Project

Profile

Help

Verification Required

Apply Clear

# Project Tracker Status Priority Severity Subject Author Assignee
  (blank) 7005 Collapse all/Expand all
7770 Ansible Plugin Task CLOSED - COMPLETE Normal Release 0.5.0 fao89 Actions
7684 Ansible Plugin Task CLOSED - COMPLETE Normal Release 0.4.2 fao89 Actions
7631 Ansible Plugin Task CLOSED - COMPLETE Normal Release 0.4.1 daviddavis Actions
7558 Ansible Plugin Task CLOSED - COMPLETE Normal Release 0.4.0 daviddavis bmbouter Actions
6650 Ansible Plugin Task CLOSED - COMPLETE Normal Remove use of fixtures from fedorapeople.org bmbouter Actions
5928 Ansible Plugin Task CLOSED - COMPLETE Normal [EPIC] Complete CLI testing for Role and Collection workflows bmbouter Actions
5912 Ansible Plugin Task CLOSED - COMPLETE Normal Bootstrap pulp_galaxy repository using plugin template bmbouter Actions
5911 Ansible Plugin Task CLOSED - COMPLETE Normal [Epic] Port automation hub code to a pulp plugin named pulp_galaxy bmbouter Actions
5333 Ansible Plugin Test CLOSED - COMPLETE High As a user, I can sync collections from another Pulp server daviddavis kersom Actions
5262 Ansible Plugin Test CLOSED - COMPLETE Normal Test - Uploading same collection twice causes 500 error kersom kersom Actions
5256 Ansible Plugin Test CLOSED - COMPLETE Normal Test - Ansible collection remote doesn't handle trailing / in sync url kersom Actions
5000 Ansible Plugin Test CLOSED - COMPLETE Normal Collection - Test that sucessive syncs do update repo version kersom kersom Actions
4915 Ansible Plugin Test CLOSED - COMPLETE Normal Test install a collection hosted by Pulp using mazer kersom kersom Actions
4913 Ansible Plugin Test CLOSED - COMPLETE Normal Test sync collections from Galaxy kersom kersom Actions
4048 Ansible Plugin Task CLOSED - COMPLETE Normal Remove publishers daviddavis Actions
3616 Ansible Plugin Task CLOSED - COMPLETE Normal Have Travis push packages to pypi whenever a new tag is created in the pulpcore repo daviddavis Actions
3496 Ansible Plugin Task CLOSED - COMPLETE Normal Rename Importer to Remote amacdona@redhat.com bmbouter Actions
9489 Ansible Plugin Task MODIFIED Normal Make use of shared_resources in sync and copy jobs mdellweg mdellweg Actions
9346 Ansible Plugin Story MODIFIED Normal As user, I can sync collections using a GitRemote daviddavis dkliban@redhat.com Actions
9345 Ansible Plugin Story MODIFIED Normal As a user, I can create a GitRemote to sync content from git daviddavis dkliban@redhat.com Actions
8205 Ansible Plugin Story MODIFIED Normal Add AnsibleCollectionDeprecated resource to export/import gerrod fao89 Actions
8194 Ansible Plugin Story MODIFIED Normal Syncing will exclude collection versions found at `/excludes/` endpoint of remote gerrod Actions
6323 CertGuard Task CLOSED - WONTFIX Normal [Epic] Move certguard authentication from pulp-content to apache and nginx access scripts bmbouter Actions
7484 CertGuard Task CLOSED - DUPLICATE Normal Replace PyOpenSSL use with `cryptography` library from pypa bmbouter Actions
6830 CertGuard Task CLOSED - DUPLICATE High Update yum/dnf documentation on how .repo files can be configured to present a client cert and key bmbouter Actions
6810 CertGuard Task CLOSED - DUPLICATE Normal Add a test to ensure FileRemote with client_cert and client_key configured can sync from a protected repository bmbouter Actions
6444 CertGuard Task CLOSED - DUPLICATE Normal Replace X509 artifact generation with `trustme` implementation bmbouter Actions
6423 CertGuard Task CLOSED - DUPLICATE Normal Add a test so that an expired client X509 Certificate should be denied bmbouter Actions
4666 CertGuard Story CLOSED - DUPLICATE Normal As a user I have path checking features for to the X.509 certguard bmbouter Actions
4363 CertGuard Test CLOSED - DUPLICATE Normal Test the RHSMCertGuard bherring Actions
6744 CertGuard Task CLOSED - CURRENTRELEASE Normal Add debug docs and clean up table of contents bmbouter bmbouter Actions
6545 CertGuard Task CLOSED - CURRENTRELEASE Normal Rename URL for RHSM CertGuard to use lowercase instead of all caps bmbouter bmbouter Actions
6445 CertGuard Story CLOSED - CURRENTRELEASE Normal As a user I have X509, RHSM docs and Reverse Proxy config docs bmbouter bmbouter Actions
6352 CertGuard Story CLOSED - CURRENTRELEASE Normal As a user, I can submit my cert via TLS and I do not have to strip newlines from it bmbouter bmbouter Actions
6298 CertGuard Task CLOSED - CURRENTRELEASE Normal Move documentation from README to sphinx site bmbouter bmbouter Actions
6296 CertGuard Task CLOSED - CURRENTRELEASE Normal Rename CertGuard to x509CertGuard in the code since we'll soon have two types bmbouter bmbouter Actions
4664 CertGuard Story CLOSED - CURRENTRELEASE High As a user, I can use a RHSMCertGuard bmbouter bmbouter Actions
4601 CertGuard Task CLOSED - CURRENTRELEASE Normal Release pulp-certguard to PyPI bmbouter bmbouter Actions
4596 CertGuard Task CLOSED - CURRENTRELEASE Normal Add the pulp-certguard tests to run with pulpcore bmbouter bmbouter Actions
4593 CertGuard Refactor CLOSED - CURRENTRELEASE Normal rename certguard type to x509 amacdona@redhat.com bmbouter Actions
4009 CertGuard Story CLOSED - CURRENTRELEASE Normal Make CertGuard capabilities in Pulp3 bmbouter jortel@redhat.com Actions
4893 CertGuard Task CLOSED - COMPLETE Normal switch certguard to store SSL certs entirely in the database bmbouter Actions
4122 CertGuard Test CLOSED - COMPLETE Normal Test CRUD ContentGuard kersom Actions
6635 Container Support Story CLOSED - WORKSFORME Normal As a user I can export a set of repo versions ipanova@redhat.com Actions
8915 Container Support Task CLOSED - WONTFIX Normal Release 2.1.3 ipanova@redhat.com Actions
7419 Container Support Story CLOSED - WONTFIX Normal As a user I can integrate with DOC,SEC: Docker Notary client / TUF support westurner Actions
7025 Container Support Task CLOSED - WONTFIX Normal Identify whether it is possible to use chunk uploads from core during push operation ipanova@redhat.com Actions
6822 Container Support Task CLOSED - WONTFIX Normal Create and a use TempRepoVersion during docker push ipanova@redhat.com mdellweg Actions
5463 Container Support Task CLOSED - WONTFIX Normal Use new upload serializer in pulp_docker fao89 Actions
5364 Container Support Task CLOSED - WONTFIX Normal add ability to specify registry when generating fixtures dkliban@redhat.com Actions
5362 Container Support Test CLOSED - WONTFIX Normal Performace testing: sync ipanova@redhat.com Actions
5322 Container Support Story CLOSED - WONTFIX Normal As a user I have retuned a list of references that prevent recursive removal ipanova@redhat.com Actions
5277 Container Support Test CLOSED - WONTFIX Normal Test - As a user I can sync a registry by whitelisting tag( Filtered sync) kersom Actions
5275 Container Support Test CLOSED - WONTFIX Normal Test - As a user, I can sync from registries that use basic auth kersom Actions
5267 Container Support Test CLOSED - WONTFIX High Test - As a user I can filter Manifests and ManifestTags by media type kersom Actions
5266 Container Support Test CLOSED - WONTFIX Normal Test - Docker remote whitelist_tags can't be empty string kersom Actions
5260 Container Support Test CLOSED - WONTFIX High Test - As a user, I can filter Manifests and ManifestTags by multiple media types kersom Actions
5259 Container Support Task CLOSED - WONTFIX Normal Add test_bindings.py and test_bindings.rb scripts amacdona@redhat.com Actions
5232 Container Support Story CLOSED - WONTFIX Normal As a user I can remove docker content units with a force flag ipanova@redhat.com Actions
5040 Container Support Story CLOSED - WONTFIX Normal As a user, I can submit one-time Remote options with sync bmbouter Actions
4935 Container Support Task CLOSED - WONTFIX Normal As a user, I can validate blobs and manifests checksum during sync ipanova@redhat.com Actions
4822 Container Support Test CLOSED - WONTFIX Normal As a user i can sync from registrues that have auth ipanova@redhat.com Actions
4813 Container Support Story CLOSED - WONTFIX Normal As a user, I can create docker content from uploaded artifacts amacdona@redhat.com Actions
4753 Container Support Test CLOSED - WONTFIX Normal As a user i can manage a docker image that has manifest in old format (v2 Schema1) kersom Actions
4752 Container Support Test CLOSED - WONTFIX Normal Test sync in case when registry does not provide scope in the response headers kersom Actions
4703 Container Support Test CLOSED - WONTFIX Normal Add a test for syncing from quay, gcr and redhat registries ipanova@redhat.com Actions
4657 Container Support Story CLOSED - WONTFIX Normal As a user i can use skopeo pulp transport to upload images to Pulp container registry ipanova@redhat.com Actions
4598 Container Support Test CLOSED - WONTFIX Normal specify --tls=verify=false if pulling an image with podman ipanova@redhat.com Actions
4533 Container Support Test CLOSED - WONTFIX Normal Test Pull Container Image by Digest rochacbruno Actions
4531 Container Support Test CLOSED - WONTFIX Normal Fetch registry content using API calls kersom Actions
4461 Container Support Test CLOSED - WONTFIX Low As a user i can configure download of the foreign layers bherring Actions
4311 Container Support Story CLOSED - WONTFIX Normal As a user, I can view layer (Blob) details on the Manifest amacdona@redhat.com Actions
4310 Container Support Story CLOSED - WONTFIX Normal As a user I can view the Manifest data for each Manifest on a ManifestList amacdona@redhat.com Actions
4299 Container Support Test CLOSED - WONTFIX Normal Remove duplicate tags from repository during sync bherring Actions
4202 Container Support Story CLOSED - WONTFIX Normal As a Docker user, I have containers bmbouter Actions
3404 Container Support Story CLOSED - WONTFIX Normal model Blob for pulp_docker 4.0 bizhang Actions
9597 Container Support Story CLOSED - DUPLICATE Normal As a user, my image signature JSON payload is validated ttereshc Actions
9582 Container Support Story CLOSED - DUPLICATE Normal As a user when I remove manifest from a repo its signatures are removed as well ipanova@redhat.com Actions
9581 Container Support Story CLOSED - DUPLICATE Normal As a user I can audit existing container images and verify its signatures ipanova@redhat.com Actions
9572 Container Support Task CLOSED - DUPLICATE Normal Port the RBAC implementation to the pulpcore roles framework mdellweg Actions
9560 Container Support Story CLOSED - DUPLICATE Normal As a user I can pull-through cache container images when remote is defined on distribution ipanova@redhat.com Actions
9558 Container Support Story CLOSED - DUPLICATE Normal As a user I can export import/export image signarure altogether with the images ipanova@redhat.com Actions
9557 Container Support Story CLOSED - DUPLICATE Normal As a user I want to invalidate existing signatures ipanova@redhat.com Actions
9513 Container Support Story CLOSED - DUPLICATE Normal As a user I can view container image signatures ipanova@redhat.com Actions
9512 Container Support Story CLOSED - DUPLICATE Normal As a user, I have signatures removed with the image removal ipanova@redhat.com Actions
9511 Container Support Story CLOSED - DUPLICATE Normal As a user I can publish container signature to the server ipanova@redhat.com Actions
9510 Container Support Story CLOSED - DUPLICATE Normal As a user I can host container image signatures ipanova@redhat.com Actions
9509 Container Support Story CLOSED - DUPLICATE Normal As a user I can sign container image by providing signing policy config ipanova@redhat.com ipanova@redhat.com Actions
9508 Container Support Story CLOSED - DUPLICATE Normal As a user I, while mirroring, can verify image signature by providing verification policy config ipanova@redhat.com Actions
9507 Container Support Story CLOSED - DUPLICATE Normal As a user I can sync container image with its original signature ipanova@redhat.com ttereshc Actions
9502 Container Support Story CLOSED - DUPLICATE Normal [EPIC] Contrainer Signing and Verification ipanova@redhat.com Actions
9500 Container Support Story CLOSED - DUPLICATE Normal Enable cache in pulp container handler ipanova@redhat.com lmjachky Actions
9424 Container Support Refactor CLOSED - DUPLICATE Normal Remove the interrelate stage from the sync pipeline mdellweg Actions
9241 Container Support Story CLOSED - DUPLICATE Normal As a user I can mount blobs across repositories ipanova@redhat.com Actions
9143 Container Support Task CLOSED - DUPLICATE Normal Add section for settings recommendations ipanova@redhat.com Actions
9115 Container Support Story CLOSED - DUPLICATE Normal As a user during login into container registy I can authenticate against password or a token key ipanova@redhat.com Actions
8577 Container Support Refactor CLOSED - DUPLICATE Normal Refactor get_dr_push so it is more readable ipanova@redhat.com Actions
8570 Container Support Refactor CLOSED - DUPLICATE Normal Look into how to optimize queries in add_and_remove method ipanova@redhat.com Actions
8271 Container Support Story CLOSED - DUPLICATE Normal RBAC will be enforced for the registry if TOKEN_AUTH is disabled mdellweg mdellweg Actions
7973 Container Support Story CLOSED - DUPLICATE Normal As a user I can retrieve a blob upload status via docker v2 api ipanova@redhat.com Actions
(201-300/8435) Per page: 25, 50, 100

Also available in: Atom CSV PDF

Please register to add an issue