Project

Profile

Help

Issues

Filters

Apply Clear

# Project Tracker Status Priority Severity Subject Author Assignee Triaged Tags
6745 Container Support Issue POST Normal 2. Medium image_build 'artifacts' are not found during build time dkliban@redhat.com Yes Actions
9500 Container Support Story POST Normal Enable cache in pulp container handler ipanova@redhat.com lmjachky Actions
7733 Container Support Story POST Normal As a user I can use the image_builder in S3 deployments mdellweg mdellweg Actions
9507 Container Support Story POST Normal As a user I can sync container image with its original signature ipanova@redhat.com ttereshc Actions
7266 Debian Support Issue POST Normal 2. Medium Add tests to ensure all control file fields present in an upstream package index will be present in pulp_deb quba42 No Actions
8775 Debian Support Issue POST Normal 2. Medium Add support "Source" indices and source level packages (*.orig.tar.gz, *.debian.tar.xz, *.dsc) markawr No Actions
8684 Debian Support Issue POST Normal 2. Medium Add support for automatic publishing and distributing quba42 quba42 No Actions
6659 File Support Task POST Normal Add script for generating docs for python client fao89 fao89 Actions
7004 Pulp Task POST Normal Pulp-fixtures nginx config file ppicka Actions
7313 Pulp Task POST Normal The installer should be tested as a collection mdellweg CI/CD Actions
9575 Pulp Task POST Normal Move queryset filtering for Tasks to Task.objects bmbouter bmbouter Actions
7229 Pulp Task POST Normal publish plugin documentation at docs.pulpproject.org dkliban@redhat.com duck Actions
6369 Pulp Task POST Normal Allow bindings generation for views/viewsets without models/querysets fao89 fao89 API Bindings Actions
6660 Pulp Task POST Normal Add script for generating docs for python clients fao89 fao89 Actions
8130 Pulp Issue POST Normal 2. Medium Installer is doubling http on apache snippets fao89 fao89 Yes Actions
8209 Pulp Issue POST Normal 2. Medium openapi schema is not showing repository_version as an available query paramter on the content_api ipanova@redhat.com fao89 Yes Actions
8830 Pulp Issue POST Normal 2. Medium Memory leak in openapi.json schema generation. osapryki fao89 Yes Actions
9498 Pulp Task POST Normal Rework RBAC content guard to work with roles mdellweg gerrod Actions
8554 Pulp Story POST Normal Provide easy task cleanup api jsherril@redhat.com ggainey Katello Actions
9595 Pulp Issue POST Normal 2. Medium HEAD requests on the artefacts from S3 storage recieve 403 ipanova@redhat.com ipanova@redhat.com Yes Actions
8806 Pulp Task POST Normal Allow plugin writers to cache the responses of their APIs gerrod lmjachky Performance Actions
9590 Pulp Issue POST Normal 2. Medium Pulp CI badges are no longer valid lmjachky lmjachky Yes Actions
6953 Pulp Task POST Normal Build container that has pulpcore, pulp_python, and repositories with all Python deps dkliban@redhat.com mdellweg Actions
9588 Pulp Issue POST Normal 2. Medium RBAC: Groups cannot use creation_hooks mdellweg mdellweg Yes Actions
9475 Pulp Issue POST Normal 2. Medium By default Pulp requires Redis bmbouter ppicka Yes Actions
7822 Pulp Story POST Normal As a user, I can remove a Pulp plugin jsherril@redhat.com ttereshc Katello Actions
9566 RPM Support Issue POST Normal 2. Medium Create better primary keys for subtrees holger.hees No Actions
9206 RPM Support Issue POST Normal 2. Medium Repodata signing is broken if sqlite is enabled rmcgover dalley Yes Pulp 2 Actions
9231 RPM Support Issue POST Normal 2. Medium The interaction of skip_types and mirror=True is unintuitive dalley dalley Yes Actions
9309 RPM Support Refactor POST High Add support for new memory-efficient createrepo_c parsing method dalley dalley Actions
9509 Container Support Story ASSIGNED Normal As a user I can sign container image by providing signing policy config ipanova@redhat.com ipanova@redhat.com Actions
8271 Container Support Story ASSIGNED Normal RBAC will be enforced for the registry if TOKEN_AUTH is disabled mdellweg mdellweg Actions
8678 Maven Plugin Issue ASSIGNED Normal 2. Medium Provide 'view_name' warning when using the all in one container gerrod mdellweg Yes Actions
6797 Pulp Story ASSIGNED Normal [epic] As a user, I can consume all the plugin prereq roles in the installer. mdepaulo@redhat.com Actions
9205 Pulp Issue ASSIGNED Normal 2. Medium yum_distributor publish succeeds even when signing fails rmcgover dalley Yes Pulp 2 Actions
9393 Pulp Issue ASSIGNED High 2. Medium modify API with both add_content_units and remove_content_units isn't always correct iballou dalley Yes Katello Actions
9396 Pulp Issue ASSIGNED High 2. Medium Duplicate key error during pulpcore.app.tasks.repository.add_and_remove iballou dalley Yes Katello Actions
5807 Pulp Task ASSIGNED Normal Re-consolidate the docs with each other and the plugin template dalley dkliban@redhat.com Documentation Actions
8939 Pulp Story ASSIGNED Normal Add token authentication to pulpcore gerrod gerrod GalaxyNG Actions
4831 Pulp Story ASSIGNED Normal As a user, I have docs on how to delete content daviddavis ggainey Documentation Actions
8146 Pulp Task ASSIGNED Normal Remove tech preview from import/export bmbouter ggainey Actions
9419 Pulp Story ASSIGNED Normal As a plugin writer, I want to have a function for touching content units lmjachky lmjachky Actions
9361 Pulp Issue ASSIGNED Normal 2. Medium Missing release notes - pulpcore wibbit mdellweg Yes Documentation Actions
5762 Pulp Story ASSIGNED Normal [Epic] CI Improvements mdepaulo@redhat.com mdepaulo@redhat.com CI/CD Actions
6306 Pulp Task ASSIGNED Low Request EPEL8 versions of packages in the pulp-devel role mdepaulo@redhat.com mdepaulo@redhat.com Actions
6696 Pulp Issue ASSIGNED Normal 2. Medium pulp_installer fails to run "Collect static content" task when pulp_source_dir is set ironfroggy mdepaulo@redhat.com Yes Documentation Actions
7043 Pulp Story ASSIGNED Normal As a user, I have pulp_installer compile and install the pulpcore-selinux policy dkliban@redhat.com mdepaulo@redhat.com SELinux Actions
7136 Pulp Issue ASSIGNED Normal 2. Medium Requirement conflict when running RUNNING HANDLER [pulp.pulp_installer.pulp_common : Collect static content zen42@linux.com mdepaulo@redhat.com Yes Actions
7443 Pulp Issue ASSIGNED High 2. Medium pulp installer does not set ownership and permissions correctly because it cannot find apache user ipanova@redhat.com mdepaulo@redhat.com Yes Actions
7892 Pulp Issue ASSIGNED Normal 2. Medium the task "Ensure pulp is part of group redis" doesn't need to create its home directory tsugimur@redhat.com mdepaulo@redhat.com No Actions
9447 Pulp Task ASSIGNED Normal Write KCS for ACS ppicka ppicka Actions
6605 RPM Support Test ASSIGNED Low Re-enable test_sync_advisory_no_updated_date ppicka dalley Actions
9399 RPM Support Issue ASSIGNED High 3. High sync error: invalid memory alloc request size keilr dalley Yes Actions
9406 RPM Support Issue ASSIGNED High 3. High Trivial OOM on sync for a particular Microsoft repo dalley dalley Yes Actions
8741 RPM Support Story ASSIGNED Normal Full support for "static_context" in modulemd documents dalley ggainey Actions
9149 RPM Support Task ASSIGNED Normal As a Pulp user, I want an end-to-end tutorial with all the steps to get an RPM into Pulp mcorr ggainey Documentation Actions
4666 CertGuard Story NEW Normal As a user I have path checking features for to the X.509 certguard bmbouter Actions
6423 CertGuard Task NEW Normal Add a test so that an expired client X509 Certificate should be denied bmbouter Actions
6444 CertGuard Task NEW Normal Replace X509 artifact generation with `trustme` implementation bmbouter Actions
6810 CertGuard Task NEW Normal Add a test to ensure FileRemote with client_cert and client_key configured can sync from a protected repository bmbouter Actions
6830 CertGuard Task NEW High Update yum/dnf documentation on how .repo files can be configured to present a client cert and key bmbouter Documentation Actions
7484 CertGuard Task NEW Normal Replace PyOpenSSL use with `cryptography` library from pypa bmbouter Actions
8785 CertGuard Issue NEW Normal 2. Medium CONTRIBUTING docs are out of date for how to test pulp_certguard ehelms@redhat.com No Actions
9081 CertGuard Issue NEW Normal 2. Medium Repoint docs-links to pulporoject.org instead of readthedocs ggainey No Documentation Actions
9140 CertGuard Issue NEW Normal 2. Medium RHSM certguard failure messages are lost in log-level debug ttereshc No Katello Actions
4190 Container Support Issue NEW Normal 2. Medium Tag names starting with `sha256:` could cause collisions amacdona@redhat.com Yes Actions
4202 Container Support Story NEW Normal As a Docker user, I have containers bmbouter Actions
4299 Container Support Test NEW Normal Remove duplicate tags from repository during sync bherring Actions
4310 Container Support Story NEW Normal As a user I can view the Manifest data for each Manifest on a ManifestList amacdona@redhat.com Actions
4311 Container Support Story NEW Normal As a user, I can view layer (Blob) details on the Manifest amacdona@redhat.com Actions
4400 Container Support Story NEW Low As a user, I can download Foreign layers amacdona@redhat.com Actions
4461 Container Support Test NEW Low As a user i can configure download of the foreign layers bherring Actions
4531 Container Support Test NEW Normal Fetch registry content using API calls kersom Actions
4533 Container Support Test NEW Normal Test Pull Container Image by Digest rochacbruno Actions
4598 Container Support Test NEW Normal specify --tls=verify=false if pulling an image with podman ipanova@redhat.com Actions
4657 Container Support Story NEW Normal As a user i can use skopeo pulp transport to upload images to Pulp container registry ipanova@redhat.com Actions
4703 Container Support Test NEW Normal Add a test for syncing from quay, gcr and redhat registries ipanova@redhat.com Actions
4752 Container Support Test NEW Normal Test sync in case when registry does not provide scope in the response headers kersom Actions
4753 Container Support Test NEW Normal As a user i can manage a docker image that has manifest in old format (v2 Schema1) kersom Actions
4822 Container Support Test NEW Normal As a user i can sync from registrues that have auth ipanova@redhat.com Actions
4935 Container Support Task NEW Normal As a user, I can validate blobs and manifests checksum during sync ipanova@redhat.com Actions
5102 Container Support Issue NEW Normal 2. Medium Ruby bindings for Docker manifest list returns object with ambiguous name iballou Yes Actions
5232 Container Support Story NEW Normal As a user I can remove docker content units with a force flag ipanova@redhat.com Actions
5259 Container Support Task NEW Normal Add test_bindings.py and test_bindings.rb scripts amacdona@redhat.com Actions
5260 Container Support Test NEW High Test - As a user, I can filter Manifests and ManifestTags by multiple media types kersom Actions
5266 Container Support Test NEW Normal Test - Docker remote whitelist_tags can't be empty string kersom Actions
5267 Container Support Test NEW High Test - As a user I can filter Manifests and ManifestTags by media type kersom Actions
5275 Container Support Test NEW Normal Test - As a user, I can sync from registries that use basic auth kersom Actions
5277 Container Support Test NEW Normal Test - As a user I can sync a registry by whitelisting tag( Filtered sync) kersom Actions
5322 Container Support Story NEW Normal As a user I have retuned a list of references that prevent recursive removal ipanova@redhat.com Actions
5362 Container Support Test NEW Normal Performace testing: sync ipanova@redhat.com Actions
5364 Container Support Task NEW Normal add ability to specify registry when generating fixtures dkliban@redhat.com Actions
5545 Container Support Story NEW Normal Feature request: whitelist upstreams joeydumont Actions
5736 Container Support Issue NEW Normal 1. Low An exception is raised when trying to sync content lmjachky Yes Actions
5823 Container Support Task NEW Normal Ensure recursive add and remove is not impacted by values_list() ipanova@redhat.com Actions
6634 Container Support Story NEW Normal [EPIC] As a user I can export and import container content in the air-gapped environment ipanova@redhat.com Actions
6788 Container Support Story NEW Normal As an admin i can configure whether foreign layers can be pushed to the registry ipanova@redhat.com Actions
6871 Container Support Story NEW Normal [Epic] Add security scanner integration bmbouter Actions
6946 Container Support Story NEW Normal As a user I can manage helm charts via Container Registry ipanova@redhat.com Actions
7056 Container Support Story NEW Normal [EPIC] As a user i can manage delta updates ipanova@redhat.com Actions
(1-100/624) Per page: 25, 50, 100

Also available in: Atom CSV PDF

Please register to add an issue