Hi,

I want to set some values in sshd_config. Example:

KexAlgorithms
[email protected],diffie-hellman-group-exchange-sha256

keys($sshdCfg).each |String $comment| {
  augeas { "$file: $comment":
    context => $sshdCfg[$comment]['context'],
    changes => [ $sshdCfg[$comment]['changes'] ],
    notify  => Service["${sshdService}"],
  }
}

'sshd_config Security Settings':
  context:                       '/files/etc/ssh/sshd_config'
  changes:
    - 'set KexAlgorithms
[email protected],diffie-hellman-group-exchange-sha256'

This does not work, error below. I can work around that with

'sshd_config Security Settings':
  context:                       '/files/etc/ssh/sshd_config'
  changes:
    - 'set KexAlgorithms/1 [email protected]'
    - 'set KexAlgorithms/2 diffie-hellman-group-exchange-sha256'

but this does not remove existing values 3, 4, 5, ... How can I solve
that?

Thank you!

Debug: /Stage[main]/My_sshd/Notify[sshd_config PrintMotd]: The
container Class[My_sshd] will propagate my refresh event
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Opening augeas
with root /, lens path , flags 32
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Augeas version
1.12.0 is installed
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Will attempt
to save and only run if files changed
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): sending
command 'set' with params ["/files/etc/ssh/sshd_config/PrintMotd",
"yes"]
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Skipping
because no files were changed
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Closed the
augeas connection
Notice: {"context"=>"/files/etc/ssh/sshd_config", "changes"=>["set
KexAlgorithms
[email protected],[email protected]"]}
Notice: /Stage[main]/My_sshd/Notify[sshd_config Security
Settings]/message: defined 'message' as {
  'context' => '/files/etc/ssh/sshd_config',
  'changes' => ['set KexAlgorithms
[email protected],[email protected]']
}
Debug: /Stage[main]/My_sshd/Notify[sshd_config Security Settings]: The
container Class[My_sshd] will propagate my refresh event
Debug: Augeas[: sshd_config Security Settings](provider=augeas):
Opening augeas with root /, lens path , flags 32
Debug: Augeas[: sshd_config Security Settings](provider=augeas): Augeas
version 1.12.0 is installed
Debug: Augeas[: sshd_config Security Settings](provider=augeas): Will
attempt to save and only run if files changed
Debug: Augeas[: sshd_config Security Settings](provider=augeas):
sending command 'set' with params
["/files/etc/ssh/sshd_config/KexAlgorithms",
"[email protected],[email protected]"]
Debug: Augeas[: sshd_config Security Settings](provider=augeas): Put
failed on one or more files, output from /augeas//error:
Debug: Augeas[: sshd_config Security Settings](provider=augeas):
/augeas/files/etc/ssh/sshd_config/error = put_failed
Debug: Augeas[: sshd_config Security Settings](provider=augeas):
/augeas/files/etc/ssh/sshd_config/error/path =
/files/etc/ssh/sshd_config/
Debug: Augeas[: sshd_config Security Settings](provider=augeas):
/augeas/files/etc/ssh/sshd_config/error/lens =
/usr/local/share/augeas/lenses/dist/sshd.aug:142.12-.47:

     { "#comment" = "$FreeBSD: releng/11.2/crypto/openssh/sshd_config
323136 2017-09-02 23:39:51Z des $" }
     {  }
     { "#comment" = "This is the sshd server system-wide configuration
file.  See" }
     { "#comment" = "sshd_config(5) for more information." }
     {  }
     { "#comment" = "This sshd was compiled with
PATH=/usr/bin:/bin:/usr/sbin:/sbin" }
     {  }
     { "#comment" = "The strategy used for options in the default
sshd_config shipped with" }
     { "#comment" = "OpenSSH is to specify options with their default
value where" }
     { "#comment" = "possible, but leave them commented.  Uncommented
options override the" }
     { "#comment" = "default value." }
     {  }
     { "#comment" = "Note that some of FreeBSD's defaults differ from
OpenBSD's, and" }
     { "#comment" = "FreeBSD has a few additional options." }
     {  }
     { "#comment" = "Port 22" }
     { "#comment" = "AddressFamily any" }
     { "#comment" = "ListenAddress 0.0.0.0" }
     { "#comment" = "ListenAddress ::" }
     {  }
     { "#comment" = "HostKey /etc/ssh/ssh_host_rsa_key" }
     { "#comment" = "HostKey /etc/ssh/ssh_host_dsa_key" }
     { "#comment" = "HostKey /etc/ssh/ssh_host_ecdsa_key" }
     { "#comment" = "HostKey /etc/ssh/ssh_host_ed25519_key" }
     {  }
     { "#comment" = "Ciphers and keying" }
     { "#comment" = "RekeyLimit default none" }
     {  }
     { "#comment" = "Logging" }
     { "#comment" = "SyslogFacility AUTH" }
     { "#comment" = "LogLevel INFO" }
     {  }
     { "#comment" = "Authentication:" }
     {  }
     { "#comment" = "LoginGraceTime 2m" }
     { "#comment" = "PermitRootLogin no" }
     { "#comment" = "StrictModes yes" }
     { "#comment" = "MaxAuthTries 6"
     { "#comment" = "PubkeyAuthentication yes" }
     {  }
     { "#comment" = "The default is to check both .ssh/authorized_keys
and .ssh/authorized_keys2" }
     { "#comment" = "but this is overridden so installations will only
check .ssh/authorized_keys" }
     { "AuthorizedKeysFile" = ".ssh/authorized_keys" }
     {  }
     { "#comment" = "AuthorizedPrincipalsFile none" }
     {  }
     { "#comment" = "AuthorizedKeysCommand none" }
     { "#comment" = "AuthorizedKeysCommandUser nobody" }
     {  }
     { "#comment" = "For this to work you will also need host keys in
/etc/ssh/ssh_known_hosts" }
     { "#comment" = "HostbasedAuthentication no" }
     { "#comment" = "Change to yes if you don't trust
~/.ssh/known_hosts for" }
     { "#comment" = "HostbasedAuthentication" }
     { "#comment" = "IgnoreUserKnownHosts no" }
     { "#comment" = "Don't read the user's ~/.rhosts and ~/.shosts
files" }
     { "#comment" = "IgnoreRhosts yes" }
     {  }
     { "#comment" = "Change to yes to enable built-in password
authentication." }
     { "#comment" = "PasswordAuthentication no" }
     { "#comment" = "PermitEmptyPasswords no" }
     {  }
     { "#comment" = "Change to no to disable PAM authentication" }
     { "#comment" = "ChallengeResponseAuthentication yes" }
     {  }
     { "#comment" = "Kerberos options" }
     { "#comment" = "KerberosAuthentication no" }
     { "#comment" = "KerberosOrLocalPasswd yes" }
     { "#comment" = "KerberosTicketCleanup yes" }
     { "#comment" = "KerberosGetAFSToken no" }
     {  }
     { "#comment" = "GSSAPI options" }
     { "#comment" = "GSSAPIAuthentication no" }
     { "#comment" = "GSSAPICleanupCredentials yes" }
     {  }
     { "#comment" = "Set this to 'no' to disable PAM authentication,
account processing," }
     { "#comment" = "and session processing. If this is enabled, PAM
authentication will" }
     { "#comment" = "be
     { "#comment" = "the setting of "PermitRootLogin
without-password"." }
     { "#comment" = "If you just want the PAM account and session
checks to run without" }
     { "#comment" = "PAM authentication, then enable this but set
PasswordAuthentication" }
     { "#comment" = "and ChallengeResponseAuthentication to 'no'." }
     { "#comment" = "UsePAM yes" }
     {  }
     { "#comment" = "AllowAgentForwarding yes" }
     { "#comment" = "AllowTcpForwarding yes" }
     { "#comment" = "GatewayPorts no" }
     { "#comment" = "X11Forwarding yes" }
     { "#comment" = "X11DisplayOffset 10" }
     { "#comment" = "X11UseLocalhost yes" }
     { "#comment" = "PermitTTY yes" }
     { "#comment" = "PrintMotd yes" }
     { "#comment" = "PrintLastLog yes" }
     { "#comment" = "TCPKeepAlive yes" }
     { "#comment" = "PermitUserEnvironment no" }
     { "#comment" = "Compression delayed" }
     { "#comment" = "ClientAliveInterval 0" }
     { "#comment" = "ClientAliveCountMax 3" }
     { "#comment" = "UseDNS yes" }
     { "#comment" = "PidFile /var/run/sshd.pid" }
     { "#comment" = "MaxStartups 10:30:100" }
     { "#comment" = "PermitTunnel no" }
     { "#comment" = "ChrootDirectory none" }
     { "#comment" = "UseBlacklist no" }
     { "#comment" = "VersionAddendum FreeBSD-20170903" }
     {  }
     { "#comment" = "no default banner path" }
     { "#comment" = "Banner none" }
     {  }
     { "#comment" = "override default of no subsystems" }
     { "Subsystem" }
     {  }
     { "#comment" = "Example of overriding settings on a per-user
basis" }
     { "#comment" = "Match User anoncvs" }
     { "#comment" = "X11Forwarding no" }
     { "#comment" = "AllowTcpForwarding no" }
     { "#comment"
     { "#comment" = "ForceCommand cvs server" }
     {  }
     { "KexAlgorithms" =
"[email protected],[email protected]" }
     { "Ciphers" }
     { "MACs" }
     {  }
     { "ChallengeResponseAuthentication" = "no" }
     { "ClientAliveInterval" = "30" }
     { "ClientAliveCountMax" = "2" }
     { "PasswordAuthentication" = "no" }
     { "PermitRootLogin" = "prohibit-password" }
     { "PrintMotd" = "yes" }
     {  }
     { "#comment" = "Match address
10.0.0.0/8,172.16.0.0/12,192.168.0.0/24,2001:6f8:1013:1::/64" }
     { "Match" }
     { "Match" }

  with pattern
   (    { /AcceptEnv/ }
      | { /AllowGroups/ }
      | { /AllowUsers/ }
      | { /DenyGroups/ }
      | { /Subsystem/ }
      | { /DenyUsers/ }
      | { /MACs/ }
      | { /Ciphers/ }
      | { /KexAlgorithms/ }
      | { /HostKeyAlgorithms/ }
      | {
/[Aa][Cc][Cc][Ee][Pp][Tt][Ee][Nn](([Vv][0-9A-Za-z]|[0-9A-UW-Za-uw-z])[0-
9A-Za-z]*|)|[Aa][Cc][Cc][Ee][Pp][Tt][Ee]([0-9A-MO-Za-mo-z][0-9A-Za-z]*|)
|[Aa][Cc][Cc][Ee][Pp][Tt]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Aa][Cc][Cc][E
e][Pp]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Aa][Cc][Cc][Ee]([0-9A-OQ-Za-oq-z
][0-9A-Za-z]*|)|[Aa][Cc][Cc]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Aa][Ll][Ll
][Oo][Ww]([Gg][Rr][Oo][Uu][Pp](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-
Za-z]*|)|[Gg][Rr][Oo][Uu]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Gg][Rr][Oo]([
0-9A-TV-Za-tv-z][0-9A-Za-z]*|)|[Gg][Rr]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|
[Uu][Ss][Ee][Rr](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Uu][
Ss][Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Uu][Ss]([0-9A-DF-Za-df-z][0-9A-
Za-z]*|)|[Uu]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Gg]([0-9A-QS-Za-qs-z][0-9
A-Za-z]*|)|[0-9A-FH-TV-Za-fh-tv-z][0-9A-Za-z]*|)|[Aa][Ll][Ll][Oo]([0-9A-
VX-Za-vx-z][0-9A-Za-z]*|)|[Aa][Ll][Ll]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[
Aa][Ll]([0-9A-KM-Za-km-z][0-9A-Za-z]*|)|[Aa][Cc]([0-9ABD-Zabd-z][0-9A-Za
-z]*|)|[Cc][Ii][Pp][Hh][Ee][Rr](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A
-Za-z]*|)|[Cc][Ii][Pp][Hh][Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Cc][Ii][
Pp][Hh]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Cc][Ii][Pp]([0-9A-GI-Za-gi-z][0
-9A-Za-z]*|)|[Cc][Ii]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][G
g][Rr][Oo][Uu][Pp](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Dd
][Ee][Nn][Yy][Gg][Rr][Oo][Uu]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Dd][Ee][N
n][Yy][Gg][Rr][Oo]([0-9A-TV-Za-tv-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Gg][
Rr]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss][Ee][Rr](([S
s][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss][
Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss]([0-9A-DF-Za
-df-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|
)|[Dd][Ee][Nn][Yy][Gg]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy](
[0-9A-FH-TV-Za-fh-tv-z][0-9A-Za-z]*|)|[Dd][Ee][Nn]([0-9A-XZa-xz][0-9A-Za
-z]*|)|[Dd][Ee]([0-9A-MO-Za-mo-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt][Kk][Ee]
[Yy]([Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh][Mm](([Ss][0-9A-Za-z]|[0-9A-RT-Za-r
t-z])[0-9A-Za-z]*|)|[Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh]([0-9A-LN-Za-ln-z][0
-9A-Za-z]*|)|[Aa][Ll][Gg][Oo][Rr][Ii][Tt]([0-9A-GI-Za-gi-z][0-9A-Za-z]*|
)|[Aa][Ll][Gg][Oo][Rr][Ii]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Aa][Ll][Gg][
Oo][Rr]([0-9A-HJ-Za-hj-z][0-9A-Za-z]*|)|[Aa][Ll][Gg][Oo]([0-9A-QS-Za-qs-
z][0-9A-Za-z]*|)|[Aa][Ll][Gg]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Aa][Ll]([
0-9A-FH-Za-fh-z][0-9A-Za-z]*|)|[Aa]([0-9A-KM-Za-km-z][0-9A-Za-z]*|)|[0-9
B-Zb-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt][Kk][Ee]([0-9A-XZa-xz][0-9A-Za-z]*
|)|[Hh][Oo][Ss][Tt][Kk]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt]
([0-9A-JL-Za-jl-z][0-9A-Za-z]*|)|[Hh][Oo][Ss]([0-9A-SU-Za-su-z][0-9A-Za-
z]*|)|[Hh][Oo]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][
Oo][Rr][Ii][Tt][Hh][Mm](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|
)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh]([0-9A-LN-Za-ln-z][0-9A-Za
-z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii][Tt]([0-9A-GI-Za-gi-z][0-9A-Z
a-z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii]([0-9A-SU-Za-su-z][0-9A-Za-z
]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr]([0-9A-HJ-Za-hj-z][0-9A-Za-z]*|)|[K
k][Ee][Xx][Aa][Ll][Gg][Oo]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][
Aa][Ll][Gg]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa][Ll]([0-9A-F
H-Za-fh-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa]([0-9A-KM-Za-km-z][0-9A-Za-z]*|
)|[Kk][Ee][Xx]([0-9B-Zb-z][0-9A-Za-z]*|)|[Kk][Ee]([0-9A-WYZa-wyz][0-9A-Z
a-z]*|)|[Mm][Aa][Tt][Cc](([Hh][0-9A-Za-z]|[0-9A-GI-Za-gi-z])[0-9A-Za-z]*
|)|[Mm][Aa][Tt]([0-9ABD-Zabd-z][0-9A-Za-z]*|)|[Mm][Aa][Cc](([Ss][0-9A-Za
-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Mm][Aa]([0-9ABD-SU-Zabd-su-z][0-9A
-Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss][Tt][Ee](([Mm][0-9A-Za-z]|[0-9A-LN-Za-
ln-z])[0-9A-Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss][Tt]([0-9A-DF-Za-df-z][0-9A
-Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Ss][
Uu][Bb][Ss][Yy]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Ss][Uu][Bb][Ss]([0-9A-X
Za-xz][0-9A-Za-z]*|)|[Ss][Uu][Bb]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Ss][U
u]([0-9AC-Zac-z][0-9A-Za-z]*|)|([Ss][0-9A-TV-Za-tv-z]|[Mm][0-9B-Zb-z]|[K
k][0-9A-DF-Za-df-z]|[Hh][0-9A-NP-Za-np-z]|[Dd][0-9A-DF-Za-df-z]|[Cc][0-9
A-HJ-Za-hj-z]|[Aa][0-9ABD-KM-Zabd-km-z]|[0-9BE-GIJLN-RT-Zbe-gijln-rt-z][
0-9A-Za-z])[0-9A-Za-z]*|[Ss]|[Mm]|[Kk]|[Hh]|[Dd]|[Cc]|[Aa]|[0-9BE-GIJLN-
RT-Zbe-gijln-rt-z]/ = /[^\t\n =]+([\t =]+[^\t\n =]+)*/ }
      | { /#comment/ = /[^\t\n\r ].*[^\t\n\r ]|[^\t\n\r ]/ }
      | { })*
    { /Match/ }*

Debug: Augeas[: sshd_config Security Settings](provider=augeas): Closed
the augeas connection
Error: /Stage[main]/My_sshd/Augeas[: sshd_config Security Settings]:
Could not evaluate: Saving failed, see debug
/usr/local/lib/ruby/site_ruby/2.5/puppet/util/errors.rb:157:in `fail'
/usr/local/lib/ruby/site_ruby/2.5/puppet/provider/augeas/augeas.rb:444:i
n `need_to_run?'
/usr/local/lib/ruby/site_ruby/2.5/puppet/type/augeas.rb:198:in
`retrieve'
/usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1080:in `block in
retrieve'
/usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1075:in `each'
/usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1075:in `retrieve'
/usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1098:in
`retrieve_resource'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/resource_harness.rb
:305:in `from_resource'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/resource_harness.rb
:20:in `evaluate'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:259:in `apply'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:279:in
`eval_resource'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `call'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `block
(2 levels) in evaluate'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in
thinmark'
/usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `block
in evaluate'
/usr/local/lib/ruby/site_ruby/2.5/puppet/graph/relationship_graph.rb:121
:in `traverse'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:173:in
`evaluate'
/usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:239:in
`block (2 levels) in apply'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in
thinmark'
/usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark'
/usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:238:in
`block in apply'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util/log.rb:161:in
`with_destination'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/report.rb:146:in
`as_logging_destination'
/usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:237:in
`apply'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:186:in `block (2
levels) in apply_catalog'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in
thinmark'
/usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:185:in `block in
apply_catalog'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:232:in `block in
benchmark'
/usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:231:in `benchmark'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:184:in
`apply_catalog'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:366:in
`run_internal'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:234:in `block in
run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/context.rb:65:in `override'
/usr/local/lib/ruby/site_ruby/2.5/puppet.rb:260:in `override'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:211:in `run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:59:in `block (5
levels) in run'
/usr/local/lib/ruby/2.5/timeout.rb:76:in `timeout'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:58:in `block (4
levels) in run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent/locker.rb:21:in `lock'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:52:in `block (3
levels) in run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:130:in `with_client'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:49:in `block (2
levels) in run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:87:in `run_in_fork'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:48:in `block in run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:179:in
`controlled_run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:46:in `run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/application/agent.rb:372:in
`onetime'
/usr/local/lib/ruby/site_ruby/2.5/puppet/application/agent.rb:350:in
`run_command'
/usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:375:in `block
in run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:667:in `exit_on_fail'
/usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:375:in `run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util/command_line.rb:139:in
`run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util/command_line.rb:77:in
`execute'
/usr/local/bin/puppet:5:in `<main>'
Notice: /Stage[main]/My_sshd/Service[sshd]: Dependency Augeas[:
sshd_config Security Settings] has failures: true
Warning: /Stage[main]/My_sshd/Service[sshd]: Skipping because of failed
dependencies

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/puppet-users/xn0lzb6638rbt6f000%40news.gmane.org.

Reply via email to