{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":368536027,"defaultBranch":"main","name":"cloud_controller_ng","ownerLogin":"sap-contributions","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2021-05-18T13:15:13.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/67365985?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1727449921.0","currentOid":""},"activityList":{"items":[{"before":"1012d700fb9d64f97072a20a8fd015bda774155a","after":"f2e96d95480157fba46d1b1b019b527052024c3a","ref":"refs/heads/file-based-service-bindings-enabled-column","pushedAt":"2024-09-27T15:14:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Add column file_based_service_bindings_enabled to apps table","shortMessageHtmlLink":"Add column file_based_service_bindings_enabled to apps table"}},{"before":"e2997d140aa76bb116d4d72bbcde1ffc139af3b4","after":"3535b69537ae7bed1d390dc89470c33fd7fe9b30","ref":"refs/heads/file-based-service-bindings-feature-flag","pushedAt":"2024-09-27T15:14:09.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Add api docs for file-based-service-bindings app feature","shortMessageHtmlLink":"Add api docs for file-based-service-bindings app feature"}},{"before":null,"after":"9c07aeb1024c3dac46b2b047b628f532b53e80a7","ref":"refs/heads/rotate-database-key-spec-false-values","pushedAt":"2024-09-27T15:12:01.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Fix rotate_database_key_spec\n\n- Values must not be 'nil', but can be 'false'.\n- 'false.present?' evaluates to 'false'.","shortMessageHtmlLink":"Fix rotate_database_key_spec"}},{"before":"f599250d76eb92df26c5202669fc9804d25074dc","after":"1012d700fb9d64f97072a20a8fd015bda774155a","ref":"refs/heads/file-based-service-bindings-enabled-column","pushedAt":"2024-09-27T13:43:37.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Add column file_based_service_bindings_enabled to apps table","shortMessageHtmlLink":"Add column file_based_service_bindings_enabled to apps table"}},{"before":"799dba50b6fc5d8e190480a28351838bd2d2fb34","after":"e2997d140aa76bb116d4d72bbcde1ffc139af3b4","ref":"refs/heads/file-based-service-bindings-feature-flag","pushedAt":"2024-09-27T13:43:00.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Add api docs for file-based-service-bindings app feature","shortMessageHtmlLink":"Add api docs for file-based-service-bindings app feature"}},{"before":"988afc106754066902e538d8916ff44c6d3623c9","after":null,"ref":"refs/heads/retrieve-cnb-apps","pushedAt":"2024-09-27T13:35:21.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"modulo11","name":"Johannes Dillmann","path":"/modulo11","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18194365?s=80&v=4"}},{"before":null,"after":"799dba50b6fc5d8e190480a28351838bd2d2fb34","ref":"refs/heads/file-based-service-bindings-feature-flag","pushedAt":"2024-09-27T13:23:12.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Add api docs for file-based-service-bindings app feature","shortMessageHtmlLink":"Add api docs for file-based-service-bindings app feature"}},{"before":null,"after":"f599250d76eb92df26c5202669fc9804d25074dc","ref":"refs/heads/file-based-service-bindings-enabled-column","pushedAt":"2024-09-27T13:21:18.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Add column file_based_service_bindings_enabled to apps table","shortMessageHtmlLink":"Add column file_based_service_bindings_enabled to apps table"}},{"before":null,"after":"988afc106754066902e538d8916ff44c6d3623c9","ref":"refs/heads/retrieve-cnb-apps","pushedAt":"2024-09-27T11:58:01.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"modulo11","name":"Johannes Dillmann","path":"/modulo11","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18194365?s=80&v=4"},"commit":{"message":"Allow cnb apps to be retrieved","shortMessageHtmlLink":"Allow cnb apps to be retrieved"}},{"before":null,"after":"7a9f8e4d5083f05180f47bcbba93f774f885d494","ref":"refs/heads/fog-retry-openssl-error","pushedAt":"2024-09-27T08:22:04.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jochenehret","name":"Jochen Ehret","path":"/jochenehret","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7871793?s=80&v=4"},"commit":{"message":"Add OpenSSL::OpenSSLError to Fog RetryableClient config\n\n* on GCP we see sporadic OpenSSLErrors (unexpected eof) -> try to remediate","shortMessageHtmlLink":"Add OpenSSL::OpenSSLError to Fog RetryableClient config"}},{"before":null,"after":"027cafe89f02f359e14d62391eda36e0dbcc6810","ref":"refs/heads/retry_for_package_upload","pushedAt":"2024-09-25T14:27:26.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jochenehret","name":"Jochen Ehret","path":"/jochenehret","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7871793?s=80&v=4"},"commit":{"message":"Use 3 retries with exp backoff for package upload\n\n* remediates blobstore failures, e.g. unexpected OpenSSL eof erros ons GCP/GCS","shortMessageHtmlLink":"Use 3 retries with exp backoff for package upload"}},{"before":"a8a0124d019f0b800165d6436d4906dc2c0e76c2","after":"403da3dd381825d4613ba583e6b640db2e456c33","ref":"refs/heads/prevent-deletion-of-current-droplet-foreign-key","pushedAt":"2024-09-23T09:25:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Prevent deletion of current droplet with foreign key\n\nAdd foreign key from apps.droplet_guid to droplets.guid.\n\nMySQL only: ensure that the collation of the foreign key column\n(apps.droplet_guid) matches the referenced column (droplets.guid).\n\nRemove invalid current droplet relations (i.e. guid does not exist)\nbefore creating the foreign key constraint.\n\nAdd tests for ForeignKeyConstraintViolation errors.","shortMessageHtmlLink":"Prevent deletion of current droplet with foreign key"}},{"before":"b55a772cee4901b9546d51bbd5193eafdfae0300","after":"29d7904bbdc300fd2d7440c67b9bee5985c78c0e","ref":"refs/heads/cnb-system-buildpacks","pushedAt":"2024-09-23T06:53:18.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pbusko","name":"Pavel Busko","path":"/pbusko","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/17778211?s=80&v=4"},"commit":{"message":"restrict default_app_lifecycle on schema level\n\nCo-authored-by: Ralf Pannemans ","shortMessageHtmlLink":"restrict default_app_lifecycle on schema level"}},{"before":"b728adcbcdd94e184b17590f9f5db159d218c6a3","after":"d2be4008f5838902245f574bfd29b2f552888942","ref":"refs/heads/configurable-pollable-jobs-cleanup","pushedAt":"2024-09-19T10:41:14.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Configurable pollable jobs cleanup","shortMessageHtmlLink":"Configurable pollable jobs cleanup"}},{"before":null,"after":"b728adcbcdd94e184b17590f9f5db159d218c6a3","ref":"refs/heads/configurable-pollable-jobs-cleanup","pushedAt":"2024-09-19T09:20:09.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Configurable pollable jobs cleanup","shortMessageHtmlLink":"Configurable pollable jobs cleanup"}},{"before":"a7612dd4be82e61c4779d4ac8c58f9f9c6ceb1c9","after":"2e952d66e2e0497832fd37b4fa2a94b5497f9d40","ref":"refs/heads/rubocop-fixes","pushedAt":"2024-09-17T15:10:02.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Enable new cops and fix some offenses","shortMessageHtmlLink":"Enable new cops and fix some offenses"}},{"before":null,"after":"a7612dd4be82e61c4779d4ac8c58f9f9c6ceb1c9","ref":"refs/heads/rubocop-fixes","pushedAt":"2024-09-17T14:22:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Enable new cops and fix some offenses","shortMessageHtmlLink":"Enable new cops and fix some offenses"}},{"before":"ddc3801c493bbbcffc0a62a34e8336af6cd29677","after":"6be50873af4c973ef36be50abbeee2c928918ca3","ref":"refs/heads/shared-spaces-decorator-permissions","pushedAt":"2024-09-13T06:22:10.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Filter out space and organization names based on permissions\n\nWhen a user has access to a shared service instance (i.e. read\npermissions on any of the shared spaces), the guids of all shared spaces\nare visible, but only those space and organization names the user is\nallowed to read based on the given roles.\n\nExample:\n\n DEVELOPER who is space developer in SPACE_1, SPACE_2 and SPACE_3\n shared SERVICE_INSTANCE from SPACE_1 to SPACE_2 and SPACE_3. For each\n space there is a dedicated space auditor (AUDITOR_1, AUDITOR_2 and\n AUDITOR_3).\n\n SPACE_1\n -------\n DEVELOPER (space developer)\n AUDITOR_1 (space auditor)\n SERVICE_INSTANCE\n\n SPACE_2\n -------\n DEVELOPER (space developer)\n AUDITOR_2 (space auditor)\n shared SERVICE_INSTANCE\n\n SPACE_3\n -------\n DEVELOPER (space developer)\n AUDITOR_3 (space auditor)\n shared SERVICE_INSTANCE\n\nOriginal behavior (before PR cloudfoundry/cloud_controller_ng#3931):\n\n - AUDITOR_1 can see SPACE_2.guid + name and SPACE_3.guid + name\n => SPACE_2.name and SPACE_3.name should not be readable\n - AUDITOR_2 cannot see shared spaces\n => shared spaces should be readable\n - AUDITOR_3 cannot see shared spaces\n => shared spaces should be readable\n\nChanged behavior (with PR cloudfoundry/cloud_controller_ng#3931):\n\n - AUDITOR_1 can see SPACE_2.guid + name and SPACE_3.guid + name\n => SPACE_2.name and SPACE_3.name should not be readable\n - AUDITOR_2 can see SPACE_2.guid + name and SPACE_3.guid + name\n => SPACE_3.name should not be readable\n - AUDITOR_3 can see SPACE_2.guid + name and SPACE_3.guid + name\n => SPACE_2.name should not be readable\n\nNew behavior (this change):\n\n - AUDITOR_1 can see SPACE_2.guid and SPACE_3.guid\n - AUDITOR_2 can see SPACE_2.guid + name and SPACE_3.guid\n - AUDITOR_3 can see SPACE_2.guid and SPACE_3.guid + name","shortMessageHtmlLink":"Filter out space and organization names based on permissions"}},{"before":"000ff200755fe2771f78b1470da8f6da16039312","after":"a8a0124d019f0b800165d6436d4906dc2c0e76c2","ref":"refs/heads/prevent-deletion-of-current-droplet-foreign-key","pushedAt":"2024-09-12T13:26:24.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Prevent deletion of current droplet with foreign key\n\nAdd foreign key from apps.droplet_guid to droplets.guid.\n\nMySQL only: ensure that the collation of the foreign key column\n(apps.droplet_guid) matches the referenced column (droplets.guid).\n\nRemove invalid current droplet relations (i.e. guid does not exist)\nbefore creating the foreign key constraint.\n\nAdd tests for ForeignKeyConstraintViolation errors.","shortMessageHtmlLink":"Prevent deletion of current droplet with foreign key"}},{"before":"bfe60100f650b6438aaf02c7cb8145a4ae1e2672","after":"50bb5d632e9db5192a41965b65a285d556c16acc","ref":"refs/heads/prevent-deletion-of-current-droplet","pushedAt":"2024-09-12T13:06:02.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Prevent deletion of current droplet\n\nDropletsController: check if droplet is in use (i.e. app's current\ndroplet) and raise an ApiError (UnprocessableEntity)\n\nPrepare for the introduction of a foreign key from apps.droplet_guid to\ndroplets.guid:\n- DropletModel: handle ForeignKeyConstraintViolation and translate into\n ApiError (UnprocessableEntity)\n- AppModel: handle ForeignKeyConstraintViolation and translate into\n ValidationFailed error\n- DropletDelete: move destroy before other operations (deletion from\n blobstore, recording of event) so that an exception stops the control\n flow\n- AppDelete: clear droplet_guid (i.e. current droplet relation) before\n deleting subresources (incl. droplets)\n- AppAssignDroplet: handle ValidationFailed error and translate into\n already existing error\n- Adapt tests to also work with a foreign key","shortMessageHtmlLink":"Prevent deletion of current droplet"}},{"before":null,"after":"000ff200755fe2771f78b1470da8f6da16039312","ref":"refs/heads/prevent-deletion-of-current-droplet-foreign-key","pushedAt":"2024-09-12T11:50:17.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Prevent deletion of current droplet with foreign key","shortMessageHtmlLink":"Prevent deletion of current droplet with foreign key"}},{"before":"0cd64e4021af6cb069ca0aa7aef9f4a24a846d2d","after":"bfe60100f650b6438aaf02c7cb8145a4ae1e2672","ref":"refs/heads/prevent-deletion-of-current-droplet","pushedAt":"2024-09-12T11:48:58.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Prevent deletion of current droplet","shortMessageHtmlLink":"Prevent deletion of current droplet"}},{"before":"76b29e56cef6fd7256054309eed16e39b8208969","after":"0cd64e4021af6cb069ca0aa7aef9f4a24a846d2d","ref":"refs/heads/prevent-deletion-of-current-droplet","pushedAt":"2024-09-11T12:48:10.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Prevent deletion of current droplet","shortMessageHtmlLink":"Prevent deletion of current droplet"}},{"before":"0437331380ff5386ad1f0907810729f80573d3ad","after":"76b29e56cef6fd7256054309eed16e39b8208969","ref":"refs/heads/prevent-deletion-of-current-droplet","pushedAt":"2024-09-11T11:09:57.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Prevent deletion of current droplet","shortMessageHtmlLink":"Prevent deletion of current droplet"}},{"before":"95ba453c0d04f3c798b45d3cbe6720ea819f8e92","after":"0437331380ff5386ad1f0907810729f80573d3ad","ref":"refs/heads/prevent-deletion-of-current-droplet","pushedAt":"2024-09-10T15:03:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Prevent deletion of current droplet","shortMessageHtmlLink":"Prevent deletion of current droplet"}},{"before":null,"after":"ddc3801c493bbbcffc0a62a34e8336af6cd29677","ref":"refs/heads/shared-spaces-decorator-permissions","pushedAt":"2024-09-10T11:35:36.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Filter out space and organization names based on permissions\n\nWhen a user has access to a shared service instance (i.e. read\npermissions on any of the shared spaces), the guids of all shared spaces\nare visible, but only those space and organization names the user is\nallowed to read based on the given roles.\n\nExample:\n\n DEVELOPER who is space developer in SPACE_1, SPACE_2 and SPACE_3\n shared SERVICE_INSTANCE from SPACE_1 to SPACE_2 and SPACE_3. For each\n space there is a dedicated space auditor (AUDITOR_1, AUDITOR_2 and\n AUDITOR_3).\n\n SPACE_1\n -------\n DEVELOPER (space developer)\n AUDITOR_1 (space auditor)\n SERVICE_INSTANCE\n\n SPACE_2\n -------\n DEVELOPER (space developer)\n AUDITOR_2 (space auditor)\n shared SERVICE_INSTANCE\n\n SPACE_3\n -------\n DEVELOPER (space developer)\n AUDITOR_3 (space auditor)\n shared SERVICE_INSTANCE\n\nOriginal behavior (before PR cloudfoundry/cloud_controller_ng#3931):\n\n - AUDITOR_1 can see SPACE_2.guid + name and SPACE_3.guid + name\n => SPACE_2.name and SPACE_3.name should not be readable\n - AUDITOR_2 cannot see shared spaces\n => shared spaces should be readable\n - AUDITOR_3 cannot see shared spaces\n => shared spaces should be readable\n\nChanged behavior (with PR cloudfoundry/cloud_controller_ng#3931):\n\n - AUDITOR_1 can see SPACE_2.guid + name and SPACE_3.guid + name\n => SPACE_2.name and SPACE_3.name should not be readable\n - AUDITOR_2 can see SPACE_2.guid + name and SPACE_3.guid + name\n => SPACE_3.name should not be readable\n - AUDITOR_3 can see SPACE_2.guid + name and SPACE_3.guid + name\n => SPACE_2.name should not be readable\n\nNew behavior (this change):\n\n - AUDITOR_1 can see SPACE_2.guid and SPACE_3.guid\n - AUDITOR_2 can see SPACE_2.guid + name and SPACE_3.guid\n - AUDITOR_3 can see SPACE_2.guid and SPACE_3.guid + name","shortMessageHtmlLink":"Filter out space and organization names based on permissions"}},{"before":null,"after":"95ba453c0d04f3c798b45d3cbe6720ea819f8e92","ref":"refs/heads/prevent-deletion-of-current-droplet","pushedAt":"2024-09-09T15:11:53.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Prevent deletion of current droplet","shortMessageHtmlLink":"Prevent deletion of current droplet"}},{"before":null,"after":"c463e48b96736fc6b2b9ae35b58d82aaf74c5538","ref":"refs/heads/clear-current-droplet-guid-when-deleted","pushedAt":"2024-08-09T10:43:06.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Clear the app's current droplet guid when droplet is deleted","shortMessageHtmlLink":"Clear the app's current droplet guid when droplet is deleted"}},{"before":"42cdedafec85e53e036fc83ba587552014a631ac","after":null,"ref":"refs/heads/secondary-order","pushedAt":"2024-08-06T13:54:45.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"}},{"before":"74518f8b51466d76a1ed1704d883e1b3ffbb7e88","after":"11bc521d08e44ed2c712012a05e81c580d284aff","ref":"refs/heads/name-conflicts-parallel-service-instance-sharing","pushedAt":"2024-08-05T18:00:08.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"philippthun","name":"Philipp Thun","path":"/philippthun","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/618301?s=80&v=4"},"commit":{"message":"Resolve name conflicts in parallel service instance creation + sharing\n\nAdd a materialized view that returns all names of (shared) service\ninstances and their (target) space guid.\n\nAlso add a unique index to ensure that a service instance cannot be\nshared into a space where another service instance with the same name\nalready exists.\n\nRefresh the materialized view when saving a service instance or adding a\nshared space.\n\nRaise a validation or instance sharing error in case a unique constraint\nviolations occurs.\n\nTODO: works for PostgreSQL only","shortMessageHtmlLink":"Resolve name conflicts in parallel service instance creation + sharing"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yN1QxNToxNDozNC4wMDAwMDBazwAAAATCv4dj","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOC0wNVQxODowMDowOC4wMDAwMDBazwAAAASSUCZt"}},"title":"Activity ยท sap-contributions/cloud_controller_ng"}