Project

General

Profile

Bug #19926

Puppet module repo deletion has no protection

Added by Josh Pavel almost 5 years ago. Updated 6 months ago.

Status:
Closed
Priority:
Normal
Assignee:
-
Category:
Repositories
Target version:
Difficulty:
Triaged:
Yes
Bugzilla link:
Pull request:
Fixed in Releases:
Found in Releases:
Red Hat JIRA:

Description

1.) Create a product that contains puppet module repos
2.) Create content views and hosts to use those puppet modules
3.) You are able to delete the puppet repos which orphans the content views and hosts

Expected behavior: if puppet modules are used by published puppet environments, the same protection afforded to RPMs should be offered to puppet modules.

In my specific case, we were moving from using the public puppet forge to a private internal forge that performs a fall-through itself to the public forge. We had previously had the public forget linked directly. When we attempted to migrate to the internal forge, we were permitted to remove the old public puppet repos, and our linked modules disappeared from the content views. On re-adding them, they automatically re-appeared in content views, without having to republish them.

History

#1 Updated by Eric Helms almost 5 years ago

  • Legacy Backlogs Release (now unused) set to 258

#2 Updated by Justin Sherrill almost 5 years ago

  • Legacy Backlogs Release (now unused) changed from 258 to 250

#3 Updated by Justin Sherrill over 4 years ago

  • Legacy Backlogs Release (now unused) changed from 250 to 114

#4 Updated by Dirk Götz 6 months ago

  • Triaged set to No
  • Status changed from New to Closed

Katello 4.0 has dropped pulp 2 and puppet content, so this issue is no longer relevant.

#5 Updated by James Jeffers 6 months ago

  • Triaged changed from No to Yes

Also available in: Atom PDF