Hi, I want to set some values in sshd_config. Example:
KexAlgorithms [email protected],diffie-hellman-group-exchange-sha256 keys($sshdCfg).each |String $comment| { augeas { "$file: $comment": context => $sshdCfg[$comment]['context'], changes => [ $sshdCfg[$comment]['changes'] ], notify => Service["${sshdService}"], } } 'sshd_config Security Settings': context: '/files/etc/ssh/sshd_config' changes: - 'set KexAlgorithms [email protected],diffie-hellman-group-exchange-sha256' This does not work, error below. I can work around that with 'sshd_config Security Settings': context: '/files/etc/ssh/sshd_config' changes: - 'set KexAlgorithms/1 [email protected]' - 'set KexAlgorithms/2 diffie-hellman-group-exchange-sha256' but this does not remove existing values 3, 4, 5, ... How can I solve that? Thank you! Debug: /Stage[main]/My_sshd/Notify[sshd_config PrintMotd]: The container Class[My_sshd] will propagate my refresh event Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Opening augeas with root /, lens path , flags 32 Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Augeas version 1.12.0 is installed Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Will attempt to save and only run if files changed Debug: Augeas[: sshd_config PrintMotd](provider=augeas): sending command 'set' with params ["/files/etc/ssh/sshd_config/PrintMotd", "yes"] Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Skipping because no files were changed Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Closed the augeas connection Notice: {"context"=>"/files/etc/ssh/sshd_config", "changes"=>["set KexAlgorithms [email protected],[email protected]"]} Notice: /Stage[main]/My_sshd/Notify[sshd_config Security Settings]/message: defined 'message' as { 'context' => '/files/etc/ssh/sshd_config', 'changes' => ['set KexAlgorithms [email protected],[email protected]'] } Debug: /Stage[main]/My_sshd/Notify[sshd_config Security Settings]: The container Class[My_sshd] will propagate my refresh event Debug: Augeas[: sshd_config Security Settings](provider=augeas): Opening augeas with root /, lens path , flags 32 Debug: Augeas[: sshd_config Security Settings](provider=augeas): Augeas version 1.12.0 is installed Debug: Augeas[: sshd_config Security Settings](provider=augeas): Will attempt to save and only run if files changed Debug: Augeas[: sshd_config Security Settings](provider=augeas): sending command 'set' with params ["/files/etc/ssh/sshd_config/KexAlgorithms", "[email protected],[email protected]"] Debug: Augeas[: sshd_config Security Settings](provider=augeas): Put failed on one or more files, output from /augeas//error: Debug: Augeas[: sshd_config Security Settings](provider=augeas): /augeas/files/etc/ssh/sshd_config/error = put_failed Debug: Augeas[: sshd_config Security Settings](provider=augeas): /augeas/files/etc/ssh/sshd_config/error/path = /files/etc/ssh/sshd_config/ Debug: Augeas[: sshd_config Security Settings](provider=augeas): /augeas/files/etc/ssh/sshd_config/error/lens = /usr/local/share/augeas/lenses/dist/sshd.aug:142.12-.47: { "#comment" = "$FreeBSD: releng/11.2/crypto/openssh/sshd_config 323136 2017-09-02 23:39:51Z des $" } { } { "#comment" = "This is the sshd server system-wide configuration file. See" } { "#comment" = "sshd_config(5) for more information." } { } { "#comment" = "This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin" } { } { "#comment" = "The strategy used for options in the default sshd_config shipped with" } { "#comment" = "OpenSSH is to specify options with their default value where" } { "#comment" = "possible, but leave them commented. Uncommented options override the" } { "#comment" = "default value." } { } { "#comment" = "Note that some of FreeBSD's defaults differ from OpenBSD's, and" } { "#comment" = "FreeBSD has a few additional options." } { } { "#comment" = "Port 22" } { "#comment" = "AddressFamily any" } { "#comment" = "ListenAddress 0.0.0.0" } { "#comment" = "ListenAddress ::" } { } { "#comment" = "HostKey /etc/ssh/ssh_host_rsa_key" } { "#comment" = "HostKey /etc/ssh/ssh_host_dsa_key" } { "#comment" = "HostKey /etc/ssh/ssh_host_ecdsa_key" } { "#comment" = "HostKey /etc/ssh/ssh_host_ed25519_key" } { } { "#comment" = "Ciphers and keying" } { "#comment" = "RekeyLimit default none" } { } { "#comment" = "Logging" } { "#comment" = "SyslogFacility AUTH" } { "#comment" = "LogLevel INFO" } { } { "#comment" = "Authentication:" } { } { "#comment" = "LoginGraceTime 2m" } { "#comment" = "PermitRootLogin no" } { "#comment" = "StrictModes yes" } { "#comment" = "MaxAuthTries 6" { "#comment" = "PubkeyAuthentication yes" } { } { "#comment" = "The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2" } { "#comment" = "but this is overridden so installations will only check .ssh/authorized_keys" } { "AuthorizedKeysFile" = ".ssh/authorized_keys" } { } { "#comment" = "AuthorizedPrincipalsFile none" } { } { "#comment" = "AuthorizedKeysCommand none" } { "#comment" = "AuthorizedKeysCommandUser nobody" } { } { "#comment" = "For this to work you will also need host keys in /etc/ssh/ssh_known_hosts" } { "#comment" = "HostbasedAuthentication no" } { "#comment" = "Change to yes if you don't trust ~/.ssh/known_hosts for" } { "#comment" = "HostbasedAuthentication" } { "#comment" = "IgnoreUserKnownHosts no" } { "#comment" = "Don't read the user's ~/.rhosts and ~/.shosts files" } { "#comment" = "IgnoreRhosts yes" } { } { "#comment" = "Change to yes to enable built-in password authentication." } { "#comment" = "PasswordAuthentication no" } { "#comment" = "PermitEmptyPasswords no" } { } { "#comment" = "Change to no to disable PAM authentication" } { "#comment" = "ChallengeResponseAuthentication yes" } { } { "#comment" = "Kerberos options" } { "#comment" = "KerberosAuthentication no" } { "#comment" = "KerberosOrLocalPasswd yes" } { "#comment" = "KerberosTicketCleanup yes" } { "#comment" = "KerberosGetAFSToken no" } { } { "#comment" = "GSSAPI options" } { "#comment" = "GSSAPIAuthentication no" } { "#comment" = "GSSAPICleanupCredentials yes" } { } { "#comment" = "Set this to 'no' to disable PAM authentication, account processing," } { "#comment" = "and session processing. If this is enabled, PAM authentication will" } { "#comment" = "be { "#comment" = "the setting of "PermitRootLogin without-password"." } { "#comment" = "If you just want the PAM account and session checks to run without" } { "#comment" = "PAM authentication, then enable this but set PasswordAuthentication" } { "#comment" = "and ChallengeResponseAuthentication to 'no'." } { "#comment" = "UsePAM yes" } { } { "#comment" = "AllowAgentForwarding yes" } { "#comment" = "AllowTcpForwarding yes" } { "#comment" = "GatewayPorts no" } { "#comment" = "X11Forwarding yes" } { "#comment" = "X11DisplayOffset 10" } { "#comment" = "X11UseLocalhost yes" } { "#comment" = "PermitTTY yes" } { "#comment" = "PrintMotd yes" } { "#comment" = "PrintLastLog yes" } { "#comment" = "TCPKeepAlive yes" } { "#comment" = "PermitUserEnvironment no" } { "#comment" = "Compression delayed" } { "#comment" = "ClientAliveInterval 0" } { "#comment" = "ClientAliveCountMax 3" } { "#comment" = "UseDNS yes" } { "#comment" = "PidFile /var/run/sshd.pid" } { "#comment" = "MaxStartups 10:30:100" } { "#comment" = "PermitTunnel no" } { "#comment" = "ChrootDirectory none" } { "#comment" = "UseBlacklist no" } { "#comment" = "VersionAddendum FreeBSD-20170903" } { } { "#comment" = "no default banner path" } { "#comment" = "Banner none" } { } { "#comment" = "override default of no subsystems" } { "Subsystem" } { } { "#comment" = "Example of overriding settings on a per-user basis" } { "#comment" = "Match User anoncvs" } { "#comment" = "X11Forwarding no" } { "#comment" = "AllowTcpForwarding no" } { "#comment" { "#comment" = "ForceCommand cvs server" } { } { "KexAlgorithms" = "[email protected],[email protected]" } { "Ciphers" } { "MACs" } { } { "ChallengeResponseAuthentication" = "no" } { "ClientAliveInterval" = "30" } { "ClientAliveCountMax" = "2" } { "PasswordAuthentication" = "no" } { "PermitRootLogin" = "prohibit-password" } { "PrintMotd" = "yes" } { } { "#comment" = "Match address 10.0.0.0/8,172.16.0.0/12,192.168.0.0/24,2001:6f8:1013:1::/64" } { "Match" } { "Match" } with pattern ( { /AcceptEnv/ } | { /AllowGroups/ } | { /AllowUsers/ } | { /DenyGroups/ } | { /Subsystem/ } | { /DenyUsers/ } | { /MACs/ } | { /Ciphers/ } | { /KexAlgorithms/ } | { /HostKeyAlgorithms/ } | { /[Aa][Cc][Cc][Ee][Pp][Tt][Ee][Nn](([Vv][0-9A-Za-z]|[0-9A-UW-Za-uw-z])[0- 9A-Za-z]*|)|[Aa][Cc][Cc][Ee][Pp][Tt][Ee]([0-9A-MO-Za-mo-z][0-9A-Za-z]*|) |[Aa][Cc][Cc][Ee][Pp][Tt]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Aa][Cc][Cc][E e][Pp]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Aa][Cc][Cc][Ee]([0-9A-OQ-Za-oq-z ][0-9A-Za-z]*|)|[Aa][Cc][Cc]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Aa][Ll][Ll ][Oo][Ww]([Gg][Rr][Oo][Uu][Pp](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A- Za-z]*|)|[Gg][Rr][Oo][Uu]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Gg][Rr][Oo]([ 0-9A-TV-Za-tv-z][0-9A-Za-z]*|)|[Gg][Rr]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)| [Uu][Ss][Ee][Rr](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Uu][ Ss][Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Uu][Ss]([0-9A-DF-Za-df-z][0-9A- Za-z]*|)|[Uu]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Gg]([0-9A-QS-Za-qs-z][0-9 A-Za-z]*|)|[0-9A-FH-TV-Za-fh-tv-z][0-9A-Za-z]*|)|[Aa][Ll][Ll][Oo]([0-9A- VX-Za-vx-z][0-9A-Za-z]*|)|[Aa][Ll][Ll]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[ Aa][Ll]([0-9A-KM-Za-km-z][0-9A-Za-z]*|)|[Aa][Cc]([0-9ABD-Zabd-z][0-9A-Za -z]*|)|[Cc][Ii][Pp][Hh][Ee][Rr](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A -Za-z]*|)|[Cc][Ii][Pp][Hh][Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Cc][Ii][ Pp][Hh]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Cc][Ii][Pp]([0-9A-GI-Za-gi-z][0 -9A-Za-z]*|)|[Cc][Ii]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][G g][Rr][Oo][Uu][Pp](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Dd ][Ee][Nn][Yy][Gg][Rr][Oo][Uu]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Dd][Ee][N n][Yy][Gg][Rr][Oo]([0-9A-TV-Za-tv-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Gg][ Rr]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss][Ee][Rr](([S s][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss][ Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss]([0-9A-DF-Za -df-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu]([0-9A-RT-Za-rt-z][0-9A-Za-z]*| )|[Dd][Ee][Nn][Yy][Gg]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy]( [0-9A-FH-TV-Za-fh-tv-z][0-9A-Za-z]*|)|[Dd][Ee][Nn]([0-9A-XZa-xz][0-9A-Za -z]*|)|[Dd][Ee]([0-9A-MO-Za-mo-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt][Kk][Ee] [Yy]([Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh][Mm](([Ss][0-9A-Za-z]|[0-9A-RT-Za-r t-z])[0-9A-Za-z]*|)|[Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh]([0-9A-LN-Za-ln-z][0 -9A-Za-z]*|)|[Aa][Ll][Gg][Oo][Rr][Ii][Tt]([0-9A-GI-Za-gi-z][0-9A-Za-z]*| )|[Aa][Ll][Gg][Oo][Rr][Ii]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Aa][Ll][Gg][ Oo][Rr]([0-9A-HJ-Za-hj-z][0-9A-Za-z]*|)|[Aa][Ll][Gg][Oo]([0-9A-QS-Za-qs- z][0-9A-Za-z]*|)|[Aa][Ll][Gg]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Aa][Ll]([ 0-9A-FH-Za-fh-z][0-9A-Za-z]*|)|[Aa]([0-9A-KM-Za-km-z][0-9A-Za-z]*|)|[0-9 B-Zb-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt][Kk][Ee]([0-9A-XZa-xz][0-9A-Za-z]* |)|[Hh][Oo][Ss][Tt][Kk]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt] ([0-9A-JL-Za-jl-z][0-9A-Za-z]*|)|[Hh][Oo][Ss]([0-9A-SU-Za-su-z][0-9A-Za- z]*|)|[Hh][Oo]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][ Oo][Rr][Ii][Tt][Hh][Mm](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*| )|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh]([0-9A-LN-Za-ln-z][0-9A-Za -z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii][Tt]([0-9A-GI-Za-gi-z][0-9A-Z a-z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii]([0-9A-SU-Za-su-z][0-9A-Za-z ]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr]([0-9A-HJ-Za-hj-z][0-9A-Za-z]*|)|[K k][Ee][Xx][Aa][Ll][Gg][Oo]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][ Aa][Ll][Gg]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa][Ll]([0-9A-F H-Za-fh-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa]([0-9A-KM-Za-km-z][0-9A-Za-z]*| )|[Kk][Ee][Xx]([0-9B-Zb-z][0-9A-Za-z]*|)|[Kk][Ee]([0-9A-WYZa-wyz][0-9A-Z a-z]*|)|[Mm][Aa][Tt][Cc](([Hh][0-9A-Za-z]|[0-9A-GI-Za-gi-z])[0-9A-Za-z]* |)|[Mm][Aa][Tt]([0-9ABD-Zabd-z][0-9A-Za-z]*|)|[Mm][Aa][Cc](([Ss][0-9A-Za -z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Mm][Aa]([0-9ABD-SU-Zabd-su-z][0-9A -Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss][Tt][Ee](([Mm][0-9A-Za-z]|[0-9A-LN-Za- ln-z])[0-9A-Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss][Tt]([0-9A-DF-Za-df-z][0-9A -Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Ss][ Uu][Bb][Ss][Yy]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Ss][Uu][Bb][Ss]([0-9A-X Za-xz][0-9A-Za-z]*|)|[Ss][Uu][Bb]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Ss][U u]([0-9AC-Zac-z][0-9A-Za-z]*|)|([Ss][0-9A-TV-Za-tv-z]|[Mm][0-9B-Zb-z]|[K k][0-9A-DF-Za-df-z]|[Hh][0-9A-NP-Za-np-z]|[Dd][0-9A-DF-Za-df-z]|[Cc][0-9 A-HJ-Za-hj-z]|[Aa][0-9ABD-KM-Zabd-km-z]|[0-9BE-GIJLN-RT-Zbe-gijln-rt-z][ 0-9A-Za-z])[0-9A-Za-z]*|[Ss]|[Mm]|[Kk]|[Hh]|[Dd]|[Cc]|[Aa]|[0-9BE-GIJLN- RT-Zbe-gijln-rt-z]/ = /[^\t\n =]+([\t =]+[^\t\n =]+)*/ } | { /#comment/ = /[^\t\n\r ].*[^\t\n\r ]|[^\t\n\r ]/ } | { })* { /Match/ }* Debug: Augeas[: sshd_config Security Settings](provider=augeas): Closed the augeas connection Error: /Stage[main]/My_sshd/Augeas[: sshd_config Security Settings]: Could not evaluate: Saving failed, see debug /usr/local/lib/ruby/site_ruby/2.5/puppet/util/errors.rb:157:in `fail' /usr/local/lib/ruby/site_ruby/2.5/puppet/provider/augeas/augeas.rb:444:i n `need_to_run?' /usr/local/lib/ruby/site_ruby/2.5/puppet/type/augeas.rb:198:in `retrieve' /usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1080:in `block in retrieve' /usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1075:in `each' /usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1075:in `retrieve' /usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1098:in `retrieve_resource' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/resource_harness.rb :305:in `from_resource' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/resource_harness.rb :20:in `evaluate' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:259:in `apply' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:279:in `eval_resource' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `call' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `block (2 levels) in evaluate' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in thinmark' /usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `block in evaluate' /usr/local/lib/ruby/site_ruby/2.5/puppet/graph/relationship_graph.rb:121 :in `traverse' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:173:in `evaluate' /usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:239:in `block (2 levels) in apply' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in thinmark' /usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark' /usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:238:in `block in apply' /usr/local/lib/ruby/site_ruby/2.5/puppet/util/log.rb:161:in `with_destination' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/report.rb:146:in `as_logging_destination' /usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:237:in `apply' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:186:in `block (2 levels) in apply_catalog' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in thinmark' /usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:185:in `block in apply_catalog' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:232:in `block in benchmark' /usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:231:in `benchmark' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:184:in `apply_catalog' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:366:in `run_internal' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:234:in `block in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/context.rb:65:in `override' /usr/local/lib/ruby/site_ruby/2.5/puppet.rb:260:in `override' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:211:in `run' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:59:in `block (5 levels) in run' /usr/local/lib/ruby/2.5/timeout.rb:76:in `timeout' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:58:in `block (4 levels) in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent/locker.rb:21:in `lock' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:52:in `block (3 levels) in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:130:in `with_client' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:49:in `block (2 levels) in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:87:in `run_in_fork' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:48:in `block in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:179:in `controlled_run' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:46:in `run' /usr/local/lib/ruby/site_ruby/2.5/puppet/application/agent.rb:372:in `onetime' /usr/local/lib/ruby/site_ruby/2.5/puppet/application/agent.rb:350:in `run_command' /usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:375:in `block in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:667:in `exit_on_fail' /usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:375:in `run' /usr/local/lib/ruby/site_ruby/2.5/puppet/util/command_line.rb:139:in `run' /usr/local/lib/ruby/site_ruby/2.5/puppet/util/command_line.rb:77:in `execute' /usr/local/bin/puppet:5:in `<main>' Notice: /Stage[main]/My_sshd/Service[sshd]: Dependency Augeas[: sshd_config Security Settings] has failures: true Warning: /Stage[main]/My_sshd/Service[sshd]: Skipping because of failed dependencies -- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/xn0lzb6638rbt6f000%40news.gmane.org.
