Puppet module repo deletion has no protection
1.) Create a product that contains puppet module repos
2.) Create content views and hosts to use those puppet modules
3.) You are able to delete the puppet repos which orphans the content views and hosts
Expected behavior: if puppet modules are used by published puppet environments, the same protection afforded to RPMs should be offered to puppet modules.
In my specific case, we were moving from using the public puppet forge to a private internal forge that performs a fall-through itself to the public forge. We had previously had the public forget linked directly. When we attempted to migrate to the internal forge, we were permitted to remove the old public puppet repos, and our linked modules disappeared from the content views. On re-adding them, they automatically re-appeared in content views, without having to republish them.