java.lang.String, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:659) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.postPermsPermissions(org.folio.rest.jaxrs.model.PermissionUpload, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:753) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.getPermsPermissionsById(java.lang.String, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:848) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.putPermsPermissionsById(java.lang.String, org.folio.rest.jaxrs.model.PermissionUpload, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:857) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.deletePermsPermissionsById(java.lang.String, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:966) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] Join point 'method-execution(void org.folio.rest.impl.PermsAPI.getPermsPermissions(java.lang.String, java.lang.String, java.lang.String, int, int, java.lang.String, java.lang.String, java.lang.String, java.lang.String, java.util.Map, io.vertx.core.Handler, io.vertx.core.Context))' in Type 'org.folio.rest.impl.PermsAPI' (PermsAPI.java:1089) advised by before advice from 'org.folio.rest.annotations.RestValidator' (domain-models-api-aspects-33.0.0-SNAPSHOT.jar!RestValidator.class:37(from RestValidator.aj)) [INFO] [INFO] --- maven-resources-plugin:3.0.1:testResources (default-testResources) @ mod-permissions --- [INFO] Using 'UTF-8' encoding to copy filtered resources. [INFO] skip non existing resourceDirectory /home/adam/folio/mod-permissions/src/test/resources [INFO] [INFO] --- maven-compiler-plugin:3.8.1:testCompile (default-testCompile) @ mod-permissions --- [INFO] Changes detected - recompiling the module! [INFO] Compiling 7 source files to /home/adam/folio/mod-permissions/target/test-classes [INFO] /home/adam/folio/mod-permissions/src/test/java/org/folio/permstest/RestVerticleTest.java: Some input files use or override a deprecated API. [INFO] /home/adam/folio/mod-permissions/src/test/java/org/folio/permstest/RestVerticleTest.java: Recompile with -Xlint:deprecation for details. [INFO] /home/adam/folio/mod-permissions/src/test/java/org/folio/permstest/RestVerticleTest.java: /home/adam/folio/mod-permissions/src/test/java/org/folio/permstest/RestVerticleTest.java uses unchecked or unsafe operations. [INFO] /home/adam/folio/mod-permissions/src/test/java/org/folio/permstest/RestVerticleTest.java: Recompile with -Xlint:unchecked for details. [INFO] [INFO] --- maven-surefire-plugin:2.22.1:test (default-test) @ mod-permissions --- [INFO] [INFO] ------------------------------------------------------- [INFO] T E S T S [INFO] ------------------------------------------------------- [INFO] Running org.folio.rest.impl.PermissionUtilsTest [INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s - in org.folio.rest.impl.PermissionUtilsTest [INFO] Running org.folio.rest.impl.PermsAPITest SLF4J: Failed to load class "org.slf4j.impl.StaticLoggerBinder". SLF4J: Defaulting to no-operation (NOP) logger implementation SLF4J: See http://www.slf4j.org/codes.html#StaticLoggerBinder for further details. 14:01:59 [] [] [] [] INFO Version HV000001: Hibernate Validator 6.1.5.Final 14:01:59 [] [] [] [] ERROR PermsAPI null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.getPermsUsersPermissionsById(PermsAPI.java:475) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testGetPermsUsersPermissionsByIdNullPointer(PermsAPITest.java:135) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:01:59 [] [] [] [] INFO LoadConfs File does not exist: /postgres-conf.json 14:01:59 [] [] [] [] INFO LoadConfs Resource does not exist: /postgres-conf.json 14:01:59 [] [] [] [] INFO PostgresClient No DB configuration found, setting username, password and database for testing 14:01:59 [] [] [] [] INFO PostgresClient Using schema: badTenant 14:01:59 [] [] [] [] INFO PostgresClient Starting postgres tester 14:02:01 [] [] [] [] INFO PostgresClient postgreSQLClientConfig = {"postgres_tester":true,"username":"badtenant_mod_permissions","password":"...","database":"postgres","port":49345,"host":"localhost"} 14:02:01 [] [] [] [] ERROR PermsAPI { "message": "relation \"badtenant_mod_permissions.permissions_users\" does not exist", "severity": "ERROR", "code": "42P01", "position": "13", "file": "parse_relation.c", "line": "1170", "routine": "parserOpenTable" } io.vertx.pgclient.PgException: { "message": "relation \"badtenant_mod_permissions.permissions_users\" does not exist", "severity": "ERROR", "code": "42P01", "position": "13", "file": "parse_relation.c", "line": "1170", "routine": "parserOpenTable" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:01 [] [] [] [] ERROR PermsAPI null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.putPermsUsersById(PermsAPI.java:264) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testPutPermsUsersByIdNullPointer(PermsAPITest.java:117) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:01 [] [] [] [] ERROR PermsAPI null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.postPermsUsers(PermsAPI.java:129) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testPostPermsUsersNullPointer(PermsAPITest.java:108) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:01 [] [] [] [] ERROR PermsAPI null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.postPermsUsersPermissionsById(PermsAPI.java:514) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testPostPermsUsersPermissionsByIdNullPointer(PermsAPITest.java:144) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:01 [] [] [] [] ERROR PermsAPI null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.postPermsPermissions(PermsAPI.java:756) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testPostPermsPermissionsNullPointer(PermsAPITest.java:162) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:02 [] [] [] [] ERROR PermsAPI null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.deletePermsPermissionsById(PermsAPI.java:970) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testDeletePermsPermissionsByIdNullPointer(PermsAPITest.java:198) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:02 [] [] [] [] INFO LoadConfs File does not exist: /postgres-conf.json 14:02:02 [] [] [] [] INFO LoadConfs Resource does not exist: /postgres-conf.json 14:02:02 [] [] [] [] INFO PostgresClient No DB configuration found, setting username, password and database for testing 14:02:02 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'that' >>>WHERE (jsonb->>'permissionName') = 'that' 14:02:02 [] [] [] [] INFO PostgresClient Using schema: foo 14:02:02 [] [] [] [] INFO PostgresClient postgreSQLClientConfig = {"postgres_tester":true,"username":"foo_mod_permissions","password":"...","database":"postgres","port":49345,"host":"localhost"} 14:02:02 [] [] [] [] ERROR PostgresClient query with count: { "message": "schema \"badtenant_mod_permissions\" does not exist", "severity": "ERROR", "code": "3F000", "position": "8", "file": "namespace.c", "line": "3042", "routine": "get_namespace_oid" } - SELECT badtenant_mod_permissions.count_estimate('SELECT jsonb FROM badtenant_mod_permissions.permissions WHERE (jsonb->>''permissionName'') = ''that''') io.vertx.pgclient.PgException: { "message": "schema \"badtenant_mod_permissions\" does not exist", "severity": "ERROR", "code": "3F000", "position": "8", "file": "namespace.c", "line": "3042", "routine": "get_namespace_oid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:03 [] [] [] [] ERROR PostgresClient { "message": "password authentication failed for user \"foo_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"foo_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:03 [] [] [] [] ERROR PermsAPI null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.postPermsPurgeDeprecated(PermsAPI.java:1952) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testPostPermsPurgeDeprecatedNullPointer(PermsAPITest.java:217) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:03 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(dummy == false)' [Mon May 10 14:02:03 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:03 [] [] [] [] ERROR PermsAPI null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.getPermsPermissions(PermsAPI.java:1111) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testGetPermsPermissionsNullPointer(PermsAPITest.java:207) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:03 [] [] [] [] ERROR PermsAPI null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.deletePermsUsersPermissionsByIdAndPermissionname(PermsAPI.java:664) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testDeletePermsUsersPermissionsByIdAndPermissionnameNullPointer(PermsAPITest.java:153) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:03 [] [] [] [] ERROR PgUtil null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PgUtil.postgresClient(PgUtil.java:1356) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PgUtil.getById(PgUtil.java:939) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PgUtil.getById(PgUtil.java:902) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.getPermsPermissionsById(PermsAPI.java:851) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testGetPermsPermissionsByIdNullPointer(PermsAPITest.java:180) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:03 [] [] [] [] ERROR PermsAPI null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.putPermsPermissionsById(PermsAPI.java:861) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testPutPermsPermissionsByIdNullPointer(PermsAPITest.java:189) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:03 [] [] [] [] ERROR PermsAPI Error using Postgres instance: null java.lang.NullPointerException: null at org.folio.rest.tools.utils.TenantTool.tenantId(TenantTool.java:31) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.deletePermsUsersById(PermsAPI.java:381) ~[classes/:?] at org.folio.rest.impl.PermsAPITest.testDeletePermsUsersByIdNullPointer(PermsAPITest.java:126) ~[test-classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeTestMethod(VertxUnitRunner.java:95) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.lambda$invokeExplosively$0(VertxUnitRunner.java:114) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.run(TestContextImpl.java:90) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.invokeExplosively(VertxUnitRunner.java:130) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner.access$000(VertxUnitRunner.java:39) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$1.evaluate(VertxUnitRunner.java:84) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) [junit-4.13.1.jar:4.13.1] at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) [junit-4.13.1.jar:4.13.1] at io.vertx.ext.unit.junit.VertxUnitRunner$2.evaluate(VertxUnitRunner.java:196) [vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.junit.VertxUnitRunner$3.evaluate(VertxUnitRunner.java:211) [vertx-unit-4.0.2.jar:4.0.2] at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) [junit-4.13.1.jar:4.13.1] at org.junit.runners.ParentRunner.run(ParentRunner.java:413) [junit-4.13.1.jar:4.13.1] at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) [surefire-junit4-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) [surefire-booter-2.22.1.jar:2.22.1] at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [surefire-booter-2.22.1.jar:2.22.1] 14:02:03 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: >>> 14:02:03 [] [] [] [] ERROR PostgresClient queryAndAnalyze: { "message": "relation \"badtenant_mod_permissions.permissions\" does not exist", "severity": "ERROR", "code": "42P01", "position": "19", "file": "parse_relation.c", "line": "1170", "routine": "parserOpenTable" } - SELECT jsonb FROM badtenant_mod_permissions.permissions io.vertx.pgclient.PgException: { "message": "relation \"badtenant_mod_permissions.permissions\" does not exist", "severity": "ERROR", "code": "42P01", "position": "19", "file": "parse_relation.c", "line": "1170", "routine": "parserOpenTable" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] [INFO] Tests run: 18, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.17 s - in org.folio.rest.impl.PermsAPITest [INFO] Running org.folio.rest.impl.TenantRefAPITest 14:02:03 [] [] [] [] INFO PostgresClient Stopping postgres tester 14:02:03 [] [] [] [] INFO RestVerticle git: git@github.com:folio-org/raml-module-builder.git b776a3b570c74f8f0bcce5d19d502928c3bf7948 14:02:03 [] [] [] [] INFO RestVerticle metrics enabled: false 14:02:03 [] [] [] [] INFO Messages Loading messages from /infra-messages/APIMessages_de.properties ................................ 14:02:03 [] [] [] [] INFO Messages Loading messages from /infra-messages/APIMessages_en.properties ................................ 14:02:03 [] [] [] [] INFO RestRouting Adding route DELETE /_/tenant/{operation_id} -> deleteTenantByOperationId 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /_/tenant/{operation_id} -> getTenantByOperationId 14:02:03 [] [] [] [] INFO RestRouting Adding route POST /_/tenant -> postTenant 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /_/jsonSchemas -> getJsonSchemas 14:02:03 [] [] [] [] INFO RestRouting Adding route POST /_/tenantpermissions -> postTenantpermissions 14:02:03 [] [] [] [] INFO RestRouting Adding route DELETE /admin/kill_query -> deleteAdminKillQuery 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/cache_hit_rates -> getAdminCacheHitRates 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/db_cache_summary -> getAdminDbCacheSummary 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/health -> getAdminHealth 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/jstack -> getAdminJstack 14:02:03 [] [] [] [] INFO RestRouting Adding route PUT /admin/jstack -> putAdminJstack 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/list_locking_queries -> getAdminListLockingQueries 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/loglevel -> getAdminLoglevel 14:02:03 [] [] [] [] INFO RestRouting Adding route PUT /admin/loglevel -> putAdminLoglevel 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/memory -> getAdminMemory 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_active_sessions -> getAdminPostgresActiveSessions 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_load -> getAdminPostgresLoad 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_table_access_stats -> getAdminPostgresTableAccessStats 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_table_size -> getAdminPostgresTableSize 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/slow_queries -> getAdminSlowQueries 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/table_index_usage -> getAdminTableIndexUsage 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /admin/total_db_size -> getAdminTotalDbSize 14:02:03 [] [] [] [] INFO RestRouting Adding route POST /admin/get_password -> postAdminGetPassword 14:02:03 [] [] [] [] INFO RestRouting Adding route POST /admin/importSQL -> postAdminImportSQL 14:02:03 [] [] [] [] INFO RestRouting Adding route POST /admin/postgres_maintenance -> postAdminPostgresMaintenance 14:02:03 [] [] [] [] INFO RestRouting Adding route POST /admin/set_AES_key -> postAdminSetAESKey 14:02:03 [] [] [] [] INFO RestRouting Adding route PUT /admin/postgres_create_indexes -> putAdminPostgresCreateIndexes 14:02:03 [] [] [] [] INFO RestRouting Adding route PUT /admin/postgres_drop_indexes -> putAdminPostgresDropIndexes 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /_/ramls -> getRamls 14:02:03 [] [] [] [] INFO RestRouting Adding route DELETE /perms/permissions/{id} -> deletePermsPermissionsById 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /perms/permissions/{id} -> getPermsPermissionsById 14:02:03 [] [] [] [] INFO RestRouting Adding route PUT /perms/permissions/{id} -> putPermsPermissionsById 14:02:03 [] [] [] [] INFO RestRouting Adding route DELETE /perms/users/{id} -> deletePermsUsersById 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /perms/users/{id} -> getPermsUsersById 14:02:03 [] [] [] [] INFO RestRouting Adding route PUT /perms/users/{id} -> putPermsUsersById 14:02:03 [] [] [] [] INFO RestRouting Adding route DELETE /perms/users/{id}/permissions/{permissionname} -> deletePermsUsersPermissionsByIdAndPermissionname 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /perms/permissions -> getPermsPermissions 14:02:03 [] [] [] [] INFO RestRouting Adding route POST /perms/permissions -> postPermsPermissions 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /perms/users -> getPermsUsers 14:02:03 [] [] [] [] INFO RestRouting Adding route POST /perms/users -> postPermsUsers 14:02:03 [] [] [] [] INFO RestRouting Adding route GET /perms/users/{id}/permissions -> getPermsUsersPermissionsById 14:02:03 [] [] [] [] INFO RestRouting Adding route POST /perms/users/{id}/permissions -> postPermsUsersPermissionsById 14:02:03 [] [] [] [] INFO RestRouting Adding route POST /perms/purge-deprecated -> postPermsPurgeDeprecated 14:02:03 [] [] [] [] INFO RestRouting Looks like org.folio.rest.jaxrs.resource.Rmbtests is not implemented 14:02:03 [] [] [] [] INFO RestVerticle Listening port 59756 14:02:03 [] [] [] [] INFO RestVerticle No periodic implementation found, continuing with deployment 14:02:03 [] [] [] [] INFO RestVerticle No Post Deploy Hook implementation found, continuing with deployment 14:02:04 [] [] [] [] INFO RestRouting invoking postTenant 14:02:04 [] [] [] [] INFO LoadConfs File does not exist: /postgres-conf.json 14:02:04 [] [] [] [] INFO LoadConfs Resource does not exist: /postgres-conf.json 14:02:04 [] [] [] [] INFO PostgresClient No DB configuration found, setting username, password and database for testing 14:02:04 [] [] [] [] INFO PostgresClient Starting postgres tester 14:02:05 [] [] [] [] INFO PostgresClient postgreSQLClientConfig = {"postgres_tester":true,"username":"username","password":"...","database":"postgres","port":49346,"host":"localhost"} 14:02:05 [] [] [] [] INFO PostgresClient Executing multiple statements with id -966878371 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE ROLE diku_mod_permissions PASSWORD 'diku' NOSUPERUSER NOCREATEDB INHERIT LOGIN; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE ROLE diku_mod_permissions PASSWORD 'diku' NOSUPERUSER NOCREATEDB INHERIT LOGIN; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} GRANT diku_mod_permissions TO CURRENT_USER; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed GRANT diku_mod_permissions TO CURRENT_USER; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE SCHEMA diku_mod_permissions AUTHORIZATION diku_mod_permissions; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE SCHEMA diku_mod_permissions AUTHORIZATION diku_mod_permissions; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER ROLE diku_mod_permissions SET search_path = "$user"; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed ALTER ROLE diku_mod_permissions SET search_path = "$user"; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ BEGIN BEGIN -- This only succeeds if show_trgm, a pg_trgm function, -- has been loaded into public schema. PERFORM public.show_trgm('a'); EXCEPTION WHEN undefined_function THEN BEGIN ALTER EXTENSION pg_trgm SET SCHEMA public; EXCEPTION WHEN undefined_object THEN NULL; END; END; END $$; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $$ BEGIN BEGIN -- This only succeeds if show_trgm, a pg_trgm function, -- has been loaded into public schema. PERFORM public.show_trgm('a'); EXCEPTION WHEN undefined_function THEN BEGIN ALTER EXTENSION pg_trgm SET SCHEMA public; EXCEPTION WHEN undefined_object THEN NULL; END; END; END $$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE EXTENSION IF NOT EXISTS unaccent WITH SCHEMA public; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE EXTENSION IF NOT EXISTS unaccent WITH SCHEMA public; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE EXTENSION IF NOT EXISTS pg_trgm WITH SCHEMA public; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE EXTENSION IF NOT EXISTS pg_trgm WITH SCHEMA public; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal ( id SERIAL PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal ( id SERIAL PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} insert into diku_mod_permissions.rmb_internal (jsonb) values ('{"rmbVersion": "33.0.0-SNAPSHOT", "moduleVersion": "mod-permissions-1.0.0"}'::jsonb); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed insert into diku_mod_permissions.rmb_internal (jsonb) values ('{"rmbVersion": "33.0.0-SNAPSHOT", "moduleVersion": "mod-permissions-1.0.0"}'::jsonb); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_job ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_job ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:05 [] [] [] [] INFO LogUtil 127.0.0.1:55602 POST /_/tenant HTTP_1_1 201 270 1639 tid=diku Created 14:02:05 [] [] [] [] INFO PostgresClient Executing multiple statements with id -1611535702 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} SET search_path TO diku_mod_permissions; 14:02:05 [] [] [] [] INFO RestRouting invoking getTenantByOperationId 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed SET search_path TO diku_mod_permissions; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal_index ( name text PRIMARY KEY, def text NOT NULL, remove boolean NOT NULL ); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal_index ( name text PRIMARY KEY, def text NOT NULL, remove boolean NOT NULL ); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} UPDATE diku_mod_permissions.rmb_internal_index SET remove = TRUE; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed UPDATE diku_mod_permissions.rmb_internal_index SET remove = TRUE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS rmb_internal_analyze ( tablename text ); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS rmb_internal_analyze ( tablename text ); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_smaller(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 < $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_smaller(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 < $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_larger(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 > $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_larger(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 > $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.next_uuid(uuid) RETURNS uuid AS $$ DECLARE uuid text; digit text; BEGIN uuid = $1; FOR i IN REVERSE 36..1 LOOP digit := substring(uuid from i for 1); -- skip minus, version byte M and variant byte N CONTINUE WHEN digit = '-' OR i = 15 OR i = 20; CASE digit WHEN '0' THEN digit := '1'; WHEN '1' THEN digit := '2'; WHEN '2' THEN digit := '3'; WHEN '3' THEN digit := '4'; WHEN '4' THEN digit := '5'; WHEN '5' THEN digit := '6'; WHEN '6' THEN digit := '7'; WHEN '7' THEN digit := '8'; WHEN '8' THEN digit := '9'; WHEN '9' THEN digit := 'a'; WHEN 'a' THEN digit := 'b'; WHEN 'b' THEN digit := 'c'; WHEN 'c' THEN digit := 'd'; WHEN 'd' THEN digit := 'e'; WHEN 'e' THEN digit := 'f'; WHEN 'f' THEN digit := '0'; ELSE NULL; END CASE; uuid = overlay(uuid placing digit from i); EXIT WHEN digit <> '0'; END LOOP; RETURN uuid; END; $$ LANGUAGE plpgsql; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.next_uuid(uuid) RETURNS uuid AS $$ DECLARE uuid text; digit text; BEGIN uuid = $1; FOR i IN REVERSE 36..1 LOOP digit := substring(uuid from i for 1); -- skip minus, version byte M and variant byte N CONTINUE WHEN digit = '-' OR i = 15 OR i = 20; CASE digit WHEN '0' THEN digit := '1'; WHEN '1' THEN digit := '2'; WHEN '2' THEN digit := '3'; WHEN '3' THEN digit := '4'; WHEN '4' THEN digit := '5'; WHEN '5' THEN digit := '6'; WHEN '6' THEN digit := '7'; WHEN '7' THEN digit := '8'; WHEN '8' THEN digit := '9'; WHEN '9' THEN digit := 'a'; WHEN 'a' THEN digit := 'b'; WHEN 'b' THEN digit := 'c'; WHEN 'c' THEN digit := 'd'; WHEN 'd' THEN digit := 'e'; WHEN 'e' THEN digit := 'f'; WHEN 'f' THEN digit := '0'; ELSE NULL; END CASE; uuid = overlay(uuid placing digit from i); EXIT WHEN digit <> '0'; END LOOP; RETURN uuid; END; $$ LANGUAGE plpgsql; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE AGGREGATE diku_mod_permissions.max(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_larger, combinefunc = diku_mod_permissions.uuid_larger, parallel = safe, sortop = operator (>) ); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE AGGREGATE diku_mod_permissions.max(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_larger, combinefunc = diku_mod_permissions.uuid_larger, parallel = safe, sortop = operator (>) ); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE AGGREGATE diku_mod_permissions.min(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_smaller, combinefunc = diku_mod_permissions.uuid_smaller, parallel = safe, sortop = operator (<) ); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE AGGREGATE diku_mod_permissions.min(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_smaller, combinefunc = diku_mod_permissions.uuid_smaller, parallel = safe, sortop = operator (<) ); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.count_estimate_smart2(bigint,bigint,text); [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.count_estimate_smart2(pg_catalog.int8,pg_catalog.int8,text) does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.count_estimate_smart2(bigint,bigint,text); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE FUNCTION diku_mod_permissions.count_estimate_smart2(rows bigint, lim bigint, query text) RETURNS bigint AS $$ DECLARE rec record; cnt bigint; BEGIN IF rows = lim THEN FOR rec IN EXECUTE 'EXPLAIN ' || query LOOP cnt := substring(rec."QUERY PLAN" FROM ' rows=([[:digit:]]+)'); EXIT WHEN cnt IS NOT NULL; END LOOP; RETURN cnt; END IF; RETURN rows; END; $$ LANGUAGE plpgsql VOLATILE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE FUNCTION diku_mod_permissions.count_estimate_smart2(rows bigint, lim bigint, query text) RETURNS bigint AS $$ DECLARE rec record; cnt bigint; BEGIN IF rows = lim THEN FOR rec IN EXECUTE 'EXPLAIN ' || query LOOP cnt := substring(rec."QUERY PLAN" FROM ' rows=([[:digit:]]+)'); EXIT WHEN cnt IS NOT NULL; END LOOP; RETURN cnt; END IF; RETURN rows; END; $$ LANGUAGE plpgsql VOLATILE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate_default(query text) RETURNS bigint AS $$ DECLARE rows bigint; q text; BEGIN q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO rows; IF rows < 1000 THEN return rows; END IF; rows = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF rows < 1000 THEN return 1000; END IF; RETURN rows; END; $$ LANGUAGE plpgsql IMMUTABLE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate_default(query text) RETURNS bigint AS $$ DECLARE rows bigint; q text; BEGIN q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO rows; IF rows < 1000 THEN return rows; END IF; rows = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF rows < 1000 THEN return 1000; END IF; RETURN rows; END; $$ LANGUAGE plpgsql IMMUTABLE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate(query text) RETURNS bigint AS $$ DECLARE count bigint; est_count bigint; q text; BEGIN est_count = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF est_count > 4*1000 THEN RETURN est_count; END IF; q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO count; IF count < 1000 THEN RETURN count; END IF; IF est_count < 1000 THEN RETURN 1000; END IF; RETURN est_count; END; $$ LANGUAGE plpgsql STABLE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate(query text) RETURNS bigint AS $$ DECLARE count bigint; est_count bigint; q text; BEGIN est_count = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF est_count > 4*1000 THEN RETURN est_count; END IF; q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO count; IF count < 1000 THEN RETURN count; END IF; IF est_count < 1000 THEN RETURN 1000; END IF; RETURN est_count; END; $$ LANGUAGE plpgsql STABLE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.upsert(text, uuid, anyelement) RETURNS uuid AS $$ DECLARE ret uuid; BEGIN EXECUTE format('UPDATE diku_mod_permissions.%I SET jsonb=$3 WHERE id=$2 RETURNING id', $1) USING $1, $2, $3 INTO ret; IF ret IS NOT NULL THEN RETURN ret; END IF; EXECUTE format('INSERT INTO diku_mod_permissions.%I (id, jsonb) VALUES ($2, $3) RETURNING id', $1) USING $1, $2, $3 INTO STRICT ret; RETURN ret; END; $$ LANGUAGE plpgsql; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.upsert(text, uuid, anyelement) RETURNS uuid AS $$ DECLARE ret uuid; BEGIN EXECUTE format('UPDATE diku_mod_permissions.%I SET jsonb=$3 WHERE id=$2 RETURNING id', $1) USING $1, $2, $3 INTO ret; IF ret IS NOT NULL THEN RETURN ret; END IF; EXECUTE format('INSERT INTO diku_mod_permissions.%I (id, jsonb) VALUES ($2, $3) RETURNING id', $1) USING $1, $2, $3 INTO STRICT ret; RETURN ret; END; $$ LANGUAGE plpgsql; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE ver integer; BEGIN SELECT current_setting('server_version_num') INTO ver; IF (ver >= 120000) THEN CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT public.unaccent('public.unaccent', $1) -- schema-qualify function and dictionary $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; ELSE CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT regexp_replace(public.unaccent('public.unaccent', $1), E'[\u0300\u0301\u0302\u0303\u0304\u0305\u0306\u0307\u0308\u0309\u030a\u030b\u030c\u030d\u030e\u030f' || E'\u0310\u0311\u0312\u0313\u0314\u0315\u0316\u0317\u0318\u0319\u031a\u031b\u031c\u031d\u031e\u031f' || E'\u0320\u0321\u0322\u0323\u0324\u0325\u0326\u0327\u0328\u0329\u032a\u032b\u032c\u032d\u032e\u032f' || E'\u0330\u0331\u0332\u0333\u0334\u0335\u0336\u0337\u0338\u0339\u033a\u033b\u033c\u033d\u033e\u033f' || E'\u0340\u0341\u0342\u0343\u0344\u0345\u0346\u0347\u0348\u0349\u034a\u034b\u034c\u034d\u034e\u034f' || E'\u0350\u0351\u0352\u0353\u0354\u0355\u0356\u0357\u0358\u0359\u035a\u035b\u035c\u035d\u035e\u035f' || E'\u0360\u0361\u0362' || E'\u20dd\u20de\u20df\u20e0' || E'\u20e2\u20e3\u20e4]', '', 'g') $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; END IF; END $$; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE ver integer; BEGIN SELECT current_setting('server_version_num') INTO ver; IF (ver >= 120000) THEN CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT public.unaccent('public.unaccent', $1) -- schema-qualify function and dictionary $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; ELSE CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT regexp_replace(public.unaccent('public.unaccent', $1), E'[\u0300\u0301\u0302\u0303\u0304\u0305\u0306\u0307\u0308\u0309\u030a\u030b\u030c\u030d\u030e\u030f' || E'\u0310\u0311\u0312\u0313\u0314\u0315\u0316\u0317\u0318\u0319\u031a\u031b\u031c\u031d\u031e\u031f' || E'\u0320\u0321\u0322\u0323\u0324\u0325\u0326\u0327\u0328\u0329\u032a\u032b\u032c\u032d\u032e\u032f' || E'\u0330\u0331\u0332\u0333\u0334\u0335\u0336\u0337\u0338\u0339\u033a\u033b\u033c\u033d\u033e\u033f' || E'\u0340\u0341\u0342\u0343\u0344\u0345\u0346\u0347\u0348\u0349\u034a\u034b\u034c\u034d\u034e\u034f' || E'\u0350\u0351\u0352\u0353\u0354\u0355\u0356\u0357\u0358\u0359\u035a\u035b\u035c\u035d\u035e\u035f' || E'\u0360\u0361\u0362' || E'\u20dd\u20de\u20df\u20e0' || E'\u20e2\u20e3\u20e4]', '', 'g') $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; END IF; END $$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.get_tsvector(text) RETURNS tsvector AS $$ SELECT to_tsvector('simple', translate($1, '&', ',')); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.get_tsvector(text) RETURNS tsvector AS $$ SELECT to_tsvector('simple', translate($1, '&', ',')); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_and(text) RETURNS tsquery AS $$ SELECT to_tsquery('simple', string_agg(CASE WHEN length(v) = 0 OR v = '*' THEN '' WHEN right(v, 1) = '*' THEN '''' || left(v, -1) || ''':*' ELSE '''' || v || '''' END, '&')) FROM (SELECT regexp_split_to_table(translate($1, '&''', ',,'), ' +')) AS x(v); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_and(text) RETURNS tsquery AS $$ SELECT to_tsquery('simple', string_agg(CASE WHEN length(v) = 0 OR v = '*' THEN '' WHEN right(v, 1) = '*' THEN '''' || left(v, -1) || ''':*' ELSE '''' || v || '''' END, '&')) FROM (SELECT regexp_split_to_table(translate($1, '&''', ',,'), ' +')) AS x(v); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_or(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '|')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_or(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '|')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_phrase(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '<->')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_phrase(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '<->')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.normalize_digits(text) RETURNS text AS $$ SELECT translate((regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1], E' \t-', '') || CASE WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1] = '' THEN '' WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2] = '' THEN '' ELSE ' ' END || (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2]; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.normalize_digits(text) RETURNS text AS $$ SELECT translate((regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1], E' \t-', '') || CASE WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1] = '' THEN '' WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2] = '' THEN '' ELSE ' ' END || (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2]; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_id_in_jsonb() RETURNS TRIGGER AS $$ BEGIN NEW.jsonb = jsonb_set(NEW.jsonb, '{id}', to_jsonb(NEW.id)); RETURN NEW; END; $$ language 'plpgsql'; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_id_in_jsonb() RETURNS TRIGGER AS $$ BEGIN NEW.jsonb = jsonb_set(NEW.jsonb, '{id}', to_jsonb(NEW.id)); RETURN NEW; END; $$ language 'plpgsql'; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_space_sql(VARIADIC text[]) RETURNS text AS $$ select concat_ws(' ', VARIADIC $1); $$ LANGUAGE SQL IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_space_sql(VARIADIC text[]) RETURNS text AS $$ select concat_ws(' ', VARIADIC $1); $$ LANGUAGE SQL IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object_values(jsonb_array jsonb, field text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object_values(jsonb_array jsonb, field text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object_values( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1) WHERE value->>$3 = $4; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object_values( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1) WHERE value->>$3 = $4; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.first_array_object_value( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT value->>$2 FROM jsonb_array_elements($1) WHERE value->>$3 = $4 LIMIT 1; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.first_array_object_value( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT value->>$2 FROM jsonb_array_elements($1) WHERE value->>$3 = $4 LIMIT 1; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object(jsonb_array jsonb) RETURNS text AS $$ SELECT string_agg(value::text, ' ') FROM jsonb_array_elements_text($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object(jsonb_array jsonb) RETURNS text AS $$ SELECT string_agg(value::text, ' ') FROM jsonb_array_elements_text($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS rmb_internal_index(aname text, tops text, newdef text); [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function rmb_internal_index(text,text,text) does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS rmb_internal_index(aname text, tops text, newdef text); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION rmb_internal_index( atable text, aname text, tops text, newdef text) RETURNS void AS $$ DECLARE olddef text; namep CONSTANT text = concat(aname, '_p'); prepareddef text; BEGIN IF tops = 'DELETE' THEN -- use case insensitive %s, not case sensitive %I -- no SQL injection because the names are hard-coded in schema.json EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE 'DELETE FROM diku_mod_permissions.rmb_internal_index WHERE name = $1' USING aname; RETURN; END IF; SELECT def INTO olddef FROM diku_mod_permissions.rmb_internal_index WHERE name = aname; SELECT def INTO prepareddef FROM diku_mod_permissions.rmb_internal_index WHERE name = namep; prepareddef = replace(prepareddef, concat(' ', namep, ' ON '), concat(' ', aname, ' ON ')); IF prepareddef = newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE format('ALTER INDEX IF EXISTS %s RENAME TO %s', namep, aname); EXECUTE 'DELETE FROM rmb_internal_index WHERE name = $1' USING namep; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; ELSIF olddef IS DISTINCT FROM newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE newdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; END IF; EXECUTE 'INSERT INTO diku_mod_permissions.rmb_internal_index VALUES ($1, $2, FALSE) ' 'ON CONFLICT (name) DO UPDATE SET def = EXCLUDED.def, remove = EXCLUDED.remove' USING aname, newdef; END $$ LANGUAGE plpgsql; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION rmb_internal_index( atable text, aname text, tops text, newdef text) RETURNS void AS $$ DECLARE olddef text; namep CONSTANT text = concat(aname, '_p'); prepareddef text; BEGIN IF tops = 'DELETE' THEN -- use case insensitive %s, not case sensitive %I -- no SQL injection because the names are hard-coded in schema.json EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE 'DELETE FROM diku_mod_permissions.rmb_internal_index WHERE name = $1' USING aname; RETURN; END IF; SELECT def INTO olddef FROM diku_mod_permissions.rmb_internal_index WHERE name = aname; SELECT def INTO prepareddef FROM diku_mod_permissions.rmb_internal_index WHERE name = namep; prepareddef = replace(prepareddef, concat(' ', namep, ' ON '), concat(' ', aname, ' ON ')); IF prepareddef = newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE format('ALTER INDEX IF EXISTS %s RENAME TO %s', namep, aname); EXECUTE 'DELETE FROM rmb_internal_index WHERE name = $1' USING namep; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; ELSIF olddef IS DISTINCT FROM newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE newdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; END IF; EXECUTE 'INSERT INTO diku_mod_permissions.rmb_internal_index VALUES ($1, $2, FALSE) ' 'ON CONFLICT (name) DO UPDATE SET def = EXCLUDED.def, remove = EXCLUDED.remove' USING aname, newdef; END $$ LANGUAGE plpgsql; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ BEGIN -- use advisory lock to prevent "tuple concurrently updated" -- https://issues.folio.org/browse/RMB-744 PERFORM pg_advisory_xact_lock(20201101, 1234567890); REVOKE ALL PRIVILEGES ON SCHEMA public FROM diku_mod_permissions; REVOKE CREATE ON SCHEMA public FROM PUBLIC; END $$; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $$ BEGIN -- use advisory lock to prevent "tuple concurrently updated" -- https://issues.folio.org/browse/RMB-744 PERFORM pg_advisory_xact_lock(20201101, 1234567890); REVOKE ALL PRIVILEGES ON SCHEMA public FROM diku_mod_permissions; REVOKE CREATE ON SCHEMA public FROM PUBLIC; END $$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_injson_permissions ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_injson_permissions" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_injson_permissions ON diku_mod_permissions.permissions CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_in_jsonb" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER TABLE diku_mod_permissions.permissions ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed ALTER TABLE diku_mod_permissions.permissions ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ ); END $do$; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_permissionname_idx_unique" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_permissionName_idx_unique" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ ); END $do$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ ); END $do$; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_permissionname_idx_gin" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_permissionName_idx_gin" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ ); END $do$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS update_permissions_references ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "update_permissions_references" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS update_permissions_references ON diku_mod_permissions.permissions CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_references(); [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.update_permissions_references() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_references(); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_md_trigger ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_md_trigger" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_md_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_set_md(); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_set_md(); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_md_json_trigger ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_md_json_trigger" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_md_json_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_md_json(); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_md_json(); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_ol_version_trigger ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_ol_version_trigger" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_ol_version_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_set_ol_version() CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.permissions_set_ol_version() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_set_ol_version() CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions_users ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions_users ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_injson_permissions_users ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_injson_permissions_users" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_injson_permissions_users ON diku_mod_permissions.permissions_users CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_in_jsonb" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions_users CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER TABLE diku_mod_permissions.permissions_users ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed ALTER TABLE diku_mod_permissions.permissions_users ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ ); END $do$; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_users_id_idx" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_users_id_idx" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ ); END $do$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ ); END $do$; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_users_userid_idx" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_users_userId_idx" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ ); END $do$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ ); END $do$; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_users_userid_idx_gin" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_users_userId_idx_gin" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ ); END $do$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS update_permissions_users_references ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "update_permissions_users_references" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS update_permissions_users_references ON diku_mod_permissions.permissions_users CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_users_references(); [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.update_permissions_users_references() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_users_references(); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_users_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_users_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_md_trigger ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_users_md_trigger" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_md_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_users_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_users_set_md(); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_users_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_users_set_md(); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_users_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_users_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_md_json_trigger ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_users_md_json_trigger" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_md_json_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_users_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_users_md_json(); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_users_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_users_md_json(); 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_ol_version_trigger ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_users_ol_version_trigger" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_ol_version_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_users_set_ol_version() CASCADE; [Mon May 10 14:02:05 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.permissions_users_set_ol_version() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_users_set_ol_version() CASCADE; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE aname TEXT; BEGIN FOR aname IN SELECT name FROM diku_mod_permissions.rmb_internal_index WHERE remove = TRUE LOOP EXECUTE 'DROP INDEX IF EXISTS ' || aname; END LOOP; END $$; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE aname TEXT; BEGIN FOR aname IN SELECT name FROM diku_mod_permissions.rmb_internal_index WHERE remove = TRUE LOOP EXECUTE 'DROP INDEX IF EXISTS ' || aname; END LOOP; END $$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE version TEXT; i RECORD; newindexdef TEXT; BEGIN SELECT jsonb->>'rmbVersion' INTO version FROM diku_mod_permissions.rmb_internal; IF version !~ '^(\d\.|1\d\.|2[0-8]\.|29\.[0-3]\.)' THEN -- skip this upgrade if last install/upgrade was made by RMB >= 29.4.x RETURN; END IF; FOR i IN SELECT * FROM pg_catalog.pg_indexes WHERE schemaname = 'diku_mod_permissions' LOOP newindexdef := regexp_replace(i.indexdef, -- \m = beginning of a word, \M = end of a word '\mpublic\.(f_unaccent|concat_space_sql|concat_array_object_values|concat_array_object)\M', 'diku_mod_permissions.\1', 'g'); IF newindexdef <> i.indexdef THEN EXECUTE 'DROP INDEX ' || i.indexname; EXECUTE newindexdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING i.tablename; END IF; END LOOP; END $$; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE version TEXT; i RECORD; newindexdef TEXT; BEGIN SELECT jsonb->>'rmbVersion' INTO version FROM diku_mod_permissions.rmb_internal; IF version !~ '^(\d\.|1\d\.|2[0-8]\.|29\.[0-3]\.)' THEN -- skip this upgrade if last install/upgrade was made by RMB >= 29.4.x RETURN; END IF; FOR i IN SELECT * FROM pg_catalog.pg_indexes WHERE schemaname = 'diku_mod_permissions' LOOP newindexdef := regexp_replace(i.indexdef, -- \m = beginning of a word, \M = end of a word '\mpublic\.(f_unaccent|concat_space_sql|concat_array_object_values|concat_array_object)\M', 'diku_mod_permissions.\1', 'g'); IF newindexdef <> i.indexdef THEN EXECUTE 'DROP INDEX ' || i.indexname; EXECUTE newindexdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING i.tablename; END IF; END LOOP; END $$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE t TEXT; BEGIN FOR t IN SELECT DISTINCT tablename FROM rmb_internal_analyze LOOP EXECUTE 'ANALYZE ' || t; END LOOP; END $$; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE t TEXT; BEGIN FOR t IN SELECT DISTINCT tablename FROM rmb_internal_analyze LOOP EXECUTE 'ANALYZE ' || t; END LOOP; END $$; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} TRUNCATE rmb_internal_analyze; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed TRUNCATE rmb_internal_analyze; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA diku_mod_permissions TO diku_mod_permissions; 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA diku_mod_permissions TO diku_mod_permissions; 14:02:05 [] [] [] [] INFO PostgresClient trying to execute: {} UPDATE diku_mod_permissions.rmb_internal SET jsonb = jsonb || jsonb_build_object( 'rmbVersion', '33.0.0-SNAPSHOT', 'moduleVersion', 'mod-permissions-1.0.0', 'schemaJson', $mainftl${ "scripts" : [], "tables" : [ { "tableName" : "permissions", "fromModuleVersion" : "5.0", "withMetadata" : true, "uniqueIndex" : [ { "fieldName" : "permissionName", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "permissionName", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] }, { "tableName" : "permissions_users", "fromModuleVersion" : "5.0", "withMetadata" : true, "index" : [ { "fieldName" : "id", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false }, { "fieldName" : "userId", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "userId", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] } ], "views" : [] } $mainftl$); 14:02:05 [] [] [] [] INFO PostgresClient Successfully executed UPDATE diku_mod_permissions.rmb_internal SET jsonb = jsonb || jsonb_build_object( 'rmbVersion', '33.0.0-SNAPSHOT', 'moduleVersion', 'mod-permissions-1.0.0', 'schemaJson', $mainftl${ "scripts" : [], "tables" : [ { "tableName" : "permissions", "fromModuleVersion" : "5.0", "withMetadata" : true, "uniqueIndex" : [ { "fieldName" : "permissionName", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "permissionName", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] }, { "tableName" : "permissions_users", "fromModuleVersion" : "5.0", "withMetadata" : true, "index" : [ { "fieldName" : "id", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false }, { "fieldName" : "userId", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "userId", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] } ], "views" : [] } $mainftl$); 14:02:05 [] [] [] [] INFO LoadConfs File does not exist: /postgres-conf.json 14:02:05 [] [] [] [] INFO LoadConfs Resource does not exist: /postgres-conf.json 14:02:05 [] [] [] [] INFO PostgresClient No DB configuration found, setting username, password and database for testing 14:02:05 [] [] [] [] INFO PostgresClient Using schema: diku 14:02:05 [] [] [] [] INFO PostgresClient postgreSQLClientConfig = {"postgres_tester":true,"username":"diku_mod_permissions","password":"...","database":"postgres","port":49346,"host":"localhost"} 14:02:05 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'mutable') = 'false' >>>WHERE (jsonb->>'mutable') = 'false' 14:02:05 [] [] [] [] INFO TenantPermsAPI Successfully soft deleted 0 permissions 14:02:05 [] [] [] [] INFO TenantRefAPI Marked all system-defined permissions deprecated. 14:02:05 [] [] [] [] WARN TenantLoading TenantLoading.perform No X-Okapi-Url-to header 14:02:05 [] [] [] [] INFO TenantAPI job 2ee1bf3c-57ce-4466-8d0e-2558b2ade4c5 completed 14:02:05 [] [] [] [] INFO LogUtil 127.0.0.1:55602 GET /_/tenant/2ee1bf3c-57ce-4466-8d0e-2558b2ade4c5 wait=60000& HTTP_1_1 200 269 96 tid=diku OK 14:02:05 [] [] [] [] INFO LoadConfs File does not exist: /postgres-conf.json 14:02:05 [] [] [] [] INFO LoadConfs Resource does not exist: /postgres-conf.json 14:02:05 [] [] [] [] INFO PostgresClient No DB configuration found, setting username, password and database for testing 14:02:05 [] [] [] [] INFO PostgresClient Using schema: badTenant 14:02:05 [] [] [] [] INFO PostgresClient postgreSQLClientConfig = {"postgres_tester":true,"username":"badtenant_mod_permissions","password":"...","database":"postgres","port":49346,"host":"localhost"} 14:02:06 [] [] [] [] ERROR PostgresClient { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:06 [] [] [] [] ERROR TenantRefAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:06 [] [] [] [] ERROR TenantRefAPI null java.lang.NullPointerException: null at org.folio.rest.impl.TenantRefAPI.getSystemPerms(TenantRefAPI.java:76) ~[classes/:?] at org.folio.rest.impl.TenantRefAPITest.lambda$testGetSystemPermsNullContext$7(TenantRefAPITest.java:93) ~[test-classes/:?] at io.vertx.core.impl.future.FutureImpl$3.onSuccess(FutureImpl.java:124) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.Mapping.onSuccess(Mapping.java:40) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl$ListenerArray.onSuccess(FutureImpl.java:230) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.tryComplete(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.onSuccess(PromiseImpl.java:49) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.handle(PromiseImpl.java:41) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.sqlclient.impl.TransactionImpl.lambda$wrap$1(TransactionImpl.java:78) ~[vertx-sql-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.core.impl.future.FutureImpl$3.onSuccess(FutureImpl.java:124) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.lambda$emitSuccess$0(FutureBase.java:54) ~[vertx-core-4.0.2.jar:4.0.2] at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:164) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:500) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:06 [] [] [] [] INFO RestVerticle No shutdown hook implementation found, continuing with shutdown [INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.821 s - in org.folio.rest.impl.TenantRefAPITest [INFO] Running org.folio.permstest.RestVerticleTest 14:02:06 [] [] [] [] INFO PostgresClient Stopping postgres tester 14:02:07 [] [] [] [] INFO RestVerticle git: git@github.com:folio-org/raml-module-builder.git b776a3b570c74f8f0bcce5d19d502928c3bf7948 14:02:07 [] [] [] [] INFO RestVerticle metrics enabled: false 14:02:07 [] [] [] [] INFO RestRouting Adding route DELETE /_/tenant/{operation_id} -> deleteTenantByOperationId 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /_/tenant/{operation_id} -> getTenantByOperationId 14:02:07 [] [] [] [] INFO RestRouting Adding route POST /_/tenant -> postTenant 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /_/jsonSchemas -> getJsonSchemas 14:02:07 [] [] [] [] INFO RestRouting Adding route POST /_/tenantpermissions -> postTenantpermissions 14:02:07 [] [] [] [] INFO RestRouting Adding route DELETE /admin/kill_query -> deleteAdminKillQuery 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/cache_hit_rates -> getAdminCacheHitRates 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/db_cache_summary -> getAdminDbCacheSummary 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/health -> getAdminHealth 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/jstack -> getAdminJstack 14:02:07 [] [] [] [] INFO RestRouting Adding route PUT /admin/jstack -> putAdminJstack 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/list_locking_queries -> getAdminListLockingQueries 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/loglevel -> getAdminLoglevel 14:02:07 [] [] [] [] INFO RestRouting Adding route PUT /admin/loglevel -> putAdminLoglevel 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/memory -> getAdminMemory 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_active_sessions -> getAdminPostgresActiveSessions 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_load -> getAdminPostgresLoad 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_table_access_stats -> getAdminPostgresTableAccessStats 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_table_size -> getAdminPostgresTableSize 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/slow_queries -> getAdminSlowQueries 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/table_index_usage -> getAdminTableIndexUsage 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /admin/total_db_size -> getAdminTotalDbSize 14:02:07 [] [] [] [] INFO RestRouting Adding route POST /admin/get_password -> postAdminGetPassword 14:02:07 [] [] [] [] INFO RestRouting Adding route POST /admin/importSQL -> postAdminImportSQL 14:02:07 [] [] [] [] INFO RestRouting Adding route POST /admin/postgres_maintenance -> postAdminPostgresMaintenance 14:02:07 [] [] [] [] INFO RestRouting Adding route POST /admin/set_AES_key -> postAdminSetAESKey 14:02:07 [] [] [] [] INFO RestRouting Adding route PUT /admin/postgres_create_indexes -> putAdminPostgresCreateIndexes 14:02:07 [] [] [] [] INFO RestRouting Adding route PUT /admin/postgres_drop_indexes -> putAdminPostgresDropIndexes 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /_/ramls -> getRamls 14:02:07 [] [] [] [] INFO RestRouting Adding route DELETE /perms/permissions/{id} -> deletePermsPermissionsById 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /perms/permissions/{id} -> getPermsPermissionsById 14:02:07 [] [] [] [] INFO RestRouting Adding route PUT /perms/permissions/{id} -> putPermsPermissionsById 14:02:07 [] [] [] [] INFO RestRouting Adding route DELETE /perms/users/{id} -> deletePermsUsersById 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /perms/users/{id} -> getPermsUsersById 14:02:07 [] [] [] [] INFO RestRouting Adding route PUT /perms/users/{id} -> putPermsUsersById 14:02:07 [] [] [] [] INFO RestRouting Adding route DELETE /perms/users/{id}/permissions/{permissionname} -> deletePermsUsersPermissionsByIdAndPermissionname 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /perms/permissions -> getPermsPermissions 14:02:07 [] [] [] [] INFO RestRouting Adding route POST /perms/permissions -> postPermsPermissions 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /perms/users -> getPermsUsers 14:02:07 [] [] [] [] INFO RestRouting Adding route POST /perms/users -> postPermsUsers 14:02:07 [] [] [] [] INFO RestRouting Adding route GET /perms/users/{id}/permissions -> getPermsUsersPermissionsById 14:02:07 [] [] [] [] INFO RestRouting Adding route POST /perms/users/{id}/permissions -> postPermsUsersPermissionsById 14:02:07 [] [] [] [] INFO RestRouting Adding route POST /perms/purge-deprecated -> postPermsPurgeDeprecated 14:02:07 [] [] [] [] INFO RestRouting Looks like org.folio.rest.jaxrs.resource.Rmbtests is not implemented 14:02:07 [] [] [] [] INFO RestVerticle Listening port 58567 14:02:07 [] [] [] [] INFO RestVerticle No periodic implementation found, continuing with deployment 14:02:07 [] [] [] [] INFO RestVerticle No Post Deploy Hook implementation found, continuing with deployment 14:02:07 [] [] [] [] INFO RestRouting invoking postTenant 14:02:07 [] [] [] [] INFO LoadConfs File does not exist: /postgres-conf.json 14:02:07 [] [] [] [] INFO LoadConfs Resource does not exist: /postgres-conf.json 14:02:07 [] [] [] [] INFO PostgresClient No DB configuration found, setting username, password and database for testing 14:02:07 [] [] [] [] INFO PostgresClient Starting postgres tester 14:02:08 [] [] [] [] INFO PostgresClient postgreSQLClientConfig = {"postgres_tester":true,"username":"username","password":"...","database":"postgres","port":49347,"host":"localhost"} 14:02:08 [] [] [] [] INFO PostgresClient Executing multiple statements with id -966878371 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE ROLE diku_mod_permissions PASSWORD 'diku' NOSUPERUSER NOCREATEDB INHERIT LOGIN; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE ROLE diku_mod_permissions PASSWORD 'diku' NOSUPERUSER NOCREATEDB INHERIT LOGIN; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} GRANT diku_mod_permissions TO CURRENT_USER; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed GRANT diku_mod_permissions TO CURRENT_USER; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE SCHEMA diku_mod_permissions AUTHORIZATION diku_mod_permissions; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE SCHEMA diku_mod_permissions AUTHORIZATION diku_mod_permissions; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER ROLE diku_mod_permissions SET search_path = "$user"; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed ALTER ROLE diku_mod_permissions SET search_path = "$user"; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ BEGIN BEGIN -- This only succeeds if show_trgm, a pg_trgm function, -- has been loaded into public schema. PERFORM public.show_trgm('a'); EXCEPTION WHEN undefined_function THEN BEGIN ALTER EXTENSION pg_trgm SET SCHEMA public; EXCEPTION WHEN undefined_object THEN NULL; END; END; END $$; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $$ BEGIN BEGIN -- This only succeeds if show_trgm, a pg_trgm function, -- has been loaded into public schema. PERFORM public.show_trgm('a'); EXCEPTION WHEN undefined_function THEN BEGIN ALTER EXTENSION pg_trgm SET SCHEMA public; EXCEPTION WHEN undefined_object THEN NULL; END; END; END $$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE EXTENSION IF NOT EXISTS unaccent WITH SCHEMA public; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE EXTENSION IF NOT EXISTS unaccent WITH SCHEMA public; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE EXTENSION IF NOT EXISTS pg_trgm WITH SCHEMA public; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE EXTENSION IF NOT EXISTS pg_trgm WITH SCHEMA public; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal ( id SERIAL PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal ( id SERIAL PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} insert into diku_mod_permissions.rmb_internal (jsonb) values ('{"rmbVersion": "33.0.0-SNAPSHOT", "moduleVersion": "mod-permissions-1.0.0"}'::jsonb); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed insert into diku_mod_permissions.rmb_internal (jsonb) values ('{"rmbVersion": "33.0.0-SNAPSHOT", "moduleVersion": "mod-permissions-1.0.0"}'::jsonb); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_job ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_job ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41348 POST /_/tenant HTTP_1_1 201 269 1372 tid=diku Created 14:02:08 [] [] [] [] INFO PostgresClient Executing multiple statements with id -1611535702 14:02:08 [] [] [] [] INFO RestRouting invoking getTenantByOperationId 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} SET search_path TO diku_mod_permissions; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed SET search_path TO diku_mod_permissions; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal_index ( name text PRIMARY KEY, def text NOT NULL, remove boolean NOT NULL ); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal_index ( name text PRIMARY KEY, def text NOT NULL, remove boolean NOT NULL ); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} UPDATE diku_mod_permissions.rmb_internal_index SET remove = TRUE; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed UPDATE diku_mod_permissions.rmb_internal_index SET remove = TRUE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS rmb_internal_analyze ( tablename text ); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS rmb_internal_analyze ( tablename text ); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_smaller(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 < $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_smaller(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 < $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_larger(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 > $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_larger(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 > $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.next_uuid(uuid) RETURNS uuid AS $$ DECLARE uuid text; digit text; BEGIN uuid = $1; FOR i IN REVERSE 36..1 LOOP digit := substring(uuid from i for 1); -- skip minus, version byte M and variant byte N CONTINUE WHEN digit = '-' OR i = 15 OR i = 20; CASE digit WHEN '0' THEN digit := '1'; WHEN '1' THEN digit := '2'; WHEN '2' THEN digit := '3'; WHEN '3' THEN digit := '4'; WHEN '4' THEN digit := '5'; WHEN '5' THEN digit := '6'; WHEN '6' THEN digit := '7'; WHEN '7' THEN digit := '8'; WHEN '8' THEN digit := '9'; WHEN '9' THEN digit := 'a'; WHEN 'a' THEN digit := 'b'; WHEN 'b' THEN digit := 'c'; WHEN 'c' THEN digit := 'd'; WHEN 'd' THEN digit := 'e'; WHEN 'e' THEN digit := 'f'; WHEN 'f' THEN digit := '0'; ELSE NULL; END CASE; uuid = overlay(uuid placing digit from i); EXIT WHEN digit <> '0'; END LOOP; RETURN uuid; END; $$ LANGUAGE plpgsql; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.next_uuid(uuid) RETURNS uuid AS $$ DECLARE uuid text; digit text; BEGIN uuid = $1; FOR i IN REVERSE 36..1 LOOP digit := substring(uuid from i for 1); -- skip minus, version byte M and variant byte N CONTINUE WHEN digit = '-' OR i = 15 OR i = 20; CASE digit WHEN '0' THEN digit := '1'; WHEN '1' THEN digit := '2'; WHEN '2' THEN digit := '3'; WHEN '3' THEN digit := '4'; WHEN '4' THEN digit := '5'; WHEN '5' THEN digit := '6'; WHEN '6' THEN digit := '7'; WHEN '7' THEN digit := '8'; WHEN '8' THEN digit := '9'; WHEN '9' THEN digit := 'a'; WHEN 'a' THEN digit := 'b'; WHEN 'b' THEN digit := 'c'; WHEN 'c' THEN digit := 'd'; WHEN 'd' THEN digit := 'e'; WHEN 'e' THEN digit := 'f'; WHEN 'f' THEN digit := '0'; ELSE NULL; END CASE; uuid = overlay(uuid placing digit from i); EXIT WHEN digit <> '0'; END LOOP; RETURN uuid; END; $$ LANGUAGE plpgsql; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE AGGREGATE diku_mod_permissions.max(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_larger, combinefunc = diku_mod_permissions.uuid_larger, parallel = safe, sortop = operator (>) ); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE AGGREGATE diku_mod_permissions.max(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_larger, combinefunc = diku_mod_permissions.uuid_larger, parallel = safe, sortop = operator (>) ); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE AGGREGATE diku_mod_permissions.min(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_smaller, combinefunc = diku_mod_permissions.uuid_smaller, parallel = safe, sortop = operator (<) ); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE AGGREGATE diku_mod_permissions.min(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_smaller, combinefunc = diku_mod_permissions.uuid_smaller, parallel = safe, sortop = operator (<) ); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.count_estimate_smart2(bigint,bigint,text); [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.count_estimate_smart2(pg_catalog.int8,pg_catalog.int8,text) does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.count_estimate_smart2(bigint,bigint,text); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE FUNCTION diku_mod_permissions.count_estimate_smart2(rows bigint, lim bigint, query text) RETURNS bigint AS $$ DECLARE rec record; cnt bigint; BEGIN IF rows = lim THEN FOR rec IN EXECUTE 'EXPLAIN ' || query LOOP cnt := substring(rec."QUERY PLAN" FROM ' rows=([[:digit:]]+)'); EXIT WHEN cnt IS NOT NULL; END LOOP; RETURN cnt; END IF; RETURN rows; END; $$ LANGUAGE plpgsql VOLATILE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE FUNCTION diku_mod_permissions.count_estimate_smart2(rows bigint, lim bigint, query text) RETURNS bigint AS $$ DECLARE rec record; cnt bigint; BEGIN IF rows = lim THEN FOR rec IN EXECUTE 'EXPLAIN ' || query LOOP cnt := substring(rec."QUERY PLAN" FROM ' rows=([[:digit:]]+)'); EXIT WHEN cnt IS NOT NULL; END LOOP; RETURN cnt; END IF; RETURN rows; END; $$ LANGUAGE plpgsql VOLATILE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate_default(query text) RETURNS bigint AS $$ DECLARE rows bigint; q text; BEGIN q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO rows; IF rows < 1000 THEN return rows; END IF; rows = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF rows < 1000 THEN return 1000; END IF; RETURN rows; END; $$ LANGUAGE plpgsql IMMUTABLE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate_default(query text) RETURNS bigint AS $$ DECLARE rows bigint; q text; BEGIN q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO rows; IF rows < 1000 THEN return rows; END IF; rows = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF rows < 1000 THEN return 1000; END IF; RETURN rows; END; $$ LANGUAGE plpgsql IMMUTABLE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate(query text) RETURNS bigint AS $$ DECLARE count bigint; est_count bigint; q text; BEGIN est_count = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF est_count > 4*1000 THEN RETURN est_count; END IF; q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO count; IF count < 1000 THEN RETURN count; END IF; IF est_count < 1000 THEN RETURN 1000; END IF; RETURN est_count; END; $$ LANGUAGE plpgsql STABLE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate(query text) RETURNS bigint AS $$ DECLARE count bigint; est_count bigint; q text; BEGIN est_count = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF est_count > 4*1000 THEN RETURN est_count; END IF; q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO count; IF count < 1000 THEN RETURN count; END IF; IF est_count < 1000 THEN RETURN 1000; END IF; RETURN est_count; END; $$ LANGUAGE plpgsql STABLE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.upsert(text, uuid, anyelement) RETURNS uuid AS $$ DECLARE ret uuid; BEGIN EXECUTE format('UPDATE diku_mod_permissions.%I SET jsonb=$3 WHERE id=$2 RETURNING id', $1) USING $1, $2, $3 INTO ret; IF ret IS NOT NULL THEN RETURN ret; END IF; EXECUTE format('INSERT INTO diku_mod_permissions.%I (id, jsonb) VALUES ($2, $3) RETURNING id', $1) USING $1, $2, $3 INTO STRICT ret; RETURN ret; END; $$ LANGUAGE plpgsql; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.upsert(text, uuid, anyelement) RETURNS uuid AS $$ DECLARE ret uuid; BEGIN EXECUTE format('UPDATE diku_mod_permissions.%I SET jsonb=$3 WHERE id=$2 RETURNING id', $1) USING $1, $2, $3 INTO ret; IF ret IS NOT NULL THEN RETURN ret; END IF; EXECUTE format('INSERT INTO diku_mod_permissions.%I (id, jsonb) VALUES ($2, $3) RETURNING id', $1) USING $1, $2, $3 INTO STRICT ret; RETURN ret; END; $$ LANGUAGE plpgsql; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE ver integer; BEGIN SELECT current_setting('server_version_num') INTO ver; IF (ver >= 120000) THEN CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT public.unaccent('public.unaccent', $1) -- schema-qualify function and dictionary $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; ELSE CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT regexp_replace(public.unaccent('public.unaccent', $1), E'[\u0300\u0301\u0302\u0303\u0304\u0305\u0306\u0307\u0308\u0309\u030a\u030b\u030c\u030d\u030e\u030f' || E'\u0310\u0311\u0312\u0313\u0314\u0315\u0316\u0317\u0318\u0319\u031a\u031b\u031c\u031d\u031e\u031f' || E'\u0320\u0321\u0322\u0323\u0324\u0325\u0326\u0327\u0328\u0329\u032a\u032b\u032c\u032d\u032e\u032f' || E'\u0330\u0331\u0332\u0333\u0334\u0335\u0336\u0337\u0338\u0339\u033a\u033b\u033c\u033d\u033e\u033f' || E'\u0340\u0341\u0342\u0343\u0344\u0345\u0346\u0347\u0348\u0349\u034a\u034b\u034c\u034d\u034e\u034f' || E'\u0350\u0351\u0352\u0353\u0354\u0355\u0356\u0357\u0358\u0359\u035a\u035b\u035c\u035d\u035e\u035f' || E'\u0360\u0361\u0362' || E'\u20dd\u20de\u20df\u20e0' || E'\u20e2\u20e3\u20e4]', '', 'g') $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; END IF; END $$; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE ver integer; BEGIN SELECT current_setting('server_version_num') INTO ver; IF (ver >= 120000) THEN CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT public.unaccent('public.unaccent', $1) -- schema-qualify function and dictionary $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; ELSE CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT regexp_replace(public.unaccent('public.unaccent', $1), E'[\u0300\u0301\u0302\u0303\u0304\u0305\u0306\u0307\u0308\u0309\u030a\u030b\u030c\u030d\u030e\u030f' || E'\u0310\u0311\u0312\u0313\u0314\u0315\u0316\u0317\u0318\u0319\u031a\u031b\u031c\u031d\u031e\u031f' || E'\u0320\u0321\u0322\u0323\u0324\u0325\u0326\u0327\u0328\u0329\u032a\u032b\u032c\u032d\u032e\u032f' || E'\u0330\u0331\u0332\u0333\u0334\u0335\u0336\u0337\u0338\u0339\u033a\u033b\u033c\u033d\u033e\u033f' || E'\u0340\u0341\u0342\u0343\u0344\u0345\u0346\u0347\u0348\u0349\u034a\u034b\u034c\u034d\u034e\u034f' || E'\u0350\u0351\u0352\u0353\u0354\u0355\u0356\u0357\u0358\u0359\u035a\u035b\u035c\u035d\u035e\u035f' || E'\u0360\u0361\u0362' || E'\u20dd\u20de\u20df\u20e0' || E'\u20e2\u20e3\u20e4]', '', 'g') $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; END IF; END $$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.get_tsvector(text) RETURNS tsvector AS $$ SELECT to_tsvector('simple', translate($1, '&', ',')); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.get_tsvector(text) RETURNS tsvector AS $$ SELECT to_tsvector('simple', translate($1, '&', ',')); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_and(text) RETURNS tsquery AS $$ SELECT to_tsquery('simple', string_agg(CASE WHEN length(v) = 0 OR v = '*' THEN '' WHEN right(v, 1) = '*' THEN '''' || left(v, -1) || ''':*' ELSE '''' || v || '''' END, '&')) FROM (SELECT regexp_split_to_table(translate($1, '&''', ',,'), ' +')) AS x(v); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_and(text) RETURNS tsquery AS $$ SELECT to_tsquery('simple', string_agg(CASE WHEN length(v) = 0 OR v = '*' THEN '' WHEN right(v, 1) = '*' THEN '''' || left(v, -1) || ''':*' ELSE '''' || v || '''' END, '&')) FROM (SELECT regexp_split_to_table(translate($1, '&''', ',,'), ' +')) AS x(v); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_or(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '|')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_or(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '|')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_phrase(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '<->')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_phrase(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '<->')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.normalize_digits(text) RETURNS text AS $$ SELECT translate((regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1], E' \t-', '') || CASE WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1] = '' THEN '' WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2] = '' THEN '' ELSE ' ' END || (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2]; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.normalize_digits(text) RETURNS text AS $$ SELECT translate((regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1], E' \t-', '') || CASE WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1] = '' THEN '' WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2] = '' THEN '' ELSE ' ' END || (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2]; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_id_in_jsonb() RETURNS TRIGGER AS $$ BEGIN NEW.jsonb = jsonb_set(NEW.jsonb, '{id}', to_jsonb(NEW.id)); RETURN NEW; END; $$ language 'plpgsql'; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_id_in_jsonb() RETURNS TRIGGER AS $$ BEGIN NEW.jsonb = jsonb_set(NEW.jsonb, '{id}', to_jsonb(NEW.id)); RETURN NEW; END; $$ language 'plpgsql'; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_space_sql(VARIADIC text[]) RETURNS text AS $$ select concat_ws(' ', VARIADIC $1); $$ LANGUAGE SQL IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_space_sql(VARIADIC text[]) RETURNS text AS $$ select concat_ws(' ', VARIADIC $1); $$ LANGUAGE SQL IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object_values(jsonb_array jsonb, field text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object_values(jsonb_array jsonb, field text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object_values( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1) WHERE value->>$3 = $4; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object_values( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1) WHERE value->>$3 = $4; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.first_array_object_value( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT value->>$2 FROM jsonb_array_elements($1) WHERE value->>$3 = $4 LIMIT 1; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.first_array_object_value( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT value->>$2 FROM jsonb_array_elements($1) WHERE value->>$3 = $4 LIMIT 1; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object(jsonb_array jsonb) RETURNS text AS $$ SELECT string_agg(value::text, ' ') FROM jsonb_array_elements_text($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object(jsonb_array jsonb) RETURNS text AS $$ SELECT string_agg(value::text, ' ') FROM jsonb_array_elements_text($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS rmb_internal_index(aname text, tops text, newdef text); [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function rmb_internal_index(text,text,text) does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS rmb_internal_index(aname text, tops text, newdef text); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION rmb_internal_index( atable text, aname text, tops text, newdef text) RETURNS void AS $$ DECLARE olddef text; namep CONSTANT text = concat(aname, '_p'); prepareddef text; BEGIN IF tops = 'DELETE' THEN -- use case insensitive %s, not case sensitive %I -- no SQL injection because the names are hard-coded in schema.json EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE 'DELETE FROM diku_mod_permissions.rmb_internal_index WHERE name = $1' USING aname; RETURN; END IF; SELECT def INTO olddef FROM diku_mod_permissions.rmb_internal_index WHERE name = aname; SELECT def INTO prepareddef FROM diku_mod_permissions.rmb_internal_index WHERE name = namep; prepareddef = replace(prepareddef, concat(' ', namep, ' ON '), concat(' ', aname, ' ON ')); IF prepareddef = newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE format('ALTER INDEX IF EXISTS %s RENAME TO %s', namep, aname); EXECUTE 'DELETE FROM rmb_internal_index WHERE name = $1' USING namep; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; ELSIF olddef IS DISTINCT FROM newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE newdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; END IF; EXECUTE 'INSERT INTO diku_mod_permissions.rmb_internal_index VALUES ($1, $2, FALSE) ' 'ON CONFLICT (name) DO UPDATE SET def = EXCLUDED.def, remove = EXCLUDED.remove' USING aname, newdef; END $$ LANGUAGE plpgsql; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION rmb_internal_index( atable text, aname text, tops text, newdef text) RETURNS void AS $$ DECLARE olddef text; namep CONSTANT text = concat(aname, '_p'); prepareddef text; BEGIN IF tops = 'DELETE' THEN -- use case insensitive %s, not case sensitive %I -- no SQL injection because the names are hard-coded in schema.json EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE 'DELETE FROM diku_mod_permissions.rmb_internal_index WHERE name = $1' USING aname; RETURN; END IF; SELECT def INTO olddef FROM diku_mod_permissions.rmb_internal_index WHERE name = aname; SELECT def INTO prepareddef FROM diku_mod_permissions.rmb_internal_index WHERE name = namep; prepareddef = replace(prepareddef, concat(' ', namep, ' ON '), concat(' ', aname, ' ON ')); IF prepareddef = newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE format('ALTER INDEX IF EXISTS %s RENAME TO %s', namep, aname); EXECUTE 'DELETE FROM rmb_internal_index WHERE name = $1' USING namep; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; ELSIF olddef IS DISTINCT FROM newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE newdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; END IF; EXECUTE 'INSERT INTO diku_mod_permissions.rmb_internal_index VALUES ($1, $2, FALSE) ' 'ON CONFLICT (name) DO UPDATE SET def = EXCLUDED.def, remove = EXCLUDED.remove' USING aname, newdef; END $$ LANGUAGE plpgsql; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ BEGIN -- use advisory lock to prevent "tuple concurrently updated" -- https://issues.folio.org/browse/RMB-744 PERFORM pg_advisory_xact_lock(20201101, 1234567890); REVOKE ALL PRIVILEGES ON SCHEMA public FROM diku_mod_permissions; REVOKE CREATE ON SCHEMA public FROM PUBLIC; END $$; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $$ BEGIN -- use advisory lock to prevent "tuple concurrently updated" -- https://issues.folio.org/browse/RMB-744 PERFORM pg_advisory_xact_lock(20201101, 1234567890); REVOKE ALL PRIVILEGES ON SCHEMA public FROM diku_mod_permissions; REVOKE CREATE ON SCHEMA public FROM PUBLIC; END $$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_injson_permissions ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_injson_permissions" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_injson_permissions ON diku_mod_permissions.permissions CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_in_jsonb" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER TABLE diku_mod_permissions.permissions ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed ALTER TABLE diku_mod_permissions.permissions ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ ); END $do$; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_permissionname_idx_unique" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_permissionName_idx_unique" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ ); END $do$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ ); END $do$; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_permissionname_idx_gin" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_permissionName_idx_gin" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ ); END $do$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS update_permissions_references ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "update_permissions_references" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS update_permissions_references ON diku_mod_permissions.permissions CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_references(); [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.update_permissions_references() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_references(); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_md_trigger ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_md_trigger" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_md_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_set_md(); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_set_md(); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_md_json_trigger ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_md_json_trigger" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_md_json_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_md_json(); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_md_json(); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_ol_version_trigger ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_ol_version_trigger" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_ol_version_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_set_ol_version() CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.permissions_set_ol_version() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_set_ol_version() CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions_users ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions_users ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_injson_permissions_users ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_injson_permissions_users" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_injson_permissions_users ON diku_mod_permissions.permissions_users CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_in_jsonb" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions_users CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER TABLE diku_mod_permissions.permissions_users ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed ALTER TABLE diku_mod_permissions.permissions_users ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ ); END $do$; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_users_id_idx" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_users_id_idx" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ ); END $do$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ ); END $do$; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_users_userid_idx" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_users_userId_idx" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ ); END $do$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ ); END $do$; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_users_userid_idx_gin" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_users_userId_idx_gin" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ ); END $do$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS update_permissions_users_references ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "update_permissions_users_references" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS update_permissions_users_references ON diku_mod_permissions.permissions_users CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_users_references(); [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.update_permissions_users_references() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_users_references(); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_users_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_users_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_md_trigger ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_users_md_trigger" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_md_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_users_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_users_set_md(); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_users_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_users_set_md(); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_users_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_users_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_md_json_trigger ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_users_md_json_trigger" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_md_json_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_users_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_users_md_json(); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_users_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_users_md_json(); 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_ol_version_trigger ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_users_ol_version_trigger" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_ol_version_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_users_set_ol_version() CASCADE; [Mon May 10 14:02:08 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.permissions_users_set_ol_version() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_users_set_ol_version() CASCADE; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE aname TEXT; BEGIN FOR aname IN SELECT name FROM diku_mod_permissions.rmb_internal_index WHERE remove = TRUE LOOP EXECUTE 'DROP INDEX IF EXISTS ' || aname; END LOOP; END $$; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE aname TEXT; BEGIN FOR aname IN SELECT name FROM diku_mod_permissions.rmb_internal_index WHERE remove = TRUE LOOP EXECUTE 'DROP INDEX IF EXISTS ' || aname; END LOOP; END $$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE version TEXT; i RECORD; newindexdef TEXT; BEGIN SELECT jsonb->>'rmbVersion' INTO version FROM diku_mod_permissions.rmb_internal; IF version !~ '^(\d\.|1\d\.|2[0-8]\.|29\.[0-3]\.)' THEN -- skip this upgrade if last install/upgrade was made by RMB >= 29.4.x RETURN; END IF; FOR i IN SELECT * FROM pg_catalog.pg_indexes WHERE schemaname = 'diku_mod_permissions' LOOP newindexdef := regexp_replace(i.indexdef, -- \m = beginning of a word, \M = end of a word '\mpublic\.(f_unaccent|concat_space_sql|concat_array_object_values|concat_array_object)\M', 'diku_mod_permissions.\1', 'g'); IF newindexdef <> i.indexdef THEN EXECUTE 'DROP INDEX ' || i.indexname; EXECUTE newindexdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING i.tablename; END IF; END LOOP; END $$; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE version TEXT; i RECORD; newindexdef TEXT; BEGIN SELECT jsonb->>'rmbVersion' INTO version FROM diku_mod_permissions.rmb_internal; IF version !~ '^(\d\.|1\d\.|2[0-8]\.|29\.[0-3]\.)' THEN -- skip this upgrade if last install/upgrade was made by RMB >= 29.4.x RETURN; END IF; FOR i IN SELECT * FROM pg_catalog.pg_indexes WHERE schemaname = 'diku_mod_permissions' LOOP newindexdef := regexp_replace(i.indexdef, -- \m = beginning of a word, \M = end of a word '\mpublic\.(f_unaccent|concat_space_sql|concat_array_object_values|concat_array_object)\M', 'diku_mod_permissions.\1', 'g'); IF newindexdef <> i.indexdef THEN EXECUTE 'DROP INDEX ' || i.indexname; EXECUTE newindexdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING i.tablename; END IF; END LOOP; END $$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE t TEXT; BEGIN FOR t IN SELECT DISTINCT tablename FROM rmb_internal_analyze LOOP EXECUTE 'ANALYZE ' || t; END LOOP; END $$; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE t TEXT; BEGIN FOR t IN SELECT DISTINCT tablename FROM rmb_internal_analyze LOOP EXECUTE 'ANALYZE ' || t; END LOOP; END $$; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} TRUNCATE rmb_internal_analyze; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed TRUNCATE rmb_internal_analyze; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA diku_mod_permissions TO diku_mod_permissions; 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA diku_mod_permissions TO diku_mod_permissions; 14:02:08 [] [] [] [] INFO PostgresClient trying to execute: {} UPDATE diku_mod_permissions.rmb_internal SET jsonb = jsonb || jsonb_build_object( 'rmbVersion', '33.0.0-SNAPSHOT', 'moduleVersion', 'mod-permissions-1.0.0', 'schemaJson', $mainftl${ "scripts" : [], "tables" : [ { "tableName" : "permissions", "fromModuleVersion" : "5.0", "withMetadata" : true, "uniqueIndex" : [ { "fieldName" : "permissionName", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "permissionName", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] }, { "tableName" : "permissions_users", "fromModuleVersion" : "5.0", "withMetadata" : true, "index" : [ { "fieldName" : "id", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false }, { "fieldName" : "userId", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "userId", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] } ], "views" : [] } $mainftl$); 14:02:08 [] [] [] [] INFO PostgresClient Successfully executed UPDATE diku_mod_permissions.rmb_internal SET jsonb = jsonb || jsonb_build_object( 'rmbVersion', '33.0.0-SNAPSHOT', 'moduleVersion', 'mod-permissions-1.0.0', 'schemaJson', $mainftl${ "scripts" : [], "tables" : [ { "tableName" : "permissions", "fromModuleVersion" : "5.0", "withMetadata" : true, "uniqueIndex" : [ { "fieldName" : "permissionName", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "permissionName", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] }, { "tableName" : "permissions_users", "fromModuleVersion" : "5.0", "withMetadata" : true, "index" : [ { "fieldName" : "id", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false }, { "fieldName" : "userId", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "userId", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] } ], "views" : [] } $mainftl$); 14:02:08 [] [] [] [] INFO LoadConfs File does not exist: /postgres-conf.json 14:02:08 [] [] [] [] INFO LoadConfs Resource does not exist: /postgres-conf.json 14:02:08 [] [] [] [] INFO PostgresClient No DB configuration found, setting username, password and database for testing 14:02:08 [] [] [] [] INFO PostgresClient Using schema: diku 14:02:08 [] [] [] [] INFO PostgresClient postgreSQLClientConfig = {"postgres_tester":true,"username":"diku_mod_permissions","password":"...","database":"postgres","port":49347,"host":"localhost"} 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'mutable') = 'false' >>>WHERE (jsonb->>'mutable') = 'false' 14:02:08 [] [] [] [] INFO TenantPermsAPI Successfully soft deleted 0 permissions 14:02:08 [] [] [] [] INFO TenantRefAPI Marked all system-defined permissions deprecated. 14:02:08 [] [] [] [] WARN TenantLoading TenantLoading.perform No X-Okapi-Url-to header 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1bcfd501-232e-47da-a511-fdd29ae3d692' >>>WHERE (jsonb->>'userId') = '1bcfd501-232e-47da-a511-fdd29ae3d692' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 15 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'aace299f-7a74-4118-9cf3-599110dce278' >>>WHERE (jsonb->>'userId') = 'aace299f-7a74-4118-9cf3-599110dce278' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2c2e383d-7369-4aff-afb7-eb3db4cb71a0' >>>WHERE (jsonb->>'userId') = '2c2e383d-7369-4aff-afb7-eb3db4cb71a0' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'dc13dcc6-2bda-412c-b046-1398d1becb75' >>>WHERE (jsonb->>'userId') = 'dc13dcc6-2bda-412c-b046-1398d1becb75' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'acf8aab2-91ee-4210-bb7c-b688d66a9de4' >>>WHERE (jsonb->>'userId') = 'acf8aab2-91ee-4210-bb7c-b688d66a9de4' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2220260d-12c7-49ab-9ac4-f923323f0cb3' >>>WHERE (jsonb->>'userId') = '2220260d-12c7-49ab-9ac4-f923323f0cb3' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1dbc9318-9718-4e9d-b32a-6684cf258910' >>>WHERE (jsonb->>'userId') = '1dbc9318-9718-4e9d-b32a-6684cf258910' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'dd176277-5c2d-4310-bf2f-e45e312b5026' >>>WHERE (jsonb->>'userId') = 'dd176277-5c2d-4310-bf2f-e45e312b5026' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'be2e9bdb-9884-4fe9-87d0-ba91e8425412' >>>WHERE (jsonb->>'userId') = 'be2e9bdb-9884-4fe9-87d0-ba91e8425412' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e546d50a-926a-421f-8400-a041a2e9db79' >>>WHERE (jsonb->>'userId') = 'e546d50a-926a-421f-8400-a041a2e9db79' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '9ad09b01-7429-455f-9f64-e3897027db61' >>>WHERE (jsonb->>'userId') = '9ad09b01-7429-455f-9f64-e3897027db61' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '67e40b72-66ca-4113-bed9-17a40bc448e0' >>>WHERE (jsonb->>'userId') = '67e40b72-66ca-4113-bed9-17a40bc448e0' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '71f28723-784e-4292-b794-af4ffca9178e' >>>WHERE (jsonb->>'userId') = '71f28723-784e-4292-b794-af4ffca9178e' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5a57f974-ea09-4c87-b7f5-e4144dde6128' >>>WHERE (jsonb->>'userId') = '5a57f974-ea09-4c87-b7f5-e4144dde6128' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '78284bd0-cdf1-4fc9-a404-739388b41cc7' >>>WHERE (jsonb->>'userId') = '78284bd0-cdf1-4fc9-a404-739388b41cc7' 14:02:08 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:08 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:08 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '785c6f6e-36a5-4434-8aa7-210bb55cea34' >>>WHERE (jsonb->>'userId') = '785c6f6e-36a5-4434-8aa7-210bb55cea34' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c7d6c761-905e-4e7b-a616-a624175efe11' >>>WHERE (jsonb->>'userId') = 'c7d6c761-905e-4e7b-a616-a624175efe11' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7aa8082c-d1ed-4e33-bf0e-02d3efe5624b' >>>WHERE (jsonb->>'userId') = '7aa8082c-d1ed-4e33-bf0e-02d3efe5624b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5dfffe75-267d-4133-b7bf-6d6daf26d5a4' >>>WHERE (jsonb->>'userId') = '5dfffe75-267d-4133-b7bf-6d6daf26d5a4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a5a80ce1-c00d-4ede-ba44-912c1e093948' >>>WHERE (jsonb->>'userId') = 'a5a80ce1-c00d-4ede-ba44-912c1e093948' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7d7f46e8-5f99-4ac8-aa86-83a23f4bd8de' >>>WHERE (jsonb->>'userId') = '7d7f46e8-5f99-4ac8-aa86-83a23f4bd8de' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4a5e1aa3-0733-45d9-b9cc-836b4e92d6ea' >>>WHERE (jsonb->>'userId') = '4a5e1aa3-0733-45d9-b9cc-836b4e92d6ea' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8d65692e-fa98-49f2-9896-f9f6b0893358' >>>WHERE (jsonb->>'userId') = '8d65692e-fa98-49f2-9896-f9f6b0893358' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'fad510e6-5b8d-4b10-b846-ce6ff7457629' >>>WHERE (jsonb->>'userId') = 'fad510e6-5b8d-4b10-b846-ce6ff7457629' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5f9bb63a-66f1-47eb-bc19-f182af2fc3e7' >>>WHERE (jsonb->>'userId') = '5f9bb63a-66f1-47eb-bc19-f182af2fc3e7' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'cc0685f2-6ac2-4840-bb67-1493c14968c5' >>>WHERE (jsonb->>'userId') = 'cc0685f2-6ac2-4840-bb67-1493c14968c5' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6e74dfe1-2eca-48bd-89ce-9fe1633920a3' >>>WHERE (jsonb->>'userId') = '6e74dfe1-2eca-48bd-89ce-9fe1633920a3' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f6d2c74c-3181-4c25-9a21-1b1f4c30765f' >>>WHERE (jsonb->>'userId') = 'f6d2c74c-3181-4c25-9a21-1b1f4c30765f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1dbf36ab-bba6-4725-8456-bda646796dd1' >>>WHERE (jsonb->>'userId') = '1dbf36ab-bba6-4725-8456-bda646796dd1' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '94fc2d88-359e-45e1-8360-ff6fb132cac4' >>>WHERE (jsonb->>'userId') = '94fc2d88-359e-45e1-8360-ff6fb132cac4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '04e1cda1-a049-463b-97af-98c59a8fd806' >>>WHERE (jsonb->>'userId') = '04e1cda1-a049-463b-97af-98c59a8fd806' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e923bd61-bf27-42a9-8293-ed7738c24bca' >>>WHERE (jsonb->>'userId') = 'e923bd61-bf27-42a9-8293-ed7738c24bca' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c78aa9ec-b7d3-4d53-9e43-20296f39b496' >>>WHERE (jsonb->>'userId') = 'c78aa9ec-b7d3-4d53-9e43-20296f39b496' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '488d4776-d0e2-4618-9ca9-78fa5dcc787c' >>>WHERE (jsonb->>'userId') = '488d4776-d0e2-4618-9ca9-78fa5dcc787c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '860b2291-c28a-4943-804a-169af01edef4' >>>WHERE (jsonb->>'userId') = '860b2291-c28a-4943-804a-169af01edef4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0b6d1482-de21-4643-ae5b-90b4c7164c4a' >>>WHERE (jsonb->>'userId') = '0b6d1482-de21-4643-ae5b-90b4c7164c4a' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd1f69036-a316-41e4-89c1-77f77a3c7f1d' >>>WHERE (jsonb->>'userId') = 'd1f69036-a316-41e4-89c1-77f77a3c7f1d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '75da2654-00a8-4ca5-9c73-2bf9e1e5c883' >>>WHERE (jsonb->>'userId') = '75da2654-00a8-4ca5-9c73-2bf9e1e5c883' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4fd8d3dd-ebc0-4d10-ae81-199e831be32e' >>>WHERE (jsonb->>'userId') = '4fd8d3dd-ebc0-4d10-ae81-199e831be32e' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c2a2f428-ab5f-46ce-b3ed-7d0ab39a0096' >>>WHERE (jsonb->>'userId') = 'c2a2f428-ab5f-46ce-b3ed-7d0ab39a0096' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '48861bba-0d73-4277-8f44-f3b65b038017' >>>WHERE (jsonb->>'userId') = '48861bba-0d73-4277-8f44-f3b65b038017' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd4849a05-4066-4129-ae56-3dfc39498e36' >>>WHERE (jsonb->>'userId') = 'd4849a05-4066-4129-ae56-3dfc39498e36' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '51e1e298-db10-465b-8c20-7f3d1e929834' >>>WHERE (jsonb->>'userId') = '51e1e298-db10-465b-8c20-7f3d1e929834' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0aa0c321-9974-4a67-92dc-bca029d093e2' >>>WHERE (jsonb->>'userId') = '0aa0c321-9974-4a67-92dc-bca029d093e2' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2075c729-a9b8-43db-860c-60a3cc31a949' >>>WHERE (jsonb->>'userId') = '2075c729-a9b8-43db-860c-60a3cc31a949' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f62dc160-eacc-4922-a0cb-e1ed68a44601' >>>WHERE (jsonb->>'userId') = 'f62dc160-eacc-4922-a0cb-e1ed68a44601' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '430f49de-6848-4cba-886a-4902cb9b887d' >>>WHERE (jsonb->>'userId') = '430f49de-6848-4cba-886a-4902cb9b887d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd3409c88-7e3f-497a-b94c-69e85e23b45c' >>>WHERE (jsonb->>'userId') = 'd3409c88-7e3f-497a-b94c-69e85e23b45c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '888a321d-676e-42fc-b588-a677d16a76ec' >>>WHERE (jsonb->>'userId') = '888a321d-676e-42fc-b588-a677d16a76ec' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e308411d-773e-416e-be58-f16176c0549e' >>>WHERE (jsonb->>'userId') = 'e308411d-773e-416e-be58-f16176c0549e' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4f012e5c-840b-4f7a-b7e0-c2e3b1d41309' >>>WHERE (jsonb->>'userId') = '4f012e5c-840b-4f7a-b7e0-c2e3b1d41309' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f5d7aed2-1647-4e83-b85e-74760f770799' >>>WHERE (jsonb->>'userId') = 'f5d7aed2-1647-4e83-b85e-74760f770799' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0cce8c30-0a0d-4ebb-a107-cf47ad35eafb' >>>WHERE (jsonb->>'userId') = '0cce8c30-0a0d-4ebb-a107-cf47ad35eafb' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c2f1cefa-2ebb-4a7a-a420-84dcf2f89cf5' >>>WHERE (jsonb->>'userId') = 'c2f1cefa-2ebb-4a7a-a420-84dcf2f89cf5' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '67002fdf-b2f6-4e1f-bab8-d750efb0558f' >>>WHERE (jsonb->>'userId') = '67002fdf-b2f6-4e1f-bab8-d750efb0558f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4adf499e-c954-4bf9-9261-26720608e120' >>>WHERE (jsonb->>'userId') = '4adf499e-c954-4bf9-9261-26720608e120' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '342971e4-43af-44c3-a8c3-478a97cc94bc' >>>WHERE (jsonb->>'userId') = '342971e4-43af-44c3-a8c3-478a97cc94bc' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6ff36aa8-c68d-42c9-b68b-ece603ea59d7' >>>WHERE (jsonb->>'userId') = '6ff36aa8-c68d-42c9-b68b-ece603ea59d7' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '420d485a-033f-4999-ab2c-12c00cd5ec07' >>>WHERE (jsonb->>'userId') = '420d485a-033f-4999-ab2c-12c00cd5ec07' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4acbd1f5-dbfe-4928-8325-2955e50faa4b' >>>WHERE (jsonb->>'userId') = '4acbd1f5-dbfe-4928-8325-2955e50faa4b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ab60d124-5d41-49c5-8aae-2ef2cd3704c2' >>>WHERE (jsonb->>'userId') = 'ab60d124-5d41-49c5-8aae-2ef2cd3704c2' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1f2608df-ff79-4576-b578-14627bbe87fa' >>>WHERE (jsonb->>'userId') = '1f2608df-ff79-4576-b578-14627bbe87fa' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '08522da4-668a-4450-a769-3abfae5678ad' >>>WHERE (jsonb->>'userId') = '08522da4-668a-4450-a769-3abfae5678ad' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8cde4a35-f58b-492e-bd07-d668f7322253' >>>WHERE (jsonb->>'userId') = '8cde4a35-f58b-492e-bd07-d668f7322253' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4f0e711c-d583-41e0-9555-b62f1725023f' >>>WHERE (jsonb->>'userId') = '4f0e711c-d583-41e0-9555-b62f1725023f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5bec815c-72b9-452f-ac19-bc2793c94537' >>>WHERE (jsonb->>'userId') = '5bec815c-72b9-452f-ac19-bc2793c94537' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2fabd929-3ed9-40ae-aaf2-6c39c4bebf13' >>>WHERE (jsonb->>'userId') = '2fabd929-3ed9-40ae-aaf2-6c39c4bebf13' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e63273e7-48f5-4c43-ab4e-1751ecacaa21' >>>WHERE (jsonb->>'userId') = 'e63273e7-48f5-4c43-ab4e-1751ecacaa21' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd80b45eb-5dc0-4635-b539-dac722cc3a50' >>>WHERE (jsonb->>'userId') = 'd80b45eb-5dc0-4635-b539-dac722cc3a50' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '261e1062-a473-47f4-a00f-a197c4a87530' >>>WHERE (jsonb->>'userId') = '261e1062-a473-47f4-a00f-a197c4a87530' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6f644096-0cb6-4d9c-9da4-0831b3625c0d' >>>WHERE (jsonb->>'userId') = '6f644096-0cb6-4d9c-9da4-0831b3625c0d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c0d4a2da-7c38-46f4-869c-797bb083ee2d' >>>WHERE (jsonb->>'userId') = 'c0d4a2da-7c38-46f4-869c-797bb083ee2d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f0dc6802-450f-459a-9dc6-209086375b7f' >>>WHERE (jsonb->>'userId') = 'f0dc6802-450f-459a-9dc6-209086375b7f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '07066a1f-1fb7-4793-bbca-7cd8d1ea90ab' >>>WHERE (jsonb->>'userId') = '07066a1f-1fb7-4793-bbca-7cd8d1ea90ab' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '00bc2807-4d5b-4a27-a2b5-b7b1ba431cc4' >>>WHERE (jsonb->>'userId') = '00bc2807-4d5b-4a27-a2b5-b7b1ba431cc4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ae2f6ce7-386a-4c5a-9fcf-e5f517a88ced' >>>WHERE (jsonb->>'userId') = 'ae2f6ce7-386a-4c5a-9fcf-e5f517a88ced' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b56b28b9-7f22-426e-a099-4f753be686fa' >>>WHERE (jsonb->>'userId') = 'b56b28b9-7f22-426e-a099-4f753be686fa' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6302b991-3223-4bc7-ae66-795d161f64ab' >>>WHERE (jsonb->>'userId') = '6302b991-3223-4bc7-ae66-795d161f64ab' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1b5795ad-5ad0-4ba5-9c62-a7b26eb2f6b8' >>>WHERE (jsonb->>'userId') = '1b5795ad-5ad0-4ba5-9c62-a7b26eb2f6b8' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2084e201-b0da-4ac3-b3ae-873c48596093' >>>WHERE (jsonb->>'userId') = '2084e201-b0da-4ac3-b3ae-873c48596093' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2120fe62-ba0a-4dce-8701-f360368d5c30' >>>WHERE (jsonb->>'userId') = '2120fe62-ba0a-4dce-8701-f360368d5c30' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6f4111a4-8b6f-4008-9b95-ecd31db69234' >>>WHERE (jsonb->>'userId') = '6f4111a4-8b6f-4008-9b95-ecd31db69234' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c1277b9b-b165-48ee-ac35-e737ed325f34' >>>WHERE (jsonb->>'userId') = 'c1277b9b-b165-48ee-ac35-e737ed325f34' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '745bdee1-458c-4076-bad1-be5a470c49fb' >>>WHERE (jsonb->>'userId') = '745bdee1-458c-4076-bad1-be5a470c49fb' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6f36265e-722a-490a-b436-806e63af2ea7' >>>WHERE (jsonb->>'userId') = '6f36265e-722a-490a-b436-806e63af2ea7' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '734f2e97-2c41-4e70-9b98-44cead2607e4' >>>WHERE (jsonb->>'userId') = '734f2e97-2c41-4e70-9b98-44cead2607e4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f6cd72ab-3e89-44c0-99aa-54ab4844f167' >>>WHERE (jsonb->>'userId') = 'f6cd72ab-3e89-44c0-99aa-54ab4844f167' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4ca6da61-a9fa-4226-850d-43aa2d89f9a6' >>>WHERE (jsonb->>'userId') = '4ca6da61-a9fa-4226-850d-43aa2d89f9a6' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '97f100da-9218-4351-bc14-ef0558f01625' >>>WHERE (jsonb->>'userId') = '97f100da-9218-4351-bc14-ef0558f01625' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'cd5994cf-6ee5-49b4-b58e-7bc70d724626' >>>WHERE (jsonb->>'userId') = 'cd5994cf-6ee5-49b4-b58e-7bc70d724626' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2a823816-c059-4703-becf-0cc68a734189' >>>WHERE (jsonb->>'userId') = '2a823816-c059-4703-becf-0cc68a734189' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '65fcc41e-df15-459a-bf93-2f53cfa8ff7f' >>>WHERE (jsonb->>'userId') = '65fcc41e-df15-459a-bf93-2f53cfa8ff7f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'eaeffd06-57d3-488c-bd1b-c39d5c62e97d' >>>WHERE (jsonb->>'userId') = 'eaeffd06-57d3-488c-bd1b-c39d5c62e97d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2338689d-f27e-49fd-8bce-9f9bf7be6ea0' >>>WHERE (jsonb->>'userId') = '2338689d-f27e-49fd-8bce-9f9bf7be6ea0' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '15fa3eda-f495-496c-b21e-4f281b38a3ef' >>>WHERE (jsonb->>'userId') = '15fa3eda-f495-496c-b21e-4f281b38a3ef' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '86344e52-979a-45da-ad44-9edcc05c5312' >>>WHERE (jsonb->>'userId') = '86344e52-979a-45da-ad44-9edcc05c5312' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f1dc9a7e-492b-4f2b-848a-115b5919d589' >>>WHERE (jsonb->>'userId') = 'f1dc9a7e-492b-4f2b-848a-115b5919d589' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '16757efe-86ac-40bb-bdd6-fafee02463c7' >>>WHERE (jsonb->>'userId') = '16757efe-86ac-40bb-bdd6-fafee02463c7' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0db6912a-40c0-41db-8d15-be05ff851f96' >>>WHERE (jsonb->>'userId') = '0db6912a-40c0-41db-8d15-be05ff851f96' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd6c40971-39a6-4977-9d27-e83e731f51de' >>>WHERE (jsonb->>'userId') = 'd6c40971-39a6-4977-9d27-e83e731f51de' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'bd566b21-d125-421c-9c78-2b9a8bc4c4f7' >>>WHERE (jsonb->>'userId') = 'bd566b21-d125-421c-9c78-2b9a8bc4c4f7' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '63ff6975-5d7f-46c1-983a-dba27d163c4a' >>>WHERE (jsonb->>'userId') = '63ff6975-5d7f-46c1-983a-dba27d163c4a' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c573e5f8-a570-475d-a75e-88a4d2b757d2' >>>WHERE (jsonb->>'userId') = 'c573e5f8-a570-475d-a75e-88a4d2b757d2' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a8a11126-40b9-45f0-aa6e-9408e57c4b47' >>>WHERE (jsonb->>'userId') = 'a8a11126-40b9-45f0-aa6e-9408e57c4b47' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '3b464026-79e7-450a-a441-0e1d4f8ebf99' >>>WHERE (jsonb->>'userId') = '3b464026-79e7-450a-a441-0e1d4f8ebf99' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8f7a47c4-d66f-4dba-9255-f74507a2ecee' >>>WHERE (jsonb->>'userId') = '8f7a47c4-d66f-4dba-9255-f74507a2ecee' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '52e47672-d456-40b6-9f2d-6597d3e9f942' >>>WHERE (jsonb->>'userId') = '52e47672-d456-40b6-9f2d-6597d3e9f942' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'eb81f274-3676-45a9-8e8d-8a151af2506b' >>>WHERE (jsonb->>'userId') = 'eb81f274-3676-45a9-8e8d-8a151af2506b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '21ce4a36-4d3a-4a9d-98be-d40852799d9b' >>>WHERE (jsonb->>'userId') = '21ce4a36-4d3a-4a9d-98be-d40852799d9b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '201be44f-2f29-47af-85da-2cbfc72ac29e' >>>WHERE (jsonb->>'userId') = '201be44f-2f29-47af-85da-2cbfc72ac29e' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ac521a2a-d933-42f9-b3a4-2d7399880057' >>>WHERE (jsonb->>'userId') = 'ac521a2a-d933-42f9-b3a4-2d7399880057' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b9a05706-9d87-499d-8e5e-47dc512a21c3' >>>WHERE (jsonb->>'userId') = 'b9a05706-9d87-499d-8e5e-47dc512a21c3' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '960ab857-c8c7-4445-8d24-1e4c33de3e86' >>>WHERE (jsonb->>'userId') = '960ab857-c8c7-4445-8d24-1e4c33de3e86' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '30d7e2dd-db23-4832-b4be-30d3f5f83a60' >>>WHERE (jsonb->>'userId') = '30d7e2dd-db23-4832-b4be-30d3f5f83a60' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1200edd1-4b53-43e7-a9b7-fc590ab1c8d9' >>>WHERE (jsonb->>'userId') = '1200edd1-4b53-43e7-a9b7-fc590ab1c8d9' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0414af69-f89c-40f2-bea9-a9b5d0a179d4' >>>WHERE (jsonb->>'userId') = '0414af69-f89c-40f2-bea9-a9b5d0a179d4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '260f1870-7dee-452d-a379-301f063febda' >>>WHERE (jsonb->>'userId') = '260f1870-7dee-452d-a379-301f063febda' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1c65f9c5-5970-48bb-aa72-82ef96fc145e' >>>WHERE (jsonb->>'userId') = '1c65f9c5-5970-48bb-aa72-82ef96fc145e' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b7f677aa-e2db-4bb5-81f8-beee547bce68' >>>WHERE (jsonb->>'userId') = 'b7f677aa-e2db-4bb5-81f8-beee547bce68' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '259d55dc-015d-420a-b13d-8706018305b1' >>>WHERE (jsonb->>'userId') = '259d55dc-015d-420a-b13d-8706018305b1' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ab579dc3-219b-4f5b-8068-ab1c7a55c402' >>>WHERE (jsonb->>'userId') = 'ab579dc3-219b-4f5b-8068-ab1c7a55c402' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '78c51a90-e64f-49ce-8d28-e246a49c7f63' >>>WHERE (jsonb->>'userId') = '78c51a90-e64f-49ce-8d28-e246a49c7f63' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c2610e2c-a6f8-4336-95b6-54d716348b03' >>>WHERE (jsonb->>'userId') = 'c2610e2c-a6f8-4336-95b6-54d716348b03' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5ed8a4be-f0d8-459d-9e9a-27f2e8c155af' >>>WHERE (jsonb->>'userId') = '5ed8a4be-f0d8-459d-9e9a-27f2e8c155af' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'dc5dab8d-f80a-476a-b920-3cf21eeee902' >>>WHERE (jsonb->>'userId') = 'dc5dab8d-f80a-476a-b920-3cf21eeee902' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0d6d38bf-aaf6-4976-a2ce-7ff787195982' >>>WHERE (jsonb->>'userId') = '0d6d38bf-aaf6-4976-a2ce-7ff787195982' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '34a22ca8-9aff-4b1c-96c2-f908ddb068ae' >>>WHERE (jsonb->>'userId') = '34a22ca8-9aff-4b1c-96c2-f908ddb068ae' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b4e91548-c387-4b01-aaa1-489afc3f6936' >>>WHERE (jsonb->>'userId') = 'b4e91548-c387-4b01-aaa1-489afc3f6936' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2cb8a9f5-5a04-4b26-89de-c5a522638de2' >>>WHERE (jsonb->>'userId') = '2cb8a9f5-5a04-4b26-89de-c5a522638de2' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a56edfbe-087e-4f79-bd7e-d855fbe746e4' >>>WHERE (jsonb->>'userId') = 'a56edfbe-087e-4f79-bd7e-d855fbe746e4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b617c5f2-78d4-4c7e-bf0c-d21392a8c39f' >>>WHERE (jsonb->>'userId') = 'b617c5f2-78d4-4c7e-bf0c-d21392a8c39f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '9e87bfea-2d31-4cc3-9cef-9e1e67553243' >>>WHERE (jsonb->>'userId') = '9e87bfea-2d31-4cc3-9cef-9e1e67553243' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '44e640f4-3e0e-4bb4-92af-6263108893b2' >>>WHERE (jsonb->>'userId') = '44e640f4-3e0e-4bb4-92af-6263108893b2' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f308aadb-9403-44de-9b5a-06792b78bb3a' >>>WHERE (jsonb->>'userId') = 'f308aadb-9403-44de-9b5a-06792b78bb3a' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd0fc4228-2e42-49b2-a5b0-9df48897e8c0' >>>WHERE (jsonb->>'userId') = 'd0fc4228-2e42-49b2-a5b0-9df48897e8c0' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '42e9d211-4bfb-45fe-a088-f19d0a514f98' >>>WHERE (jsonb->>'userId') = '42e9d211-4bfb-45fe-a088-f19d0a514f98' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f7a0a518-6ff3-4531-b54b-e630d61aede0' >>>WHERE (jsonb->>'userId') = 'f7a0a518-6ff3-4531-b54b-e630d61aede0' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4205e8ff-804d-45bb-9d6d-f75f845ce608' >>>WHERE (jsonb->>'userId') = '4205e8ff-804d-45bb-9d6d-f75f845ce608' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b7da16ef-f3d2-4c12-a564-858bc3eee366' >>>WHERE (jsonb->>'userId') = 'b7da16ef-f3d2-4c12-a564-858bc3eee366' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1b648069-8563-41c8-afc0-d8359f11503c' >>>WHERE (jsonb->>'userId') = '1b648069-8563-41c8-afc0-d8359f11503c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5e84b6a4-fde4-4099-ab54-c82c9041f685' >>>WHERE (jsonb->>'userId') = '5e84b6a4-fde4-4099-ab54-c82c9041f685' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e5e950e0-3f56-4ff1-8e86-671cdbc37688' >>>WHERE (jsonb->>'userId') = 'e5e950e0-3f56-4ff1-8e86-671cdbc37688' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ef39251f-db4c-4253-9951-645735f84904' >>>WHERE (jsonb->>'userId') = 'ef39251f-db4c-4253-9951-645735f84904' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '3387893c-7bde-4d2f-9ad2-d4974b3e959e' >>>WHERE (jsonb->>'userId') = '3387893c-7bde-4d2f-9ad2-d4974b3e959e' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '292451b5-0026-4463-a762-d43fc6cc9122' >>>WHERE (jsonb->>'userId') = '292451b5-0026-4463-a762-d43fc6cc9122' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '10cb9367-c095-4872-9add-8aecdf339dd4' >>>WHERE (jsonb->>'userId') = '10cb9367-c095-4872-9add-8aecdf339dd4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '17b26a4a-e481-4b86-8949-5ef6570eb622' >>>WHERE (jsonb->>'userId') = '17b26a4a-e481-4b86-8949-5ef6570eb622' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a49cefad-7447-4f2f-9004-de32e7a6cc53' >>>WHERE (jsonb->>'userId') = 'a49cefad-7447-4f2f-9004-de32e7a6cc53' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e0b7cb11-7d1f-48d8-b8a5-bc138550313d' >>>WHERE (jsonb->>'userId') = 'e0b7cb11-7d1f-48d8-b8a5-bc138550313d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f57c13f1-6114-41b2-aa6f-33045068d6be' >>>WHERE (jsonb->>'userId') = 'f57c13f1-6114-41b2-aa6f-33045068d6be' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8853c9a2-cae2-4b5e-84ce-2b39bb809e5b' >>>WHERE (jsonb->>'userId') = '8853c9a2-cae2-4b5e-84ce-2b39bb809e5b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '956f39c5-92e3-4c26-bcdc-1827674710cf' >>>WHERE (jsonb->>'userId') = '956f39c5-92e3-4c26-bcdc-1827674710cf' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '87c329f1-2220-4a8a-b750-ded39bbe9769' >>>WHERE (jsonb->>'userId') = '87c329f1-2220-4a8a-b750-ded39bbe9769' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '54f65a75-f35b-4f56-86a6-fa4a3d957e57' >>>WHERE (jsonb->>'userId') = '54f65a75-f35b-4f56-86a6-fa4a3d957e57' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7597bd13-9f57-4cd1-a7cf-dc0ac7375280' >>>WHERE (jsonb->>'userId') = '7597bd13-9f57-4cd1-a7cf-dc0ac7375280' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8e9d1a69-9745-4ad4-a8e8-6841a9441b40' >>>WHERE (jsonb->>'userId') = '8e9d1a69-9745-4ad4-a8e8-6841a9441b40' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2eb8fef6-95c8-491d-a6a3-00176997dca4' >>>WHERE (jsonb->>'userId') = '2eb8fef6-95c8-491d-a6a3-00176997dca4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '78a21fb3-0e80-4172-8ccf-8a1d8d5e1553' >>>WHERE (jsonb->>'userId') = '78a21fb3-0e80-4172-8ccf-8a1d8d5e1553' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '86c9f455-a685-45d0-9d01-5943a1ba7e5b' >>>WHERE (jsonb->>'userId') = '86c9f455-a685-45d0-9d01-5943a1ba7e5b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '969e6710-309e-41bd-ba35-2b97faec30b7' >>>WHERE (jsonb->>'userId') = '969e6710-309e-41bd-ba35-2b97faec30b7' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5cf0c0d9-17cc-42f1-87c1-10ec6476fc3a' >>>WHERE (jsonb->>'userId') = '5cf0c0d9-17cc-42f1-87c1-10ec6476fc3a' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e1e435da-97e2-4083-8657-832aeb549929' >>>WHERE (jsonb->>'userId') = 'e1e435da-97e2-4083-8657-832aeb549929' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a23eac4b-955e-451c-b4ff-6ec2f5e63e23' >>>WHERE (jsonb->>'userId') = 'a23eac4b-955e-451c-b4ff-6ec2f5e63e23' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '55e09c25-0a7b-4df8-8bde-a8964b57ef40' >>>WHERE (jsonb->>'userId') = '55e09c25-0a7b-4df8-8bde-a8964b57ef40' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'daa9cf25-f333-447b-b577-158d6ce944a5' >>>WHERE (jsonb->>'userId') = 'daa9cf25-f333-447b-b577-158d6ce944a5' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6f511507-dab9-42fb-b966-bb8a1330ee7a' >>>WHERE (jsonb->>'userId') = '6f511507-dab9-42fb-b966-bb8a1330ee7a' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '56708cfe-750e-49ad-b72a-003ce7ad78a4' >>>WHERE (jsonb->>'userId') = '56708cfe-750e-49ad-b72a-003ce7ad78a4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b549fc60-9779-4bac-a4de-df8304ff69c4' >>>WHERE (jsonb->>'userId') = 'b549fc60-9779-4bac-a4de-df8304ff69c4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '28724f2b-89b3-4a05-839c-2e77138e01a3' >>>WHERE (jsonb->>'userId') = '28724f2b-89b3-4a05-839c-2e77138e01a3' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2a424823-588a-45ee-9441-a6384b6614b2' >>>WHERE (jsonb->>'userId') = '2a424823-588a-45ee-9441-a6384b6614b2' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'bc048122-1914-4971-ab0f-62303fef71aa' >>>WHERE (jsonb->>'userId') = 'bc048122-1914-4971-ab0f-62303fef71aa' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '3793853e-6297-424d-abea-24525079f658' >>>WHERE (jsonb->>'userId') = '3793853e-6297-424d-abea-24525079f658' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5e3d70ff-a89a-44a0-a2e2-4cae67668805' >>>WHERE (jsonb->>'userId') = '5e3d70ff-a89a-44a0-a2e2-4cae67668805' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'abad6503-a51b-4fec-a1cd-b5f672b1ff7b' >>>WHERE (jsonb->>'userId') = 'abad6503-a51b-4fec-a1cd-b5f672b1ff7b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b4fa5d79-4af6-4623-9331-fabdfee79e0c' >>>WHERE (jsonb->>'userId') = 'b4fa5d79-4af6-4623-9331-fabdfee79e0c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '423d5beb-3196-449e-aacb-9595d6321950' >>>WHERE (jsonb->>'userId') = '423d5beb-3196-449e-aacb-9595d6321950' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b3dae815-3d30-49f9-ac26-363e661382a0' >>>WHERE (jsonb->>'userId') = 'b3dae815-3d30-49f9-ac26-363e661382a0' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b09038a4-0386-4782-8ee8-11aa87e09887' >>>WHERE (jsonb->>'userId') = 'b09038a4-0386-4782-8ee8-11aa87e09887' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '368b8b4a-c3c2-436c-9cba-95dcac52ebf9' >>>WHERE (jsonb->>'userId') = '368b8b4a-c3c2-436c-9cba-95dcac52ebf9' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '46ed7160-426b-460e-91b3-ab22a7d6fc26' >>>WHERE (jsonb->>'userId') = '46ed7160-426b-460e-91b3-ab22a7d6fc26' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4cb9a24c-76e1-4755-9f54-f51115e00b53' >>>WHERE (jsonb->>'userId') = '4cb9a24c-76e1-4755-9f54-f51115e00b53' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '62b25727-310f-4fa3-b308-666a6cf28c97' >>>WHERE (jsonb->>'userId') = '62b25727-310f-4fa3-b308-666a6cf28c97' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a601f1f2-88a4-465a-850e-8f50c28ce7d9' >>>WHERE (jsonb->>'userId') = 'a601f1f2-88a4-465a-850e-8f50c28ce7d9' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6c76eeec-183d-4635-9019-11ce8623d50c' >>>WHERE (jsonb->>'userId') = '6c76eeec-183d-4635-9019-11ce8623d50c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e6dfcfef-e724-4485-870d-d2c4d1dcfdd9' >>>WHERE (jsonb->>'userId') = 'e6dfcfef-e724-4485-870d-d2c4d1dcfdd9' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ade18246-c529-497f-bd4c-2c3f85e995ad' >>>WHERE (jsonb->>'userId') = 'ade18246-c529-497f-bd4c-2c3f85e995ad' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8616dd12-e244-4047-834a-db0c6cd1477b' >>>WHERE (jsonb->>'userId') = '8616dd12-e244-4047-834a-db0c6cd1477b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f643e743-3496-4ecd-94d7-1ca2fdf56c82' >>>WHERE (jsonb->>'userId') = 'f643e743-3496-4ecd-94d7-1ca2fdf56c82' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'df84acd4-4425-47e9-9a25-db8eb2973950' >>>WHERE (jsonb->>'userId') = 'df84acd4-4425-47e9-9a25-db8eb2973950' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2884afb0-5bec-45c4-b9f4-0bc525bc0322' >>>WHERE (jsonb->>'userId') = '2884afb0-5bec-45c4-b9f4-0bc525bc0322' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b3e39715-0659-4776-9d40-abe655408d84' >>>WHERE (jsonb->>'userId') = 'b3e39715-0659-4776-9d40-abe655408d84' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f303e908-30dc-4139-9542-4a4e206c4b96' >>>WHERE (jsonb->>'userId') = 'f303e908-30dc-4139-9542-4a4e206c4b96' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c9255397-a8cb-4208-9558-1aae0e6f2c68' >>>WHERE (jsonb->>'userId') = 'c9255397-a8cb-4208-9558-1aae0e6f2c68' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1ee0a888-ade1-4bc7-a9b6-15a2d46a6b18' >>>WHERE (jsonb->>'userId') = '1ee0a888-ade1-4bc7-a9b6-15a2d46a6b18' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a0dadce9-06ed-4b23-9fc0-6b5238aa92d8' >>>WHERE (jsonb->>'userId') = 'a0dadce9-06ed-4b23-9fc0-6b5238aa92d8' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a98abce3-be00-4d9a-a66a-0593d27b41e0' >>>WHERE (jsonb->>'userId') = 'a98abce3-be00-4d9a-a66a-0593d27b41e0' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1db3d6c7-6ac5-4b3c-b860-deb2df449736' >>>WHERE (jsonb->>'userId') = '1db3d6c7-6ac5-4b3c-b860-deb2df449736' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '45e77e83-60a3-4031-89d5-81222043dec6' >>>WHERE (jsonb->>'userId') = '45e77e83-60a3-4031-89d5-81222043dec6' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '169aeb77-32f6-4f60-a2c0-db791b96e411' >>>WHERE (jsonb->>'userId') = '169aeb77-32f6-4f60-a2c0-db791b96e411' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '70e0c050-e842-4eee-9632-967a49e43bb2' >>>WHERE (jsonb->>'userId') = '70e0c050-e842-4eee-9632-967a49e43bb2' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b3f61b07-a1b3-44ac-bb7f-622b90ac17c3' >>>WHERE (jsonb->>'userId') = 'b3f61b07-a1b3-44ac-bb7f-622b90ac17c3' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2e5f9cc4-46ab-4dfe-b40a-8493296353fb' >>>WHERE (jsonb->>'userId') = '2e5f9cc4-46ab-4dfe-b40a-8493296353fb' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c926be9c-a8ce-4399-a9b3-11ec0fc8d6c9' >>>WHERE (jsonb->>'userId') = 'c926be9c-a8ce-4399-a9b3-11ec0fc8d6c9' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7dd96d33-6abf-4394-8768-647c76d79412' >>>WHERE (jsonb->>'userId') = '7dd96d33-6abf-4394-8768-647c76d79412' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e14b1bc1-8784-4b55-bfbe-e5ec8ce0b07a' >>>WHERE (jsonb->>'userId') = 'e14b1bc1-8784-4b55-bfbe-e5ec8ce0b07a' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e59bc21a-884e-42a2-8792-163efc3662e7' >>>WHERE (jsonb->>'userId') = 'e59bc21a-884e-42a2-8792-163efc3662e7' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7b06cbcf-5d6d-431b-8922-20509d40f1ae' >>>WHERE (jsonb->>'userId') = '7b06cbcf-5d6d-431b-8922-20509d40f1ae' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '93136048-585b-466e-88f8-a10115e6d7e2' >>>WHERE (jsonb->>'userId') = '93136048-585b-466e-88f8-a10115e6d7e2' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6b5f249c-7df1-4c2f-afc2-0ef6fc21b701' >>>WHERE (jsonb->>'userId') = '6b5f249c-7df1-4c2f-afc2-0ef6fc21b701' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '872695bb-4157-4c6f-84c7-eb5b50b9ce17' >>>WHERE (jsonb->>'userId') = '872695bb-4157-4c6f-84c7-eb5b50b9ce17' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a2468e40-fb7c-453c-a217-8388801e2407' >>>WHERE (jsonb->>'userId') = 'a2468e40-fb7c-453c-a217-8388801e2407' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '046353cf-3963-482c-9792-32ade0a33afa' >>>WHERE (jsonb->>'userId') = '046353cf-3963-482c-9792-32ade0a33afa' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '71f4828b-8ad5-4ae6-bfa6-45ecfe3f6c3c' >>>WHERE (jsonb->>'userId') = '71f4828b-8ad5-4ae6-bfa6-45ecfe3f6c3c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '21c08ac3-c287-4a21-b966-e263504aa773' >>>WHERE (jsonb->>'userId') = '21c08ac3-c287-4a21-b966-e263504aa773' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5cc5bd09-d90e-4484-8058-74c237165877' >>>WHERE (jsonb->>'userId') = '5cc5bd09-d90e-4484-8058-74c237165877' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e25fecaf-dfbf-4e59-bd3d-0493c1b519f5' >>>WHERE (jsonb->>'userId') = 'e25fecaf-dfbf-4e59-bd3d-0493c1b519f5' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '066795ce-4938-48f2-9411-f3f922b51e1c' >>>WHERE (jsonb->>'userId') = '066795ce-4938-48f2-9411-f3f922b51e1c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8af5eaca-d164-4a5f-9941-0467c6facffa' >>>WHERE (jsonb->>'userId') = '8af5eaca-d164-4a5f-9941-0467c6facffa' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'fa18e51c-50d9-4fe3-ab58-c592ea30328a' >>>WHERE (jsonb->>'userId') = 'fa18e51c-50d9-4fe3-ab58-c592ea30328a' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '95a99d37-66b5-4b8d-a598-ab36618f9aac' >>>WHERE (jsonb->>'userId') = '95a99d37-66b5-4b8d-a598-ab36618f9aac' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a983c74e-b4f5-4ca9-94f0-b79efa947b27' >>>WHERE (jsonb->>'userId') = 'a983c74e-b4f5-4ca9-94f0-b79efa947b27' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '15b9deaf-1a59-4396-a8e5-d6c7e5b79b28' >>>WHERE (jsonb->>'userId') = '15b9deaf-1a59-4396-a8e5-d6c7e5b79b28' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'eb7696da-a2c3-4166-8aba-757c42556d1e' >>>WHERE (jsonb->>'userId') = 'eb7696da-a2c3-4166-8aba-757c42556d1e' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '66fe5bd9-1129-4b40-b54d-05b4c358463c' >>>WHERE (jsonb->>'userId') = '66fe5bd9-1129-4b40-b54d-05b4c358463c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0f1f1a5d-49b6-42f4-8b18-faa2ce0e7be4' >>>WHERE (jsonb->>'userId') = '0f1f1a5d-49b6-42f4-8b18-faa2ce0e7be4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'bf93cf45-4c02-4a34-aad0-9ed949109630' >>>WHERE (jsonb->>'userId') = 'bf93cf45-4c02-4a34-aad0-9ed949109630' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0a985a0a-b515-42a0-8ec2-1c2b7e8a1d8c' >>>WHERE (jsonb->>'userId') = '0a985a0a-b515-42a0-8ec2-1c2b7e8a1d8c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '197f8e91-5110-4487-ad36-b3d21a66059d' >>>WHERE (jsonb->>'userId') = '197f8e91-5110-4487-ad36-b3d21a66059d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'bb4d8818-35cc-4cb6-b181-b5ccfb734744' >>>WHERE (jsonb->>'userId') = 'bb4d8818-35cc-4cb6-b181-b5ccfb734744' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'beaffbac-e56d-4e32-a653-b631945f060c' >>>WHERE (jsonb->>'userId') = 'beaffbac-e56d-4e32-a653-b631945f060c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c0af9380-d277-4820-a607-15a2d9c50ba6' >>>WHERE (jsonb->>'userId') = 'c0af9380-d277-4820-a607-15a2d9c50ba6' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e13b3d8d-71ff-49bd-9ea1-4ad7da8b1b8e' >>>WHERE (jsonb->>'userId') = 'e13b3d8d-71ff-49bd-9ea1-4ad7da8b1b8e' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c6a1f097-1292-441c-a760-682279a7f94c' >>>WHERE (jsonb->>'userId') = 'c6a1f097-1292-441c-a760-682279a7f94c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '589ee8e5-4fe4-4ab3-8a58-441cebea454a' >>>WHERE (jsonb->>'userId') = '589ee8e5-4fe4-4ab3-8a58-441cebea454a' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '550a06c3-8d0c-4ae3-a267-b32527272772' >>>WHERE (jsonb->>'userId') = '550a06c3-8d0c-4ae3-a267-b32527272772' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '9207540e-91e9-4a75-ad1e-65a715784326' >>>WHERE (jsonb->>'userId') = '9207540e-91e9-4a75-ad1e-65a715784326' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '384272bb-efab-4e94-b3b8-f67f20796f20' >>>WHERE (jsonb->>'userId') = '384272bb-efab-4e94-b3b8-f67f20796f20' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0ab0736b-57ba-404c-9b17-d94de2cf4d9a' >>>WHERE (jsonb->>'userId') = '0ab0736b-57ba-404c-9b17-d94de2cf4d9a' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '50e30476-ee93-4b16-a53c-27ce2c4b49d7' >>>WHERE (jsonb->>'userId') = '50e30476-ee93-4b16-a53c-27ce2c4b49d7' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e1bcf784-484c-42ca-b502-cf2f2e57eca3' >>>WHERE (jsonb->>'userId') = 'e1bcf784-484c-42ca-b502-cf2f2e57eca3' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c8edf675-9323-4410-9d14-0727e038dad0' >>>WHERE (jsonb->>'userId') = 'c8edf675-9323-4410-9d14-0727e038dad0' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '57db810d-d59c-4443-ab43-3542cfdf7905' >>>WHERE (jsonb->>'userId') = '57db810d-d59c-4443-ab43-3542cfdf7905' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6b5a896c-c6f4-4a28-a89a-2e2ca6ff0d0e' >>>WHERE (jsonb->>'userId') = '6b5a896c-c6f4-4a28-a89a-2e2ca6ff0d0e' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c6d99127-e834-4f60-9a77-f74646cd1618' >>>WHERE (jsonb->>'userId') = 'c6d99127-e834-4f60-9a77-f74646cd1618' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c51cf0e7-ea33-4638-a54c-afffc75a680b' >>>WHERE (jsonb->>'userId') = 'c51cf0e7-ea33-4638-a54c-afffc75a680b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ea2ef01f-d732-4119-90ab-ee6df447548f' >>>WHERE (jsonb->>'userId') = 'ea2ef01f-d732-4119-90ab-ee6df447548f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ea3a1605-a930-4183-b04e-0b2fca3ae094' >>>WHERE (jsonb->>'userId') = 'ea3a1605-a930-4183-b04e-0b2fca3ae094' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'dc3cd5a5-4235-48c3-b9d3-a958863f7498' >>>WHERE (jsonb->>'userId') = 'dc3cd5a5-4235-48c3-b9d3-a958863f7498' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '251cfa92-24a7-45db-9f0d-acd2da450b50' >>>WHERE (jsonb->>'userId') = '251cfa92-24a7-45db-9f0d-acd2da450b50' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'eaed771f-1472-4f5a-a31f-bbb5922ba5fe' >>>WHERE (jsonb->>'userId') = 'eaed771f-1472-4f5a-a31f-bbb5922ba5fe' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'fbc2b501-a8cc-43a7-8d8c-b68067b63a33' >>>WHERE (jsonb->>'userId') = 'fbc2b501-a8cc-43a7-8d8c-b68067b63a33' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '223907c9-517b-4b10-a6bc-8f7fcb0a05c3' >>>WHERE (jsonb->>'userId') = '223907c9-517b-4b10-a6bc-8f7fcb0a05c3' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1be7f410-6ec3-4e88-ac25-0f8d8c63274d' >>>WHERE (jsonb->>'userId') = '1be7f410-6ec3-4e88-ac25-0f8d8c63274d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '01b9d72b-9aab-4efd-97a4-d03c1667bf0d' >>>WHERE (jsonb->>'userId') = '01b9d72b-9aab-4efd-97a4-d03c1667bf0d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c8c1eced-7ff5-44e2-89da-12d276c1e2bc' >>>WHERE (jsonb->>'userId') = 'c8c1eced-7ff5-44e2-89da-12d276c1e2bc' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c97f19d3-7a82-4891-aaa1-de087a9a903f' >>>WHERE (jsonb->>'userId') = 'c97f19d3-7a82-4891-aaa1-de087a9a903f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e76cf4c9-e15a-414e-81b9-672a90fb2745' >>>WHERE (jsonb->>'userId') = 'e76cf4c9-e15a-414e-81b9-672a90fb2745' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2c9e8cdd-d2fe-485b-b663-34225637fe93' >>>WHERE (jsonb->>'userId') = '2c9e8cdd-d2fe-485b-b663-34225637fe93' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '69a7d4f8-a32a-46d8-a006-0e5ea69f34bc' >>>WHERE (jsonb->>'userId') = '69a7d4f8-a32a-46d8-a006-0e5ea69f34bc' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '011dc219-6b7f-4d93-ae7f-f512ed651493' >>>WHERE (jsonb->>'userId') = '011dc219-6b7f-4d93-ae7f-f512ed651493' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '3ada4a0c-e554-4749-8809-fee35fe2c7ad' >>>WHERE (jsonb->>'userId') = '3ada4a0c-e554-4749-8809-fee35fe2c7ad' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '32134c21-fae8-497e-b2d2-daa1ba421070' >>>WHERE (jsonb->>'userId') = '32134c21-fae8-497e-b2d2-daa1ba421070' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e505acd3-925e-4e2c-a255-8d11e25ba046' >>>WHERE (jsonb->>'userId') = 'e505acd3-925e-4e2c-a255-8d11e25ba046' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'dc6e1590-7021-433d-98a3-eda0f8d8fde1' >>>WHERE (jsonb->>'userId') = 'dc6e1590-7021-433d-98a3-eda0f8d8fde1' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'fb5de3c8-5293-440e-8448-a688c3a7367c' >>>WHERE (jsonb->>'userId') = 'fb5de3c8-5293-440e-8448-a688c3a7367c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f45d047f-248d-424a-9571-8b1249279c02' >>>WHERE (jsonb->>'userId') = 'f45d047f-248d-424a-9571-8b1249279c02' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ec97250b-1ded-46a7-a8f6-a474f8fe622d' >>>WHERE (jsonb->>'userId') = 'ec97250b-1ded-46a7-a8f6-a474f8fe622d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a5fb6646-3e42-46ed-b686-e009e1490d2c' >>>WHERE (jsonb->>'userId') = 'a5fb6646-3e42-46ed-b686-e009e1490d2c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '457a3c37-cada-47ed-ae8d-c8eda723251f' >>>WHERE (jsonb->>'userId') = '457a3c37-cada-47ed-ae8d-c8eda723251f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0e64adb1-36ba-4cdd-9909-047612b7629e' >>>WHERE (jsonb->>'userId') = '0e64adb1-36ba-4cdd-9909-047612b7629e' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '975256dc-abdc-45d1-b51a-f9f9ca15a491' >>>WHERE (jsonb->>'userId') = '975256dc-abdc-45d1-b51a-f9f9ca15a491' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f4e0bd3e-1592-4a70-9f4a-41ccb6ca6b43' >>>WHERE (jsonb->>'userId') = 'f4e0bd3e-1592-4a70-9f4a-41ccb6ca6b43' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2a81b279-d459-4022-82f6-69a569d196b9' >>>WHERE (jsonb->>'userId') = '2a81b279-d459-4022-82f6-69a569d196b9' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f3055954-ebc3-4da8-8a60-0b8f52480125' >>>WHERE (jsonb->>'userId') = 'f3055954-ebc3-4da8-8a60-0b8f52480125' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4c564a60-8ac6-41f9-a8b6-088901a5f8ca' >>>WHERE (jsonb->>'userId') = '4c564a60-8ac6-41f9-a8b6-088901a5f8ca' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8931291a-8f92-4044-a17f-49a546b489ce' >>>WHERE (jsonb->>'userId') = '8931291a-8f92-4044-a17f-49a546b489ce' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ffce08d4-c08d-4ff8-8ff8-060a5015aa2a' >>>WHERE (jsonb->>'userId') = 'ffce08d4-c08d-4ff8-8ff8-060a5015aa2a' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a208cf17-a7f0-452d-ae0e-64011232c86d' >>>WHERE (jsonb->>'userId') = 'a208cf17-a7f0-452d-ae0e-64011232c86d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '65ec5d8b-c3f6-41d4-8026-fba1f7cae715' >>>WHERE (jsonb->>'userId') = '65ec5d8b-c3f6-41d4-8026-fba1f7cae715' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ceecd8ee-9586-4024-b107-d368b58a1025' >>>WHERE (jsonb->>'userId') = 'ceecd8ee-9586-4024-b107-d368b58a1025' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '23807f0f-6053-417c-b335-f3b0f84ceb8e' >>>WHERE (jsonb->>'userId') = '23807f0f-6053-417c-b335-f3b0f84ceb8e' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7ff26639-c033-442a-8bf4-2e896b17fcf9' >>>WHERE (jsonb->>'userId') = '7ff26639-c033-442a-8bf4-2e896b17fcf9' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ff5ec271-7138-46d0-8ca1-f5f57790e5bd' >>>WHERE (jsonb->>'userId') = 'ff5ec271-7138-46d0-8ca1-f5f57790e5bd' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '43f60acf-2557-48e9-b457-12783925444f' >>>WHERE (jsonb->>'userId') = '43f60acf-2557-48e9-b457-12783925444f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '137d4cbd-00ff-4332-97cb-88373fa9b556' >>>WHERE (jsonb->>'userId') = '137d4cbd-00ff-4332-97cb-88373fa9b556' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a7fb2289-b4dc-4deb-8fd3-86cf8e2b7db6' >>>WHERE (jsonb->>'userId') = 'a7fb2289-b4dc-4deb-8fd3-86cf8e2b7db6' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '9a04ae0d-e39f-44c3-b520-43144f6d93e4' >>>WHERE (jsonb->>'userId') = '9a04ae0d-e39f-44c3-b520-43144f6d93e4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f1c2d681-faba-4950-918f-bf58d914ba1f' >>>WHERE (jsonb->>'userId') = 'f1c2d681-faba-4950-918f-bf58d914ba1f' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '47f7eaea-1a18-4058-907c-62b7d095c61b' >>>WHERE (jsonb->>'userId') = '47f7eaea-1a18-4058-907c-62b7d095c61b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '22b0e29a-cc5d-456b-b272-b521ad5d2a39' >>>WHERE (jsonb->>'userId') = '22b0e29a-cc5d-456b-b272-b521ad5d2a39' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '89066e1d-0691-4514-ae37-586cf746d3f4' >>>WHERE (jsonb->>'userId') = '89066e1d-0691-4514-ae37-586cf746d3f4' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '48a3115d-d476-4582-b6a8-55c09eed7ec7' >>>WHERE (jsonb->>'userId') = '48a3115d-d476-4582-b6a8-55c09eed7ec7' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f046c9bd-45aa-4ab1-ad3f-461ead3dfdc1' >>>WHERE (jsonb->>'userId') = 'f046c9bd-45aa-4ab1-ad3f-461ead3dfdc1' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2ee07dc7-835f-4a33-a783-db2ae3f1238c' >>>WHERE (jsonb->>'userId') = '2ee07dc7-835f-4a33-a783-db2ae3f1238c' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5c4910af-508f-49f5-b2c2-f856ffd7f2aa' >>>WHERE (jsonb->>'userId') = '5c4910af-508f-49f5-b2c2-f856ffd7f2aa' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'be3113c3-0965-4bf4-97c2-40ff54501c2b' >>>WHERE (jsonb->>'userId') = 'be3113c3-0965-4bf4-97c2-40ff54501c2b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6c6ab6f6-394a-44a5-8d5c-66f88f9ec01d' >>>WHERE (jsonb->>'userId') = '6c6ab6f6-394a-44a5-8d5c-66f88f9ec01d' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0a246f61-d85f-42b6-8dcc-48d25a46690b' >>>WHERE (jsonb->>'userId') = '0a246f61-d85f-42b6-8dcc-48d25a46690b' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd20d2f4e-6356-4dc3-b7b1-8b9fb5564e02' >>>WHERE (jsonb->>'userId') = 'd20d2f4e-6356-4dc3-b7b1-8b9fb5564e02' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:09 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '11dd4634-e4a9-45f0-9683-fa4d7a8f9728' >>>WHERE (jsonb->>'userId') = '11dd4634-e4a9-45f0-9683-fa4d7a8f9728' 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41362 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:09 [] [] [] [] INFO TenantAPI job e2a67c27-7276-498a-9072-13808a5e0cf5 completed 14:02:09 [] [] [] [] INFO LogUtil 127.0.0.1:41348 GET /_/tenant/e2a67c27-7276-498a-9072-13808a5e0cf5 wait=60000& HTTP_1_1 200 268 1066 tid=diku OK 14:02:09 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:09 [] [] [] [] INFO LoadConfs File does not exist: /postgres-conf.json 14:02:09 [] [] [] [] INFO LoadConfs Resource does not exist: /postgres-conf.json 14:02:09 [] [] [] [] INFO PostgresClient No DB configuration found, setting username, password and database for testing 14:02:09 [] [] [] [] INFO PostgresClient Using schema: badTenant 14:02:09 [] [] [] [] INFO PostgresClient postgreSQLClientConfig = {"postgres_tester":true,"username":"badtenant_mod_permissions","password":"...","database":"postgres","port":49347,"host":"localhost"} 14:02:10 [] [] [] [] ERROR PermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:10 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/123/permissions null HTTP_1_1 400 183 1013 tid=badTenant Bad Request 14:02:10 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:10 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'module' >>>WHERE (jsonb->>'moduleName') = 'module' 14:02:10 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 27 15 tid=diku Created 14:02:10 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:11 [] [] [] [] ERROR PermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:11 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 400 183 1013 tid=badTenant Bad Request 14:02:11 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:12 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') >>>WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') 14:02:12 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 201 254 5 tid=diku Created 14:02:12 [] [] [] [] INFO RestRouting invoking putPermsUsersById 14:02:12 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'non.existing' >>>WHERE (jsonb->>'permissionName') = 'non.existing' [Mon May 10 14:02:12 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:12 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==176bc0cc-b785-4cf9-9e8a-5fafe8178332 >>>WHERE id='176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:12 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==176bc0cc-b785-4cf9-9e8a-5fafe8178332 >>>WHERE id='176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:12 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'non.existing' >>>WHERE (jsonb->>'permissionName') = 'non.existing' 14:02:12 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/users/176bc0cc-b785-4cf9-9e8a-5fafe8178332 null HTTP_1_1 422 309 42 tid=diku Unprocessable Entity 14:02:12 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:12 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' >>>WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:12 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/176bc0cc-b785-4cf9-9e8a-5fafe8178332 null HTTP_1_1 204 0 4 tid=diku No Content 14:02:12 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:12 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleFoo' >>>WHERE (jsonb->>'moduleName') = 'moduleFoo' 14:02:12 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm9a6148a2-e321-4168-a11a-fbdb41103c8a' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm9a6148a2-e321-4168-a11a-fbdb41103c8a' LIMIT 1 14:02:12 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm9a6148a2-e321-4168-a11a-fbdb41103c8a' >>>WHERE (jsonb->>'permissionName') = 'perm9a6148a2-e321-4168-a11a-fbdb41103c8a' 14:02:12 [] [] [] [] INFO TenantPermsAPI Saved perm perm9a6148a2-e321-4168-a11a-fbdb41103c8a 14:02:12 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 208 19 tid=diku Created 14:02:12 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:12 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'user.defined.permd63a8fbf-93c1-4117-b512-ecded2c9f074' >>>WHERE (jsonb->>'permissionName') = 'user.defined.permd63a8fbf-93c1-4117-b512-ecded2c9f074' 14:02:12 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 201 430 5 tid=diku Created 14:02:12 [] [] [] [] INFO RestRouting invoking postTenant 14:02:12 [] [] [] [] INFO PostgresClient Executing multiple statements with id 1016378101 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER ROLE diku_mod_permissions SET search_path = "$user"; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed ALTER ROLE diku_mod_permissions SET search_path = "$user"; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ BEGIN BEGIN -- This only succeeds if show_trgm, a pg_trgm function, -- has been loaded into public schema. PERFORM public.show_trgm('a'); EXCEPTION WHEN undefined_function THEN BEGIN ALTER EXTENSION pg_trgm SET SCHEMA public; EXCEPTION WHEN undefined_object THEN NULL; END; END; END $$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $$ BEGIN BEGIN -- This only succeeds if show_trgm, a pg_trgm function, -- has been loaded into public schema. PERFORM public.show_trgm('a'); EXCEPTION WHEN undefined_function THEN BEGIN ALTER EXTENSION pg_trgm SET SCHEMA public; EXCEPTION WHEN undefined_object THEN NULL; END; END; END $$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE EXTENSION IF NOT EXISTS unaccent WITH SCHEMA public; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42710', message='extension "unaccent" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='extension.c', line='1669', routine='CreateExtension', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE EXTENSION IF NOT EXISTS unaccent WITH SCHEMA public; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE EXTENSION IF NOT EXISTS pg_trgm WITH SCHEMA public; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42710', message='extension "pg_trgm" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='extension.c', line='1669', routine='CreateExtension', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE EXTENSION IF NOT EXISTS pg_trgm WITH SCHEMA public; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_job ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42P07', message='relation "rmb_job" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='parse_utilcmd.c', line='209', routine='transformCreateStmt', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_job ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:12 [] [] [] [] INFO LogUtil 127.0.0.1:41404 POST /_/tenant HTTP_1_1 201 210 11 tid=diku Created 14:02:12 [] [] [] [] INFO PostgresClient Executing multiple statements with id 369183633 14:02:12 [] [] [] [] INFO RestRouting invoking getTenantByOperationId 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} SET search_path TO diku_mod_permissions; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed SET search_path TO diku_mod_permissions; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal_index ( name text PRIMARY KEY, def text NOT NULL, remove boolean NOT NULL ); [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42P07', message='relation "rmb_internal_index" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='parse_utilcmd.c', line='209', routine='transformCreateStmt', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal_index ( name text PRIMARY KEY, def text NOT NULL, remove boolean NOT NULL ); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} UPDATE diku_mod_permissions.rmb_internal_index SET remove = TRUE; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed UPDATE diku_mod_permissions.rmb_internal_index SET remove = TRUE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS rmb_internal_analyze ( tablename text ); [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42P07', message='relation "rmb_internal_analyze" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='parse_utilcmd.c', line='209', routine='transformCreateStmt', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS rmb_internal_analyze ( tablename text ); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.count_estimate_smart2(bigint,bigint,text); 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.count_estimate_smart2(bigint,bigint,text); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE FUNCTION diku_mod_permissions.count_estimate_smart2(rows bigint, lim bigint, query text) RETURNS bigint AS $$ DECLARE rec record; cnt bigint; BEGIN IF rows = lim THEN FOR rec IN EXECUTE 'EXPLAIN ' || query LOOP cnt := substring(rec."QUERY PLAN" FROM ' rows=([[:digit:]]+)'); EXIT WHEN cnt IS NOT NULL; END LOOP; RETURN cnt; END IF; RETURN rows; END; $$ LANGUAGE plpgsql VOLATILE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE FUNCTION diku_mod_permissions.count_estimate_smart2(rows bigint, lim bigint, query text) RETURNS bigint AS $$ DECLARE rec record; cnt bigint; BEGIN IF rows = lim THEN FOR rec IN EXECUTE 'EXPLAIN ' || query LOOP cnt := substring(rec."QUERY PLAN" FROM ' rows=([[:digit:]]+)'); EXIT WHEN cnt IS NOT NULL; END LOOP; RETURN cnt; END IF; RETURN rows; END; $$ LANGUAGE plpgsql VOLATILE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate_default(query text) RETURNS bigint AS $$ DECLARE rows bigint; q text; BEGIN q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO rows; IF rows < 1000 THEN return rows; END IF; rows = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF rows < 1000 THEN return 1000; END IF; RETURN rows; END; $$ LANGUAGE plpgsql IMMUTABLE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate_default(query text) RETURNS bigint AS $$ DECLARE rows bigint; q text; BEGIN q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO rows; IF rows < 1000 THEN return rows; END IF; rows = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF rows < 1000 THEN return 1000; END IF; RETURN rows; END; $$ LANGUAGE plpgsql IMMUTABLE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate(query text) RETURNS bigint AS $$ DECLARE count bigint; est_count bigint; q text; BEGIN est_count = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF est_count > 4*1000 THEN RETURN est_count; END IF; q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO count; IF count < 1000 THEN RETURN count; END IF; IF est_count < 1000 THEN RETURN 1000; END IF; RETURN est_count; END; $$ LANGUAGE plpgsql STABLE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate(query text) RETURNS bigint AS $$ DECLARE count bigint; est_count bigint; q text; BEGIN est_count = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF est_count > 4*1000 THEN RETURN est_count; END IF; q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO count; IF count < 1000 THEN RETURN count; END IF; IF est_count < 1000 THEN RETURN 1000; END IF; RETURN est_count; END; $$ LANGUAGE plpgsql STABLE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.upsert(text, uuid, anyelement) RETURNS uuid AS $$ DECLARE ret uuid; BEGIN EXECUTE format('UPDATE diku_mod_permissions.%I SET jsonb=$3 WHERE id=$2 RETURNING id', $1) USING $1, $2, $3 INTO ret; IF ret IS NOT NULL THEN RETURN ret; END IF; EXECUTE format('INSERT INTO diku_mod_permissions.%I (id, jsonb) VALUES ($2, $3) RETURNING id', $1) USING $1, $2, $3 INTO STRICT ret; RETURN ret; END; $$ LANGUAGE plpgsql; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.upsert(text, uuid, anyelement) RETURNS uuid AS $$ DECLARE ret uuid; BEGIN EXECUTE format('UPDATE diku_mod_permissions.%I SET jsonb=$3 WHERE id=$2 RETURNING id', $1) USING $1, $2, $3 INTO ret; IF ret IS NOT NULL THEN RETURN ret; END IF; EXECUTE format('INSERT INTO diku_mod_permissions.%I (id, jsonb) VALUES ($2, $3) RETURNING id', $1) USING $1, $2, $3 INTO STRICT ret; RETURN ret; END; $$ LANGUAGE plpgsql; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE ver integer; BEGIN SELECT current_setting('server_version_num') INTO ver; IF (ver >= 120000) THEN CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT public.unaccent('public.unaccent', $1) -- schema-qualify function and dictionary $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; ELSE CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT regexp_replace(public.unaccent('public.unaccent', $1), E'[\u0300\u0301\u0302\u0303\u0304\u0305\u0306\u0307\u0308\u0309\u030a\u030b\u030c\u030d\u030e\u030f' || E'\u0310\u0311\u0312\u0313\u0314\u0315\u0316\u0317\u0318\u0319\u031a\u031b\u031c\u031d\u031e\u031f' || E'\u0320\u0321\u0322\u0323\u0324\u0325\u0326\u0327\u0328\u0329\u032a\u032b\u032c\u032d\u032e\u032f' || E'\u0330\u0331\u0332\u0333\u0334\u0335\u0336\u0337\u0338\u0339\u033a\u033b\u033c\u033d\u033e\u033f' || E'\u0340\u0341\u0342\u0343\u0344\u0345\u0346\u0347\u0348\u0349\u034a\u034b\u034c\u034d\u034e\u034f' || E'\u0350\u0351\u0352\u0353\u0354\u0355\u0356\u0357\u0358\u0359\u035a\u035b\u035c\u035d\u035e\u035f' || E'\u0360\u0361\u0362' || E'\u20dd\u20de\u20df\u20e0' || E'\u20e2\u20e3\u20e4]', '', 'g') $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; END IF; END $$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE ver integer; BEGIN SELECT current_setting('server_version_num') INTO ver; IF (ver >= 120000) THEN CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT public.unaccent('public.unaccent', $1) -- schema-qualify function and dictionary $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; ELSE CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT regexp_replace(public.unaccent('public.unaccent', $1), E'[\u0300\u0301\u0302\u0303\u0304\u0305\u0306\u0307\u0308\u0309\u030a\u030b\u030c\u030d\u030e\u030f' || E'\u0310\u0311\u0312\u0313\u0314\u0315\u0316\u0317\u0318\u0319\u031a\u031b\u031c\u031d\u031e\u031f' || E'\u0320\u0321\u0322\u0323\u0324\u0325\u0326\u0327\u0328\u0329\u032a\u032b\u032c\u032d\u032e\u032f' || E'\u0330\u0331\u0332\u0333\u0334\u0335\u0336\u0337\u0338\u0339\u033a\u033b\u033c\u033d\u033e\u033f' || E'\u0340\u0341\u0342\u0343\u0344\u0345\u0346\u0347\u0348\u0349\u034a\u034b\u034c\u034d\u034e\u034f' || E'\u0350\u0351\u0352\u0353\u0354\u0355\u0356\u0357\u0358\u0359\u035a\u035b\u035c\u035d\u035e\u035f' || E'\u0360\u0361\u0362' || E'\u20dd\u20de\u20df\u20e0' || E'\u20e2\u20e3\u20e4]', '', 'g') $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; END IF; END $$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.get_tsvector(text) RETURNS tsvector AS $$ SELECT to_tsvector('simple', translate($1, '&', ',')); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.get_tsvector(text) RETURNS tsvector AS $$ SELECT to_tsvector('simple', translate($1, '&', ',')); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_and(text) RETURNS tsquery AS $$ SELECT to_tsquery('simple', string_agg(CASE WHEN length(v) = 0 OR v = '*' THEN '' WHEN right(v, 1) = '*' THEN '''' || left(v, -1) || ''':*' ELSE '''' || v || '''' END, '&')) FROM (SELECT regexp_split_to_table(translate($1, '&''', ',,'), ' +')) AS x(v); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_and(text) RETURNS tsquery AS $$ SELECT to_tsquery('simple', string_agg(CASE WHEN length(v) = 0 OR v = '*' THEN '' WHEN right(v, 1) = '*' THEN '''' || left(v, -1) || ''':*' ELSE '''' || v || '''' END, '&')) FROM (SELECT regexp_split_to_table(translate($1, '&''', ',,'), ' +')) AS x(v); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_or(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '|')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_or(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '|')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_phrase(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '<->')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_phrase(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '<->')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.normalize_digits(text) RETURNS text AS $$ SELECT translate((regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1], E' \t-', '') || CASE WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1] = '' THEN '' WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2] = '' THEN '' ELSE ' ' END || (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2]; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.normalize_digits(text) RETURNS text AS $$ SELECT translate((regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1], E' \t-', '') || CASE WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1] = '' THEN '' WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2] = '' THEN '' ELSE ' ' END || (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2]; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_id_in_jsonb() RETURNS TRIGGER AS $$ BEGIN NEW.jsonb = jsonb_set(NEW.jsonb, '{id}', to_jsonb(NEW.id)); RETURN NEW; END; $$ language 'plpgsql'; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_id_in_jsonb() RETURNS TRIGGER AS $$ BEGIN NEW.jsonb = jsonb_set(NEW.jsonb, '{id}', to_jsonb(NEW.id)); RETURN NEW; END; $$ language 'plpgsql'; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_space_sql(VARIADIC text[]) RETURNS text AS $$ select concat_ws(' ', VARIADIC $1); $$ LANGUAGE SQL IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_space_sql(VARIADIC text[]) RETURNS text AS $$ select concat_ws(' ', VARIADIC $1); $$ LANGUAGE SQL IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object_values(jsonb_array jsonb, field text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object_values(jsonb_array jsonb, field text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object_values( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1) WHERE value->>$3 = $4; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object_values( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1) WHERE value->>$3 = $4; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.first_array_object_value( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT value->>$2 FROM jsonb_array_elements($1) WHERE value->>$3 = $4 LIMIT 1; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.first_array_object_value( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT value->>$2 FROM jsonb_array_elements($1) WHERE value->>$3 = $4 LIMIT 1; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object(jsonb_array jsonb) RETURNS text AS $$ SELECT string_agg(value::text, ' ') FROM jsonb_array_elements_text($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object(jsonb_array jsonb) RETURNS text AS $$ SELECT string_agg(value::text, ' ') FROM jsonb_array_elements_text($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS rmb_internal_index(aname text, tops text, newdef text); [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function rmb_internal_index(text,text,text) does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS rmb_internal_index(aname text, tops text, newdef text); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION rmb_internal_index( atable text, aname text, tops text, newdef text) RETURNS void AS $$ DECLARE olddef text; namep CONSTANT text = concat(aname, '_p'); prepareddef text; BEGIN IF tops = 'DELETE' THEN -- use case insensitive %s, not case sensitive %I -- no SQL injection because the names are hard-coded in schema.json EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE 'DELETE FROM diku_mod_permissions.rmb_internal_index WHERE name = $1' USING aname; RETURN; END IF; SELECT def INTO olddef FROM diku_mod_permissions.rmb_internal_index WHERE name = aname; SELECT def INTO prepareddef FROM diku_mod_permissions.rmb_internal_index WHERE name = namep; prepareddef = replace(prepareddef, concat(' ', namep, ' ON '), concat(' ', aname, ' ON ')); IF prepareddef = newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE format('ALTER INDEX IF EXISTS %s RENAME TO %s', namep, aname); EXECUTE 'DELETE FROM rmb_internal_index WHERE name = $1' USING namep; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; ELSIF olddef IS DISTINCT FROM newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE newdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; END IF; EXECUTE 'INSERT INTO diku_mod_permissions.rmb_internal_index VALUES ($1, $2, FALSE) ' 'ON CONFLICT (name) DO UPDATE SET def = EXCLUDED.def, remove = EXCLUDED.remove' USING aname, newdef; END $$ LANGUAGE plpgsql; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION rmb_internal_index( atable text, aname text, tops text, newdef text) RETURNS void AS $$ DECLARE olddef text; namep CONSTANT text = concat(aname, '_p'); prepareddef text; BEGIN IF tops = 'DELETE' THEN -- use case insensitive %s, not case sensitive %I -- no SQL injection because the names are hard-coded in schema.json EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE 'DELETE FROM diku_mod_permissions.rmb_internal_index WHERE name = $1' USING aname; RETURN; END IF; SELECT def INTO olddef FROM diku_mod_permissions.rmb_internal_index WHERE name = aname; SELECT def INTO prepareddef FROM diku_mod_permissions.rmb_internal_index WHERE name = namep; prepareddef = replace(prepareddef, concat(' ', namep, ' ON '), concat(' ', aname, ' ON ')); IF prepareddef = newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE format('ALTER INDEX IF EXISTS %s RENAME TO %s', namep, aname); EXECUTE 'DELETE FROM rmb_internal_index WHERE name = $1' USING namep; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; ELSIF olddef IS DISTINCT FROM newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE newdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; END IF; EXECUTE 'INSERT INTO diku_mod_permissions.rmb_internal_index VALUES ($1, $2, FALSE) ' 'ON CONFLICT (name) DO UPDATE SET def = EXCLUDED.def, remove = EXCLUDED.remove' USING aname, newdef; END $$ LANGUAGE plpgsql; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ BEGIN -- use advisory lock to prevent "tuple concurrently updated" -- https://issues.folio.org/browse/RMB-744 PERFORM pg_advisory_xact_lock(20201101, 1234567890); REVOKE ALL PRIVILEGES ON SCHEMA public FROM diku_mod_permissions; REVOKE CREATE ON SCHEMA public FROM PUBLIC; END $$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $$ BEGIN -- use advisory lock to prevent "tuple concurrently updated" -- https://issues.folio.org/browse/RMB-744 PERFORM pg_advisory_xact_lock(20201101, 1234567890); REVOKE ALL PRIVILEGES ON SCHEMA public FROM diku_mod_permissions; REVOKE CREATE ON SCHEMA public FROM PUBLIC; END $$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42P07', message='relation "permissions" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='parse_utilcmd.c', line='209', routine='transformCreateStmt', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_injson_permissions ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_injson_permissions" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_injson_permissions ON diku_mod_permissions.permissions CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER TABLE diku_mod_permissions.permissions ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42701', message='column "creation_date" of relation "permissions" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='tablecmds.c', line='6166', routine='check_for_column_name_collision', schema='null', table='null', column='null', dataType='null', constraint='null' [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42701', message='column "created_by" of relation "permissions" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='tablecmds.c', line='6166', routine='check_for_column_name_collision', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed ALTER TABLE diku_mod_permissions.permissions ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ ); END $do$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ ); END $do$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ ); END $do$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ ); END $do$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS update_permissions_references ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "update_permissions_references" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS update_permissions_references ON diku_mod_permissions.permissions CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_references(); [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.update_permissions_references() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_references(); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_md_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_md_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_set_md(); 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_set_md(); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_md_json_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_md_json_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_md_json(); 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_md_json(); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_ol_version_trigger ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_ol_version_trigger" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_ol_version_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_set_ol_version() CASCADE; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.permissions_set_ol_version() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_set_ol_version() CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions_users ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42P07', message='relation "permissions_users" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='parse_utilcmd.c', line='209', routine='transformCreateStmt', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions_users ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_injson_permissions_users ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_injson_permissions_users" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_injson_permissions_users ON diku_mod_permissions.permissions_users CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions_users CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions_users CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER TABLE diku_mod_permissions.permissions_users ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42701', message='column "creation_date" of relation "permissions_users" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='tablecmds.c', line='6166', routine='check_for_column_name_collision', schema='null', table='null', column='null', dataType='null', constraint='null' [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='42701', message='column "created_by" of relation "permissions_users" already exists, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='tablecmds.c', line='6166', routine='check_for_column_name_collision', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed ALTER TABLE diku_mod_permissions.permissions_users ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ ); END $do$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ ); END $do$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ ); END $do$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ ); END $do$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ ); END $do$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ ); END $do$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS update_permissions_users_references ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "update_permissions_users_references" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS update_permissions_users_references ON diku_mod_permissions.permissions_users CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_users_references(); [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.update_permissions_users_references() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_users_references(); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_users_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_users_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_md_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_md_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_users_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_users_set_md(); 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_users_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_users_set_md(); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_users_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_users_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_md_json_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_md_json_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_users_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_users_md_json(); 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_users_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_users_md_json(); 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_ol_version_trigger ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_users_ol_version_trigger" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_ol_version_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_users_set_ol_version() CASCADE; [Mon May 10 14:02:12 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.permissions_users_set_ol_version() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_users_set_ol_version() CASCADE; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE aname TEXT; BEGIN FOR aname IN SELECT name FROM diku_mod_permissions.rmb_internal_index WHERE remove = TRUE LOOP EXECUTE 'DROP INDEX IF EXISTS ' || aname; END LOOP; END $$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE aname TEXT; BEGIN FOR aname IN SELECT name FROM diku_mod_permissions.rmb_internal_index WHERE remove = TRUE LOOP EXECUTE 'DROP INDEX IF EXISTS ' || aname; END LOOP; END $$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE version TEXT; i RECORD; newindexdef TEXT; BEGIN SELECT jsonb->>'rmbVersion' INTO version FROM diku_mod_permissions.rmb_internal; IF version !~ '^(\d\.|1\d\.|2[0-8]\.|29\.[0-3]\.)' THEN -- skip this upgrade if last install/upgrade was made by RMB >= 29.4.x RETURN; END IF; FOR i IN SELECT * FROM pg_catalog.pg_indexes WHERE schemaname = 'diku_mod_permissions' LOOP newindexdef := regexp_replace(i.indexdef, -- \m = beginning of a word, \M = end of a word '\mpublic\.(f_unaccent|concat_space_sql|concat_array_object_values|concat_array_object)\M', 'diku_mod_permissions.\1', 'g'); IF newindexdef <> i.indexdef THEN EXECUTE 'DROP INDEX ' || i.indexname; EXECUTE newindexdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING i.tablename; END IF; END LOOP; END $$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE version TEXT; i RECORD; newindexdef TEXT; BEGIN SELECT jsonb->>'rmbVersion' INTO version FROM diku_mod_permissions.rmb_internal; IF version !~ '^(\d\.|1\d\.|2[0-8]\.|29\.[0-3]\.)' THEN -- skip this upgrade if last install/upgrade was made by RMB >= 29.4.x RETURN; END IF; FOR i IN SELECT * FROM pg_catalog.pg_indexes WHERE schemaname = 'diku_mod_permissions' LOOP newindexdef := regexp_replace(i.indexdef, -- \m = beginning of a word, \M = end of a word '\mpublic\.(f_unaccent|concat_space_sql|concat_array_object_values|concat_array_object)\M', 'diku_mod_permissions.\1', 'g'); IF newindexdef <> i.indexdef THEN EXECUTE 'DROP INDEX ' || i.indexname; EXECUTE newindexdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING i.tablename; END IF; END LOOP; END $$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE t TEXT; BEGIN FOR t IN SELECT DISTINCT tablename FROM rmb_internal_analyze LOOP EXECUTE 'ANALYZE ' || t; END LOOP; END $$; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE t TEXT; BEGIN FOR t IN SELECT DISTINCT tablename FROM rmb_internal_analyze LOOP EXECUTE 'ANALYZE ' || t; END LOOP; END $$; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} TRUNCATE rmb_internal_analyze; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed TRUNCATE rmb_internal_analyze; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA diku_mod_permissions TO diku_mod_permissions; 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA diku_mod_permissions TO diku_mod_permissions; 14:02:12 [] [] [] [] INFO PostgresClient trying to execute: {} UPDATE diku_mod_permissions.rmb_internal SET jsonb = jsonb || jsonb_build_object( 'rmbVersion', '33.0.0-SNAPSHOT', 'moduleVersion', 'mod-permissions-1.0.0', 'schemaJson', $mainftl${ "scripts" : [], "tables" : [ { "tableName" : "permissions", "fromModuleVersion" : "5.0", "withMetadata" : true, "uniqueIndex" : [ { "fieldName" : "permissionName", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "permissionName", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] }, { "tableName" : "permissions_users", "fromModuleVersion" : "5.0", "withMetadata" : true, "index" : [ { "fieldName" : "id", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false }, { "fieldName" : "userId", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "userId", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] } ], "views" : [] } $mainftl$); 14:02:12 [] [] [] [] INFO PostgresClient Successfully executed UPDATE diku_mod_permissions.rmb_internal SET jsonb = jsonb || jsonb_build_object( 'rmbVersion', '33.0.0-SNAPSHOT', 'moduleVersion', 'mod-permissions-1.0.0', 'schemaJson', $mainftl${ "scripts" : [], "tables" : [ { "tableName" : "permissions", "fromModuleVersion" : "5.0", "withMetadata" : true, "uniqueIndex" : [ { "fieldName" : "permissionName", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "permissionName", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] }, { "tableName" : "permissions_users", "fromModuleVersion" : "5.0", "withMetadata" : true, "index" : [ { "fieldName" : "id", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false }, { "fieldName" : "userId", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "userId", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] } ], "views" : [] } $mainftl$); 14:02:12 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'mutable') = 'false' >>>WHERE (jsonb->>'mutable') = 'false' 14:02:12 [] [] [] [] INFO Conn starting: saveBatch size=1 14:02:12 [] [] [] [] ERROR Conn saveBatch size=1 { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:12 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:12 [] [] [] [] ERROR TenantRefAPI Failed to mark system-defined permissions deprecated io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:12 [] [] [] [] INFO TenantAPI job 523b5045-48c5-4ab8-bd2d-ad13327fc699 completed 14:02:12 [] [] [] [] INFO LogUtil 127.0.0.1:41404 GET /_/tenant/523b5045-48c5-4ab8-bd2d-ad13327fc699 wait=60000& HTTP_1_1 200 454 35 tid=diku OK 14:02:12 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:12 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==perm9a6148a2-e321-4168-a11a-fbdb41103c8a) AND (dummy==false)' [Mon May 10 14:02:12 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:12 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:12 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:12 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==perm9a6148a2-e321-4168-a11a-fbdb41103c8a) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('perm9a6148a2-e321-4168-a11a-fbdb41103c8a'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:12 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:12 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:12 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:12 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName==perm9a6148a2-e321-4168-a11a-fbdb41103c8a HTTP_1_1 200 424 15 tid=diku OK 14:02:12 [] [] [] [] INFO RestVerticleTest { "permissionName" : "perm9a6148a2-e321-4168-a11a-fbdb41103c8a", "displayName" : "Description Foo", "id" : "f126adb1-7b5f-4e21-936b-d1cbc58df4f5", "tags" : [ ], "subPermissions" : [ ], "childOf" : [ ], "grantedTo" : [ ], "mutable" : false, "visible" : false, "dummy" : false, "deprecated" : false, "moduleName" : "moduleFoo" } 14:02:12 [] [] [] [] ERROR VertxUtils Unhandled exception caught by vertx java.lang.AssertionError: Expected true at io.vertx.ext.unit.impl.TestContextImpl.reportAssertionError(TestContextImpl.java:362) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.assertTrue(TestContextImpl.java:202) ~[vertx-unit-4.0.2.jar:4.0.2] at io.vertx.ext.unit.impl.TestContextImpl.assertTrue(TestContextImpl.java:208) ~[vertx-unit-4.0.2.jar:4.0.2] at org.folio.permstest.RestVerticleTest.lambda$testDeprecatePermissionsOnTenantInit$49(RestVerticleTest.java:1225) ~[test-classes/:?] at io.vertx.core.impl.future.FutureImpl$1.onSuccess(FutureImpl.java:90) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl$ListenerArray.onSuccess(FutureImpl.java:230) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.tryComplete(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.Promise.tryComplete(Promise.java:121) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.Promise.complete(Promise.java:77) ~[vertx-core-4.0.2.jar:4.0.2] at org.folio.permstest.TestUtil.lambda$tenantOp$2(TestUtil.java:109) ~[test-classes/:?] at io.vertx.core.impl.future.FutureImpl$3.onSuccess(FutureImpl.java:124) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.tryComplete(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.onSuccess(PromiseImpl.java:49) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.handle(PromiseImpl.java:41) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.handle(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.ext.web.client.impl.HttpContext.handleDispatchResponse(HttpContext.java:369) ~[vertx-web-client-4.0.2.jar:4.0.2] at io.vertx.ext.web.client.impl.HttpContext.execute(HttpContext.java:356) ~[vertx-web-client-4.0.2.jar:4.0.2] at io.vertx.ext.web.client.impl.HttpContext.next(HttpContext.java:334) ~[vertx-web-client-4.0.2.jar:4.0.2] at io.vertx.ext.web.client.impl.HttpContext.fire(HttpContext.java:301) ~[vertx-web-client-4.0.2.jar:4.0.2] at io.vertx.ext.web.client.impl.HttpContext.dispatchResponse(HttpContext.java:263) ~[vertx-web-client-4.0.2.jar:4.0.2] at io.vertx.ext.web.client.impl.HttpContext.lambda$null$8(HttpContext.java:533) ~[vertx-web-client-4.0.2.jar:4.0.2] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:96) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:59) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.lambda$runOnContext$0(EventLoopContext.java:40) ~[vertx-core-4.0.2.jar:4.0.2] at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:164) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:497) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:12 [] [] [] [] INFO RestRouting invoking putPermsPermissionsById 14:02:13 [] [] [] [] ERROR PermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:13 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/permissions/123 null HTTP_1_1 400 183 1011 tid=badTenant Bad Request 14:02:13 [] [] [] [] INFO RestRouting invoking deletePermsUsersPermissionsByIdAndPermissionname 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '123' >>>WHERE id = '123' 14:02:13 [] [] [] [] ERROR PostgresClient query with count: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } - SELECT diku_mod_permissions.count_estimate('SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = ''123''') io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:13 [] [] [] [] ERROR PermsAPI { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:13 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/123/permissions/name null HTTP_1_1 400 458 8 tid=diku Bad Request 14:02:13 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '818ce66c-feae-4695-ad96-028415a50276' >>>WHERE id = '818ce66c-feae-4695-ad96-028415a50276' 14:02:13 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/818ce66c-feae-4695-ad96-028415a50276/permissions null HTTP_1_1 404 56 6 tid=diku Not Found 14:02:13 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = 'd2506dbc-c720-4d39-a632-534172b055da' OR (jsonb->>'userId') = 'd1bfb555-11b2-4552-8cb8-b641433497e3') >>>WHERE (id = 'd2506dbc-c720-4d39-a632-534172b055da' OR (jsonb->>'userId') = 'd1bfb555-11b2-4552-8cb8-b641433497e3') 14:02:13 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 201 254 6 tid=diku Created 14:02:13 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'd2506dbc-c720-4d39-a632-534172b055da' >>>WHERE id = 'd2506dbc-c720-4d39-a632-534172b055da' 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'abname' >>>WHERE (jsonb->>'permissionName') = 'abname' 14:02:13 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/d2506dbc-c720-4d39-a632-534172b055da/permissions null HTTP_1_1 400 42 7 tid=diku Bad Request 14:02:13 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'amodule' >>>WHERE (jsonb->>'moduleName') = 'amodule' 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.all' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'adummy.all' LIMIT 1 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'abname' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'abname' LIMIT 1 14:02:13 [] [] [] [] INFO TenantPermsAPI Permission with name 'abname' does not exist 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'abname' >>>WHERE (jsonb->>'permissionName') = 'abname' 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'abname' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'abname' LIMIT 1 14:02:13 [] [] [] [] INFO TenantPermsAPI Permission with name 'abname' exists 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'abname' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'abname' LIMIT 1 14:02:13 [] [] [] [] INFO TenantPermsAPI Permission with name 'abname' exists 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'abname' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'abname' LIMIT 1 14:02:13 [] [] [] [] INFO TenantPermsAPI Permission with name 'abname' exists 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.all' >>>WHERE (jsonb->>'permissionName') = 'adummy.all' 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'abname' >>>WHERE (jsonb->>'permissionName') = 'abname' 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'abname' >>>WHERE (jsonb->>'permissionName') = 'abname' 14:02:13 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission abname with value adummy.all 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'abname' >>>WHERE (jsonb->>'permissionName') = 'abname' 14:02:13 [] [] [] [] INFO TenantPermsAPI Saved perm adummy.all 14:02:13 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 219 17 tid=diku Created 14:02:13 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'd2506dbc-c720-4d39-a632-534172b055da' >>>WHERE id = 'd2506dbc-c720-4d39-a632-534172b055da' 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'abname' >>>WHERE (jsonb->>'permissionName') = 'abname' 14:02:13 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/d2506dbc-c720-4d39-a632-534172b055da/permissions null HTTP_1_1 400 74 2 tid=diku Bad Request 14:02:13 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:13 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'd2506dbc-c720-4d39-a632-534172b055da' >>>WHERE id = 'd2506dbc-c720-4d39-a632-534172b055da' 14:02:13 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/d2506dbc-c720-4d39-a632-534172b055da null HTTP_1_1 204 0 1 tid=diku No Content 14:02:13 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:14 [] [] [] [] ERROR PermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:14 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 400 183 1010 tid=badTenant Bad Request 14:02:14 [] [] [] [] INFO RestRouting invoking getPermsUsers [Mon May 10 14:02:14 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:14 [] [] [] [] ERROR PostgresClient org.folio.cql2pgjson.exception.QueryValidationException: org.z3950.zing.cql.CQLParseException: expected index or term, got EOF org.folio.rest.persist.cql.CQLQueryValidationException: org.folio.cql2pgjson.exception.QueryValidationException: org.z3950.zing.cql.CQLParseException: expected index or term, got EOF at org.folio.rest.persist.cql.CQLWrapper.getWhereThis(CQLWrapper.java:176) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereOp(CQLWrapper.java:203) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereClause(CQLWrapper.java:226) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWithoutLimOff(CQLWrapper.java:277) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.toString(CQLWrapper.java:287) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.buildQueryHelper(PostgresClient.java:2114) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.doStreamGetCount(PostgresClient.java:1939) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.streamGet(PostgresClient.java:1915) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.lambda$48(PostgresClient.java:1853) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.lambda$116(PostgresClient.java:3501) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.future.FutureImpl$3.onSuccess(FutureImpl.java:124) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.addListener(FutureImpl.java:164) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.onComplete(FutureImpl.java:132) ~[vertx-core-4.0.2.jar:4.0.2] at org.folio.rest.persist.PostgresClient.getConnection(PostgresClient.java:3465) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.getSQLConnection(PostgresClient.java:3492) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.streamGet(PostgresClient.java:1852) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PgUtil.streamGet(PgUtil.java:672) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PgUtil.streamGet(PgUtil.java:620) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PgUtil.streamGet(PgUtil.java:588) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.getPermsUsers(PermsAPI.java:120) ~[classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at org.folio.rest.RestRouting.invoke(RestRouting.java:433) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.RestRouting.lambda$22(RestRouting.java:701) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:96) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:59) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.onEnd(Http1xServerRequest.java:549) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.handleEnd(Http1xServerRequest.java:535) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.execute(EventLoopContext.java:73) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.DuplicatedContext.execute(DuplicatedContext.java:189) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.onEnd(Http1xServerConnection.java:199) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.handleMessage(Http1xServerConnection.java:142) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:153) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:148) [vertx-core-4.0.2.jar:4.0.2] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.ChannelInboundHandlerAdapter.channelRead(ChannelInboundHandlerAdapter.java:93) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.http.websocketx.extensions.WebSocketServerExtensionHandler.channelRead(WebSocketServerExtensionHandler.java:101) [netty-codec-http-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] Caused by: org.folio.cql2pgjson.exception.QueryValidationException: org.z3950.zing.cql.CQLParseException: expected index or term, got EOF at org.folio.cql2pgjson.CQL2PgJSON.toSql(CQL2PgJSON.java:301) ~[cql2pgjson-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereThis(CQLWrapper.java:174) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] ... 68 more Caused by: org.z3950.zing.cql.CQLParseException: expected index or term, got EOF at org.z3950.zing.cql.CQLParser.matchSymbol(CQLParser.java:356) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseTerm(CQLParser.java:236) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseQuery(CQLParser.java:175) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseTopLevelPrefixes(CQLParser.java:136) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parse(CQLParser.java:119) ~[cql-java-1.13.jar:?] at org.folio.cql2pgjson.CQL2PgJSON.toSql(CQL2PgJSON.java:298) ~[cql2pgjson-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereThis(CQLWrapper.java:174) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] ... 68 more 14:02:14 [] [] [] [] ERROR PgUtil org.folio.cql2pgjson.exception.QueryValidationException: org.z3950.zing.cql.CQLParseException: expected index or term, got EOF org.folio.rest.persist.cql.CQLQueryValidationException: org.folio.cql2pgjson.exception.QueryValidationException: org.z3950.zing.cql.CQLParseException: expected index or term, got EOF at org.folio.rest.persist.cql.CQLWrapper.getWhereThis(CQLWrapper.java:176) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereOp(CQLWrapper.java:203) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereClause(CQLWrapper.java:226) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWithoutLimOff(CQLWrapper.java:277) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.toString(CQLWrapper.java:287) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.buildQueryHelper(PostgresClient.java:2114) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.doStreamGetCount(PostgresClient.java:1939) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.streamGet(PostgresClient.java:1915) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.lambda$48(PostgresClient.java:1853) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.lambda$116(PostgresClient.java:3501) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.future.FutureImpl$3.onSuccess(FutureImpl.java:124) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.addListener(FutureImpl.java:164) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.onComplete(FutureImpl.java:132) ~[vertx-core-4.0.2.jar:4.0.2] at org.folio.rest.persist.PostgresClient.getConnection(PostgresClient.java:3465) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.getSQLConnection(PostgresClient.java:3492) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.streamGet(PostgresClient.java:1852) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PgUtil.streamGet(PgUtil.java:672) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PgUtil.streamGet(PgUtil.java:620) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PgUtil.streamGet(PgUtil.java:588) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.getPermsUsers(PermsAPI.java:120) ~[classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at org.folio.rest.RestRouting.invoke(RestRouting.java:433) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.RestRouting.lambda$22(RestRouting.java:701) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:96) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:59) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.onEnd(Http1xServerRequest.java:549) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.handleEnd(Http1xServerRequest.java:535) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.execute(EventLoopContext.java:73) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.DuplicatedContext.execute(DuplicatedContext.java:189) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.onEnd(Http1xServerConnection.java:199) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.handleMessage(Http1xServerConnection.java:142) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:153) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:148) [vertx-core-4.0.2.jar:4.0.2] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.ChannelInboundHandlerAdapter.channelRead(ChannelInboundHandlerAdapter.java:93) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.http.websocketx.extensions.WebSocketServerExtensionHandler.channelRead(WebSocketServerExtensionHandler.java:101) [netty-codec-http-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] Caused by: org.folio.cql2pgjson.exception.QueryValidationException: org.z3950.zing.cql.CQLParseException: expected index or term, got EOF at org.folio.cql2pgjson.CQL2PgJSON.toSql(CQL2PgJSON.java:301) ~[cql2pgjson-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereThis(CQLWrapper.java:174) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] ... 68 more Caused by: org.z3950.zing.cql.CQLParseException: expected index or term, got EOF at org.z3950.zing.cql.CQLParser.matchSymbol(CQLParser.java:356) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseTerm(CQLParser.java:236) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseQuery(CQLParser.java:175) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseTopLevelPrefixes(CQLParser.java:136) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parse(CQLParser.java:119) ~[cql-java-1.13.jar:?] at org.folio.cql2pgjson.CQL2PgJSON.toSql(CQL2PgJSON.java:298) ~[cql2pgjson-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereThis(CQLWrapper.java:174) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] ... 68 more 14:02:14 [] [] [] [] INFO RestRouting invoking putPermsUsersById 14:02:15 [] [] [] [] ERROR PermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:15 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/users/123 null HTTP_1_1 400 183 1013 tid=badTenant Bad Request 14:02:15 [] [] [] [] INFO RestRouting invoking putPermsUsersById [Mon May 10 14:02:15 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:16 [] [] [] [] ERROR PermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/users/123 null HTTP_1_1 400 183 1017 tid=badTenant Bad Request 14:02:16 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleA0' >>>WHERE (jsonb->>'moduleName') = 'moduleA0' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm49d4b7c8-03e2-49a5-88fb-d746a67a30db' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm49d4b7c8-03e2-49a5-88fb-d746a67a30db' LIMIT 1 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm49d4b7c8-03e2-49a5-88fb-d746a67a30db' >>>WHERE (jsonb->>'permissionName') = 'perm49d4b7c8-03e2-49a5-88fb-d746a67a30db' 14:02:16 [] [] [] [] INFO TenantPermsAPI Saved perm perm49d4b7c8-03e2-49a5-88fb-d746a67a30db 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 205 19 tid=diku Created 14:02:16 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleA0' >>>WHERE (jsonb->>'moduleName') = 'moduleA0' 14:02:16 [] [] [] [] INFO Conn starting: saveBatch size=1 14:02:16 [] [] [] [] ERROR Conn saveBatch size=1 { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:16 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:16 [] [] [] [] ERROR TenantPermsAPI { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 400 205 10 tid=diku Bad Request 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'a' >>>WHERE (jsonb->>'permissionName') = 'a' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 201 309 3 tid=diku Created 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:16 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(dummy == false)' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (dummy == false) >>>WHERE lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) LIMIT 10 OFFSET 0 [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions null HTTP_1_1 200 2163 6 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:16 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName=a) AND (dummy==false)' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = a >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('a')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = a >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('a')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName=a) AND (dummy==false) >>>WHERE (get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('a'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = a >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('a')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = a >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('a')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = a >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('a')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName%3Da HTTP_1_1 200 472 13 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'a' >>>WHERE (jsonb->>'permissionName') = 'a' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 422 205 3 tid=diku Unprocessable Entity 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') >>>WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'bunny.fufu' >>>WHERE (jsonb->>'permissionName') = 'bunny.fufu' 14:02:16 [] [] [] [] ERROR PermsAPI Error updating derived fields: Attempting to add non-existent permissions bunny.fufu to permission user with id 176bc0cc-b785-4cf9-9e8a-5fafe8178332 org.folio.rest.impl.PermsAPI$InvalidPermissionsException: Attempting to add non-existent permissions bunny.fufu to permission user with id 176bc0cc-b785-4cf9-9e8a-5fafe8178332 at org.folio.rest.impl.PermsAPI.lambda$86(PermsAPI.java:1529) ~[classes/:?] at io.vertx.core.impl.future.FutureImpl$3.onSuccess(FutureImpl.java:124) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.Composition$1.onSuccess(Composition.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.SucceededFuture.addListener(SucceededFuture.java:82) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.Composition.onSuccess(Composition.java:43) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.tryComplete(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.Promise.complete(Promise.java:66) ~[vertx-core-4.0.2.jar:4.0.2] at org.folio.rest.impl.PermsAPI.lambda$74(PermsAPI.java:1232) ~[classes/:?] at io.vertx.core.impl.future.FutureImpl$3.onSuccess(FutureImpl.java:124) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.tryComplete(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.Promise.complete(Promise.java:66) ~[vertx-core-4.0.2.jar:4.0.2] at org.folio.rest.impl.PermsAPI.lambda$73(PermsAPI.java:1196) ~[classes/:?] at io.vertx.core.impl.future.FutureImpl$3.onSuccess(FutureImpl.java:124) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl$ListenerArray.onSuccess(FutureImpl.java:230) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.Composition$1.onSuccess(Composition.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.tryComplete(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.onSuccess(PromiseImpl.java:49) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.handle(PromiseImpl.java:41) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.handle(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at org.folio.rest.persist.PostgresClient.lambda$67(PostgresClient.java:2172) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.lambda$102(PostgresClient.java:3168) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.future.FutureImpl$3.onSuccess(FutureImpl.java:124) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.tryComplete(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.sqlclient.impl.QueryResultBuilder.tryComplete(QueryResultBuilder.java:102) ~[vertx-sql-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.sqlclient.impl.QueryResultBuilder.tryComplete(QueryResultBuilder.java:35) ~[vertx-sql-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.core.Promise.complete(Promise.java:66) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.Promise.handle(Promise.java:51) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.sqlclient.impl.TransactionImpl.lambda$wrap$1(TransactionImpl.java:78) ~[vertx-sql-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.core.impl.future.FutureImpl$3.onSuccess(FutureImpl.java:124) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.lambda$emitSuccess$0(FutureBase.java:54) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.execute(EventLoopContext.java:83) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.DuplicatedContext.execute(DuplicatedContext.java:199) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:51) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.tryComplete(FutureImpl.java:179) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.tryComplete(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.onSuccess(PromiseImpl.java:49) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.handle(PromiseImpl.java:41) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.PromiseImpl.handle(PromiseImpl.java:23) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.sqlclient.impl.command.CommandResponse.fire(CommandResponse.java:46) ~[vertx-sql-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.sqlclient.impl.SocketConnectionBase.handleMessage(SocketConnectionBase.java:258) ~[vertx-sql-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.PgSocketConnection.handleMessage(PgSocketConnection.java:94) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.sqlclient.impl.SocketConnectionBase.lambda$init$0(SocketConnectionBase.java:96) ~[vertx-sql-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.core.net.impl.NetSocketImpl.lambda$new$1(NetSocketImpl.java:90) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:240) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:130) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.NetSocketImpl.lambda$handleMessage$9(NetSocketImpl.java:378) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.emit(EventLoopContext.java:52) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.ContextImpl.emit(ContextImpl.java:294) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.emit(EventLoopContext.java:24) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.NetSocketImpl.handleMessage(NetSocketImpl.java:377) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:153) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:148) ~[vertx-core-4.0.2.jar:4.0.2] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) ~[netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) ~[netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) ~[netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.CombinedChannelDuplexHandler$DelegatingChannelHandlerContext.fireChannelRead(CombinedChannelDuplexHandler.java:436) ~[netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.vertx.pgclient.impl.codec.PgEncoder.lambda$write$0(PgEncoder.java:77) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgCommandCodec.handleReadyForQuery(PgCommandCodec.java:139) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeReadyForQuery(PgDecoder.java:226) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:86) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 422 339 4 tid=diku Unprocessable Entity 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') >>>WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') >>>WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') 14:02:16 [] [] [] [] WARN PermsAPI Constraint violated for userId or id field (or both) 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 422 256 2 tid=diku Unprocessable Entity 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' >>>WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'a' >>>WHERE (jsonb->>'permissionName') = 'a' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==176bc0cc-b785-4cf9-9e8a-5fafe8178332 >>>WHERE id='176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'a' >>>WHERE (jsonb->>'permissionName') = 'a' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'a' >>>WHERE (jsonb->>'permissionName') = 'a' 14:02:16 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission a with value 176bc0cc-b785-4cf9-9e8a-5fafe8178332 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'a' >>>WHERE (jsonb->>'permissionName') = 'a' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/176bc0cc-b785-4cf9-9e8a-5fafe8178332/permissions null HTTP_1_1 200 28 9 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' >>>WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/176bc0cc-b785-4cf9-9e8a-5fafe8178332/permissions null HTTP_1_1 422 271 1 tid=diku Unprocessable Entity 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'c04f2722-068e-4809-8d1e-c85decdd7073' >>>WHERE id = 'c04f2722-068e-4809-8d1e-c85decdd7073' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' >>>WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' >>>WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/permissions/c04f2722-068e-4809-8d1e-c85decdd7073 null HTTP_1_1 204 0 6 tid=diku No Content 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.whizz' >>>WHERE (jsonb->>'permissionName') = 'foo.whizz' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 422 269 3 tid=diku Unprocessable Entity 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 201 363 2 tid=diku Created 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 422 219 1 tid=diku Unprocessable Entity 14:02:16 [] [] [] [] INFO RestRouting invoking putPermsPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' >>>WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' >>>WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.whizz' >>>WHERE (jsonb->>'permissionName') = 'foo.whizz' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/permissions/cb95a04c-38fd-4f68-9124-afe4e5e41a5b null HTTP_1_1 422 316 5 tid=diku Unprocessable Entity 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.whizz' >>>WHERE (jsonb->>'permissionName') = 'foo.whizz' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 201 358 2 tid=diku Created 14:02:16 [] [] [] [] INFO RestRouting invoking putPermsPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' >>>WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' >>>WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.whizz' >>>WHERE (jsonb->>'permissionName') = 'foo.whizz' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.whizz' >>>WHERE (jsonb->>'permissionName') = 'foo.whizz' 14:02:16 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission foo.whizz with value foo.all# 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.whizz' >>>WHERE (jsonb->>'permissionName') = 'foo.whizz' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/permissions/cb95a04c-38fd-4f68-9124-afe4e5e41a5b null HTTP_1_1 200 355 5 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissionsById 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions/cb95a04c-38fd-4f68-9124-afe4e5e41a5b null HTTP_1_1 200 438 1 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissionsById 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions/6ed104fe-6cfc-41c3-a508-b9ac758439ef null HTTP_1_1 200 452 1 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:16 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(dummy == false)' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (dummy == false) >>>WHERE lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) LIMIT 10 OFFSET 0 [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions null HTTP_1_1 200 2697 4 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '626a7a5c-4b66-4d2f-981f-1df9757e2aa9' >>>WHERE (jsonb->>'userId') = '626a7a5c-4b66-4d2f-981f-1df9757e2aa9' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '626a7a5c-4b66-4d2f-981f-1df9757e2aa9' >>>WHERE (jsonb->>'userId') = '626a7a5c-4b66-4d2f-981f-1df9757e2aa9' 14:02:16 [] [] [] [] WARN PermsAPI Constraint violated for userId or id field (or both) 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 422 200 1 tid=diku Unprocessable Entity 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==7a596b6c-5f00-4673-bf7f-589ad0c8b96c >>>WHERE id='7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission foo.all# with value 7a596b6c-5f00-4673-bf7f-589ad0c8b96c 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c/permissions null HTTP_1_1 200 35 7 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissionsById 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions/cb95a04c-38fd-4f68-9124-afe4e5e41a5b null HTTP_1_1 200 477 1 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c/permissions null HTTP_1_1 200 62 3 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c/permissions full=true HTTP_1_1 200 539 3 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.whizz' >>>WHERE (jsonb->>'permissionName') = 'foo.whizz' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c/permissions expanded=true HTTP_1_1 200 75 4 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.whizz' >>>WHERE (jsonb->>'permissionName') = 'foo.whizz' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.whizz' >>>WHERE (jsonb->>'permissionName') = 'foo.whizz' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c/permissions expanded=true&full=true HTTP_1_1 200 1027 4 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '6ed104fe-6cfc-41c3-a508-b9ac758439ef' >>>WHERE id = '6ed104fe-6cfc-41c3-a508-b9ac758439ef' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/permissions/6ed104fe-6cfc-41c3-a508-b9ac758439ef null HTTP_1_1 204 0 4 tid=diku No Content 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissionsById 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions/cb95a04c-38fd-4f68-9124-afe4e5e41a5b null HTTP_1_1 200 465 1 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsUsersPermissionsByIdAndPermissionname 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==7a596b6c-5f00-4673-bf7f-589ad0c8b96c >>>WHERE id='7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO PermsAPI Performing DELETE operation on GRANTED_TO of permission foo.all# with value 7a596b6c-5f00-4673-bf7f-589ad0c8b96c 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'foo.all#' >>>WHERE (jsonb->>'permissionName') = 'foo.all#' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c/permissions/foo.all%23 null HTTP_1_1 204 0 5 tid=diku No Content 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissionsById 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions/cb95a04c-38fd-4f68-9124-afe4e5e41a5b null HTTP_1_1 200 426 1 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c/permissions null HTTP_1_1 200 51 1 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'moo/all' >>>WHERE (jsonb->>'permissionName') = 'moo/all' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 201 362 2 tid=diku Created 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '626a7a5c-4b66-4d2f-981f-1df9757e2aa9' >>>WHERE (jsonb->>'userId') = '626a7a5c-4b66-4d2f-981f-1df9757e2aa9' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'moo/all' >>>WHERE (jsonb->>'permissionName') = 'moo/all' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==7a596b6c-5f00-4673-bf7f-589ad0c8b96c >>>WHERE id='7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'moo/all' >>>WHERE (jsonb->>'permissionName') = 'moo/all' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'moo/all' >>>WHERE (jsonb->>'permissionName') = 'moo/all' 14:02:16 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission moo/all with value 7a596b6c-5f00-4673-bf7f-589ad0c8b96c 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'moo/all' >>>WHERE (jsonb->>'permissionName') = 'moo/all' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/626a7a5c-4b66-4d2f-981f-1df9757e2aa9/permissions indexField=userId HTTP_1_1 200 34 8 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c/permissions null HTTP_1_1 200 61 1 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsUsersPermissionsByIdAndPermissionname 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '626a7a5c-4b66-4d2f-981f-1df9757e2aa9' >>>WHERE (jsonb->>'userId') = '626a7a5c-4b66-4d2f-981f-1df9757e2aa9' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==7a596b6c-5f00-4673-bf7f-589ad0c8b96c >>>WHERE id='7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'moo/all' >>>WHERE (jsonb->>'permissionName') = 'moo/all' 14:02:16 [] [] [] [] INFO PermsAPI Performing DELETE operation on GRANTED_TO of permission moo/all with value 7a596b6c-5f00-4673-bf7f-589ad0c8b96c 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'moo/all' >>>WHERE (jsonb->>'permissionName') = 'moo/all' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/626a7a5c-4b66-4d2f-981f-1df9757e2aa9/permissions/moo%2Fall indexField=userId HTTP_1_1 204 0 4 tid=diku No Content 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c/permissions null HTTP_1_1 200 51 1 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c null HTTP_1_1 204 0 2 tid=diku No Content 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsersById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c null HTTP_1_1 404 53 2 tid=diku Not Found 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' >>>WHERE id = '7a596b6c-5f00-4673-bf7f-589ad0c8b96c' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/7a596b6c-5f00-4673-bf7f-589ad0c8b96c null HTTP_1_1 404 70 1 tid=diku Not Found 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' >>>WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/permissions/cb95a04c-38fd-4f68-9124-afe4e5e41a5b null HTTP_1_1 204 0 2 tid=diku No Content 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissionsById 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions/cb95a04c-38fd-4f68-9124-afe4e5e41a5b null HTTP_1_1 404 9 0 tid=diku Not Found 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' >>>WHERE id = 'cb95a04c-38fd-4f68-9124-afe4e5e41a5b' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/permissions/cb95a04c-38fd-4f68-9124-afe4e5e41a5b null HTTP_1_1 404 36 1 tid=diku Not Found 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'ed145a0a-c4ff-46b3-8c44-62d89f32afea' >>>WHERE id = 'ed145a0a-c4ff-46b3-8c44-62d89f32afea' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/permissions/ed145a0a-c4ff-46b3-8c44-62d89f32afea null HTTP_1_1 404 36 1 tid=diku Not Found 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' >>>WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/176bc0cc-b785-4cf9-9e8a-5fafe8178332 null HTTP_1_1 204 0 1 tid=diku No Content 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '12#34' >>>WHERE id = '12#34' 14:02:16 [] [] [] [] ERROR PostgresClient query with count: { "message": "invalid input syntax for type uuid: \"12#34\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '12#34'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } - SELECT diku_mod_permissions.count_estimate('SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = ''12#34''') io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"12#34\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '12#34'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] ERROR PermsAPI { "message": "invalid input syntax for type uuid: \"12#34\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '12#34'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"12#34\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '12#34'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/12%2334/permissions null HTTP_1_1 400 462 1 tid=diku Bad Request 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'f9bc92e0-3ef2-4967-abe1-b83c5adc6248' >>>WHERE id = 'f9bc92e0-3ef2-4967-abe1-b83c5adc6248' 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/f9bc92e0-3ef2-4967-abe1-b83c5adc6248 null HTTP_1_1 404 70 1 tid=diku Not Found 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsersById 14:02:16 [] [] [] [] ERROR PermsAPI Invalid value 'bad' for indexField java.lang.IllegalArgumentException: Invalid value 'bad' for indexField at org.folio.rest.impl.PermsAPI.getIdCriterion(PermsAPI.java:1888) ~[classes/:?] at org.folio.rest.impl.PermsAPI.getPermsUsersById(PermsAPI.java:236) ~[classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at org.folio.rest.RestRouting.invoke(RestRouting.java:433) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.RestRouting.lambda$22(RestRouting.java:701) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:96) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:59) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.onEnd(Http1xServerRequest.java:549) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.handleEnd(Http1xServerRequest.java:535) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.execute(EventLoopContext.java:73) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.DuplicatedContext.execute(DuplicatedContext.java:189) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.onEnd(Http1xServerConnection.java:199) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.handleMessage(Http1xServerConnection.java:142) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:153) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:148) [vertx-core-4.0.2.jar:4.0.2] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.ChannelInboundHandlerAdapter.channelRead(ChannelInboundHandlerAdapter.java:93) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.http.websocketx.extensions.WebSocketServerExtensionHandler.channelRead(WebSocketServerExtensionHandler.java:101) [netty-codec-http-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/123 indexField=bad HTTP_1_1 500 34 0 tid=diku Internal Server Error 14:02:16 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleA4' >>>WHERE (jsonb->>'moduleName') = 'moduleA4' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0' LIMIT 1 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 14:02:16 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' does not exist 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 14:02:16 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' exists 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 14:02:16 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' exists 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 14:02:16 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' exists 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0' >>>WHERE (jsonb->>'permissionName') = 'permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' 14:02:16 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d with value permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' 14:02:16 [] [] [] [] INFO TenantPermsAPI Saved perm permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 256 12 tid=diku Created 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:16 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query 'permissionName=dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: permissionName=dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>>WHERE get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) LIMIT 10 OFFSET 0 [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions includeDummy=true&query=permissionName%3Ddummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d HTTP_1_1 200 397 4 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:16 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query 'permissionName=permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0')) 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: permissionName=permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0 >>>WHERE get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0')) LIMIT 10 OFFSET 0 [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0')) 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions includeDummy=true&query=permissionName%3DpermA09e608ab-9b16-4a0b-84d9-7e33d6cc59f0 HTTP_1_1 200 497 3 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleB4' >>>WHERE (jsonb->>'moduleName') = 'moduleB4' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB683a5b8b-a4dc-4172-b11e-5d724df68d24' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permB683a5b8b-a4dc-4172-b11e-5d724df68d24' LIMIT 1 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 14:02:16 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' exists 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 14:02:16 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' exists 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB683a5b8b-a4dc-4172-b11e-5d724df68d24' >>>WHERE (jsonb->>'permissionName') = 'permB683a5b8b-a4dc-4172-b11e-5d724df68d24' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' 14:02:16 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d with value permB683a5b8b-a4dc-4172-b11e-5d724df68d24 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' 14:02:16 [] [] [] [] INFO TenantPermsAPI Saved perm permB683a5b8b-a4dc-4172-b11e-5d724df68d24 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 256 8 tid=diku Created 14:02:16 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleA5' >>>WHERE (jsonb->>'moduleName') = 'moduleA5' 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' LIMIT 1 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' >>>WHERE (jsonb->>'permissionName') = 'dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' 14:02:16 [] [] [] [] INFO TenantPermsAPI Saved perm dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 212 5 tid=diku Created 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:16 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query 'permissionName=dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d' [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) 14:02:16 [] [] [] [] INFO CQLWrapper CQL >>> SQL: permissionName=dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>>WHERE get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) LIMIT 10 OFFSET 0 [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) [Mon May 10 14:02:16 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('dummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d')) 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions includeDummy=true&query=permissionName%3Ddummy0bc444e6-c3c1-4e5c-a4a5-0fa71817398d HTTP_1_1 200 453 4 tid=diku OK 14:02:16 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '123' >>>WHERE id = '123' 14:02:16 [] [] [] [] ERROR PostgresClient query with count: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } - SELECT diku_mod_permissions.count_estimate('SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = ''123''') io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] ERROR PermsAPI Error getting existing users: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/123 null HTTP_1_1 400 488 2 tid=diku Bad Request 14:02:16 [] [] [] [] INFO RestRouting invoking getPermsUsers 14:02:16 [] [] [] [] ERROR RestRouting null java.lang.reflect.InvocationTargetException: null at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at org.folio.rest.RestRouting.invoke(RestRouting.java:433) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.RestRouting.lambda$22(RestRouting.java:701) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:96) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:59) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.onEnd(Http1xServerRequest.java:549) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.handleEnd(Http1xServerRequest.java:535) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.execute(EventLoopContext.java:73) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.DuplicatedContext.execute(DuplicatedContext.java:189) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.onEnd(Http1xServerConnection.java:199) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.handleMessage(Http1xServerConnection.java:142) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:153) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:148) [vertx-core-4.0.2.jar:4.0.2] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.ChannelInboundHandlerAdapter.channelRead(ChannelInboundHandlerAdapter.java:93) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.http.websocketx.extensions.WebSocketServerExtensionHandler.channelRead(WebSocketServerExtensionHandler.java:101) [netty-codec-http-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] Caused by: javax.validation.ValidationException: 'start' parameter is incorrect. parameter value {0} is not valid: must be greater than or equal to 1 at org.folio.rest.annotations.RestValidator.buildValidationException(RestValidator.aj:81) ~[domain-models-api-aspects-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.annotations.RestValidator.ajc$before$org_folio_rest_annotations_RestValidator$1$1872e94e(RestValidator.aj:50) ~[domain-models-api-aspects-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.getPermsUsers(PermsAPI.java:120) ~[classes/:?] ... 48 more 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users query=permissions%3Ddummy*&start=0 HTTP_1_1 400 102 -1 tid=null Bad Request 'start' parameter is incorrect. parameter value {0} is not valid: must be greater than or equal to 1 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:16 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '123' >>>WHERE id = '123' 14:02:16 [] [] [] [] ERROR PostgresClient query with count: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } - SELECT diku_mod_permissions.count_estimate('SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = ''123''') io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] ERROR PermsAPI Error checking for user: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:16 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/123/permissions null HTTP_1_1 400 483 1 tid=diku Bad Request 14:02:16 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:17 [] [] [] [] ERROR PermsAPI Error checking for user: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/123/permissions null HTTP_1_1 400 208 1007 tid=badTenant Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') >>>WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 201 254 7 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'amodule' >>>WHERE (jsonb->>'moduleName') = 'amodule' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'adummy.perm' does not exist 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'adummy.perm' exists 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'adummy.perm' exists 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'adummy.perm' exists 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.all' >>>WHERE (jsonb->>'permissionName') = 'adummy.all' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission adummy.perm with value adummy.all 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm adummy.all 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 224 45 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:17 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query 'permissionName=adummy.perm' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: permissionName=adummy.perm >>>WHERE get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) LIMIT 10 OFFSET 0 [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName%3Dadummy.perm&includeDummy=true HTTP_1_1 200 336 7 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:17 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName=adummy.perm) AND (dummy==false)' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName=adummy.perm) AND (dummy==false) >>>WHERE (get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName%3Dadummy.perm&includeDummy=xx HTTP_1_1 200 47 6 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:17 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName=adummy.perm) AND (dummy==false)' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName=adummy.perm) AND (dummy==false) >>>WHERE (get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = adummy.perm >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('adummy.perm')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName%3Dadummy.perm HTTP_1_1 200 47 5 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking putPermsUsersById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/users/176bc0cc-b785-4cf9-9e8a-5fafe8178332 null HTTP_1_1 400 50 1 tid=diku Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'bmodule' >>>WHERE (jsonb->>'moduleName') = 'bmodule' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' LIMIT 1 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm adummy.perm 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 206 5 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking putPermsUsersById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==176bc0cc-b785-4cf9-9e8a-5fafe8178332 >>>WHERE id='176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==176bc0cc-b785-4cf9-9e8a-5fafe8178332 >>>WHERE id='176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission adummy.perm with value 176bc0cc-b785-4cf9-9e8a-5fafe8178332 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/users/176bc0cc-b785-4cf9-9e8a-5fafe8178332 null HTTP_1_1 200 109 7 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' >>>WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO PermsAPI Performing DELETE operation on GRANTED_TO of permission adummy.perm with value 176bc0cc-b785-4cf9-9e8a-5fafe8178332 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adummy.perm' >>>WHERE (jsonb->>'permissionName') = 'adummy.perm' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/176bc0cc-b785-4cf9-9e8a-5fafe8178332 null HTTP_1_1 204 0 4 tid=diku No Content 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '1234' OR (jsonb->>'userId') = ) >>>WHERE (id = '1234' OR (jsonb->>'userId') = ) 14:02:17 [] [] [] [] ERROR PostgresClient query with count: { "message": "syntax error at or near \")\"", "severity": "ERROR", "code": "42601", "internalPosition": "109", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE (id = '1234' OR (jsonb->>'userId') = )", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "scan.l", "line": "1145", "routine": "scanner_yyerror" } - SELECT diku_mod_permissions.count_estimate('SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE (id = ''1234'' OR (jsonb->>''userId'') = )') io.vertx.pgclient.PgException: { "message": "syntax error at or near \")\"", "severity": "ERROR", "code": "42601", "internalPosition": "109", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE (id = '1234' OR (jsonb->>'userId') = )", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "scan.l", "line": "1145", "routine": "scanner_yyerror" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] ERROR PermsAPI { "message": "syntax error at or near \")\"", "severity": "ERROR", "code": "42601", "internalPosition": "109", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE (id = '1234' OR (jsonb->>'userId') = )", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "scan.l", "line": "1145", "routine": "scanner_yyerror" } io.vertx.pgclient.PgException: { "message": "syntax error at or near \")\"", "severity": "ERROR", "code": "42601", "internalPosition": "109", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE (id = '1234' OR (jsonb->>'userId') = )", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "scan.l", "line": "1145", "routine": "scanner_yyerror" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 400 475 1 tid=diku Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '8919fd85-5a92-4e0e-bf02-1f1092f759e1' >>>WHERE id = '8919fd85-5a92-4e0e-bf02-1f1092f759e1' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/8919fd85-5a92-4e0e-bf02-1f1092f759e1/permissions null HTTP_1_1 400 64 1 tid=diku Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') >>>WHERE (id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' OR (jsonb->>'userId') = '93cb7ed4-313e-4f06-bd4b-d44b1308c3f3') 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking deletePermsUsersPermissionsByIdAndPermissionname 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' >>>WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/176bc0cc-b785-4cf9-9e8a-5fafe8178332/permissions/name null HTTP_1_1 400 71 1 tid=diku Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' >>>WHERE id = '176bc0cc-b785-4cf9-9e8a-5fafe8178332' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/176bc0cc-b785-4cf9-9e8a-5fafe8178332 null HTTP_1_1 204 0 1 tid=diku No Content 14:02:17 [] [] [] [] INFO RestRouting invoking putPermsPermissionsById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '123' >>>WHERE id = '123' 14:02:17 [] [] [] [] ERROR PostgresClient query with count: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "71", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } - SELECT diku_mod_permissions.count_estimate('SELECT jsonb FROM diku_mod_permissions.permissions WHERE id = ''123''') io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "71", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] ERROR PermsAPI { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "71", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "71", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/permissions/123 null HTTP_1_1 400 452 1 tid=diku Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleA3' >>>WHERE (jsonb->>'moduleName') = 'moduleA3' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm1edc6bcb-a657-4901-9125-ad8408088f45' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm1edc6bcb-a657-4901-9125-ad8408088f45' LIMIT 1 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm1edc6bcb-a657-4901-9125-ad8408088f45' >>>WHERE (jsonb->>'permissionName') = 'perm1edc6bcb-a657-4901-9125-ad8408088f45' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm perm1edc6bcb-a657-4901-9125-ad8408088f45 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 211 3 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleB3' >>>WHERE (jsonb->>'moduleName') = 'moduleB3' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm1edc6bcb-a657-4901-9125-ad8408088f45' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm1edc6bcb-a657-4901-9125-ad8408088f45' LIMIT 1 14:02:17 [] [] [] [] ERROR TenantPermsAPI Collision! A Permission named perm1edc6bcb-a657-4901-9125-ad8408088f45 is already defined: {"permissionName":"perm1edc6bcb-a657-4901-9125-ad8408088f45","displayName":"Description 1","id":"5b175686-2d67-421e-b794-e1d87cf37785","tags":[],"subPermissions":[],"childOf":[],"grantedTo":[],"mutable":false,"visible":false,"dummy":false,"deprecated":false,"moduleName":"moduleA3","moduleVersion":"1.0.0"} 14:02:17 [] [] [] [] ERROR TenantPermsAPI Collision! A Permission named perm1edc6bcb-a657-4901-9125-ad8408088f45 is already defined: {"permissionName":"perm1edc6bcb-a657-4901-9125-ad8408088f45","displayName":"Description 1","id":"5b175686-2d67-421e-b794-e1d87cf37785","tags":[],"subPermissions":[],"childOf":[],"grantedTo":[],"mutable":false,"visible":false,"dummy":false,"deprecated":false,"moduleName":"moduleA3","moduleVersion":"1.0.0"} io.vertx.core.impl.NoStackTraceThrowable: Collision! A Permission named perm1edc6bcb-a657-4901-9125-ad8408088f45 is already defined: {"permissionName":"perm1edc6bcb-a657-4901-9125-ad8408088f45","displayName":"Description 1","id":"5b175686-2d67-421e-b794-e1d87cf37785","tags":[],"subPermissions":[],"childOf":[],"grantedTo":[],"mutable":false,"visible":false,"dummy":false,"deprecated":false,"moduleName":"moduleA3","moduleVersion":"1.0.0"} 14:02:17 [] [] [] [] ERROR TenantPermsAPI Collision! A Permission named perm1edc6bcb-a657-4901-9125-ad8408088f45 is already defined: {"permissionName":"perm1edc6bcb-a657-4901-9125-ad8408088f45","displayName":"Description 1","id":"5b175686-2d67-421e-b794-e1d87cf37785","tags":[],"subPermissions":[],"childOf":[],"grantedTo":[],"mutable":false,"visible":false,"dummy":false,"deprecated":false,"moduleName":"moduleA3","moduleVersion":"1.0.0"} io.vertx.core.impl.NoStackTraceThrowable: Collision! A Permission named perm1edc6bcb-a657-4901-9125-ad8408088f45 is already defined: {"permissionName":"perm1edc6bcb-a657-4901-9125-ad8408088f45","displayName":"Description 1","id":"5b175686-2d67-421e-b794-e1d87cf37785","tags":[],"subPermissions":[],"childOf":[],"grantedTo":[],"mutable":false,"visible":false,"dummy":false,"deprecated":false,"moduleName":"moduleA3","moduleVersion":"1.0.0"} 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 400 397 3 tid=diku Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm-803c201a-02c6-4a97-b8ae-81984570227f' >>>WHERE (jsonb->>'permissionName') = 'perm-803c201a-02c6-4a97-b8ae-81984570227f' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 201 326 2 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking putPermsPermissionsById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '29a0f70a-4527-4a7c-b604-629a4423f8a0' >>>WHERE id = '29a0f70a-4527-4a7c-b604-629a4423f8a0' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/permissions/29a0f70a-4527-4a7c-b604-629a4423f8a0 null HTTP_1_1 400 38 1 tid=diku Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsPurgeDeprecated 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/purge-deprecated null HTTP_1_1 200 51 1 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleTestReplaceX' >>>WHERE (jsonb->>'moduleName') = 'moduleTestReplaceX' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' LIMIT 1 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' LIMIT 1 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' >>>WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' >>>WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 309 5 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleTestReplaceY' >>>WHERE (jsonb->>'moduleName') = 'moduleTestReplaceY' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permCa8ccfe99-09f1-44e4-ae51-bcb3e8e09dc2' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permCa8ccfe99-09f1-44e4-ae51-bcb3e8e09dc2' LIMIT 1 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' exists 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' exists 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' LIMIT 1 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' exists 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' exists 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permCa8ccfe99-09f1-44e4-ae51-bcb3e8e09dc2' >>>WHERE (jsonb->>'permissionName') = 'permCa8ccfe99-09f1-44e4-ae51-bcb3e8e09dc2' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' >>>WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' >>>WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' >>>WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' 14:02:17 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46 with value permCa8ccfe99-09f1-44e4-ae51-bcb3e8e09dc2 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' >>>WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' >>>WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' 14:02:17 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb with value permCa8ccfe99-09f1-44e4-ae51-bcb3e8e09dc2 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' >>>WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm permCa8ccfe99-09f1-44e4-ae51-bcb3e8e09dc2 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 274 13 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '654067f1-9a4e-4b86-b7e3-126258a65a6d' OR (jsonb->>'userId') = '62fd3284-162d-4e07-81ef-6baf1534176e') >>>WHERE (id = '654067f1-9a4e-4b86-b7e3-126258a65a6d' OR (jsonb->>'userId') = '62fd3284-162d-4e07-81ef-6baf1534176e') 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' >>>WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' >>>WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' >>>WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' 14:02:17 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46 with value 654067f1-9a4e-4b86-b7e3-126258a65a6d 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' >>>WHERE (jsonb->>'permissionName') = 'permA05a55fe5-6879-4dc6-96c7-369aa3d4ab46' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' >>>WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' 14:02:17 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb with value 654067f1-9a4e-4b86-b7e3-126258a65a6d 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' >>>WHERE (jsonb->>'permissionName') = 'permB97d6f02f-1c0b-4902-89fc-f8bee3f2a8cb' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 201 343 7 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleTestReplaceX' >>>WHERE (jsonb->>'moduleName') = 'moduleTestReplaceX' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permDef7c50cd-5c81-452a-bcde-ca7af5895d64' >>>WHERE (jsonb->>'permissionName') = 'permDef7c50cd-5c81-452a-bcde-ca7af5895d64' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm permDef7c50cd-5c81-452a-bcde-ca7af5895d64 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '654067f1-9a4e-4b86-b7e3-126258a65a6d' >>>WHERE id = '654067f1-9a4e-4b86-b7e3-126258a65a6d' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permDef7c50cd-5c81-452a-bcde-ca7af5895d64' >>>WHERE (jsonb->>'permissionName') = 'permDef7c50cd-5c81-452a-bcde-ca7af5895d64' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permDef7c50cd-5c81-452a-bcde-ca7af5895d64' >>>WHERE (jsonb->>'permissionName') = 'permDef7c50cd-5c81-452a-bcde-ca7af5895d64' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: permissionName==permDef7c50cd-5c81-452a-bcde-ca7af5895d64 >>>WHERE lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('permDef7c50cd-5c81-452a-bcde-ca7af5895d64')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==654067f1-9a4e-4b86-b7e3-126258a65a6d >>>WHERE id='654067f1-9a4e-4b86-b7e3-126258a65a6d' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: permissionName==permDef7c50cd-5c81-452a-bcde-ca7af5895d64 >>>WHERE lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('permDef7c50cd-5c81-452a-bcde-ca7af5895d64')) 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '654067f1-9a4e-4b86-b7e3-126258a65a6d' >>>WHERE id = '654067f1-9a4e-4b86-b7e3-126258a65a6d' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==654067f1-9a4e-4b86-b7e3-126258a65a6d >>>WHERE id='654067f1-9a4e-4b86-b7e3-126258a65a6d' 14:02:17 [] [] [] [] INFO Conn starting: saveBatch size=2 14:02:17 [] [] [] [] ERROR Conn saveBatch size=2 { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:17 [] [] [] [] INFO TenantPermsAPI Error renaming permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:17 [] [] [] [] ERROR TenantPermsAPI { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 400 205 14 tid=diku Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsPurgeDeprecated 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/purge-deprecated null HTTP_1_1 200 51 0 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleTestDeprecated' >>>WHERE (jsonb->>'moduleName') = 'moduleTestDeprecated' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676' LIMIT 1 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' LIMIT 1 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'permBcc918861-d080-40e8-b7f0-22c2396c8176' does not exist 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'permBcc918861-d080-40e8-b7f0-22c2396c8176' does not exist 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm permBcc918861-d080-40e8-b7f0-22c2396c8176 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'permBcc918861-d080-40e8-b7f0-22c2396c8176' exists 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' LIMIT 1 14:02:17 [] [] [] [] INFO TenantPermsAPI Permission with name 'permBcc918861-d080-40e8-b7f0-22c2396c8176' exists 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676' >>>WHERE (jsonb->>'permissionName') = 'permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' 14:02:17 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission permBcc918861-d080-40e8-b7f0-22c2396c8176 with value permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 355 15 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '19c305ff-e894-4e1b-9c8a-cd1d1fc258b5' OR (jsonb->>'userId') = 'ebea4b69-5b70-4f99-9cef-e200b5e6cfad') >>>WHERE (id = '19c305ff-e894-4e1b-9c8a-cd1d1fc258b5' OR (jsonb->>'userId') = 'ebea4b69-5b70-4f99-9cef-e200b5e6cfad') 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676' >>>WHERE (jsonb->>'permissionName') = 'permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676' >>>WHERE (jsonb->>'permissionName') = 'permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676' 14:02:17 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 with value 19c305ff-e894-4e1b-9c8a-cd1d1fc258b5 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676' >>>WHERE (jsonb->>'permissionName') = 'permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' 14:02:17 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission permBcc918861-d080-40e8-b7f0-22c2396c8176 with value 19c305ff-e894-4e1b-9c8a-cd1d1fc258b5 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' >>>WHERE (jsonb->>'permissionName') = 'permBcc918861-d080-40e8-b7f0-22c2396c8176' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 201 343 7 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:17 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName=permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676) AND (dummy==false)' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName=permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676) AND (dummy==false) >>>WHERE (get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName%3DpermA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 HTTP_1_1 200 511 5 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:17 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName=permBcc918861-d080-40e8-b7f0-22c2396c8176) AND (dummy==false)' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permBcc918861-d080-40e8-b7f0-22c2396c8176 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permBcc918861-d080-40e8-b7f0-22c2396c8176 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName=permBcc918861-d080-40e8-b7f0-22c2396c8176) AND (dummy==false) >>>WHERE (get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permBcc918861-d080-40e8-b7f0-22c2396c8176 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permBcc918861-d080-40e8-b7f0-22c2396c8176 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permBcc918861-d080-40e8-b7f0-22c2396c8176 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName%3DpermBcc918861-d080-40e8-b7f0-22c2396c8176 HTTP_1_1 200 511 5 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking getPermsUsersById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '19c305ff-e894-4e1b-9c8a-cd1d1fc258b5' >>>WHERE id = '19c305ff-e894-4e1b-9c8a-cd1d1fc258b5' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/19c305ff-e894-4e1b-9c8a-cd1d1fc258b5 null HTTP_1_1 200 343 1 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleTestDeprecated' >>>WHERE (jsonb->>'moduleName') = 'moduleTestDeprecated' 14:02:17 [] [] [] [] INFO Conn starting: saveBatch size=1 14:02:17 [] [] [] [] ERROR Conn saveBatch size=1 { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:17 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:17 [] [] [] [] ERROR TenantPermsAPI { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 400 205 3 tid=diku Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:17 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName=permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676) AND (dummy==false)' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName=permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676) AND (dummy==false) >>>WHERE (get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permA8a203ee9-5fbb-4831-b3cb-e6c7bc212676')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName%3DpermA8a203ee9-5fbb-4831-b3cb-e6c7bc212676 HTTP_1_1 200 511 5 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:17 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName=permBcc918861-d080-40e8-b7f0-22c2396c8176) AND (dummy==false)' [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permBcc918861-d080-40e8-b7f0-22c2396c8176 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permBcc918861-d080-40e8-b7f0-22c2396c8176 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName=permBcc918861-d080-40e8-b7f0-22c2396c8176) AND (dummy==false) >>>WHERE (get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permBcc918861-d080-40e8-b7f0-22c2396c8176 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permBcc918861-d080-40e8-b7f0-22c2396c8176 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permBcc918861-d080-40e8-b7f0-22c2396c8176 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permBcc918861-d080-40e8-b7f0-22c2396c8176')) [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName%3DpermBcc918861-d080-40e8-b7f0-22c2396c8176 HTTP_1_1 200 511 4 tid=diku OK 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '123' >>>WHERE id = '123' 14:02:17 [] [] [] [] ERROR PostgresClient query with count: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } - SELECT diku_mod_permissions.count_estimate('SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = ''123''') io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] ERROR PermsAPI Error checking for user: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"123\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '123'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/123/permissions null HTTP_1_1 400 483 1 tid=diku Bad Request 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleA2' >>>WHERE (jsonb->>'moduleName') = 'moduleA2' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm6ae93ebe-a979-40b4-8922-a54785f6d6ca' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm6ae93ebe-a979-40b4-8922-a54785f6d6ca' LIMIT 1 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm6ae93ebe-a979-40b4-8922-a54785f6d6ca' >>>WHERE (jsonb->>'permissionName') = 'perm6ae93ebe-a979-40b4-8922-a54785f6d6ca' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm perm6ae93ebe-a979-40b4-8922-a54785f6d6ca 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 211 4 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleA2' >>>WHERE (jsonb->>'moduleName') = 'moduleA2' 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm6ae93ebe-a979-40b4-8922-a54785f6d6ca' >>>WHERE (jsonb->>'permissionName') = 'perm6ae93ebe-a979-40b4-8922-a54785f6d6ca' 14:02:17 [] [] [] [] INFO TenantPermsAPI Saved perm perm6ae93ebe-a979-40b4-8922-a54785f6d6ca 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 211 4 tid=diku Created 14:02:17 [] [] [] [] INFO RestRouting invoking putPermsPermissionsById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '8e526812-277a-400c-8061-5160abae11b0' >>>WHERE id = '8e526812-277a-400c-8061-5160abae11b0' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/permissions/8e526812-277a-400c-8061-5160abae11b0 null HTTP_1_1 404 36 1 tid=diku Not Found 14:02:17 [] [] [] [] INFO RestRouting invoking postPermsUsersPermissionsById 14:02:17 [] [] [] [] ERROR PermsAPI Invalid value 'foo' for indexField java.lang.IllegalArgumentException: Invalid value 'foo' for indexField at org.folio.rest.impl.PermsAPI.getIdCriterion(PermsAPI.java:1888) ~[classes/:?] at org.folio.rest.impl.PermsAPI.postPermsUsersPermissionsById(PermsAPI.java:515) ~[classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at org.folio.rest.RestRouting.invoke(RestRouting.java:433) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.RestRouting.lambda$22(RestRouting.java:701) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:96) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:59) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.onEnd(Http1xServerRequest.java:549) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.handleEnd(Http1xServerRequest.java:535) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.execute(EventLoopContext.java:73) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.DuplicatedContext.execute(DuplicatedContext.java:189) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.onEnd(Http1xServerConnection.java:199) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.onContent(Http1xServerConnection.java:186) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.handleOther(Http1xServerConnection.java:156) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.handleMessage(Http1xServerConnection.java:144) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:153) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:148) [vertx-core-4.0.2.jar:4.0.2] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.ChannelInboundHandlerAdapter.channelRead(ChannelInboundHandlerAdapter.java:93) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.http.websocketx.extensions.WebSocketServerExtensionHandler.channelRead(WebSocketServerExtensionHandler.java:101) [netty-codec-http-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users/123/permissions indexField=foo HTTP_1_1 500 34 0 tid=diku Internal Server Error 14:02:17 [] [] [] [] INFO RestRouting invoking putPermsUsersById [Mon May 10 14:02:17 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:17 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==123 >>>WHERE false /* id == invalid UUID */ 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/users/123 null HTTP_1_1 404 37 1 tid=diku Not Found 14:02:17 [] [] [] [] INFO RestRouting invoking getPermsUsersById 14:02:17 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '7a18d34f-19f0-421c-9e87-57b67f5772ea' >>>WHERE id = '7a18d34f-19f0-421c-9e87-57b67f5772ea' 14:02:17 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/7a18d34f-19f0-421c-9e87-57b67f5772ea indexField=id HTTP_1_1 404 53 1 tid=diku Not Found 14:02:17 [] [] [] [] INFO RestRouting invoking deletePermsUsersPermissionsByIdAndPermissionname 14:02:18 [] [] [] [] ERROR PermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:18 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/123/permissions/name null HTTP_1_1 400 183 1009 tid=badTenant Bad Request 14:02:18 [] [] [] [] INFO RestRouting invoking putPermsPermissionsById 14:02:18 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/permissions/123 null HTTP_1_1 400 16 1 tid=diku Bad Request 14:02:18 [] [] [] [] INFO RestRouting invoking putPermsPermissionsById 14:02:18 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/permissions/123 null HTTP_1_1 400 16 2 tid=diku Bad Request 14:02:18 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:18 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'adname' >>>WHERE (jsonb->>'permissionName') = 'adname' 14:02:18 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 201 322 9 tid=diku Created 14:02:18 [] [] [] [] INFO RestRouting invoking deletePermsPermissionsById 14:02:18 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'b6c1addd-53da-4e4d-ab2c-405ba0d6bb8d' >>>WHERE id = 'b6c1addd-53da-4e4d-ab2c-405ba0d6bb8d' 14:02:18 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/permissions/b6c1addd-53da-4e4d-ab2c-405ba0d6bb8d null HTTP_1_1 204 0 7 tid=diku No Content 14:02:18 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:18 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '1234' OR (jsonb->>'userId') = '1234') >>>WHERE (id = '1234' OR (jsonb->>'userId') = '1234') 14:02:18 [] [] [] [] ERROR PostgresClient query with count: { "message": "invalid input syntax for type uuid: \"1234\"", "severity": "ERROR", "code": "22P02", "internalPosition": "78", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE (id = '1234' OR (jsonb->>'userId') = '1234')", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } - SELECT diku_mod_permissions.count_estimate('SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE (id = ''1234'' OR (jsonb->>''userId'') = ''1234'')') io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"1234\"", "severity": "ERROR", "code": "22P02", "internalPosition": "78", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE (id = '1234' OR (jsonb->>'userId') = '1234')", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:18 [] [] [] [] ERROR PermsAPI { "message": "invalid input syntax for type uuid: \"1234\"", "severity": "ERROR", "code": "22P02", "internalPosition": "78", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE (id = '1234' OR (jsonb->>'userId') = '1234')", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"1234\"", "severity": "ERROR", "code": "22P02", "internalPosition": "78", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE (id = '1234' OR (jsonb->>'userId') = '1234')", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:18 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 400 493 5 tid=diku Bad Request 14:02:18 [] [] [] [] INFO RestRouting invoking deletePermsUsersPermissionsByIdAndPermissionname 14:02:18 [] [] [] [] ERROR PermsAPI Invalid value 'foo' for indexField java.lang.IllegalArgumentException: Invalid value 'foo' for indexField at org.folio.rest.impl.PermsAPI.getIdCriterion(PermsAPI.java:1888) ~[classes/:?] at org.folio.rest.impl.PermsAPI.deletePermsUsersPermissionsByIdAndPermissionname(PermsAPI.java:665) ~[classes/:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:?] at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at org.folio.rest.RestRouting.invoke(RestRouting.java:433) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.RestRouting.lambda$22(RestRouting.java:701) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:96) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:59) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.onEnd(Http1xServerRequest.java:549) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.handleEnd(Http1xServerRequest.java:535) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.execute(EventLoopContext.java:73) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.DuplicatedContext.execute(DuplicatedContext.java:189) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.onEnd(Http1xServerConnection.java:199) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.handleMessage(Http1xServerConnection.java:142) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:153) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:148) [vertx-core-4.0.2.jar:4.0.2] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.ChannelInboundHandlerAdapter.channelRead(ChannelInboundHandlerAdapter.java:93) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.http.websocketx.extensions.WebSocketServerExtensionHandler.channelRead(WebSocketServerExtensionHandler.java:101) [netty-codec-http-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:18 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/123/permissions/name indexField=foo HTTP_1_1 500 34 1 tid=diku Internal Server Error 14:02:18 [] [] [] [] INFO RestRouting invoking deletePermsUsersPermissionsByIdAndPermissionname 14:02:18 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'ef13444b-b1bb-4318-9c0c-8f68c7b461a6' >>>WHERE id = 'ef13444b-b1bb-4318-9c0c-8f68c7b461a6' 14:02:18 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/ef13444b-b1bb-4318-9c0c-8f68c7b461a6/permissions/name null HTTP_1_1 404 64 3 tid=diku Not Found 14:02:18 [] [] [] [] INFO TestUtil Sending POST request to url 'http://localhost:58567/_/tenantpermissions' with payload: {"moduleId":"dummy-1.0.0","perms":[{"permissionName":"dummy.read","displayName":"Dummy Read","description":"Read Dummy Entries","visible":true},{"permissionName":"dummy.write","displayName":"Dummy Write","description":"Write Dummy Entries"},{"permissionName":"dummy.update","displayName":"Dummy Update","description":"Update Dummy Entries"},{"permissionName":"dummy.collection.get","displayName":"Dummy Collection Get","description":"Get Dummy Entry Collection"},{"permissionName":"dummy.collection.item.get","displayName":"Dummy Collection Item Get","description":"Get Dummy Entry Collection Item"},{"permissionName":"dummy.all","displayName":"Dummy All","description":"All Dummy Permissions","subPermissions":["dummy.read","dummy.write","dummy.update","dummy.collection.get","dummy.collection.item.get"]}]} 14:02:19 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'dummy' >>>WHERE (jsonb->>'moduleName') = 'dummy' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.update' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.update' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.all' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:19 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.read 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:19 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.write 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.update' >>>WHERE (jsonb->>'permissionName') = 'dummy.update' 14:02:19 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.update 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' 14:02:19 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.collection.get 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' 14:02:19 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.collection.item.get 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.update' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.update' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' LIMIT 1 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.read' exists 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' LIMIT 1 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.write' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.update' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.collection.get' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.collection.item.get' exists 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.update' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.update' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' LIMIT 1 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.read' exists 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' LIMIT 1 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.update' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.write' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.collection.get' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.collection.item.get' exists 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.update' >>>WHERE (jsonb->>'permissionName') = 'dummy.update' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.read with value dummy.all 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.write with value dummy.all 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.update' >>>WHERE (jsonb->>'permissionName') = 'dummy.update' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.update with value dummy.all 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.update' >>>WHERE (jsonb->>'permissionName') = 'dummy.update' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.collection.get with value dummy.all 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.collection.item.get with value dummy.all 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' 14:02:19 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.all 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41462 POST /_/tenantpermissions null HTTP_1_1 201 1262 32 tid=diku Created 14:02:19 [] [] [] [] INFO TestUtil Sending POST request to url 'http://localhost:58567/_/tenantpermissions' with payload: {"moduleId":"collision-1.0.0","perms":[{"permissionName":"dummy.read","displayName":"Colliding Read","description":"Colliding Permission for Reading Dummy Entries","visible":true}]} 14:02:19 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'collision' >>>WHERE (jsonb->>'moduleName') = 'collision' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:19 [] [] [] [] ERROR TenantPermsAPI Collision! A Permission named dummy.read is already defined: {"permissionName":"dummy.read","displayName":"Dummy Read","id":"0213807a-a68b-4048-89f3-71fabb714ed5","description":"Read Dummy Entries","tags":[],"subPermissions":[],"childOf":["dummy.all"],"grantedTo":[],"mutable":false,"visible":true,"dummy":false,"deprecated":false,"moduleName":"dummy","moduleVersion":"1.0.0"} 14:02:19 [] [] [] [] ERROR TenantPermsAPI Collision! A Permission named dummy.read is already defined: {"permissionName":"dummy.read","displayName":"Dummy Read","id":"0213807a-a68b-4048-89f3-71fabb714ed5","description":"Read Dummy Entries","tags":[],"subPermissions":[],"childOf":["dummy.all"],"grantedTo":[],"mutable":false,"visible":true,"dummy":false,"deprecated":false,"moduleName":"dummy","moduleVersion":"1.0.0"} io.vertx.core.impl.NoStackTraceThrowable: Collision! A Permission named dummy.read is already defined: {"permissionName":"dummy.read","displayName":"Dummy Read","id":"0213807a-a68b-4048-89f3-71fabb714ed5","description":"Read Dummy Entries","tags":[],"subPermissions":[],"childOf":["dummy.all"],"grantedTo":[],"mutable":false,"visible":true,"dummy":false,"deprecated":false,"moduleName":"dummy","moduleVersion":"1.0.0"} 14:02:19 [] [] [] [] ERROR TenantPermsAPI Collision! A Permission named dummy.read is already defined: {"permissionName":"dummy.read","displayName":"Dummy Read","id":"0213807a-a68b-4048-89f3-71fabb714ed5","description":"Read Dummy Entries","tags":[],"subPermissions":[],"childOf":["dummy.all"],"grantedTo":[],"mutable":false,"visible":true,"dummy":false,"deprecated":false,"moduleName":"dummy","moduleVersion":"1.0.0"} io.vertx.core.impl.NoStackTraceThrowable: Collision! A Permission named dummy.read is already defined: {"permissionName":"dummy.read","displayName":"Dummy Read","id":"0213807a-a68b-4048-89f3-71fabb714ed5","description":"Read Dummy Entries","tags":[],"subPermissions":[],"childOf":["dummy.all"],"grantedTo":[],"mutable":false,"visible":true,"dummy":false,"deprecated":false,"moduleName":"dummy","moduleVersion":"1.0.0"} 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41464 POST /_/tenantpermissions null HTTP_1_1 400 376 2 tid=diku Bad Request 14:02:19 [] [] [] [] INFO TestUtil Sending POST request to url 'http://localhost:58567/perms/permissions' with payload: {"id":"2d157427-c7b3-4242-9d4b-db17b1b41406","permissionName":"dummy.delete","displayName":"Dummy Delete","description":"Delete Dummy Entries"} 14:02:19 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41466 POST /perms/permissions null HTTP_1_1 201 373 2 tid=diku Created 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.all' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.write' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.read' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.collection.get' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.collection.item.get' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.update' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.delete' with payload: null 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.all) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.all) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.all'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.write) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.write) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.write'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.read) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.read) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.read'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.collection.get) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.collection.get) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.collection.get'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.collection.item.get) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.update) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.delete) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.collection.item.get) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.collection.item.get'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41472 GET /perms/permissions query=permissionName==dummy.read HTTP_1_1 200 469 7 tid=diku OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.update) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.update'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41470 GET /perms/permissions query=permissionName==dummy.write HTTP_1_1 200 473 11 tid=diku OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.delete) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.delete'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41468 GET /perms/permissions query=permissionName==dummy.all HTTP_1_1 200 556 16 tid=diku OK 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41474 GET /perms/permissions query=permissionName==dummy.collection.get HTTP_1_1 200 498 9 tid=diku OK 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41476 GET /perms/permissions query=permissionName==dummy.collection.item.get HTTP_1_1 200 513 8 tid=diku OK 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41478 GET /perms/permissions query=permissionName==dummy.update HTTP_1_1 200 476 8 tid=diku OK 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41480 GET /perms/permissions query=permissionName==dummy.delete HTTP_1_1 200 538 8 tid=diku OK 14:02:19 [] [] [] [] INFO TestUtil Sending POST request to url 'http://localhost:58567/_/tenantpermissions' with payload: {"moduleId":"dummy-1.0.0","perms":[{"permissionName":"dummy.read","displayName":"Dummy Read","description":"Read Dummy Entries","visible":true},{"permissionName":"dummy.write","displayName":"Dummy Write","description":"Write Dummy Entries"},{"permissionName":"dummy.update","displayName":"Dummy Update","description":"Update Dummy Entries"},{"permissionName":"dummy.collection.get","displayName":"Dummy Collection Get","description":"Get Dummy Entry Collection"},{"permissionName":"dummy.collection.item.get","displayName":"Dummy Collection Item Get","description":"Get Dummy Entry Collection Item"},{"permissionName":"dummy.all","displayName":"Dummy All","description":"All Dummy Permissions","subPermissions":["dummy.read","dummy.write","dummy.update","dummy.collection.get","dummy.collection.item.get"]}]} 14:02:19 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'dummy' >>>WHERE (jsonb->>'moduleName') = 'dummy' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.update' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.update' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.all' LIMIT 1 14:02:19 [] [] [] [] INFO TenantPermsAPI Added defined context to dummy.write 14:02:19 [] [] [] [] INFO TenantPermsAPI Added defined context to dummy.read 14:02:19 [] [] [] [] INFO TenantPermsAPI Added defined context to dummy.update 14:02:19 [] [] [] [] INFO TenantPermsAPI Added defined context to dummy.collection.get 14:02:19 [] [] [] [] INFO TenantPermsAPI Added defined context to dummy.all 14:02:19 [] [] [] [] INFO TenantPermsAPI Added defined context to dummy.collection.item.get 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41482 POST /_/tenantpermissions null HTTP_1_1 201 1262 5 tid=diku Created 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.all' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.write' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.read' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.collection.get' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.collection.item.get' with payload: null 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.update' with payload: null 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.all) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.all) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.all'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.write) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.write) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.write'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.read) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.read) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.read'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.collection.get) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.collection.get) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.collection.get'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.collection.item.get) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.update) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.collection.item.get) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.collection.item.get'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41484 GET /perms/permissions query=permissionName==dummy.all HTTP_1_1 200 556 11 tid=diku OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.update) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.update'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41486 GET /perms/permissions query=permissionName==dummy.write HTTP_1_1 200 473 10 tid=diku OK 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41488 GET /perms/permissions query=permissionName==dummy.read HTTP_1_1 200 469 9 tid=diku OK 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41490 GET /perms/permissions query=permissionName==dummy.collection.get HTTP_1_1 200 498 7 tid=diku OK 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41494 GET /perms/permissions query=permissionName==dummy.update HTTP_1_1 200 476 6 tid=diku OK 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41492 GET /perms/permissions query=permissionName==dummy.collection.item.get HTTP_1_1 200 513 7 tid=diku OK 14:02:19 [] [] [] [] INFO TestUtil Sending POST request to url 'http://localhost:58567/perms/users' with payload: {"id":"9a0872ce-0ceb-4a44-8a16-27578de8113c","userId":"35d05a6a-d61e-4e81-9708-fc44daadbec5","permissions":["dummy.all","dummy.collection.get","dummy.collection.item.get"]} 14:02:19 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '9a0872ce-0ceb-4a44-8a16-27578de8113c' OR (jsonb->>'userId') = '35d05a6a-d61e-4e81-9708-fc44daadbec5') >>>WHERE (id = '9a0872ce-0ceb-4a44-8a16-27578de8113c' OR (jsonb->>'userId') = '35d05a6a-d61e-4e81-9708-fc44daadbec5') 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission dummy.all with value 9a0872ce-0ceb-4a44-8a16-27578de8113c 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission dummy.collection.get with value 9a0872ce-0ceb-4a44-8a16-27578de8113c 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.get' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission dummy.collection.item.get with value 9a0872ce-0ceb-4a44-8a16-27578de8113c 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.item.get' 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41496 POST /perms/users null HTTP_1_1 201 319 9 tid=diku Created 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/users/9a0872ce-0ceb-4a44-8a16-27578de8113c/permissions?expanded=true' with payload: null 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '9a0872ce-0ceb-4a44-8a16-27578de8113c' >>>WHERE id = '9a0872ce-0ceb-4a44-8a16-27578de8113c' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' OR (jsonb->>'permissionName') = 'dummy.collection.get' OR (jsonb->>'permissionName') = 'dummy.collection.item.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' OR (jsonb->>'permissionName') = 'dummy.collection.get' OR (jsonb->>'permissionName') = 'dummy.collection.item.get' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' OR (jsonb->>'permissionName') = 'dummy.write' OR (jsonb->>'permissionName') = 'dummy.update' OR (jsonb->>'permissionName') = 'dummy.collection.get' OR (jsonb->>'permissionName') = 'dummy.collection.item.get' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' OR (jsonb->>'permissionName') = 'dummy.write' OR (jsonb->>'permissionName') = 'dummy.update' OR (jsonb->>'permissionName') = 'dummy.collection.get' OR (jsonb->>'permissionName') = 'dummy.collection.item.get' 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41498 GET /perms/users/9a0872ce-0ceb-4a44-8a16-27578de8113c/permissions expanded=true HTTP_1_1 200 214 4 tid=diku OK 14:02:19 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:58567/perms/permissions?query=permissionName==dummy.collection.get' with payload: null 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:19 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName==dummy.collection.get) AND (dummy==false)' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName==dummy.collection.get) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.collection.get'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41500 GET /perms/permissions query=permissionName==dummy.collection.get HTTP_1_1 200 537 3 tid=diku OK 14:02:19 [] [] [] [] INFO TestUtil Sending POST request to url 'http://localhost:58567/_/tenantpermissions' with payload: {"moduleId":"dummy-2.0.0","perms":[{"permissionName":"dummy.read","displayName":"Dummy Read","description":"Read Dummy Entries","visible":true},{"permissionName":"dummy.write","displayName":"Dummy Write","description":"Write Dummy Entries"},{"permissionName":"dummy.delete","displayName":"Dummy Delete","description":"Delete Dummy Entries"},{"permissionName":"dummy.collection.read","displayName":"Dummy Collection Read","description":"Read Dummy Entry Collection","replaces":["dummy.collection.get","dummy.collection.item.get"]},{"permissionName":"dummy.all","displayName":"Dummy All","description":"All Dummy Permissions","subPermissions":["dummy.read","dummy.write","dummy.collection.read","dummy.delete"]}]} 14:02:19 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'dummy' >>>WHERE (jsonb->>'moduleName') = 'dummy' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:19 [] [] [] [] ERROR TenantPermsAPI Error saving permissions: PermissionName collision with user-defined permission: dummy.delete 14:02:19 [] [] [] [] ERROR TenantPermsAPI PermissionName collision with user-defined permission: dummy.delete io.vertx.core.impl.NoStackTraceThrowable: PermissionName collision with user-defined permission: dummy.delete 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41502 POST /_/tenantpermissions null HTTP_1_1 400 67 4 tid=diku Bad Request 14:02:19 [] [] [] [] INFO TestUtil Sending DELETE request to url 'http://localhost:58567/perms/permissions/2d157427-c7b3-4242-9d4b-db17b1b41406' with payload: null 14:02:19 [] [] [] [] INFO RestRouting invoking deletePermsPermissionsById 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '2d157427-c7b3-4242-9d4b-db17b1b41406' >>>WHERE id = '2d157427-c7b3-4242-9d4b-db17b1b41406' 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41504 DELETE /perms/permissions/2d157427-c7b3-4242-9d4b-db17b1b41406 null HTTP_1_1 204 0 1 tid=diku No Content 14:02:19 [] [] [] [] INFO TestUtil Sending POST request to url 'http://localhost:58567/_/tenantpermissions' with payload: {"moduleId":"dummy-2.0.0","perms":[{"permissionName":"dummy.read","displayName":"Dummy Read","description":"Read Dummy Entries","visible":true},{"permissionName":"dummy.write","displayName":"Dummy Write","description":"Write Dummy Entries"},{"permissionName":"dummy.delete","displayName":"Dummy Delete","description":"Delete Dummy Entries"},{"permissionName":"dummy.collection.read","displayName":"Dummy Collection Read","description":"Read Dummy Entry Collection","replaces":["dummy.collection.get","dummy.collection.item.get"]},{"permissionName":"dummy.all","displayName":"Dummy All","description":"All Dummy Permissions","subPermissions":["dummy.read","dummy.write","dummy.collection.read","dummy.delete"]}]} 14:02:19 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'dummy' >>>WHERE (jsonb->>'moduleName') = 'dummy' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:19 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.delete 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.read' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.write' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.collection.read' does not exist 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.delete' exists 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.collection.read' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.write' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.read' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.delete' exists 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.read' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.write' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.collection.read' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.delete' exists 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' LIMIT 1 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.read' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.write' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.collection.read' exists 14:02:19 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.delete' exists 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.read with value dummy.all 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.write with value dummy.all 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.collection.read with value dummy.all 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:19 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.delete with value dummy.all 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:19 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.all 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' 14:02:19 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.collection.read 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '9a0872ce-0ceb-4a44-8a16-27578de8113c' >>>WHERE id = '9a0872ce-0ceb-4a44-8a16-27578de8113c' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '9a0872ce-0ceb-4a44-8a16-27578de8113c' >>>WHERE id = '9a0872ce-0ceb-4a44-8a16-27578de8113c' 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.collection.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.collection.read' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==9a0872ce-0ceb-4a44-8a16-27578de8113c >>>WHERE id='9a0872ce-0ceb-4a44-8a16-27578de8113c' [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: permissionName==dummy.collection.read >>>WHERE lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.collection.read')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: permissionName==dummy.collection.read >>>WHERE lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.collection.read')) [Mon May 10 14:02:19 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:19 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==9a0872ce-0ceb-4a44-8a16-27578de8113c >>>WHERE id='9a0872ce-0ceb-4a44-8a16-27578de8113c' 14:02:19 [] [] [] [] INFO Conn starting: saveBatch size=2 14:02:19 [] [] [] [] ERROR Conn saveBatch size=2 { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:19 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:19 [] [] [] [] INFO TenantPermsAPI Error renaming permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:19 [] [] [] [] ERROR TenantPermsAPI { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41506 POST /_/tenantpermissions null HTTP_1_1 400 205 35 tid=diku Bad Request 14:02:19 [] [] [] [] ERROR TestUtil Got 400, expected 201 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 422 115 -1 tid=null Unprocessable Entity {"errors":[{"message":"must not be null","type":"1","code":"-1","parameters":[{"key":"moduleId","value":"null"}]}]} 14:02:19 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:19 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'module' >>>WHERE (jsonb->>'moduleName') = 'module' 14:02:19 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 44 1 tid=diku Created 14:02:19 [] [] [] [] INFO RestRouting invoking getPermsUsersById 14:02:20 [] [] [] [] ERROR PermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/1234 null HTTP_1_1 400 183 1010 tid=badTenant Bad Request 14:02:20 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:20 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(a and) AND (dummy==false)' [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:20 [] [] [] [] ERROR Conn org.folio.cql2pgjson.exception.QueryValidationException: org.z3950.zing.cql.CQLParseException: expected index or term, got ')' org.folio.rest.persist.cql.CQLQueryValidationException: org.folio.cql2pgjson.exception.QueryValidationException: org.z3950.zing.cql.CQLParseException: expected index or term, got ')' at org.folio.rest.persist.cql.CQLWrapper.getWhereThis(CQLWrapper.java:176) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereOp(CQLWrapper.java:203) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereClause(CQLWrapper.java:226) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWithoutLimOff(CQLWrapper.java:277) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.toString(CQLWrapper.java:287) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.buildQueryHelper(PostgresClient.java:2114) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.Conn.get(Conn.java:791) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.lambda$71(PostgresClient.java:2347) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.withTimeout(PostgresClient.java:3539) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.lambda$131(PostgresClient.java:3630) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.lambda$132(PostgresClient.java:3667) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.future.Composition.onSuccess(Composition.java:38) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.emitSuccess(FutureBase.java:62) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureImpl.addListener(FutureImpl.java:164) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.future.FutureBase.compose(FutureBase.java:105) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.Future.compose(Future.java:199) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.Future.flatMap(Future.java:180) ~[vertx-core-4.0.2.jar:4.0.2] at org.folio.rest.persist.PostgresClient.withConnection(PostgresClient.java:3667) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.withConn(PostgresClient.java:3630) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.withConn(PostgresClient.java:3614) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.get(PostgresClient.java:2346) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.get(PostgresClient.java:2339) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.get(PostgresClient.java:2330) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.PostgresClient.get(PostgresClient.java:2301) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.impl.PermsAPI.getPermsPermissions(PermsAPI.java:1113) ~[classes/:?] at jdk.internal.reflect.GeneratedMethodAccessor95.invoke(Unknown Source) ~[?:?] at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:?] at java.lang.reflect.Method.invoke(Method.java:566) ~[?:?] at org.folio.rest.RestRouting.invoke(RestRouting.java:433) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.RestRouting.lambda$22(RestRouting.java:701) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:96) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.AbstractContext.dispatch(AbstractContext.java:59) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.onEnd(Http1xServerRequest.java:549) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerRequest.handleEnd(Http1xServerRequest.java:535) ~[vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.EventLoopContext.execute(EventLoopContext.java:73) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.impl.DuplicatedContext.execute(DuplicatedContext.java:189) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.onEnd(Http1xServerConnection.java:199) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.http.impl.Http1xServerConnection.handleMessage(Http1xServerConnection.java:142) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:153) [vertx-core-4.0.2.jar:4.0.2] at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:148) [vertx-core-4.0.2.jar:4.0.2] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.ChannelInboundHandlerAdapter.channelRead(ChannelInboundHandlerAdapter.java:93) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.http.websocketx.extensions.WebSocketServerExtensionHandler.channelRead(WebSocketServerExtensionHandler.java:101) [netty-codec-http-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:103) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:324) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:296) [netty-codec-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] Caused by: org.folio.cql2pgjson.exception.QueryValidationException: org.z3950.zing.cql.CQLParseException: expected index or term, got ')' at org.folio.cql2pgjson.CQL2PgJSON.toSql(CQL2PgJSON.java:301) ~[cql2pgjson-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereThis(CQLWrapper.java:174) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] ... 71 more Caused by: org.z3950.zing.cql.CQLParseException: expected index or term, got ')' at org.z3950.zing.cql.CQLParser.matchSymbol(CQLParser.java:356) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseTerm(CQLParser.java:236) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseQuery(CQLParser.java:175) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseTerm(CQLParser.java:228) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseQuery(CQLParser.java:163) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parseTopLevelPrefixes(CQLParser.java:136) ~[cql-java-1.13.jar:?] at org.z3950.zing.cql.CQLParser.parse(CQLParser.java:119) ~[cql-java-1.13.jar:?] at org.folio.cql2pgjson.CQL2PgJSON.toSql(CQL2PgJSON.java:298) ~[cql2pgjson-33.0.0-SNAPSHOT.jar:?] at org.folio.rest.persist.cql.CQLWrapper.getWhereThis(CQLWrapper.java:174) ~[domain-models-runtime-33.0.0-SNAPSHOT.jar:?] ... 71 more 14:02:20 [] [] [] [] ERROR PermsAPI org.folio.cql2pgjson.exception.QueryValidationException: org.z3950.zing.cql.CQLParseException: expected index or term, got ')' 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=a+and HTTP_1_1 400 126 7 tid=diku Bad Request 14:02:20 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleA1' >>>WHERE (jsonb->>'moduleName') = 'moduleA1' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4' LIMIT 1 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4' >>>WHERE (jsonb->>'permissionName') = 'perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4' 14:02:20 [] [] [] [] INFO TenantPermsAPI Saved perm perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 211 16 tid=diku Created 14:02:20 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'moduleB1' >>>WHERE (jsonb->>'moduleName') = 'moduleB1' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4' LIMIT 1 14:02:20 [] [] [] [] ERROR TenantPermsAPI Collision! A Permission named perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4 is already defined: {"permissionName":"perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4","displayName":"Description 1","id":"5b5e3edb-c0e0-40d1-a90e-063b0d0cbc5e","tags":[],"subPermissions":[],"childOf":[],"grantedTo":[],"mutable":false,"visible":false,"dummy":false,"deprecated":false,"moduleName":"moduleA1","moduleVersion":"1.0.0"} 14:02:20 [] [] [] [] ERROR TenantPermsAPI Collision! A Permission named perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4 is already defined: {"permissionName":"perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4","displayName":"Description 1","id":"5b5e3edb-c0e0-40d1-a90e-063b0d0cbc5e","tags":[],"subPermissions":[],"childOf":[],"grantedTo":[],"mutable":false,"visible":false,"dummy":false,"deprecated":false,"moduleName":"moduleA1","moduleVersion":"1.0.0"} io.vertx.core.impl.NoStackTraceThrowable: Collision! A Permission named perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4 is already defined: {"permissionName":"perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4","displayName":"Description 1","id":"5b5e3edb-c0e0-40d1-a90e-063b0d0cbc5e","tags":[],"subPermissions":[],"childOf":[],"grantedTo":[],"mutable":false,"visible":false,"dummy":false,"deprecated":false,"moduleName":"moduleA1","moduleVersion":"1.0.0"} 14:02:20 [] [] [] [] ERROR TenantPermsAPI Collision! A Permission named perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4 is already defined: {"permissionName":"perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4","displayName":"Description 1","id":"5b5e3edb-c0e0-40d1-a90e-063b0d0cbc5e","tags":[],"subPermissions":[],"childOf":[],"grantedTo":[],"mutable":false,"visible":false,"dummy":false,"deprecated":false,"moduleName":"moduleA1","moduleVersion":"1.0.0"} io.vertx.core.impl.NoStackTraceThrowable: Collision! A Permission named perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4 is already defined: {"permissionName":"perm1979dabf-a3da-4c8f-ad13-d64ed73d9cc4","displayName":"Description 1","id":"5b5e3edb-c0e0-40d1-a90e-063b0d0cbc5e","tags":[],"subPermissions":[],"childOf":[],"grantedTo":[],"mutable":false,"visible":false,"dummy":false,"deprecated":false,"moduleName":"moduleA1","moduleVersion":"1.0.0"} 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 400 397 5 tid=diku Bad Request 14:02:20 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'module' >>>WHERE (jsonb->>'moduleName') = 'module' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm46d5f89d-510c-4913-9385-9fd3faf0d054' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm46d5f89d-510c-4913-9385-9fd3faf0d054' LIMIT 1 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm0c098214-350f-45a4-b407-bc5b172134e6' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm0c098214-350f-45a4-b407-bc5b172134e6' LIMIT 1 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm0c098214-350f-45a4-b407-bc5b172134e6' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm0c098214-350f-45a4-b407-bc5b172134e6' LIMIT 1 14:02:20 [] [] [] [] INFO TenantPermsAPI Permission with name 'perm0c098214-350f-45a4-b407-bc5b172134e6' does not exist 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm46d5f89d-510c-4913-9385-9fd3faf0d054' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm46d5f89d-510c-4913-9385-9fd3faf0d054' LIMIT 1 14:02:20 [] [] [] [] INFO TenantPermsAPI Permission with name 'perm46d5f89d-510c-4913-9385-9fd3faf0d054' does not exist 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm46d5f89d-510c-4913-9385-9fd3faf0d054' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm46d5f89d-510c-4913-9385-9fd3faf0d054' LIMIT 1 14:02:20 [] [] [] [] INFO TenantPermsAPI Permission with name 'perm46d5f89d-510c-4913-9385-9fd3faf0d054' does not exist 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm0c098214-350f-45a4-b407-bc5b172134e6' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm0c098214-350f-45a4-b407-bc5b172134e6' LIMIT 1 14:02:20 [] [] [] [] INFO TenantPermsAPI Permission with name 'perm0c098214-350f-45a4-b407-bc5b172134e6' does not exist 14:02:20 [] [] [] [] ERROR TenantPermsAPI Error saving permissions: Unable to resolve permission dependencies for [{"permissionName":"perm0c098214-350f-45a4-b407-bc5b172134e6","replaces":[],"subPermissions":["perm46d5f89d-510c-4913-9385-9fd3faf0d054"]},{"permissionName":"perm46d5f89d-510c-4913-9385-9fd3faf0d054","replaces":[],"subPermissions":["perm0c098214-350f-45a4-b407-bc5b172134e6"]}] 14:02:20 [] [] [] [] ERROR TenantPermsAPI Unable to resolve permission dependencies for [{"permissionName":"perm0c098214-350f-45a4-b407-bc5b172134e6","replaces":[],"subPermissions":["perm46d5f89d-510c-4913-9385-9fd3faf0d054"]},{"permissionName":"perm46d5f89d-510c-4913-9385-9fd3faf0d054","replaces":[],"subPermissions":["perm0c098214-350f-45a4-b407-bc5b172134e6"]}] io.vertx.core.impl.NoStackTraceThrowable: Unable to resolve permission dependencies for [{"permissionName":"perm0c098214-350f-45a4-b407-bc5b172134e6","replaces":[],"subPermissions":["perm46d5f89d-510c-4913-9385-9fd3faf0d054"]},{"permissionName":"perm46d5f89d-510c-4913-9385-9fd3faf0d054","replaces":[],"subPermissions":["perm0c098214-350f-45a4-b407-bc5b172134e6"]}] 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 400 323 9 tid=diku Bad Request 14:02:20 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'module' >>>WHERE (jsonb->>'moduleName') = 'module' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' LIMIT 1 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' LIMIT 1 14:02:20 [] [] [] [] INFO TenantPermsAPI Permission with name 'perm5f2a5bf5-5826-40f2-b285-defde334d422' does not exist 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' >>>WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' LIMIT 1 14:02:20 [] [] [] [] INFO TenantPermsAPI Permission with name 'perm5f2a5bf5-5826-40f2-b285-defde334d422' exists 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' LIMIT 1 14:02:20 [] [] [] [] INFO TenantPermsAPI Permission with name 'perm5f2a5bf5-5826-40f2-b285-defde334d422' exists 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' LIMIT 1 14:02:20 [] [] [] [] INFO TenantPermsAPI Permission with name 'perm5f2a5bf5-5826-40f2-b285-defde334d422' exists 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' >>>WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' >>>WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' >>>WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' 14:02:20 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission perm5f2a5bf5-5826-40f2-b285-defde334d422 with value permd6306be8-75e9-4b4b-b2e5-1e1c13cac315 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' >>>WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' 14:02:20 [] [] [] [] INFO TenantPermsAPI Saved perm permd6306be8-75e9-4b4b-b2e5-1e1c13cac315 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 215 13 tid=diku Created 14:02:20 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:20 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query 'permissionName=perm5f2a5bf5-5826-40f2-b285-defde334d422' [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = perm5f2a5bf5-5826-40f2-b285-defde334d422 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('perm5f2a5bf5-5826-40f2-b285-defde334d422')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = perm5f2a5bf5-5826-40f2-b285-defde334d422 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('perm5f2a5bf5-5826-40f2-b285-defde334d422')) 14:02:20 [] [] [] [] INFO CQLWrapper CQL >>> SQL: permissionName=perm5f2a5bf5-5826-40f2-b285-defde334d422 >>>WHERE get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('perm5f2a5bf5-5826-40f2-b285-defde334d422')) LIMIT 10 OFFSET 0 [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = perm5f2a5bf5-5826-40f2-b285-defde334d422 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('perm5f2a5bf5-5826-40f2-b285-defde334d422')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = perm5f2a5bf5-5826-40f2-b285-defde334d422 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('perm5f2a5bf5-5826-40f2-b285-defde334d422')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = perm5f2a5bf5-5826-40f2-b285-defde334d422 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('perm5f2a5bf5-5826-40f2-b285-defde334d422')) 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions includeDummy=true&query=permissionName%3Dperm5f2a5bf5-5826-40f2-b285-defde334d422 HTTP_1_1 200 395 3 tid=diku OK 14:02:20 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:20 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName=permd6306be8-75e9-4b4b-b2e5-1e1c13cac315) AND (dummy==false)' [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permd6306be8-75e9-4b4b-b2e5-1e1c13cac315 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permd6306be8-75e9-4b4b-b2e5-1e1c13cac315')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permd6306be8-75e9-4b4b-b2e5-1e1c13cac315 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permd6306be8-75e9-4b4b-b2e5-1e1c13cac315')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:20 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName=permd6306be8-75e9-4b4b-b2e5-1e1c13cac315) AND (dummy==false) >>>WHERE (get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permd6306be8-75e9-4b4b-b2e5-1e1c13cac315'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permd6306be8-75e9-4b4b-b2e5-1e1c13cac315 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permd6306be8-75e9-4b4b-b2e5-1e1c13cac315')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permd6306be8-75e9-4b4b-b2e5-1e1c13cac315 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permd6306be8-75e9-4b4b-b2e5-1e1c13cac315')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = permd6306be8-75e9-4b4b-b2e5-1e1c13cac315 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('permd6306be8-75e9-4b4b-b2e5-1e1c13cac315')) [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName%3Dpermd6306be8-75e9-4b4b-b2e5-1e1c13cac315 HTTP_1_1 200 456 4 tid=diku OK 14:02:20 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'module' >>>WHERE (jsonb->>'moduleName') = 'module' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' LIMIT 1 14:02:20 [] [] [] [] INFO TenantPermsAPI Permission with name 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' exists 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' LIMIT 1 14:02:20 [] [] [] [] INFO TenantPermsAPI Permission with name 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' exists 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' >>>WHERE (jsonb->>'permissionName') = 'perm5f2a5bf5-5826-40f2-b285-defde334d422' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' >>>WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' >>>WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' 14:02:20 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission permd6306be8-75e9-4b4b-b2e5-1e1c13cac315 with value perm5f2a5bf5-5826-40f2-b285-defde334d422 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' >>>WHERE (jsonb->>'permissionName') = 'permd6306be8-75e9-4b4b-b2e5-1e1c13cac315' 14:02:20 [] [] [] [] INFO TenantPermsAPI Saved perm perm5f2a5bf5-5826-40f2-b285-defde334d422 14:02:20 [] [] [] [] INFO Conn starting: saveBatch size=1 14:02:20 [] [] [] [] ERROR Conn saveBatch size=1 { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:20 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:20 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:20 [] [] [] [] ERROR TenantPermsAPI { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 400 205 9 tid=diku Bad Request 14:02:20 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (id = '2229842d-d89e-4de1-b674-88018a9b1c62' OR (jsonb->>'userId') = 'bf17c869-8947-428a-b330-b68485d11c39') >>>WHERE (id = '2229842d-d89e-4de1-b674-88018a9b1c62' OR (jsonb->>'userId') = 'bf17c869-8947-428a-b330-b68485d11c39') 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:20 [] [] [] [] INFO RestRouting invoking putPermsUsersById [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:20 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==2229842d-d89e-4de1-b674-88018a9b1c62 >>>WHERE id='2229842d-d89e-4de1-b674-88018a9b1c62' 14:02:20 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==2229842d-d89e-4de1-b674-88018a9b1c62 >>>WHERE id='2229842d-d89e-4de1-b674-88018a9b1c62' 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/users/2229842d-d89e-4de1-b674-88018a9b1c62 null HTTP_1_1 200 127 3 tid=diku OK 14:02:20 [] [] [] [] INFO RestRouting invoking putPermsUsersById 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permission.second' >>>WHERE (jsonb->>'permissionName') = 'permission.second' [Mon May 10 14:02:20 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK 14:02:20 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==2229842d-d89e-4de1-b674-88018a9b1c62 >>>WHERE id='2229842d-d89e-4de1-b674-88018a9b1c62' 14:02:20 [] [] [] [] INFO CQLWrapper CQL >>> SQL: id==2229842d-d89e-4de1-b674-88018a9b1c62 >>>WHERE id='2229842d-d89e-4de1-b674-88018a9b1c62' 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'permission.second' >>>WHERE (jsonb->>'permissionName') = 'permission.second' 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/users/2229842d-d89e-4de1-b674-88018a9b1c62 null HTTP_1_1 422 346 4 tid=diku Unprocessable Entity 14:02:20 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:20 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '2229842d-d89e-4de1-b674-88018a9b1c62' >>>WHERE id = '2229842d-d89e-4de1-b674-88018a9b1c62' 14:02:20 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/2229842d-d89e-4de1-b674-88018a9b1c62 null HTTP_1_1 204 0 1 tid=diku No Content 14:02:20 [] [] [] [] INFO RestRouting invoking deletePermsUsersById 14:02:21 [] [] [] [] ERROR PostgresClient { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:21 [] [] [] [] ERROR PermsAPI Error getting existing users: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:21 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/users/1234 null HTTP_1_1 400 213 1006 tid=badTenant Bad Request 14:02:21 [] [] [] [] INFO RestRouting invoking deletePermsPermissionsById 14:02:22 [] [] [] [] ERROR PermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:22 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/permissions/123 null HTTP_1_1 400 183 1010 tid=badTenant Bad Request 14:02:22 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:22 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'module' >>>WHERE (jsonb->>'moduleName') = 'module' 14:02:22 [] [] [] [] INFO Conn starting: saveBatch size=2 14:02:22 [] [] [] [] ERROR Conn saveBatch size=2 { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:22 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:22 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:22 [] [] [] [] ERROR TenantPermsAPI { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:22 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 400 205 6 tid=diku Bad Request 14:02:22 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:23 [] [] [] [] ERROR TenantPermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:23 [] [] [] [] ERROR TenantPermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:23 [] [] [] [] ERROR TenantPermsAPI { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } io.vertx.pgclient.PgException: { "message": "password authentication failed for user \"badtenant_mod_permissions\"", "severity": "FATAL", "code": "28P01", "file": "auth.c", "line": "330", "routine": "auth_failed" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.InitCommandCodec.handleErrorResponse(InitCommandCodec.java:100) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 400 183 1013 tid=badTenant Bad Request 14:02:23 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'mutable-test-module' >>>WHERE (jsonb->>'moduleName') = 'mutable-test-module' 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1' LIMIT 1 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1' >>>WHERE (jsonb->>'permissionName') = 'sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1' 14:02:23 [] [] [] [] INFO TenantPermsAPI Saved perm sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 201 187 17 tid=diku Created 14:02:23 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:23 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '(permissionName=sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1) AND (dummy==false)' [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1')) [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1')) [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:23 [] [] [] [] INFO CQLWrapper CQL >>> SQL: (permissionName=sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1) AND (dummy==false) >>>WHERE (get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1')) [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1')) [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing FT search without index for permissions.jsonb->>'permissionName', CQL >>> SQL: permissionName = sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1 >>> get_tsvector(f_unaccent(permissions.jsonb->>'permissionName')) @@ tsquery_phrase(f_unaccent('sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1')) [Mon May 10 14:02:23 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions query=permissionName=sys-defined-df898aa9-60e6-4190-bb1d-79991360c3a1 HTTP_1_1 200 403 10 tid=diku OK 14:02:23 [] [] [] [] INFO RestRouting invoking putPermsPermissionsById 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'e48914ce-fa98-4754-b591-336ed6041950' >>>WHERE id = 'e48914ce-fa98-4754-b591-336ed6041950' 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/permissions/e48914ce-fa98-4754-b591-336ed6041950 null HTTP_1_1 400 37 2 tid=diku Bad Request 14:02:23 [] [] [] [] INFO RestRouting invoking deletePermsPermissionsById 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'e48914ce-fa98-4754-b591-336ed6041950' >>>WHERE id = 'e48914ce-fa98-4754-b591-336ed6041950' 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/permissions/e48914ce-fa98-4754-b591-336ed6041950 null HTTP_1_1 400 37 1 tid=diku Bad Request 14:02:23 [] [] [] [] INFO RestRouting invoking postPermsPermissions 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'user-defined-58a96864-4a4f-4038-80c9-4601eb52023e' >>>WHERE (jsonb->>'permissionName') = 'user-defined-58a96864-4a4f-4038-80c9-4601eb52023e' 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /perms/permissions null HTTP_1_1 201 334 2 tid=diku Created 14:02:23 [] [] [] [] INFO RestRouting invoking putPermsPermissionsById 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '58a96864-4a4f-4038-80c9-4601eb52023e' >>>WHERE id = '58a96864-4a4f-4038-80c9-4601eb52023e' 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '58a96864-4a4f-4038-80c9-4601eb52023e' >>>WHERE id = '58a96864-4a4f-4038-80c9-4601eb52023e' 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 PUT /perms/permissions/58a96864-4a4f-4038-80c9-4601eb52023e null HTTP_1_1 200 344 3 tid=diku OK 14:02:23 [] [] [] [] INFO RestRouting invoking deletePermsPermissionsById 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '58a96864-4a4f-4038-80c9-4601eb52023e' >>>WHERE id = '58a96864-4a4f-4038-80c9-4601eb52023e' 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 DELETE /perms/permissions/58a96864-4a4f-4038-80c9-4601eb52023e null HTTP_1_1 204 0 1 tid=diku No Content 14:02:23 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'mutable-test-module' >>>WHERE (jsonb->>'moduleName') = 'mutable-test-module' 14:02:23 [] [] [] [] INFO Conn starting: saveBatch size=1 14:02:23 [] [] [] [] ERROR Conn saveBatch size=1 { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:23 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:23 [] [] [] [] INFO TenantPermsAPI Error soft deleting permissions: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } 14:02:23 [] [] [] [] ERROR TenantPermsAPI { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } io.vertx.pgclient.PgException: { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PrepareStatementCommandCodec.handleErrorResponse(PrepareStatementCommandCodec.java:88) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 POST /_/tenantpermissions null HTTP_1_1 400 205 3 tid=diku Bad Request 14:02:23 [] [] [] [] INFO RestRouting invoking getPermsPermissionsById 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/permissions/123 null HTTP_1_1 404 142 0 tid=badTenant Not Found 14:02:23 [] [] [] [] INFO RestRouting invoking getPermsUsersById 14:02:23 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = '12#34' >>>WHERE id = '12#34' 14:02:23 [] [] [] [] ERROR PostgresClient query with count: { "message": "invalid input syntax for type uuid: \"12#34\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '12#34'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } - SELECT diku_mod_permissions.count_estimate('SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = ''12#34''') io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"12#34\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '12#34'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:23 [] [] [] [] ERROR PermsAPI { "message": "invalid input syntax for type uuid: \"12#34\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '12#34'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } io.vertx.pgclient.PgException: { "message": "invalid input syntax for type uuid: \"12#34\"", "severity": "ERROR", "code": "22P02", "internalPosition": "77", "internalQuery": "EXPLAIN SELECT jsonb FROM diku_mod_permissions.permissions_users WHERE id = '12#34'", "where": "PL/pgSQL function count_estimate_smart2(bigint,bigint,text) line 7 at FOR over EXECUTE statement\nPL/pgSQL function count_estimate(text) line 7 at assignment", "file": "uuid.c", "line": "134", "routine": "string_to_uuid" } at io.vertx.pgclient.impl.codec.ErrorResponse.toException(ErrorResponse.java:31) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.QueryCommandBaseCodec.handleErrorResponse(QueryCommandBaseCodec.java:57) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeError(PgDecoder.java:236) ~[vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.decodeMessage(PgDecoder.java:122) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.vertx.pgclient.impl.codec.PgDecoder.channelRead(PgDecoder.java:102) [vertx-pg-client-4.0.2-FOLIO.jar:4.0.2-FOLIO] at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493) [netty-transport-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) [netty-common-4.1.52.Final.jar:4.1.52.Final] at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [netty-common-4.1.52.Final.jar:4.1.52.Final] at java.lang.Thread.run(Thread.java:829) [?:?] 14:02:23 [] [] [] [] INFO LogUtil 127.0.0.1:41368 GET /perms/users/12%2334 indexField=id HTTP_1_1 400 462 1 tid=diku Bad Request 14:02:23 [] [] [] [] INFO RestVerticle No shutdown hook implementation found, continuing with shutdown [ERROR] Tests run: 59, Failures: 7, Errors: 1, Skipped: 0, Time elapsed: 16.51 s <<< FAILURE! - in org.folio.permstest.RestVerticleTest [ERROR] testDeprecatePermissionsOnTenantInit(org.folio.permstest.RestVerticleTest) Time elapsed: 0.148 s <<< FAILURE! java.lang.AssertionError: Expected true at org.folio.permstest.RestVerticleTest.lambda$testDeprecatePermissionsOnTenantInit$49(RestVerticleTest.java:1225) [ERROR] testPermissionsOnTheMove(org.folio.permstest.RestVerticleTest) Time elapsed: 0.036 s <<< FAILURE! java.lang.AssertionError: Not equals : 201 != 400 at org.folio.permstest.RestVerticleTest.testPermissionsOnTheMove(RestVerticleTest.java:355) [ERROR] testPermissionNameReplace(org.folio.permstest.RestVerticleTest) Time elapsed: 0.05 s <<< FAILURE! java.lang.AssertionError: Expected: is <201> but: was <400> at org.folio.permstest.RestVerticleTest.testPermissionNameReplace(RestVerticleTest.java:640) [ERROR] testPurgeDeprecatedPerm(org.folio.permstest.RestVerticleTest) Time elapsed: 0.054 s <<< FAILURE! java.lang.AssertionError: Expected: is but: was at org.folio.permstest.RestVerticleTest.testPurgeDeprecatedPerm(RestVerticleTest.java:571) [ERROR] testPermsSeq(org.folio.permstest.RestVerticleTest) Time elapsed: 0.176 s <<< ERROR! io.vertx.core.impl.NoStackTraceThrowable: POST request to http://localhost:58567/_/tenantpermissions failed. Expected status code '201' but got status code '400': { "message": "current transaction is aborted, commands ignored until end of transaction block", "severity": "ERROR", "code": "25P02", "file": "postgres.c", "line": "1424", "routine": "exec_parse_message" } [ERROR] testPostTenantPermissionsMutual2(org.folio.permstest.RestVerticleTest) Time elapsed: 0.037 s <<< FAILURE! java.lang.AssertionError: Not equals : 201 != 400 at org.folio.permstest.RestVerticleTest.testPostTenantPermissionsMutual2(RestVerticleTest.java:1168) [ERROR] testPostTenantPermissionsNoPermissionName(org.folio.permstest.RestVerticleTest) Time elapsed: 0.011 s <<< FAILURE! java.lang.AssertionError: Not equals : 201 != 400 at org.folio.permstest.RestVerticleTest.testPostTenantPermissionsNoPermissionName(RestVerticleTest.java:1127) [ERROR] testPermsPermissionsMutable(org.folio.permstest.RestVerticleTest) Time elapsed: 0.029 s <<< FAILURE! java.lang.AssertionError: Not equals : 201 != 400 at org.folio.permstest.RestVerticleTest.testPermsPermissionsMutable(RestVerticleTest.java:1065) [INFO] Running org.folio.permstest.PermsCacheTest [INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.folio.permstest.PermsCacheTest [INFO] Running org.folio.permstest.RestVerticleWithCacheTest 14:02:23 [] [] [] [] INFO PostgresClient Stopping postgres tester 14:02:23 [] [] [] [] INFO RestVerticle git: git@github.com:folio-org/raml-module-builder.git b776a3b570c74f8f0bcce5d19d502928c3bf7948 14:02:23 [] [] [] [] INFO RestVerticle metrics enabled: false 14:02:23 [] [] [] [] INFO RestRouting Adding route DELETE /_/tenant/{operation_id} -> deleteTenantByOperationId 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /_/tenant/{operation_id} -> getTenantByOperationId 14:02:23 [] [] [] [] INFO RestRouting Adding route POST /_/tenant -> postTenant 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /_/jsonSchemas -> getJsonSchemas 14:02:23 [] [] [] [] INFO RestRouting Adding route POST /_/tenantpermissions -> postTenantpermissions 14:02:23 [] [] [] [] INFO RestRouting Adding route DELETE /admin/kill_query -> deleteAdminKillQuery 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/cache_hit_rates -> getAdminCacheHitRates 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/db_cache_summary -> getAdminDbCacheSummary 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/health -> getAdminHealth 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/jstack -> getAdminJstack 14:02:23 [] [] [] [] INFO RestRouting Adding route PUT /admin/jstack -> putAdminJstack 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/list_locking_queries -> getAdminListLockingQueries 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/loglevel -> getAdminLoglevel 14:02:23 [] [] [] [] INFO RestRouting Adding route PUT /admin/loglevel -> putAdminLoglevel 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/memory -> getAdminMemory 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_active_sessions -> getAdminPostgresActiveSessions 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_load -> getAdminPostgresLoad 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_table_access_stats -> getAdminPostgresTableAccessStats 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/postgres_table_size -> getAdminPostgresTableSize 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/slow_queries -> getAdminSlowQueries 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/table_index_usage -> getAdminTableIndexUsage 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /admin/total_db_size -> getAdminTotalDbSize 14:02:23 [] [] [] [] INFO RestRouting Adding route POST /admin/get_password -> postAdminGetPassword 14:02:23 [] [] [] [] INFO RestRouting Adding route POST /admin/importSQL -> postAdminImportSQL 14:02:23 [] [] [] [] INFO RestRouting Adding route POST /admin/postgres_maintenance -> postAdminPostgresMaintenance 14:02:23 [] [] [] [] INFO RestRouting Adding route POST /admin/set_AES_key -> postAdminSetAESKey 14:02:23 [] [] [] [] INFO RestRouting Adding route PUT /admin/postgres_create_indexes -> putAdminPostgresCreateIndexes 14:02:23 [] [] [] [] INFO RestRouting Adding route PUT /admin/postgres_drop_indexes -> putAdminPostgresDropIndexes 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /_/ramls -> getRamls 14:02:23 [] [] [] [] INFO RestRouting Adding route DELETE /perms/permissions/{id} -> deletePermsPermissionsById 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /perms/permissions/{id} -> getPermsPermissionsById 14:02:23 [] [] [] [] INFO RestRouting Adding route PUT /perms/permissions/{id} -> putPermsPermissionsById 14:02:23 [] [] [] [] INFO RestRouting Adding route DELETE /perms/users/{id} -> deletePermsUsersById 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /perms/users/{id} -> getPermsUsersById 14:02:23 [] [] [] [] INFO RestRouting Adding route PUT /perms/users/{id} -> putPermsUsersById 14:02:23 [] [] [] [] INFO RestRouting Adding route DELETE /perms/users/{id}/permissions/{permissionname} -> deletePermsUsersPermissionsByIdAndPermissionname 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /perms/permissions -> getPermsPermissions 14:02:23 [] [] [] [] INFO RestRouting Adding route POST /perms/permissions -> postPermsPermissions 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /perms/users -> getPermsUsers 14:02:23 [] [] [] [] INFO RestRouting Adding route POST /perms/users -> postPermsUsers 14:02:23 [] [] [] [] INFO RestRouting Adding route GET /perms/users/{id}/permissions -> getPermsUsersPermissionsById 14:02:23 [] [] [] [] INFO RestRouting Adding route POST /perms/users/{id}/permissions -> postPermsUsersPermissionsById 14:02:23 [] [] [] [] INFO RestRouting Adding route POST /perms/purge-deprecated -> postPermsPurgeDeprecated 14:02:23 [] [] [] [] INFO RestRouting Looks like org.folio.rest.jaxrs.resource.Rmbtests is not implemented 14:02:23 [] [] [] [] INFO RestVerticle Listening port 53032 14:02:23 [] [] [] [] INFO RestVerticle No periodic implementation found, continuing with deployment 14:02:23 [] [] [] [] INFO RestVerticle No Post Deploy Hook implementation found, continuing with deployment 14:02:23 [] [] [] [] INFO RestRouting invoking postTenant 14:02:23 [] [] [] [] INFO LoadConfs File does not exist: /postgres-conf.json 14:02:23 [] [] [] [] INFO LoadConfs Resource does not exist: /postgres-conf.json 14:02:23 [] [] [] [] INFO PostgresClient No DB configuration found, setting username, password and database for testing 14:02:23 [] [] [] [] INFO PostgresClient Starting postgres tester 14:02:25 [] [] [] [] INFO PostgresClient postgreSQLClientConfig = {"postgres_tester":true,"username":"username","password":"...","database":"postgres","port":49348,"host":"localhost"} 14:02:25 [] [] [] [] INFO PostgresClient Executing multiple statements with id -966878371 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE ROLE diku_mod_permissions PASSWORD 'diku' NOSUPERUSER NOCREATEDB INHERIT LOGIN; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE ROLE diku_mod_permissions PASSWORD 'diku' NOSUPERUSER NOCREATEDB INHERIT LOGIN; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} GRANT diku_mod_permissions TO CURRENT_USER; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed GRANT diku_mod_permissions TO CURRENT_USER; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE SCHEMA diku_mod_permissions AUTHORIZATION diku_mod_permissions; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE SCHEMA diku_mod_permissions AUTHORIZATION diku_mod_permissions; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER ROLE diku_mod_permissions SET search_path = "$user"; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed ALTER ROLE diku_mod_permissions SET search_path = "$user"; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ BEGIN BEGIN -- This only succeeds if show_trgm, a pg_trgm function, -- has been loaded into public schema. PERFORM public.show_trgm('a'); EXCEPTION WHEN undefined_function THEN BEGIN ALTER EXTENSION pg_trgm SET SCHEMA public; EXCEPTION WHEN undefined_object THEN NULL; END; END; END $$; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $$ BEGIN BEGIN -- This only succeeds if show_trgm, a pg_trgm function, -- has been loaded into public schema. PERFORM public.show_trgm('a'); EXCEPTION WHEN undefined_function THEN BEGIN ALTER EXTENSION pg_trgm SET SCHEMA public; EXCEPTION WHEN undefined_object THEN NULL; END; END; END $$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE EXTENSION IF NOT EXISTS unaccent WITH SCHEMA public; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE EXTENSION IF NOT EXISTS unaccent WITH SCHEMA public; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE EXTENSION IF NOT EXISTS pg_trgm WITH SCHEMA public; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE EXTENSION IF NOT EXISTS pg_trgm WITH SCHEMA public; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal ( id SERIAL PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal ( id SERIAL PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} insert into diku_mod_permissions.rmb_internal (jsonb) values ('{"rmbVersion": "33.0.0-SNAPSHOT", "moduleVersion": "mod-permissions-1.0.0"}'::jsonb); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed insert into diku_mod_permissions.rmb_internal (jsonb) values ('{"rmbVersion": "33.0.0-SNAPSHOT", "moduleVersion": "mod-permissions-1.0.0"}'::jsonb); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_job ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_job ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48780 POST /_/tenant HTTP_1_1 201 269 1385 tid=diku Created 14:02:25 [] [] [] [] INFO PostgresClient Executing multiple statements with id -1611535702 14:02:25 [] [] [] [] INFO RestRouting invoking getTenantByOperationId 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} SET search_path TO diku_mod_permissions; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed SET search_path TO diku_mod_permissions; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal_index ( name text PRIMARY KEY, def text NOT NULL, remove boolean NOT NULL ); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.rmb_internal_index ( name text PRIMARY KEY, def text NOT NULL, remove boolean NOT NULL ); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} UPDATE diku_mod_permissions.rmb_internal_index SET remove = TRUE; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed UPDATE diku_mod_permissions.rmb_internal_index SET remove = TRUE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS rmb_internal_analyze ( tablename text ); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS rmb_internal_analyze ( tablename text ); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_smaller(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 < $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_smaller(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 < $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_larger(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 > $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.uuid_larger(uuid, uuid) RETURNS uuid AS $$ BEGIN IF $1 IS NULL THEN RETURN $2; END IF; IF $2 IS NULL THEN RETURN $1; END IF; IF $1 > $2 THEN RETURN $1; ELSE RETURN $2; END IF; END; $$ LANGUAGE plpgsql; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.next_uuid(uuid) RETURNS uuid AS $$ DECLARE uuid text; digit text; BEGIN uuid = $1; FOR i IN REVERSE 36..1 LOOP digit := substring(uuid from i for 1); -- skip minus, version byte M and variant byte N CONTINUE WHEN digit = '-' OR i = 15 OR i = 20; CASE digit WHEN '0' THEN digit := '1'; WHEN '1' THEN digit := '2'; WHEN '2' THEN digit := '3'; WHEN '3' THEN digit := '4'; WHEN '4' THEN digit := '5'; WHEN '5' THEN digit := '6'; WHEN '6' THEN digit := '7'; WHEN '7' THEN digit := '8'; WHEN '8' THEN digit := '9'; WHEN '9' THEN digit := 'a'; WHEN 'a' THEN digit := 'b'; WHEN 'b' THEN digit := 'c'; WHEN 'c' THEN digit := 'd'; WHEN 'd' THEN digit := 'e'; WHEN 'e' THEN digit := 'f'; WHEN 'f' THEN digit := '0'; ELSE NULL; END CASE; uuid = overlay(uuid placing digit from i); EXIT WHEN digit <> '0'; END LOOP; RETURN uuid; END; $$ LANGUAGE plpgsql; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.next_uuid(uuid) RETURNS uuid AS $$ DECLARE uuid text; digit text; BEGIN uuid = $1; FOR i IN REVERSE 36..1 LOOP digit := substring(uuid from i for 1); -- skip minus, version byte M and variant byte N CONTINUE WHEN digit = '-' OR i = 15 OR i = 20; CASE digit WHEN '0' THEN digit := '1'; WHEN '1' THEN digit := '2'; WHEN '2' THEN digit := '3'; WHEN '3' THEN digit := '4'; WHEN '4' THEN digit := '5'; WHEN '5' THEN digit := '6'; WHEN '6' THEN digit := '7'; WHEN '7' THEN digit := '8'; WHEN '8' THEN digit := '9'; WHEN '9' THEN digit := 'a'; WHEN 'a' THEN digit := 'b'; WHEN 'b' THEN digit := 'c'; WHEN 'c' THEN digit := 'd'; WHEN 'd' THEN digit := 'e'; WHEN 'e' THEN digit := 'f'; WHEN 'f' THEN digit := '0'; ELSE NULL; END CASE; uuid = overlay(uuid placing digit from i); EXIT WHEN digit <> '0'; END LOOP; RETURN uuid; END; $$ LANGUAGE plpgsql; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE AGGREGATE diku_mod_permissions.max(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_larger, combinefunc = diku_mod_permissions.uuid_larger, parallel = safe, sortop = operator (>) ); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE AGGREGATE diku_mod_permissions.max(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_larger, combinefunc = diku_mod_permissions.uuid_larger, parallel = safe, sortop = operator (>) ); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE AGGREGATE diku_mod_permissions.min(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_smaller, combinefunc = diku_mod_permissions.uuid_smaller, parallel = safe, sortop = operator (<) ); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE AGGREGATE diku_mod_permissions.min(uuid) ( stype = uuid, sfunc = diku_mod_permissions.uuid_smaller, combinefunc = diku_mod_permissions.uuid_smaller, parallel = safe, sortop = operator (<) ); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.count_estimate_smart2(bigint,bigint,text); [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.count_estimate_smart2(pg_catalog.int8,pg_catalog.int8,text) does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.count_estimate_smart2(bigint,bigint,text); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE FUNCTION diku_mod_permissions.count_estimate_smart2(rows bigint, lim bigint, query text) RETURNS bigint AS $$ DECLARE rec record; cnt bigint; BEGIN IF rows = lim THEN FOR rec IN EXECUTE 'EXPLAIN ' || query LOOP cnt := substring(rec."QUERY PLAN" FROM ' rows=([[:digit:]]+)'); EXIT WHEN cnt IS NOT NULL; END LOOP; RETURN cnt; END IF; RETURN rows; END; $$ LANGUAGE plpgsql VOLATILE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE FUNCTION diku_mod_permissions.count_estimate_smart2(rows bigint, lim bigint, query text) RETURNS bigint AS $$ DECLARE rec record; cnt bigint; BEGIN IF rows = lim THEN FOR rec IN EXECUTE 'EXPLAIN ' || query LOOP cnt := substring(rec."QUERY PLAN" FROM ' rows=([[:digit:]]+)'); EXIT WHEN cnt IS NOT NULL; END LOOP; RETURN cnt; END IF; RETURN rows; END; $$ LANGUAGE plpgsql VOLATILE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate_default(query text) RETURNS bigint AS $$ DECLARE rows bigint; q text; BEGIN q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO rows; IF rows < 1000 THEN return rows; END IF; rows = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF rows < 1000 THEN return 1000; END IF; RETURN rows; END; $$ LANGUAGE plpgsql IMMUTABLE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate_default(query text) RETURNS bigint AS $$ DECLARE rows bigint; q text; BEGIN q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO rows; IF rows < 1000 THEN return rows; END IF; rows = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF rows < 1000 THEN return 1000; END IF; RETURN rows; END; $$ LANGUAGE plpgsql IMMUTABLE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate(query text) RETURNS bigint AS $$ DECLARE count bigint; est_count bigint; q text; BEGIN est_count = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF est_count > 4*1000 THEN RETURN est_count; END IF; q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO count; IF count < 1000 THEN RETURN count; END IF; IF est_count < 1000 THEN RETURN 1000; END IF; RETURN est_count; END; $$ LANGUAGE plpgsql STABLE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.count_estimate(query text) RETURNS bigint AS $$ DECLARE count bigint; est_count bigint; q text; BEGIN est_count = diku_mod_permissions.count_estimate_smart2(1000, 1000, query); IF est_count > 4*1000 THEN RETURN est_count; END IF; q = 'SELECT COUNT(*) FROM (' || query || ' LIMIT 1000) x'; EXECUTE q INTO count; IF count < 1000 THEN RETURN count; END IF; IF est_count < 1000 THEN RETURN 1000; END IF; RETURN est_count; END; $$ LANGUAGE plpgsql STABLE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.upsert(text, uuid, anyelement) RETURNS uuid AS $$ DECLARE ret uuid; BEGIN EXECUTE format('UPDATE diku_mod_permissions.%I SET jsonb=$3 WHERE id=$2 RETURNING id', $1) USING $1, $2, $3 INTO ret; IF ret IS NOT NULL THEN RETURN ret; END IF; EXECUTE format('INSERT INTO diku_mod_permissions.%I (id, jsonb) VALUES ($2, $3) RETURNING id', $1) USING $1, $2, $3 INTO STRICT ret; RETURN ret; END; $$ LANGUAGE plpgsql; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.upsert(text, uuid, anyelement) RETURNS uuid AS $$ DECLARE ret uuid; BEGIN EXECUTE format('UPDATE diku_mod_permissions.%I SET jsonb=$3 WHERE id=$2 RETURNING id', $1) USING $1, $2, $3 INTO ret; IF ret IS NOT NULL THEN RETURN ret; END IF; EXECUTE format('INSERT INTO diku_mod_permissions.%I (id, jsonb) VALUES ($2, $3) RETURNING id', $1) USING $1, $2, $3 INTO STRICT ret; RETURN ret; END; $$ LANGUAGE plpgsql; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE ver integer; BEGIN SELECT current_setting('server_version_num') INTO ver; IF (ver >= 120000) THEN CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT public.unaccent('public.unaccent', $1) -- schema-qualify function and dictionary $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; ELSE CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT regexp_replace(public.unaccent('public.unaccent', $1), E'[\u0300\u0301\u0302\u0303\u0304\u0305\u0306\u0307\u0308\u0309\u030a\u030b\u030c\u030d\u030e\u030f' || E'\u0310\u0311\u0312\u0313\u0314\u0315\u0316\u0317\u0318\u0319\u031a\u031b\u031c\u031d\u031e\u031f' || E'\u0320\u0321\u0322\u0323\u0324\u0325\u0326\u0327\u0328\u0329\u032a\u032b\u032c\u032d\u032e\u032f' || E'\u0330\u0331\u0332\u0333\u0334\u0335\u0336\u0337\u0338\u0339\u033a\u033b\u033c\u033d\u033e\u033f' || E'\u0340\u0341\u0342\u0343\u0344\u0345\u0346\u0347\u0348\u0349\u034a\u034b\u034c\u034d\u034e\u034f' || E'\u0350\u0351\u0352\u0353\u0354\u0355\u0356\u0357\u0358\u0359\u035a\u035b\u035c\u035d\u035e\u035f' || E'\u0360\u0361\u0362' || E'\u20dd\u20de\u20df\u20e0' || E'\u20e2\u20e3\u20e4]', '', 'g') $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; END IF; END $$; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE ver integer; BEGIN SELECT current_setting('server_version_num') INTO ver; IF (ver >= 120000) THEN CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT public.unaccent('public.unaccent', $1) -- schema-qualify function and dictionary $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; ELSE CREATE OR REPLACE FUNCTION diku_mod_permissions.f_unaccent(text) RETURNS text AS $f_unaccent$ SELECT regexp_replace(public.unaccent('public.unaccent', $1), E'[\u0300\u0301\u0302\u0303\u0304\u0305\u0306\u0307\u0308\u0309\u030a\u030b\u030c\u030d\u030e\u030f' || E'\u0310\u0311\u0312\u0313\u0314\u0315\u0316\u0317\u0318\u0319\u031a\u031b\u031c\u031d\u031e\u031f' || E'\u0320\u0321\u0322\u0323\u0324\u0325\u0326\u0327\u0328\u0329\u032a\u032b\u032c\u032d\u032e\u032f' || E'\u0330\u0331\u0332\u0333\u0334\u0335\u0336\u0337\u0338\u0339\u033a\u033b\u033c\u033d\u033e\u033f' || E'\u0340\u0341\u0342\u0343\u0344\u0345\u0346\u0347\u0348\u0349\u034a\u034b\u034c\u034d\u034e\u034f' || E'\u0350\u0351\u0352\u0353\u0354\u0355\u0356\u0357\u0358\u0359\u035a\u035b\u035c\u035d\u035e\u035f' || E'\u0360\u0361\u0362' || E'\u20dd\u20de\u20df\u20e0' || E'\u20e2\u20e3\u20e4]', '', 'g') $f_unaccent$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; END IF; END $$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.get_tsvector(text) RETURNS tsvector AS $$ SELECT to_tsvector('simple', translate($1, '&', ',')); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.get_tsvector(text) RETURNS tsvector AS $$ SELECT to_tsvector('simple', translate($1, '&', ',')); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_and(text) RETURNS tsquery AS $$ SELECT to_tsquery('simple', string_agg(CASE WHEN length(v) = 0 OR v = '*' THEN '' WHEN right(v, 1) = '*' THEN '''' || left(v, -1) || ''':*' ELSE '''' || v || '''' END, '&')) FROM (SELECT regexp_split_to_table(translate($1, '&''', ',,'), ' +')) AS x(v); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_and(text) RETURNS tsquery AS $$ SELECT to_tsquery('simple', string_agg(CASE WHEN length(v) = 0 OR v = '*' THEN '' WHEN right(v, 1) = '*' THEN '''' || left(v, -1) || ''':*' ELSE '''' || v || '''' END, '&')) FROM (SELECT regexp_split_to_table(translate($1, '&''', ',,'), ' +')) AS x(v); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_or(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '|')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_or(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '|')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_phrase(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '<->')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.tsquery_phrase(text) RETURNS tsquery AS $$ SELECT replace(diku_mod_permissions.tsquery_and($1)::text, '&', '<->')::tsquery; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.normalize_digits(text) RETURNS text AS $$ SELECT translate((regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1], E' \t-', '') || CASE WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1] = '' THEN '' WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2] = '' THEN '' ELSE ' ' END || (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2]; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.normalize_digits(text) RETURNS text AS $$ SELECT translate((regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1], E' \t-', '') || CASE WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[1] = '' THEN '' WHEN (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2] = '' THEN '' ELSE ' ' END || (regexp_match($1, '^([0-9 \t-]*(?:\*[ \t]*)?)(.*)'))[2]; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_id_in_jsonb() RETURNS TRIGGER AS $$ BEGIN NEW.jsonb = jsonb_set(NEW.jsonb, '{id}', to_jsonb(NEW.id)); RETURN NEW; END; $$ language 'plpgsql'; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_id_in_jsonb() RETURNS TRIGGER AS $$ BEGIN NEW.jsonb = jsonb_set(NEW.jsonb, '{id}', to_jsonb(NEW.id)); RETURN NEW; END; $$ language 'plpgsql'; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_space_sql(VARIADIC text[]) RETURNS text AS $$ select concat_ws(' ', VARIADIC $1); $$ LANGUAGE SQL IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_space_sql(VARIADIC text[]) RETURNS text AS $$ select concat_ws(' ', VARIADIC $1); $$ LANGUAGE SQL IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object_values(jsonb_array jsonb, field text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object_values(jsonb_array jsonb, field text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object_values( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1) WHERE value->>$3 = $4; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object_values( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT string_agg(value->>$2, ' ') FROM jsonb_array_elements($1) WHERE value->>$3 = $4; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.first_array_object_value( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT value->>$2 FROM jsonb_array_elements($1) WHERE value->>$3 = $4 LIMIT 1; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.first_array_object_value( jsonb_array jsonb, field text, filterkey text, filtervalue text) RETURNS text AS $$ SELECT value->>$2 FROM jsonb_array_elements($1) WHERE value->>$3 = $4 LIMIT 1; $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} create or replace function diku_mod_permissions.concat_array_object(jsonb_array jsonb) RETURNS text AS $$ SELECT string_agg(value::text, ' ') FROM jsonb_array_elements_text($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed create or replace function diku_mod_permissions.concat_array_object(jsonb_array jsonb) RETURNS text AS $$ SELECT string_agg(value::text, ' ') FROM jsonb_array_elements_text($1); $$ LANGUAGE sql IMMUTABLE PARALLEL SAFE STRICT; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS rmb_internal_index(aname text, tops text, newdef text); [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function rmb_internal_index(text,text,text) does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS rmb_internal_index(aname text, tops text, newdef text); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION rmb_internal_index( atable text, aname text, tops text, newdef text) RETURNS void AS $$ DECLARE olddef text; namep CONSTANT text = concat(aname, '_p'); prepareddef text; BEGIN IF tops = 'DELETE' THEN -- use case insensitive %s, not case sensitive %I -- no SQL injection because the names are hard-coded in schema.json EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE 'DELETE FROM diku_mod_permissions.rmb_internal_index WHERE name = $1' USING aname; RETURN; END IF; SELECT def INTO olddef FROM diku_mod_permissions.rmb_internal_index WHERE name = aname; SELECT def INTO prepareddef FROM diku_mod_permissions.rmb_internal_index WHERE name = namep; prepareddef = replace(prepareddef, concat(' ', namep, ' ON '), concat(' ', aname, ' ON ')); IF prepareddef = newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE format('ALTER INDEX IF EXISTS %s RENAME TO %s', namep, aname); EXECUTE 'DELETE FROM rmb_internal_index WHERE name = $1' USING namep; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; ELSIF olddef IS DISTINCT FROM newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE newdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; END IF; EXECUTE 'INSERT INTO diku_mod_permissions.rmb_internal_index VALUES ($1, $2, FALSE) ' 'ON CONFLICT (name) DO UPDATE SET def = EXCLUDED.def, remove = EXCLUDED.remove' USING aname, newdef; END $$ LANGUAGE plpgsql; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION rmb_internal_index( atable text, aname text, tops text, newdef text) RETURNS void AS $$ DECLARE olddef text; namep CONSTANT text = concat(aname, '_p'); prepareddef text; BEGIN IF tops = 'DELETE' THEN -- use case insensitive %s, not case sensitive %I -- no SQL injection because the names are hard-coded in schema.json EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE 'DELETE FROM diku_mod_permissions.rmb_internal_index WHERE name = $1' USING aname; RETURN; END IF; SELECT def INTO olddef FROM diku_mod_permissions.rmb_internal_index WHERE name = aname; SELECT def INTO prepareddef FROM diku_mod_permissions.rmb_internal_index WHERE name = namep; prepareddef = replace(prepareddef, concat(' ', namep, ' ON '), concat(' ', aname, ' ON ')); IF prepareddef = newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE format('ALTER INDEX IF EXISTS %s RENAME TO %s', namep, aname); EXECUTE 'DELETE FROM rmb_internal_index WHERE name = $1' USING namep; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; ELSIF olddef IS DISTINCT FROM newdef THEN EXECUTE format('DROP INDEX IF EXISTS %s', aname); EXECUTE newdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING atable; END IF; EXECUTE 'INSERT INTO diku_mod_permissions.rmb_internal_index VALUES ($1, $2, FALSE) ' 'ON CONFLICT (name) DO UPDATE SET def = EXCLUDED.def, remove = EXCLUDED.remove' USING aname, newdef; END $$ LANGUAGE plpgsql; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ BEGIN -- use advisory lock to prevent "tuple concurrently updated" -- https://issues.folio.org/browse/RMB-744 PERFORM pg_advisory_xact_lock(20201101, 1234567890); REVOKE ALL PRIVILEGES ON SCHEMA public FROM diku_mod_permissions; REVOKE CREATE ON SCHEMA public FROM PUBLIC; END $$; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $$ BEGIN -- use advisory lock to prevent "tuple concurrently updated" -- https://issues.folio.org/browse/RMB-744 PERFORM pg_advisory_xact_lock(20201101, 1234567890); REVOKE ALL PRIVILEGES ON SCHEMA public FROM diku_mod_permissions; REVOKE CREATE ON SCHEMA public FROM PUBLIC; END $$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_injson_permissions ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_injson_permissions" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_injson_permissions ON diku_mod_permissions.permissions CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_in_jsonb" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER TABLE diku_mod_permissions.permissions ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed ALTER TABLE diku_mod_permissions.permissions ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ ); END $do$; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_permissionname_idx_unique" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_permissionName_idx_unique" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_unique', 'ADD', 'CREATE UNIQUE INDEX IF NOT EXISTS permissions_permissionName_idx_unique ON diku_mod_permissions.permissions ' || $rmb$((jsonb->>'permissionName'))$rmb$ ); END $do$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ ); END $do$; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_permissionname_idx_gin" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_permissionName_idx_gin" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions', 'permissions_permissionName_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_permissionName_idx_gin ON diku_mod_permissions.permissions USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'permissionName'))) public.gin_trgm_ops)$rmb$ ); END $do$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS update_permissions_references ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "update_permissions_references" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS update_permissions_references ON diku_mod_permissions.permissions CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_references(); [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.update_permissions_references() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_references(); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_md_trigger ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_md_trigger" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_md_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_set_md(); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_set_md(); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_md_json_trigger ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_md_json_trigger" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_md_json_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_md_json(); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_md_json(); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_ol_version_trigger ON diku_mod_permissions.permissions CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_ol_version_trigger" for relation "diku_mod_permissions.permissions" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_ol_version_trigger ON diku_mod_permissions.permissions CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_set_ol_version() CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.permissions_set_ol_version() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_set_ol_version() CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions_users ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TABLE IF NOT EXISTS diku_mod_permissions.permissions_users ( id UUID PRIMARY KEY, jsonb JSONB NOT NULL ); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_injson_permissions_users ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_injson_permissions_users" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_injson_permissions_users ON diku_mod_permissions.permissions_users CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_id_in_jsonb" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_id_in_jsonb ON diku_mod_permissions.permissions_users CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_id_in_jsonb BEFORE INSERT OR UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_id_in_jsonb(); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} ALTER TABLE diku_mod_permissions.permissions_users ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed ALTER TABLE diku_mod_permissions.permissions_users ADD COLUMN IF NOT EXISTS creation_date timestamp, ADD COLUMN IF NOT EXISTS created_by text; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ ); END $do$; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_users_id_idx" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_users_id_idx" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_id_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_id_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'id'),600))$rmb$ ); END $do$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ ); END $do$; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_users_userid_idx" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_users_userId_idx" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx ON diku_mod_permissions.permissions_users ' || $rmb$(left((jsonb->>'userId'),600))$rmb$ ); END $do$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ ); END $do$; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='index "permissions_users_userid_idx_gin" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='SQL statement "DROP INDEX IF EXISTS permissions_users_userId_idx_gin" PL/pgSQL function rmb_internal_index(text,text,text,text) line 23 at EXECUTE SQL statement "SELECT rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ )" PL/pgSQL function inline_code_block line 3 at PERFORM', file='tablecmds.c', line='1191', routine='DropErrorMsgNonExistent', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $do$ BEGIN PERFORM rmb_internal_index( 'permissions_users', 'permissions_users_userId_idx_gin', 'ADD', 'CREATE INDEX IF NOT EXISTS permissions_users_userId_idx_gin ON diku_mod_permissions.permissions_users USING GIN ' || $rmb$((lower(f_unaccent(jsonb->>'userId'))) public.gin_trgm_ops)$rmb$ ); END $do$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS update_permissions_users_references ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "update_permissions_users_references" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS update_permissions_users_references ON diku_mod_permissions.permissions_users CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_users_references(); [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.update_permissions_users_references() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.update_permissions_users_references(); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_users_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.permissions_users_set_md() RETURNS TRIGGER AS $$ DECLARE input text; createdDate timestamp; BEGIN input = NEW.jsonb->'metadata'->>'createdDate'; IF input IS NULL THEN RETURN NEW; END IF; -- time stamp without time zone? IF (input::timestamp::timestamptz = input::timestamptz) THEN -- createdDate already has no time zone, normalize using ::timestamp createdDate = input::timestamp; ELSE -- createdDate has a time zone string -- normalize using ::timestamptz, convert to '+00' time zone and remove time zone string createdDate = input::timestamptz AT TIME ZONE '+00'; END IF; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(createdDate)); NEW.creation_date = createdDate; NEW.created_by = NEW.jsonb->'metadata'->>'createdByUserId'; RETURN NEW; END; $$ language 'plpgsql'; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_md_trigger ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_users_md_trigger" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_md_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_users_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_users_set_md(); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_users_md_trigger BEFORE INSERT ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.permissions_users_set_md(); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_users_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE OR REPLACE FUNCTION diku_mod_permissions.set_permissions_users_md_json() RETURNS TRIGGER AS $$ BEGIN if NEW.creation_date IS NULL then RETURN NEW; end if; NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdDate}', to_jsonb(NEW.creation_date)); if NEW.created_by IS NULL then NEW.jsonb = NEW.jsonb #- '{metadata,createdByUserId}'; else NEW.jsonb = jsonb_set(NEW.jsonb, '{metadata,createdByUserId}', to_jsonb(NEW.created_by)); end if; RETURN NEW; END; $$ language 'plpgsql'; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_md_json_trigger ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_users_md_json_trigger" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_md_json_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} CREATE TRIGGER set_permissions_users_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_users_md_json(); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed CREATE TRIGGER set_permissions_users_md_json_trigger BEFORE UPDATE ON diku_mod_permissions.permissions_users FOR EACH ROW EXECUTE PROCEDURE diku_mod_permissions.set_permissions_users_md_json(); 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP TRIGGER IF EXISTS set_permissions_users_ol_version_trigger ON diku_mod_permissions.permissions_users CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='trigger "set_permissions_users_ol_version_trigger" for relation "diku_mod_permissions.permissions_users" does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP TRIGGER IF EXISTS set_permissions_users_ol_version_trigger ON diku_mod_permissions.permissions_users CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_users_set_ol_version() CASCADE; [Mon May 10 14:02:25 CEST 2021] io.vertx.sqlclient.impl.SocketConnectionBase WARNING Backend notice: severity='NOTICE', code='00000', message='function diku_mod_permissions.permissions_users_set_ol_version() does not exist, skipping', detail='null', hint='null', position='null', internalPosition='null', internalQuery='null', where='null', file='dropcmds.c', line='491', routine='does_not_exist_skipping', schema='null', table='null', column='null', dataType='null', constraint='null' 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DROP FUNCTION IF EXISTS diku_mod_permissions.permissions_users_set_ol_version() CASCADE; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE aname TEXT; BEGIN FOR aname IN SELECT name FROM diku_mod_permissions.rmb_internal_index WHERE remove = TRUE LOOP EXECUTE 'DROP INDEX IF EXISTS ' || aname; END LOOP; END $$; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE aname TEXT; BEGIN FOR aname IN SELECT name FROM diku_mod_permissions.rmb_internal_index WHERE remove = TRUE LOOP EXECUTE 'DROP INDEX IF EXISTS ' || aname; END LOOP; END $$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE version TEXT; i RECORD; newindexdef TEXT; BEGIN SELECT jsonb->>'rmbVersion' INTO version FROM diku_mod_permissions.rmb_internal; IF version !~ '^(\d\.|1\d\.|2[0-8]\.|29\.[0-3]\.)' THEN -- skip this upgrade if last install/upgrade was made by RMB >= 29.4.x RETURN; END IF; FOR i IN SELECT * FROM pg_catalog.pg_indexes WHERE schemaname = 'diku_mod_permissions' LOOP newindexdef := regexp_replace(i.indexdef, -- \m = beginning of a word, \M = end of a word '\mpublic\.(f_unaccent|concat_space_sql|concat_array_object_values|concat_array_object)\M', 'diku_mod_permissions.\1', 'g'); IF newindexdef <> i.indexdef THEN EXECUTE 'DROP INDEX ' || i.indexname; EXECUTE newindexdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING i.tablename; END IF; END LOOP; END $$; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE version TEXT; i RECORD; newindexdef TEXT; BEGIN SELECT jsonb->>'rmbVersion' INTO version FROM diku_mod_permissions.rmb_internal; IF version !~ '^(\d\.|1\d\.|2[0-8]\.|29\.[0-3]\.)' THEN -- skip this upgrade if last install/upgrade was made by RMB >= 29.4.x RETURN; END IF; FOR i IN SELECT * FROM pg_catalog.pg_indexes WHERE schemaname = 'diku_mod_permissions' LOOP newindexdef := regexp_replace(i.indexdef, -- \m = beginning of a word, \M = end of a word '\mpublic\.(f_unaccent|concat_space_sql|concat_array_object_values|concat_array_object)\M', 'diku_mod_permissions.\1', 'g'); IF newindexdef <> i.indexdef THEN EXECUTE 'DROP INDEX ' || i.indexname; EXECUTE newindexdef; EXECUTE 'INSERT INTO rmb_internal_analyze VALUES ($1)' USING i.tablename; END IF; END LOOP; END $$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} DO $$ DECLARE t TEXT; BEGIN FOR t IN SELECT DISTINCT tablename FROM rmb_internal_analyze LOOP EXECUTE 'ANALYZE ' || t; END LOOP; END $$; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed DO $$ DECLARE t TEXT; BEGIN FOR t IN SELECT DISTINCT tablename FROM rmb_internal_analyze LOOP EXECUTE 'ANALYZE ' || t; END LOOP; END $$; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} TRUNCATE rmb_internal_analyze; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed TRUNCATE rmb_internal_analyze; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA diku_mod_permissions TO diku_mod_permissions; 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA diku_mod_permissions TO diku_mod_permissions; 14:02:25 [] [] [] [] INFO PostgresClient trying to execute: {} UPDATE diku_mod_permissions.rmb_internal SET jsonb = jsonb || jsonb_build_object( 'rmbVersion', '33.0.0-SNAPSHOT', 'moduleVersion', 'mod-permissions-1.0.0', 'schemaJson', $mainftl${ "scripts" : [], "tables" : [ { "tableName" : "permissions", "fromModuleVersion" : "5.0", "withMetadata" : true, "uniqueIndex" : [ { "fieldName" : "permissionName", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "permissionName", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] }, { "tableName" : "permissions_users", "fromModuleVersion" : "5.0", "withMetadata" : true, "index" : [ { "fieldName" : "id", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false }, { "fieldName" : "userId", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "userId", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] } ], "views" : [] } $mainftl$); 14:02:25 [] [] [] [] INFO PostgresClient Successfully executed UPDATE diku_mod_permissions.rmb_internal SET jsonb = jsonb || jsonb_build_object( 'rmbVersion', '33.0.0-SNAPSHOT', 'moduleVersion', 'mod-permissions-1.0.0', 'schemaJson', $mainftl${ "scripts" : [], "tables" : [ { "tableName" : "permissions", "fromModuleVersion" : "5.0", "withMetadata" : true, "uniqueIndex" : [ { "fieldName" : "permissionName", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "permissionName", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] }, { "tableName" : "permissions_users", "fromModuleVersion" : "5.0", "withMetadata" : true, "index" : [ { "fieldName" : "id", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false }, { "fieldName" : "userId", "tOps" : "ADD", "caseSensitive": true, "removeAccents": false } ], "ginIndex": [ { "fieldName": "userId", "tOps": "ADD", "caseSensitive": false, "removeAccents": true } ] } ], "views" : [] } $mainftl$); 14:02:25 [] [] [] [] INFO LoadConfs File does not exist: /postgres-conf.json 14:02:25 [] [] [] [] INFO LoadConfs Resource does not exist: /postgres-conf.json 14:02:25 [] [] [] [] INFO PostgresClient No DB configuration found, setting username, password and database for testing 14:02:25 [] [] [] [] INFO PostgresClient Using schema: diku 14:02:25 [] [] [] [] INFO PostgresClient postgreSQLClientConfig = {"postgres_tester":true,"username":"diku_mod_permissions","password":"...","database":"postgres","port":49348,"host":"localhost"} 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'mutable') = 'false' >>>WHERE (jsonb->>'mutable') = 'false' 14:02:25 [] [] [] [] INFO TenantPermsAPI Successfully soft deleted 0 permissions 14:02:25 [] [] [] [] INFO TenantRefAPI Marked all system-defined permissions deprecated. 14:02:25 [] [] [] [] WARN TenantLoading TenantLoading.perform No X-Okapi-Url-to header 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1bcfd501-232e-47da-a511-fdd29ae3d692' >>>WHERE (jsonb->>'userId') = '1bcfd501-232e-47da-a511-fdd29ae3d692' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 3 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'aace299f-7a74-4118-9cf3-599110dce278' >>>WHERE (jsonb->>'userId') = 'aace299f-7a74-4118-9cf3-599110dce278' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2c2e383d-7369-4aff-afb7-eb3db4cb71a0' >>>WHERE (jsonb->>'userId') = '2c2e383d-7369-4aff-afb7-eb3db4cb71a0' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'dc13dcc6-2bda-412c-b046-1398d1becb75' >>>WHERE (jsonb->>'userId') = 'dc13dcc6-2bda-412c-b046-1398d1becb75' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'acf8aab2-91ee-4210-bb7c-b688d66a9de4' >>>WHERE (jsonb->>'userId') = 'acf8aab2-91ee-4210-bb7c-b688d66a9de4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2220260d-12c7-49ab-9ac4-f923323f0cb3' >>>WHERE (jsonb->>'userId') = '2220260d-12c7-49ab-9ac4-f923323f0cb3' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1dbc9318-9718-4e9d-b32a-6684cf258910' >>>WHERE (jsonb->>'userId') = '1dbc9318-9718-4e9d-b32a-6684cf258910' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'dd176277-5c2d-4310-bf2f-e45e312b5026' >>>WHERE (jsonb->>'userId') = 'dd176277-5c2d-4310-bf2f-e45e312b5026' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'be2e9bdb-9884-4fe9-87d0-ba91e8425412' >>>WHERE (jsonb->>'userId') = 'be2e9bdb-9884-4fe9-87d0-ba91e8425412' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e546d50a-926a-421f-8400-a041a2e9db79' >>>WHERE (jsonb->>'userId') = 'e546d50a-926a-421f-8400-a041a2e9db79' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '9ad09b01-7429-455f-9f64-e3897027db61' >>>WHERE (jsonb->>'userId') = '9ad09b01-7429-455f-9f64-e3897027db61' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '67e40b72-66ca-4113-bed9-17a40bc448e0' >>>WHERE (jsonb->>'userId') = '67e40b72-66ca-4113-bed9-17a40bc448e0' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '71f28723-784e-4292-b794-af4ffca9178e' >>>WHERE (jsonb->>'userId') = '71f28723-784e-4292-b794-af4ffca9178e' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5a57f974-ea09-4c87-b7f5-e4144dde6128' >>>WHERE (jsonb->>'userId') = '5a57f974-ea09-4c87-b7f5-e4144dde6128' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '78284bd0-cdf1-4fc9-a404-739388b41cc7' >>>WHERE (jsonb->>'userId') = '78284bd0-cdf1-4fc9-a404-739388b41cc7' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '785c6f6e-36a5-4434-8aa7-210bb55cea34' >>>WHERE (jsonb->>'userId') = '785c6f6e-36a5-4434-8aa7-210bb55cea34' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c7d6c761-905e-4e7b-a616-a624175efe11' >>>WHERE (jsonb->>'userId') = 'c7d6c761-905e-4e7b-a616-a624175efe11' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7aa8082c-d1ed-4e33-bf0e-02d3efe5624b' >>>WHERE (jsonb->>'userId') = '7aa8082c-d1ed-4e33-bf0e-02d3efe5624b' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5dfffe75-267d-4133-b7bf-6d6daf26d5a4' >>>WHERE (jsonb->>'userId') = '5dfffe75-267d-4133-b7bf-6d6daf26d5a4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a5a80ce1-c00d-4ede-ba44-912c1e093948' >>>WHERE (jsonb->>'userId') = 'a5a80ce1-c00d-4ede-ba44-912c1e093948' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7d7f46e8-5f99-4ac8-aa86-83a23f4bd8de' >>>WHERE (jsonb->>'userId') = '7d7f46e8-5f99-4ac8-aa86-83a23f4bd8de' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4a5e1aa3-0733-45d9-b9cc-836b4e92d6ea' >>>WHERE (jsonb->>'userId') = '4a5e1aa3-0733-45d9-b9cc-836b4e92d6ea' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8d65692e-fa98-49f2-9896-f9f6b0893358' >>>WHERE (jsonb->>'userId') = '8d65692e-fa98-49f2-9896-f9f6b0893358' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'fad510e6-5b8d-4b10-b846-ce6ff7457629' >>>WHERE (jsonb->>'userId') = 'fad510e6-5b8d-4b10-b846-ce6ff7457629' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5f9bb63a-66f1-47eb-bc19-f182af2fc3e7' >>>WHERE (jsonb->>'userId') = '5f9bb63a-66f1-47eb-bc19-f182af2fc3e7' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'cc0685f2-6ac2-4840-bb67-1493c14968c5' >>>WHERE (jsonb->>'userId') = 'cc0685f2-6ac2-4840-bb67-1493c14968c5' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6e74dfe1-2eca-48bd-89ce-9fe1633920a3' >>>WHERE (jsonb->>'userId') = '6e74dfe1-2eca-48bd-89ce-9fe1633920a3' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f6d2c74c-3181-4c25-9a21-1b1f4c30765f' >>>WHERE (jsonb->>'userId') = 'f6d2c74c-3181-4c25-9a21-1b1f4c30765f' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1dbf36ab-bba6-4725-8456-bda646796dd1' >>>WHERE (jsonb->>'userId') = '1dbf36ab-bba6-4725-8456-bda646796dd1' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '94fc2d88-359e-45e1-8360-ff6fb132cac4' >>>WHERE (jsonb->>'userId') = '94fc2d88-359e-45e1-8360-ff6fb132cac4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '04e1cda1-a049-463b-97af-98c59a8fd806' >>>WHERE (jsonb->>'userId') = '04e1cda1-a049-463b-97af-98c59a8fd806' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e923bd61-bf27-42a9-8293-ed7738c24bca' >>>WHERE (jsonb->>'userId') = 'e923bd61-bf27-42a9-8293-ed7738c24bca' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c78aa9ec-b7d3-4d53-9e43-20296f39b496' >>>WHERE (jsonb->>'userId') = 'c78aa9ec-b7d3-4d53-9e43-20296f39b496' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '488d4776-d0e2-4618-9ca9-78fa5dcc787c' >>>WHERE (jsonb->>'userId') = '488d4776-d0e2-4618-9ca9-78fa5dcc787c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '860b2291-c28a-4943-804a-169af01edef4' >>>WHERE (jsonb->>'userId') = '860b2291-c28a-4943-804a-169af01edef4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0b6d1482-de21-4643-ae5b-90b4c7164c4a' >>>WHERE (jsonb->>'userId') = '0b6d1482-de21-4643-ae5b-90b4c7164c4a' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd1f69036-a316-41e4-89c1-77f77a3c7f1d' >>>WHERE (jsonb->>'userId') = 'd1f69036-a316-41e4-89c1-77f77a3c7f1d' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '75da2654-00a8-4ca5-9c73-2bf9e1e5c883' >>>WHERE (jsonb->>'userId') = '75da2654-00a8-4ca5-9c73-2bf9e1e5c883' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4fd8d3dd-ebc0-4d10-ae81-199e831be32e' >>>WHERE (jsonb->>'userId') = '4fd8d3dd-ebc0-4d10-ae81-199e831be32e' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c2a2f428-ab5f-46ce-b3ed-7d0ab39a0096' >>>WHERE (jsonb->>'userId') = 'c2a2f428-ab5f-46ce-b3ed-7d0ab39a0096' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '48861bba-0d73-4277-8f44-f3b65b038017' >>>WHERE (jsonb->>'userId') = '48861bba-0d73-4277-8f44-f3b65b038017' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd4849a05-4066-4129-ae56-3dfc39498e36' >>>WHERE (jsonb->>'userId') = 'd4849a05-4066-4129-ae56-3dfc39498e36' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '51e1e298-db10-465b-8c20-7f3d1e929834' >>>WHERE (jsonb->>'userId') = '51e1e298-db10-465b-8c20-7f3d1e929834' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0aa0c321-9974-4a67-92dc-bca029d093e2' >>>WHERE (jsonb->>'userId') = '0aa0c321-9974-4a67-92dc-bca029d093e2' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2075c729-a9b8-43db-860c-60a3cc31a949' >>>WHERE (jsonb->>'userId') = '2075c729-a9b8-43db-860c-60a3cc31a949' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f62dc160-eacc-4922-a0cb-e1ed68a44601' >>>WHERE (jsonb->>'userId') = 'f62dc160-eacc-4922-a0cb-e1ed68a44601' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '430f49de-6848-4cba-886a-4902cb9b887d' >>>WHERE (jsonb->>'userId') = '430f49de-6848-4cba-886a-4902cb9b887d' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd3409c88-7e3f-497a-b94c-69e85e23b45c' >>>WHERE (jsonb->>'userId') = 'd3409c88-7e3f-497a-b94c-69e85e23b45c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '888a321d-676e-42fc-b588-a677d16a76ec' >>>WHERE (jsonb->>'userId') = '888a321d-676e-42fc-b588-a677d16a76ec' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e308411d-773e-416e-be58-f16176c0549e' >>>WHERE (jsonb->>'userId') = 'e308411d-773e-416e-be58-f16176c0549e' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4f012e5c-840b-4f7a-b7e0-c2e3b1d41309' >>>WHERE (jsonb->>'userId') = '4f012e5c-840b-4f7a-b7e0-c2e3b1d41309' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f5d7aed2-1647-4e83-b85e-74760f770799' >>>WHERE (jsonb->>'userId') = 'f5d7aed2-1647-4e83-b85e-74760f770799' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0cce8c30-0a0d-4ebb-a107-cf47ad35eafb' >>>WHERE (jsonb->>'userId') = '0cce8c30-0a0d-4ebb-a107-cf47ad35eafb' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c2f1cefa-2ebb-4a7a-a420-84dcf2f89cf5' >>>WHERE (jsonb->>'userId') = 'c2f1cefa-2ebb-4a7a-a420-84dcf2f89cf5' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '67002fdf-b2f6-4e1f-bab8-d750efb0558f' >>>WHERE (jsonb->>'userId') = '67002fdf-b2f6-4e1f-bab8-d750efb0558f' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4adf499e-c954-4bf9-9261-26720608e120' >>>WHERE (jsonb->>'userId') = '4adf499e-c954-4bf9-9261-26720608e120' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '342971e4-43af-44c3-a8c3-478a97cc94bc' >>>WHERE (jsonb->>'userId') = '342971e4-43af-44c3-a8c3-478a97cc94bc' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6ff36aa8-c68d-42c9-b68b-ece603ea59d7' >>>WHERE (jsonb->>'userId') = '6ff36aa8-c68d-42c9-b68b-ece603ea59d7' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '420d485a-033f-4999-ab2c-12c00cd5ec07' >>>WHERE (jsonb->>'userId') = '420d485a-033f-4999-ab2c-12c00cd5ec07' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4acbd1f5-dbfe-4928-8325-2955e50faa4b' >>>WHERE (jsonb->>'userId') = '4acbd1f5-dbfe-4928-8325-2955e50faa4b' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ab60d124-5d41-49c5-8aae-2ef2cd3704c2' >>>WHERE (jsonb->>'userId') = 'ab60d124-5d41-49c5-8aae-2ef2cd3704c2' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1f2608df-ff79-4576-b578-14627bbe87fa' >>>WHERE (jsonb->>'userId') = '1f2608df-ff79-4576-b578-14627bbe87fa' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '08522da4-668a-4450-a769-3abfae5678ad' >>>WHERE (jsonb->>'userId') = '08522da4-668a-4450-a769-3abfae5678ad' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8cde4a35-f58b-492e-bd07-d668f7322253' >>>WHERE (jsonb->>'userId') = '8cde4a35-f58b-492e-bd07-d668f7322253' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4f0e711c-d583-41e0-9555-b62f1725023f' >>>WHERE (jsonb->>'userId') = '4f0e711c-d583-41e0-9555-b62f1725023f' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5bec815c-72b9-452f-ac19-bc2793c94537' >>>WHERE (jsonb->>'userId') = '5bec815c-72b9-452f-ac19-bc2793c94537' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2fabd929-3ed9-40ae-aaf2-6c39c4bebf13' >>>WHERE (jsonb->>'userId') = '2fabd929-3ed9-40ae-aaf2-6c39c4bebf13' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e63273e7-48f5-4c43-ab4e-1751ecacaa21' >>>WHERE (jsonb->>'userId') = 'e63273e7-48f5-4c43-ab4e-1751ecacaa21' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd80b45eb-5dc0-4635-b539-dac722cc3a50' >>>WHERE (jsonb->>'userId') = 'd80b45eb-5dc0-4635-b539-dac722cc3a50' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '261e1062-a473-47f4-a00f-a197c4a87530' >>>WHERE (jsonb->>'userId') = '261e1062-a473-47f4-a00f-a197c4a87530' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6f644096-0cb6-4d9c-9da4-0831b3625c0d' >>>WHERE (jsonb->>'userId') = '6f644096-0cb6-4d9c-9da4-0831b3625c0d' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c0d4a2da-7c38-46f4-869c-797bb083ee2d' >>>WHERE (jsonb->>'userId') = 'c0d4a2da-7c38-46f4-869c-797bb083ee2d' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f0dc6802-450f-459a-9dc6-209086375b7f' >>>WHERE (jsonb->>'userId') = 'f0dc6802-450f-459a-9dc6-209086375b7f' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '07066a1f-1fb7-4793-bbca-7cd8d1ea90ab' >>>WHERE (jsonb->>'userId') = '07066a1f-1fb7-4793-bbca-7cd8d1ea90ab' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '00bc2807-4d5b-4a27-a2b5-b7b1ba431cc4' >>>WHERE (jsonb->>'userId') = '00bc2807-4d5b-4a27-a2b5-b7b1ba431cc4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ae2f6ce7-386a-4c5a-9fcf-e5f517a88ced' >>>WHERE (jsonb->>'userId') = 'ae2f6ce7-386a-4c5a-9fcf-e5f517a88ced' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b56b28b9-7f22-426e-a099-4f753be686fa' >>>WHERE (jsonb->>'userId') = 'b56b28b9-7f22-426e-a099-4f753be686fa' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6302b991-3223-4bc7-ae66-795d161f64ab' >>>WHERE (jsonb->>'userId') = '6302b991-3223-4bc7-ae66-795d161f64ab' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1b5795ad-5ad0-4ba5-9c62-a7b26eb2f6b8' >>>WHERE (jsonb->>'userId') = '1b5795ad-5ad0-4ba5-9c62-a7b26eb2f6b8' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2084e201-b0da-4ac3-b3ae-873c48596093' >>>WHERE (jsonb->>'userId') = '2084e201-b0da-4ac3-b3ae-873c48596093' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2120fe62-ba0a-4dce-8701-f360368d5c30' >>>WHERE (jsonb->>'userId') = '2120fe62-ba0a-4dce-8701-f360368d5c30' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6f4111a4-8b6f-4008-9b95-ecd31db69234' >>>WHERE (jsonb->>'userId') = '6f4111a4-8b6f-4008-9b95-ecd31db69234' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c1277b9b-b165-48ee-ac35-e737ed325f34' >>>WHERE (jsonb->>'userId') = 'c1277b9b-b165-48ee-ac35-e737ed325f34' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '745bdee1-458c-4076-bad1-be5a470c49fb' >>>WHERE (jsonb->>'userId') = '745bdee1-458c-4076-bad1-be5a470c49fb' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6f36265e-722a-490a-b436-806e63af2ea7' >>>WHERE (jsonb->>'userId') = '6f36265e-722a-490a-b436-806e63af2ea7' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '734f2e97-2c41-4e70-9b98-44cead2607e4' >>>WHERE (jsonb->>'userId') = '734f2e97-2c41-4e70-9b98-44cead2607e4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f6cd72ab-3e89-44c0-99aa-54ab4844f167' >>>WHERE (jsonb->>'userId') = 'f6cd72ab-3e89-44c0-99aa-54ab4844f167' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4ca6da61-a9fa-4226-850d-43aa2d89f9a6' >>>WHERE (jsonb->>'userId') = '4ca6da61-a9fa-4226-850d-43aa2d89f9a6' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '97f100da-9218-4351-bc14-ef0558f01625' >>>WHERE (jsonb->>'userId') = '97f100da-9218-4351-bc14-ef0558f01625' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'cd5994cf-6ee5-49b4-b58e-7bc70d724626' >>>WHERE (jsonb->>'userId') = 'cd5994cf-6ee5-49b4-b58e-7bc70d724626' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2a823816-c059-4703-becf-0cc68a734189' >>>WHERE (jsonb->>'userId') = '2a823816-c059-4703-becf-0cc68a734189' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '65fcc41e-df15-459a-bf93-2f53cfa8ff7f' >>>WHERE (jsonb->>'userId') = '65fcc41e-df15-459a-bf93-2f53cfa8ff7f' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'eaeffd06-57d3-488c-bd1b-c39d5c62e97d' >>>WHERE (jsonb->>'userId') = 'eaeffd06-57d3-488c-bd1b-c39d5c62e97d' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2338689d-f27e-49fd-8bce-9f9bf7be6ea0' >>>WHERE (jsonb->>'userId') = '2338689d-f27e-49fd-8bce-9f9bf7be6ea0' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '15fa3eda-f495-496c-b21e-4f281b38a3ef' >>>WHERE (jsonb->>'userId') = '15fa3eda-f495-496c-b21e-4f281b38a3ef' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '86344e52-979a-45da-ad44-9edcc05c5312' >>>WHERE (jsonb->>'userId') = '86344e52-979a-45da-ad44-9edcc05c5312' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f1dc9a7e-492b-4f2b-848a-115b5919d589' >>>WHERE (jsonb->>'userId') = 'f1dc9a7e-492b-4f2b-848a-115b5919d589' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '16757efe-86ac-40bb-bdd6-fafee02463c7' >>>WHERE (jsonb->>'userId') = '16757efe-86ac-40bb-bdd6-fafee02463c7' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0db6912a-40c0-41db-8d15-be05ff851f96' >>>WHERE (jsonb->>'userId') = '0db6912a-40c0-41db-8d15-be05ff851f96' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd6c40971-39a6-4977-9d27-e83e731f51de' >>>WHERE (jsonb->>'userId') = 'd6c40971-39a6-4977-9d27-e83e731f51de' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'bd566b21-d125-421c-9c78-2b9a8bc4c4f7' >>>WHERE (jsonb->>'userId') = 'bd566b21-d125-421c-9c78-2b9a8bc4c4f7' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '63ff6975-5d7f-46c1-983a-dba27d163c4a' >>>WHERE (jsonb->>'userId') = '63ff6975-5d7f-46c1-983a-dba27d163c4a' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c573e5f8-a570-475d-a75e-88a4d2b757d2' >>>WHERE (jsonb->>'userId') = 'c573e5f8-a570-475d-a75e-88a4d2b757d2' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a8a11126-40b9-45f0-aa6e-9408e57c4b47' >>>WHERE (jsonb->>'userId') = 'a8a11126-40b9-45f0-aa6e-9408e57c4b47' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '3b464026-79e7-450a-a441-0e1d4f8ebf99' >>>WHERE (jsonb->>'userId') = '3b464026-79e7-450a-a441-0e1d4f8ebf99' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8f7a47c4-d66f-4dba-9255-f74507a2ecee' >>>WHERE (jsonb->>'userId') = '8f7a47c4-d66f-4dba-9255-f74507a2ecee' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '52e47672-d456-40b6-9f2d-6597d3e9f942' >>>WHERE (jsonb->>'userId') = '52e47672-d456-40b6-9f2d-6597d3e9f942' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'eb81f274-3676-45a9-8e8d-8a151af2506b' >>>WHERE (jsonb->>'userId') = 'eb81f274-3676-45a9-8e8d-8a151af2506b' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '21ce4a36-4d3a-4a9d-98be-d40852799d9b' >>>WHERE (jsonb->>'userId') = '21ce4a36-4d3a-4a9d-98be-d40852799d9b' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '201be44f-2f29-47af-85da-2cbfc72ac29e' >>>WHERE (jsonb->>'userId') = '201be44f-2f29-47af-85da-2cbfc72ac29e' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ac521a2a-d933-42f9-b3a4-2d7399880057' >>>WHERE (jsonb->>'userId') = 'ac521a2a-d933-42f9-b3a4-2d7399880057' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b9a05706-9d87-499d-8e5e-47dc512a21c3' >>>WHERE (jsonb->>'userId') = 'b9a05706-9d87-499d-8e5e-47dc512a21c3' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '960ab857-c8c7-4445-8d24-1e4c33de3e86' >>>WHERE (jsonb->>'userId') = '960ab857-c8c7-4445-8d24-1e4c33de3e86' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '30d7e2dd-db23-4832-b4be-30d3f5f83a60' >>>WHERE (jsonb->>'userId') = '30d7e2dd-db23-4832-b4be-30d3f5f83a60' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1200edd1-4b53-43e7-a9b7-fc590ab1c8d9' >>>WHERE (jsonb->>'userId') = '1200edd1-4b53-43e7-a9b7-fc590ab1c8d9' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0414af69-f89c-40f2-bea9-a9b5d0a179d4' >>>WHERE (jsonb->>'userId') = '0414af69-f89c-40f2-bea9-a9b5d0a179d4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '260f1870-7dee-452d-a379-301f063febda' >>>WHERE (jsonb->>'userId') = '260f1870-7dee-452d-a379-301f063febda' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1c65f9c5-5970-48bb-aa72-82ef96fc145e' >>>WHERE (jsonb->>'userId') = '1c65f9c5-5970-48bb-aa72-82ef96fc145e' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b7f677aa-e2db-4bb5-81f8-beee547bce68' >>>WHERE (jsonb->>'userId') = 'b7f677aa-e2db-4bb5-81f8-beee547bce68' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '259d55dc-015d-420a-b13d-8706018305b1' >>>WHERE (jsonb->>'userId') = '259d55dc-015d-420a-b13d-8706018305b1' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ab579dc3-219b-4f5b-8068-ab1c7a55c402' >>>WHERE (jsonb->>'userId') = 'ab579dc3-219b-4f5b-8068-ab1c7a55c402' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '78c51a90-e64f-49ce-8d28-e246a49c7f63' >>>WHERE (jsonb->>'userId') = '78c51a90-e64f-49ce-8d28-e246a49c7f63' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c2610e2c-a6f8-4336-95b6-54d716348b03' >>>WHERE (jsonb->>'userId') = 'c2610e2c-a6f8-4336-95b6-54d716348b03' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5ed8a4be-f0d8-459d-9e9a-27f2e8c155af' >>>WHERE (jsonb->>'userId') = '5ed8a4be-f0d8-459d-9e9a-27f2e8c155af' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'dc5dab8d-f80a-476a-b920-3cf21eeee902' >>>WHERE (jsonb->>'userId') = 'dc5dab8d-f80a-476a-b920-3cf21eeee902' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0d6d38bf-aaf6-4976-a2ce-7ff787195982' >>>WHERE (jsonb->>'userId') = '0d6d38bf-aaf6-4976-a2ce-7ff787195982' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '34a22ca8-9aff-4b1c-96c2-f908ddb068ae' >>>WHERE (jsonb->>'userId') = '34a22ca8-9aff-4b1c-96c2-f908ddb068ae' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b4e91548-c387-4b01-aaa1-489afc3f6936' >>>WHERE (jsonb->>'userId') = 'b4e91548-c387-4b01-aaa1-489afc3f6936' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2cb8a9f5-5a04-4b26-89de-c5a522638de2' >>>WHERE (jsonb->>'userId') = '2cb8a9f5-5a04-4b26-89de-c5a522638de2' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a56edfbe-087e-4f79-bd7e-d855fbe746e4' >>>WHERE (jsonb->>'userId') = 'a56edfbe-087e-4f79-bd7e-d855fbe746e4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b617c5f2-78d4-4c7e-bf0c-d21392a8c39f' >>>WHERE (jsonb->>'userId') = 'b617c5f2-78d4-4c7e-bf0c-d21392a8c39f' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '9e87bfea-2d31-4cc3-9cef-9e1e67553243' >>>WHERE (jsonb->>'userId') = '9e87bfea-2d31-4cc3-9cef-9e1e67553243' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '44e640f4-3e0e-4bb4-92af-6263108893b2' >>>WHERE (jsonb->>'userId') = '44e640f4-3e0e-4bb4-92af-6263108893b2' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f308aadb-9403-44de-9b5a-06792b78bb3a' >>>WHERE (jsonb->>'userId') = 'f308aadb-9403-44de-9b5a-06792b78bb3a' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd0fc4228-2e42-49b2-a5b0-9df48897e8c0' >>>WHERE (jsonb->>'userId') = 'd0fc4228-2e42-49b2-a5b0-9df48897e8c0' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '42e9d211-4bfb-45fe-a088-f19d0a514f98' >>>WHERE (jsonb->>'userId') = '42e9d211-4bfb-45fe-a088-f19d0a514f98' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f7a0a518-6ff3-4531-b54b-e630d61aede0' >>>WHERE (jsonb->>'userId') = 'f7a0a518-6ff3-4531-b54b-e630d61aede0' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4205e8ff-804d-45bb-9d6d-f75f845ce608' >>>WHERE (jsonb->>'userId') = '4205e8ff-804d-45bb-9d6d-f75f845ce608' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b7da16ef-f3d2-4c12-a564-858bc3eee366' >>>WHERE (jsonb->>'userId') = 'b7da16ef-f3d2-4c12-a564-858bc3eee366' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1b648069-8563-41c8-afc0-d8359f11503c' >>>WHERE (jsonb->>'userId') = '1b648069-8563-41c8-afc0-d8359f11503c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5e84b6a4-fde4-4099-ab54-c82c9041f685' >>>WHERE (jsonb->>'userId') = '5e84b6a4-fde4-4099-ab54-c82c9041f685' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e5e950e0-3f56-4ff1-8e86-671cdbc37688' >>>WHERE (jsonb->>'userId') = 'e5e950e0-3f56-4ff1-8e86-671cdbc37688' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ef39251f-db4c-4253-9951-645735f84904' >>>WHERE (jsonb->>'userId') = 'ef39251f-db4c-4253-9951-645735f84904' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '3387893c-7bde-4d2f-9ad2-d4974b3e959e' >>>WHERE (jsonb->>'userId') = '3387893c-7bde-4d2f-9ad2-d4974b3e959e' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '292451b5-0026-4463-a762-d43fc6cc9122' >>>WHERE (jsonb->>'userId') = '292451b5-0026-4463-a762-d43fc6cc9122' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '10cb9367-c095-4872-9add-8aecdf339dd4' >>>WHERE (jsonb->>'userId') = '10cb9367-c095-4872-9add-8aecdf339dd4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '17b26a4a-e481-4b86-8949-5ef6570eb622' >>>WHERE (jsonb->>'userId') = '17b26a4a-e481-4b86-8949-5ef6570eb622' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a49cefad-7447-4f2f-9004-de32e7a6cc53' >>>WHERE (jsonb->>'userId') = 'a49cefad-7447-4f2f-9004-de32e7a6cc53' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e0b7cb11-7d1f-48d8-b8a5-bc138550313d' >>>WHERE (jsonb->>'userId') = 'e0b7cb11-7d1f-48d8-b8a5-bc138550313d' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f57c13f1-6114-41b2-aa6f-33045068d6be' >>>WHERE (jsonb->>'userId') = 'f57c13f1-6114-41b2-aa6f-33045068d6be' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8853c9a2-cae2-4b5e-84ce-2b39bb809e5b' >>>WHERE (jsonb->>'userId') = '8853c9a2-cae2-4b5e-84ce-2b39bb809e5b' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '956f39c5-92e3-4c26-bcdc-1827674710cf' >>>WHERE (jsonb->>'userId') = '956f39c5-92e3-4c26-bcdc-1827674710cf' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '87c329f1-2220-4a8a-b750-ded39bbe9769' >>>WHERE (jsonb->>'userId') = '87c329f1-2220-4a8a-b750-ded39bbe9769' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '54f65a75-f35b-4f56-86a6-fa4a3d957e57' >>>WHERE (jsonb->>'userId') = '54f65a75-f35b-4f56-86a6-fa4a3d957e57' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7597bd13-9f57-4cd1-a7cf-dc0ac7375280' >>>WHERE (jsonb->>'userId') = '7597bd13-9f57-4cd1-a7cf-dc0ac7375280' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8e9d1a69-9745-4ad4-a8e8-6841a9441b40' >>>WHERE (jsonb->>'userId') = '8e9d1a69-9745-4ad4-a8e8-6841a9441b40' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2eb8fef6-95c8-491d-a6a3-00176997dca4' >>>WHERE (jsonb->>'userId') = '2eb8fef6-95c8-491d-a6a3-00176997dca4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '78a21fb3-0e80-4172-8ccf-8a1d8d5e1553' >>>WHERE (jsonb->>'userId') = '78a21fb3-0e80-4172-8ccf-8a1d8d5e1553' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '86c9f455-a685-45d0-9d01-5943a1ba7e5b' >>>WHERE (jsonb->>'userId') = '86c9f455-a685-45d0-9d01-5943a1ba7e5b' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '969e6710-309e-41bd-ba35-2b97faec30b7' >>>WHERE (jsonb->>'userId') = '969e6710-309e-41bd-ba35-2b97faec30b7' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5cf0c0d9-17cc-42f1-87c1-10ec6476fc3a' >>>WHERE (jsonb->>'userId') = '5cf0c0d9-17cc-42f1-87c1-10ec6476fc3a' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e1e435da-97e2-4083-8657-832aeb549929' >>>WHERE (jsonb->>'userId') = 'e1e435da-97e2-4083-8657-832aeb549929' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a23eac4b-955e-451c-b4ff-6ec2f5e63e23' >>>WHERE (jsonb->>'userId') = 'a23eac4b-955e-451c-b4ff-6ec2f5e63e23' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '55e09c25-0a7b-4df8-8bde-a8964b57ef40' >>>WHERE (jsonb->>'userId') = '55e09c25-0a7b-4df8-8bde-a8964b57ef40' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'daa9cf25-f333-447b-b577-158d6ce944a5' >>>WHERE (jsonb->>'userId') = 'daa9cf25-f333-447b-b577-158d6ce944a5' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6f511507-dab9-42fb-b966-bb8a1330ee7a' >>>WHERE (jsonb->>'userId') = '6f511507-dab9-42fb-b966-bb8a1330ee7a' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '56708cfe-750e-49ad-b72a-003ce7ad78a4' >>>WHERE (jsonb->>'userId') = '56708cfe-750e-49ad-b72a-003ce7ad78a4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b549fc60-9779-4bac-a4de-df8304ff69c4' >>>WHERE (jsonb->>'userId') = 'b549fc60-9779-4bac-a4de-df8304ff69c4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '28724f2b-89b3-4a05-839c-2e77138e01a3' >>>WHERE (jsonb->>'userId') = '28724f2b-89b3-4a05-839c-2e77138e01a3' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2a424823-588a-45ee-9441-a6384b6614b2' >>>WHERE (jsonb->>'userId') = '2a424823-588a-45ee-9441-a6384b6614b2' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'bc048122-1914-4971-ab0f-62303fef71aa' >>>WHERE (jsonb->>'userId') = 'bc048122-1914-4971-ab0f-62303fef71aa' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '3793853e-6297-424d-abea-24525079f658' >>>WHERE (jsonb->>'userId') = '3793853e-6297-424d-abea-24525079f658' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5e3d70ff-a89a-44a0-a2e2-4cae67668805' >>>WHERE (jsonb->>'userId') = '5e3d70ff-a89a-44a0-a2e2-4cae67668805' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'abad6503-a51b-4fec-a1cd-b5f672b1ff7b' >>>WHERE (jsonb->>'userId') = 'abad6503-a51b-4fec-a1cd-b5f672b1ff7b' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b4fa5d79-4af6-4623-9331-fabdfee79e0c' >>>WHERE (jsonb->>'userId') = 'b4fa5d79-4af6-4623-9331-fabdfee79e0c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '423d5beb-3196-449e-aacb-9595d6321950' >>>WHERE (jsonb->>'userId') = '423d5beb-3196-449e-aacb-9595d6321950' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b3dae815-3d30-49f9-ac26-363e661382a0' >>>WHERE (jsonb->>'userId') = 'b3dae815-3d30-49f9-ac26-363e661382a0' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b09038a4-0386-4782-8ee8-11aa87e09887' >>>WHERE (jsonb->>'userId') = 'b09038a4-0386-4782-8ee8-11aa87e09887' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '368b8b4a-c3c2-436c-9cba-95dcac52ebf9' >>>WHERE (jsonb->>'userId') = '368b8b4a-c3c2-436c-9cba-95dcac52ebf9' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '46ed7160-426b-460e-91b3-ab22a7d6fc26' >>>WHERE (jsonb->>'userId') = '46ed7160-426b-460e-91b3-ab22a7d6fc26' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4cb9a24c-76e1-4755-9f54-f51115e00b53' >>>WHERE (jsonb->>'userId') = '4cb9a24c-76e1-4755-9f54-f51115e00b53' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '62b25727-310f-4fa3-b308-666a6cf28c97' >>>WHERE (jsonb->>'userId') = '62b25727-310f-4fa3-b308-666a6cf28c97' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a601f1f2-88a4-465a-850e-8f50c28ce7d9' >>>WHERE (jsonb->>'userId') = 'a601f1f2-88a4-465a-850e-8f50c28ce7d9' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6c76eeec-183d-4635-9019-11ce8623d50c' >>>WHERE (jsonb->>'userId') = '6c76eeec-183d-4635-9019-11ce8623d50c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e6dfcfef-e724-4485-870d-d2c4d1dcfdd9' >>>WHERE (jsonb->>'userId') = 'e6dfcfef-e724-4485-870d-d2c4d1dcfdd9' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ade18246-c529-497f-bd4c-2c3f85e995ad' >>>WHERE (jsonb->>'userId') = 'ade18246-c529-497f-bd4c-2c3f85e995ad' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8616dd12-e244-4047-834a-db0c6cd1477b' >>>WHERE (jsonb->>'userId') = '8616dd12-e244-4047-834a-db0c6cd1477b' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f643e743-3496-4ecd-94d7-1ca2fdf56c82' >>>WHERE (jsonb->>'userId') = 'f643e743-3496-4ecd-94d7-1ca2fdf56c82' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'df84acd4-4425-47e9-9a25-db8eb2973950' >>>WHERE (jsonb->>'userId') = 'df84acd4-4425-47e9-9a25-db8eb2973950' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2884afb0-5bec-45c4-b9f4-0bc525bc0322' >>>WHERE (jsonb->>'userId') = '2884afb0-5bec-45c4-b9f4-0bc525bc0322' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b3e39715-0659-4776-9d40-abe655408d84' >>>WHERE (jsonb->>'userId') = 'b3e39715-0659-4776-9d40-abe655408d84' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f303e908-30dc-4139-9542-4a4e206c4b96' >>>WHERE (jsonb->>'userId') = 'f303e908-30dc-4139-9542-4a4e206c4b96' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c9255397-a8cb-4208-9558-1aae0e6f2c68' >>>WHERE (jsonb->>'userId') = 'c9255397-a8cb-4208-9558-1aae0e6f2c68' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1ee0a888-ade1-4bc7-a9b6-15a2d46a6b18' >>>WHERE (jsonb->>'userId') = '1ee0a888-ade1-4bc7-a9b6-15a2d46a6b18' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a0dadce9-06ed-4b23-9fc0-6b5238aa92d8' >>>WHERE (jsonb->>'userId') = 'a0dadce9-06ed-4b23-9fc0-6b5238aa92d8' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a98abce3-be00-4d9a-a66a-0593d27b41e0' >>>WHERE (jsonb->>'userId') = 'a98abce3-be00-4d9a-a66a-0593d27b41e0' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1db3d6c7-6ac5-4b3c-b860-deb2df449736' >>>WHERE (jsonb->>'userId') = '1db3d6c7-6ac5-4b3c-b860-deb2df449736' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '45e77e83-60a3-4031-89d5-81222043dec6' >>>WHERE (jsonb->>'userId') = '45e77e83-60a3-4031-89d5-81222043dec6' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '169aeb77-32f6-4f60-a2c0-db791b96e411' >>>WHERE (jsonb->>'userId') = '169aeb77-32f6-4f60-a2c0-db791b96e411' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '70e0c050-e842-4eee-9632-967a49e43bb2' >>>WHERE (jsonb->>'userId') = '70e0c050-e842-4eee-9632-967a49e43bb2' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'b3f61b07-a1b3-44ac-bb7f-622b90ac17c3' >>>WHERE (jsonb->>'userId') = 'b3f61b07-a1b3-44ac-bb7f-622b90ac17c3' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2e5f9cc4-46ab-4dfe-b40a-8493296353fb' >>>WHERE (jsonb->>'userId') = '2e5f9cc4-46ab-4dfe-b40a-8493296353fb' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c926be9c-a8ce-4399-a9b3-11ec0fc8d6c9' >>>WHERE (jsonb->>'userId') = 'c926be9c-a8ce-4399-a9b3-11ec0fc8d6c9' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7dd96d33-6abf-4394-8768-647c76d79412' >>>WHERE (jsonb->>'userId') = '7dd96d33-6abf-4394-8768-647c76d79412' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e14b1bc1-8784-4b55-bfbe-e5ec8ce0b07a' >>>WHERE (jsonb->>'userId') = 'e14b1bc1-8784-4b55-bfbe-e5ec8ce0b07a' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e59bc21a-884e-42a2-8792-163efc3662e7' >>>WHERE (jsonb->>'userId') = 'e59bc21a-884e-42a2-8792-163efc3662e7' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7b06cbcf-5d6d-431b-8922-20509d40f1ae' >>>WHERE (jsonb->>'userId') = '7b06cbcf-5d6d-431b-8922-20509d40f1ae' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '93136048-585b-466e-88f8-a10115e6d7e2' >>>WHERE (jsonb->>'userId') = '93136048-585b-466e-88f8-a10115e6d7e2' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6b5f249c-7df1-4c2f-afc2-0ef6fc21b701' >>>WHERE (jsonb->>'userId') = '6b5f249c-7df1-4c2f-afc2-0ef6fc21b701' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '872695bb-4157-4c6f-84c7-eb5b50b9ce17' >>>WHERE (jsonb->>'userId') = '872695bb-4157-4c6f-84c7-eb5b50b9ce17' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a2468e40-fb7c-453c-a217-8388801e2407' >>>WHERE (jsonb->>'userId') = 'a2468e40-fb7c-453c-a217-8388801e2407' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '046353cf-3963-482c-9792-32ade0a33afa' >>>WHERE (jsonb->>'userId') = '046353cf-3963-482c-9792-32ade0a33afa' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '71f4828b-8ad5-4ae6-bfa6-45ecfe3f6c3c' >>>WHERE (jsonb->>'userId') = '71f4828b-8ad5-4ae6-bfa6-45ecfe3f6c3c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '21c08ac3-c287-4a21-b966-e263504aa773' >>>WHERE (jsonb->>'userId') = '21c08ac3-c287-4a21-b966-e263504aa773' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5cc5bd09-d90e-4484-8058-74c237165877' >>>WHERE (jsonb->>'userId') = '5cc5bd09-d90e-4484-8058-74c237165877' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e25fecaf-dfbf-4e59-bd3d-0493c1b519f5' >>>WHERE (jsonb->>'userId') = 'e25fecaf-dfbf-4e59-bd3d-0493c1b519f5' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '066795ce-4938-48f2-9411-f3f922b51e1c' >>>WHERE (jsonb->>'userId') = '066795ce-4938-48f2-9411-f3f922b51e1c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8af5eaca-d164-4a5f-9941-0467c6facffa' >>>WHERE (jsonb->>'userId') = '8af5eaca-d164-4a5f-9941-0467c6facffa' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'fa18e51c-50d9-4fe3-ab58-c592ea30328a' >>>WHERE (jsonb->>'userId') = 'fa18e51c-50d9-4fe3-ab58-c592ea30328a' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '95a99d37-66b5-4b8d-a598-ab36618f9aac' >>>WHERE (jsonb->>'userId') = '95a99d37-66b5-4b8d-a598-ab36618f9aac' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a983c74e-b4f5-4ca9-94f0-b79efa947b27' >>>WHERE (jsonb->>'userId') = 'a983c74e-b4f5-4ca9-94f0-b79efa947b27' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '15b9deaf-1a59-4396-a8e5-d6c7e5b79b28' >>>WHERE (jsonb->>'userId') = '15b9deaf-1a59-4396-a8e5-d6c7e5b79b28' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'eb7696da-a2c3-4166-8aba-757c42556d1e' >>>WHERE (jsonb->>'userId') = 'eb7696da-a2c3-4166-8aba-757c42556d1e' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '66fe5bd9-1129-4b40-b54d-05b4c358463c' >>>WHERE (jsonb->>'userId') = '66fe5bd9-1129-4b40-b54d-05b4c358463c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0f1f1a5d-49b6-42f4-8b18-faa2ce0e7be4' >>>WHERE (jsonb->>'userId') = '0f1f1a5d-49b6-42f4-8b18-faa2ce0e7be4' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'bf93cf45-4c02-4a34-aad0-9ed949109630' >>>WHERE (jsonb->>'userId') = 'bf93cf45-4c02-4a34-aad0-9ed949109630' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0a985a0a-b515-42a0-8ec2-1c2b7e8a1d8c' >>>WHERE (jsonb->>'userId') = '0a985a0a-b515-42a0-8ec2-1c2b7e8a1d8c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '197f8e91-5110-4487-ad36-b3d21a66059d' >>>WHERE (jsonb->>'userId') = '197f8e91-5110-4487-ad36-b3d21a66059d' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'bb4d8818-35cc-4cb6-b181-b5ccfb734744' >>>WHERE (jsonb->>'userId') = 'bb4d8818-35cc-4cb6-b181-b5ccfb734744' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'beaffbac-e56d-4e32-a653-b631945f060c' >>>WHERE (jsonb->>'userId') = 'beaffbac-e56d-4e32-a653-b631945f060c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c0af9380-d277-4820-a607-15a2d9c50ba6' >>>WHERE (jsonb->>'userId') = 'c0af9380-d277-4820-a607-15a2d9c50ba6' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e13b3d8d-71ff-49bd-9ea1-4ad7da8b1b8e' >>>WHERE (jsonb->>'userId') = 'e13b3d8d-71ff-49bd-9ea1-4ad7da8b1b8e' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c6a1f097-1292-441c-a760-682279a7f94c' >>>WHERE (jsonb->>'userId') = 'c6a1f097-1292-441c-a760-682279a7f94c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '589ee8e5-4fe4-4ab3-8a58-441cebea454a' >>>WHERE (jsonb->>'userId') = '589ee8e5-4fe4-4ab3-8a58-441cebea454a' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '550a06c3-8d0c-4ae3-a267-b32527272772' >>>WHERE (jsonb->>'userId') = '550a06c3-8d0c-4ae3-a267-b32527272772' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '9207540e-91e9-4a75-ad1e-65a715784326' >>>WHERE (jsonb->>'userId') = '9207540e-91e9-4a75-ad1e-65a715784326' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '384272bb-efab-4e94-b3b8-f67f20796f20' >>>WHERE (jsonb->>'userId') = '384272bb-efab-4e94-b3b8-f67f20796f20' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0ab0736b-57ba-404c-9b17-d94de2cf4d9a' >>>WHERE (jsonb->>'userId') = '0ab0736b-57ba-404c-9b17-d94de2cf4d9a' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '50e30476-ee93-4b16-a53c-27ce2c4b49d7' >>>WHERE (jsonb->>'userId') = '50e30476-ee93-4b16-a53c-27ce2c4b49d7' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e1bcf784-484c-42ca-b502-cf2f2e57eca3' >>>WHERE (jsonb->>'userId') = 'e1bcf784-484c-42ca-b502-cf2f2e57eca3' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c8edf675-9323-4410-9d14-0727e038dad0' >>>WHERE (jsonb->>'userId') = 'c8edf675-9323-4410-9d14-0727e038dad0' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '57db810d-d59c-4443-ab43-3542cfdf7905' >>>WHERE (jsonb->>'userId') = '57db810d-d59c-4443-ab43-3542cfdf7905' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6b5a896c-c6f4-4a28-a89a-2e2ca6ff0d0e' >>>WHERE (jsonb->>'userId') = '6b5a896c-c6f4-4a28-a89a-2e2ca6ff0d0e' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c6d99127-e834-4f60-9a77-f74646cd1618' >>>WHERE (jsonb->>'userId') = 'c6d99127-e834-4f60-9a77-f74646cd1618' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c51cf0e7-ea33-4638-a54c-afffc75a680b' >>>WHERE (jsonb->>'userId') = 'c51cf0e7-ea33-4638-a54c-afffc75a680b' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ea2ef01f-d732-4119-90ab-ee6df447548f' >>>WHERE (jsonb->>'userId') = 'ea2ef01f-d732-4119-90ab-ee6df447548f' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ea3a1605-a930-4183-b04e-0b2fca3ae094' >>>WHERE (jsonb->>'userId') = 'ea3a1605-a930-4183-b04e-0b2fca3ae094' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'dc3cd5a5-4235-48c3-b9d3-a958863f7498' >>>WHERE (jsonb->>'userId') = 'dc3cd5a5-4235-48c3-b9d3-a958863f7498' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '251cfa92-24a7-45db-9f0d-acd2da450b50' >>>WHERE (jsonb->>'userId') = '251cfa92-24a7-45db-9f0d-acd2da450b50' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'eaed771f-1472-4f5a-a31f-bbb5922ba5fe' >>>WHERE (jsonb->>'userId') = 'eaed771f-1472-4f5a-a31f-bbb5922ba5fe' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'fbc2b501-a8cc-43a7-8d8c-b68067b63a33' >>>WHERE (jsonb->>'userId') = 'fbc2b501-a8cc-43a7-8d8c-b68067b63a33' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '223907c9-517b-4b10-a6bc-8f7fcb0a05c3' >>>WHERE (jsonb->>'userId') = '223907c9-517b-4b10-a6bc-8f7fcb0a05c3' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '1be7f410-6ec3-4e88-ac25-0f8d8c63274d' >>>WHERE (jsonb->>'userId') = '1be7f410-6ec3-4e88-ac25-0f8d8c63274d' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '01b9d72b-9aab-4efd-97a4-d03c1667bf0d' >>>WHERE (jsonb->>'userId') = '01b9d72b-9aab-4efd-97a4-d03c1667bf0d' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c8c1eced-7ff5-44e2-89da-12d276c1e2bc' >>>WHERE (jsonb->>'userId') = 'c8c1eced-7ff5-44e2-89da-12d276c1e2bc' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'c97f19d3-7a82-4891-aaa1-de087a9a903f' >>>WHERE (jsonb->>'userId') = 'c97f19d3-7a82-4891-aaa1-de087a9a903f' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e76cf4c9-e15a-414e-81b9-672a90fb2745' >>>WHERE (jsonb->>'userId') = 'e76cf4c9-e15a-414e-81b9-672a90fb2745' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2c9e8cdd-d2fe-485b-b663-34225637fe93' >>>WHERE (jsonb->>'userId') = '2c9e8cdd-d2fe-485b-b663-34225637fe93' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '69a7d4f8-a32a-46d8-a006-0e5ea69f34bc' >>>WHERE (jsonb->>'userId') = '69a7d4f8-a32a-46d8-a006-0e5ea69f34bc' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '011dc219-6b7f-4d93-ae7f-f512ed651493' >>>WHERE (jsonb->>'userId') = '011dc219-6b7f-4d93-ae7f-f512ed651493' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '3ada4a0c-e554-4749-8809-fee35fe2c7ad' >>>WHERE (jsonb->>'userId') = '3ada4a0c-e554-4749-8809-fee35fe2c7ad' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '32134c21-fae8-497e-b2d2-daa1ba421070' >>>WHERE (jsonb->>'userId') = '32134c21-fae8-497e-b2d2-daa1ba421070' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'e505acd3-925e-4e2c-a255-8d11e25ba046' >>>WHERE (jsonb->>'userId') = 'e505acd3-925e-4e2c-a255-8d11e25ba046' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'dc6e1590-7021-433d-98a3-eda0f8d8fde1' >>>WHERE (jsonb->>'userId') = 'dc6e1590-7021-433d-98a3-eda0f8d8fde1' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'fb5de3c8-5293-440e-8448-a688c3a7367c' >>>WHERE (jsonb->>'userId') = 'fb5de3c8-5293-440e-8448-a688c3a7367c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f45d047f-248d-424a-9571-8b1249279c02' >>>WHERE (jsonb->>'userId') = 'f45d047f-248d-424a-9571-8b1249279c02' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ec97250b-1ded-46a7-a8f6-a474f8fe622d' >>>WHERE (jsonb->>'userId') = 'ec97250b-1ded-46a7-a8f6-a474f8fe622d' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a5fb6646-3e42-46ed-b686-e009e1490d2c' >>>WHERE (jsonb->>'userId') = 'a5fb6646-3e42-46ed-b686-e009e1490d2c' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '457a3c37-cada-47ed-ae8d-c8eda723251f' >>>WHERE (jsonb->>'userId') = '457a3c37-cada-47ed-ae8d-c8eda723251f' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0e64adb1-36ba-4cdd-9909-047612b7629e' >>>WHERE (jsonb->>'userId') = '0e64adb1-36ba-4cdd-9909-047612b7629e' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '975256dc-abdc-45d1-b51a-f9f9ca15a491' >>>WHERE (jsonb->>'userId') = '975256dc-abdc-45d1-b51a-f9f9ca15a491' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f4e0bd3e-1592-4a70-9f4a-41ccb6ca6b43' >>>WHERE (jsonb->>'userId') = 'f4e0bd3e-1592-4a70-9f4a-41ccb6ca6b43' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2a81b279-d459-4022-82f6-69a569d196b9' >>>WHERE (jsonb->>'userId') = '2a81b279-d459-4022-82f6-69a569d196b9' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f3055954-ebc3-4da8-8a60-0b8f52480125' >>>WHERE (jsonb->>'userId') = 'f3055954-ebc3-4da8-8a60-0b8f52480125' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '4c564a60-8ac6-41f9-a8b6-088901a5f8ca' >>>WHERE (jsonb->>'userId') = '4c564a60-8ac6-41f9-a8b6-088901a5f8ca' 14:02:25 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:25 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:25 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '8931291a-8f92-4044-a17f-49a546b489ce' >>>WHERE (jsonb->>'userId') = '8931291a-8f92-4044-a17f-49a546b489ce' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ffce08d4-c08d-4ff8-8ff8-060a5015aa2a' >>>WHERE (jsonb->>'userId') = 'ffce08d4-c08d-4ff8-8ff8-060a5015aa2a' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a208cf17-a7f0-452d-ae0e-64011232c86d' >>>WHERE (jsonb->>'userId') = 'a208cf17-a7f0-452d-ae0e-64011232c86d' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '65ec5d8b-c3f6-41d4-8026-fba1f7cae715' >>>WHERE (jsonb->>'userId') = '65ec5d8b-c3f6-41d4-8026-fba1f7cae715' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ceecd8ee-9586-4024-b107-d368b58a1025' >>>WHERE (jsonb->>'userId') = 'ceecd8ee-9586-4024-b107-d368b58a1025' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '23807f0f-6053-417c-b335-f3b0f84ceb8e' >>>WHERE (jsonb->>'userId') = '23807f0f-6053-417c-b335-f3b0f84ceb8e' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 2 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '7ff26639-c033-442a-8bf4-2e896b17fcf9' >>>WHERE (jsonb->>'userId') = '7ff26639-c033-442a-8bf4-2e896b17fcf9' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'ff5ec271-7138-46d0-8ca1-f5f57790e5bd' >>>WHERE (jsonb->>'userId') = 'ff5ec271-7138-46d0-8ca1-f5f57790e5bd' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '43f60acf-2557-48e9-b457-12783925444f' >>>WHERE (jsonb->>'userId') = '43f60acf-2557-48e9-b457-12783925444f' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '137d4cbd-00ff-4332-97cb-88373fa9b556' >>>WHERE (jsonb->>'userId') = '137d4cbd-00ff-4332-97cb-88373fa9b556' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'a7fb2289-b4dc-4deb-8fd3-86cf8e2b7db6' >>>WHERE (jsonb->>'userId') = 'a7fb2289-b4dc-4deb-8fd3-86cf8e2b7db6' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '9a04ae0d-e39f-44c3-b520-43144f6d93e4' >>>WHERE (jsonb->>'userId') = '9a04ae0d-e39f-44c3-b520-43144f6d93e4' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f1c2d681-faba-4950-918f-bf58d914ba1f' >>>WHERE (jsonb->>'userId') = 'f1c2d681-faba-4950-918f-bf58d914ba1f' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '47f7eaea-1a18-4058-907c-62b7d095c61b' >>>WHERE (jsonb->>'userId') = '47f7eaea-1a18-4058-907c-62b7d095c61b' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '22b0e29a-cc5d-456b-b272-b521ad5d2a39' >>>WHERE (jsonb->>'userId') = '22b0e29a-cc5d-456b-b272-b521ad5d2a39' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '89066e1d-0691-4514-ae37-586cf746d3f4' >>>WHERE (jsonb->>'userId') = '89066e1d-0691-4514-ae37-586cf746d3f4' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '48a3115d-d476-4582-b6a8-55c09eed7ec7' >>>WHERE (jsonb->>'userId') = '48a3115d-d476-4582-b6a8-55c09eed7ec7' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'f046c9bd-45aa-4ab1-ad3f-461ead3dfdc1' >>>WHERE (jsonb->>'userId') = 'f046c9bd-45aa-4ab1-ad3f-461ead3dfdc1' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '2ee07dc7-835f-4a33-a783-db2ae3f1238c' >>>WHERE (jsonb->>'userId') = '2ee07dc7-835f-4a33-a783-db2ae3f1238c' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '5c4910af-508f-49f5-b2c2-f856ffd7f2aa' >>>WHERE (jsonb->>'userId') = '5c4910af-508f-49f5-b2c2-f856ffd7f2aa' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'be3113c3-0965-4bf4-97c2-40ff54501c2b' >>>WHERE (jsonb->>'userId') = 'be3113c3-0965-4bf4-97c2-40ff54501c2b' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '6c6ab6f6-394a-44a5-8d5c-66f88f9ec01d' >>>WHERE (jsonb->>'userId') = '6c6ab6f6-394a-44a5-8d5c-66f88f9ec01d' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '0a246f61-d85f-42b6-8dcc-48d25a46690b' >>>WHERE (jsonb->>'userId') = '0a246f61-d85f-42b6-8dcc-48d25a46690b' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = 'd20d2f4e-6356-4dc3-b7b1-8b9fb5564e02' >>>WHERE (jsonb->>'userId') = 'd20d2f4e-6356-4dc3-b7b1-8b9fb5564e02' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '11dd4634-e4a9-45f0-9683-fa4d7a8f9728' >>>WHERE (jsonb->>'userId') = '11dd4634-e4a9-45f0-9683-fa4d7a8f9728' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48796 POST /perms/users null HTTP_1_1 201 254 1 tid=diku Created 14:02:26 [] [] [] [] INFO TenantAPI job 22c5c018-0668-4cfb-a200-ff78bb722c71 completed 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48780 GET /_/tenant/22c5c018-0668-4cfb-a200-ff78bb722c71 wait=60000& HTTP_1_1 200 268 751 tid=diku OK 14:02:26 [] [] [] [] INFO TestUtil Sending POST request to url 'http://localhost:53032/_/tenantpermissions' with payload: {"moduleId":"dummy","perms":[{"permissionName":"dummy.read","displayName":"Dummy Read","description":"Read Dummy Entries","visible":true},{"permissionName":"dummy.write","displayName":"Dummy Write","description":"Write Dummy Entries"},{"permissionName":"dummy.all","displayName":"Dummy All","description":"All Dummy Permissions","subPermissions":["dummy.read","dummy.write"]}]} 14:02:26 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'dummy' >>>WHERE (jsonb->>'moduleName') = 'dummy' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.all' LIMIT 1 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:26 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.read 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:26 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.write 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:26 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.write' exists 14:02:26 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.read' exists 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:26 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.read' exists 14:02:26 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.write' exists 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:26 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.read with value dummy.all 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:26 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.write with value dummy.all 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:26 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.all 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48800 POST /_/tenantpermissions null HTTP_1_1 201 603 22 tid=diku Created 14:02:26 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:53032/perms/permissions?expandSubs=true&query=(permissionName==dummy.all)' with payload: null 14:02:26 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:26 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '((permissionName==dummy.all)) AND (dummy==false)' [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:26 [] [] [] [] INFO CQLWrapper CQL >>> SQL: ((permissionName==dummy.all)) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.all'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: >>> 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: >>> 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48810 GET /perms/permissions expandSubs=true&query=(permissionName==dummy.all) HTTP_1_1 200 1271 4 tid=diku OK 14:02:26 [] [] [] [] INFO TestUtil Sending POST request to url 'http://localhost:53032/_/tenantpermissions' with payload: {"moduleId":"dummy","perms":[{"permissionName":"dummy.read","displayName":"Dummy Read","description":"Read Dummy Entries","visible":true},{"permissionName":"dummy.write","displayName":"Dummy Write","description":"Write Dummy Entries"},{"permissionName":"dummy.all","displayName":"Dummy All","description":"All Dummy Permissions","subPermissions":["dummy.read","dummy.write","dummy.delete"]},{"permissionName":"dummy.delete","displayName":"Dummy Delete","description":"Delete Dummy Entries"}]} 14:02:26 [] [] [] [] INFO RestRouting invoking postTenantpermissions 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'moduleName') = 'dummy' >>>WHERE (jsonb->>'moduleName') = 'dummy' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:26 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.delete 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:26 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.read' exists 14:02:26 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.write' exists 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 14:02:26 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.delete' exists 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.read' LIMIT 1 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.write' LIMIT 1 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' LIMIT 1 14:02:26 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.read' exists 14:02:26 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.delete' exists 14:02:26 [] [] [] [] INFO TenantPermsAPI Permission with name 'dummy.write' exists 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.read' >>>WHERE (jsonb->>'permissionName') = 'dummy.read' 14:02:26 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.read with value dummy.all 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.write' >>>WHERE (jsonb->>'permissionName') = 'dummy.write' 14:02:26 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.write with value dummy.all 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:26 [] [] [] [] INFO PermsAPI Performing ADD operation on CHILD_OF of permission dummy.delete with value dummy.all 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.delete' >>>WHERE (jsonb->>'permissionName') = 'dummy.delete' 14:02:26 [] [] [] [] INFO TenantPermsAPI Saved perm dummy.all 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48812 POST /_/tenantpermissions null HTTP_1_1 201 794 17 tid=diku Created 14:02:26 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:53032/perms/permissions?expandSubs=true&query=(permissionName==dummy.all)' with payload: null 14:02:26 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:26 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '((permissionName==dummy.all)) AND (dummy==false)' [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:26 [] [] [] [] INFO CQLWrapper CQL >>> SQL: ((permissionName==dummy.all)) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.all'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:26 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: >>> 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48818 GET /perms/permissions expandSubs=true&query=(permissionName==dummy.all) HTTP_1_1 200 1698 5 tid=diku OK 14:02:26 [] [] [] [] INFO TestUtil Sending POST request to url 'http://localhost:53032/perms/users' with payload: {"userId":"35d05a6a-d61e-4e81-9708-fc44daadbec5","permissions":["dummy.all"]} 14:02:26 [] [] [] [] INFO RestRouting invoking postPermsUsers 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'userId') = '35d05a6a-d61e-4e81-9708-fc44daadbec5' >>>WHERE (jsonb->>'userId') = '35d05a6a-d61e-4e81-9708-fc44daadbec5' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' 14:02:26 [] [] [] [] INFO PermsAPI Performing ADD operation on GRANTED_TO of permission dummy.all with value d74de59f-7981-4995-b4ca-474bea0c8bc4 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE (jsonb->>'permissionName') = 'dummy.all' >>>WHERE (jsonb->>'permissionName') = 'dummy.all' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48820 POST /perms/users null HTTP_1_1 201 266 5 tid=diku Created 14:02:26 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:53032/perms/users/d74de59f-7981-4995-b4ca-474bea0c8bc4/permissions?expanded=true' with payload: null 14:02:26 [] [] [] [] INFO RestRouting invoking getPermsUsersPermissionsById 14:02:26 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: WHERE id = 'd74de59f-7981-4995-b4ca-474bea0c8bc4' >>>WHERE id = 'd74de59f-7981-4995-b4ca-474bea0c8bc4' 14:02:26 [] [] [] [] INFO LogUtil 127.0.0.1:48822 GET /perms/users/d74de59f-7981-4995-b4ca-474bea0c8bc4/permissions expanded=true HTTP_1_1 200 108 1 tid=diku OK 14:02:30 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:53032/perms/permissions?expandSubs=true&query=(permissionName==dummy.all)' with payload: null 14:02:30 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:30 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '((permissionName==dummy.all)) AND (dummy==false)' [Mon May 10 14:02:30 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:30 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:30 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:30 [] [] [] [] INFO CQLWrapper CQL >>> SQL: ((permissionName==dummy.all)) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.all'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:30 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:30 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:30 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:30 [] [] [] [] INFO LogUtil 127.0.0.1:48840 GET /perms/permissions expandSubs=true&query=(permissionName==dummy.all) HTTP_1_1 200 1737 13 tid=diku OK 14:02:30 [] [] [] [] INFO CQLWrapper CRITERION >>> SQL: >>> 14:02:32 [] [] [] [] INFO TestUtil Sending GET request to url 'http://localhost:53032/perms/permissions?expandSubs=true&query=(permissionName==dummy.all)' with payload: null 14:02:32 [] [] [] [] INFO RestRouting invoking getPermsPermissions 14:02:32 [] [] [] [] INFO PermsAPI Generating cql to request rows from table 'permissions' with query '((permissionName==dummy.all)) AND (dummy==false)' [Mon May 10 14:02:32 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON INFO loadDbSchema: Loaded templates/db_scripts/schema.json OK [Mon May 10 14:02:32 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:32 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:32 [] [] [] [] INFO CQLWrapper CQL >>> SQL: ((permissionName==dummy.all)) AND (dummy==false) >>>WHERE (lower(f_unaccent(permissions.jsonb->>'permissionName')) LIKE lower(f_unaccent('dummy.all'))) AND (lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false'))) LIMIT 10 OFFSET 0 [Mon May 10 14:02:32 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:32 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) [Mon May 10 14:02:32 CEST 2021] org.folio.cql2pgjson.CQL2PgJSON WARNING Doing LIKE search without index for permissions.jsonb->>'dummy', CQL >>> SQL: dummy == false >>> lower(f_unaccent(permissions.jsonb->>'dummy')) LIKE lower(f_unaccent('false')) 14:02:32 [] [] [] [] INFO LogUtil 127.0.0.1:48844 GET /perms/permissions expandSubs=true&query=(permissionName==dummy.all) HTTP_1_1 200 1737 12 tid=diku OK 14:02:32 [] [] [] [] INFO RestVerticle No shutdown hook implementation found, continuing with shutdown [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 8.765 s - in org.folio.permstest.RestVerticleWithCacheTest 14:02:32 [] [] [] [] INFO PostgresClient Stopping postgres tester 14:02:32 [] [] [] [] INFO PostgresClient Stopping postgres tester 14:02:32 [] [] [] [] INFO PostgresClient Stopping postgres tester 14:02:32 [] [] [] [] INFO PostgresClient Stopping postgres tester [INFO] [INFO] Results: [INFO] [ERROR] Failures: [ERROR] RestVerticleTest.lambda$testDeprecatePermissionsOnTenantInit$49:1225 Expected true [ERROR] RestVerticleTest.testPermissionNameReplace:640 Expected: is <201> but: was <400> [ERROR] RestVerticleTest.testPermissionsOnTheMove:355 Not equals : 201 != 400 [ERROR] RestVerticleTest.testPermsPermissionsMutable:1065 Not equals : 201 != 400 [ERROR] RestVerticleTest.testPostTenantPermissionsMutual2:1168 Not equals : 201 != 400 [ERROR] RestVerticleTest.testPostTenantPermissionsNoPermissionName:1127 Not equals : 201 != 400 [ERROR] RestVerticleTest.testPurgeDeprecatedPerm:571 Expected: is but: was [ERROR] Errors: [ERROR] RestVerticleTest.testPermsSeq ยป NoStackTraceThrowable POST request to http://l... [INFO] [ERROR] Tests run: 85, Failures: 7, Errors: 1, Skipped: 0 [INFO] [INFO] ------------------------------------------------------------------------ [INFO] BUILD FAILURE [INFO] ------------------------------------------------------------------------ [INFO] Total time: 41.776 s [INFO] Finished at: 2021-05-10T14:02:33+02:00 [INFO] ------------------------------------------------------------------------ [ERROR] Failed to execute goal org.apache.maven.plugins:maven-surefire-plugin:2.22.1:test (default-test) on project mod-permissions: There are test failures. [ERROR] [ERROR] Please refer to /home/adam/folio/mod-permissions/target/surefire-reports for the individual test results. [ERROR] Please refer to dump files (if any exist) [date].dump, [date]-jvmRun[N].dump and [date].dumpstream. [ERROR] -> [Help 1] [ERROR] [ERROR] To see the full stack trace of the errors, re-run Maven with the -e switch. [ERROR] Re-run Maven using the -X switch to enable full debug logging. [ERROR] [ERROR] For more information about the errors and possible solutions, please read the following articles: [ERROR] [Help 1] http://cwiki.apache.org/confluence/display/MAVEN/MojoFailureException