Hi, I want to set some values in sshd_config. Example:
KexAlgorithms curve25519-sha...@libssh.org,diffie-hellman-group-exchange-sha256 keys($sshdCfg).each |String $comment| { augeas { "$file: $comment": context => $sshdCfg[$comment]['context'], changes => [ $sshdCfg[$comment]['changes'] ], notify => Service["${sshdService}"], } } 'sshd_config Security Settings': context: '/files/etc/ssh/sshd_config' changes: - 'set KexAlgorithms curve25519-sha...@libssh.org,diffie-hellman-group-exchange-sha256' This does not work, error below. I can work around that with 'sshd_config Security Settings': context: '/files/etc/ssh/sshd_config' changes: - 'set KexAlgorithms/1 curve25519-sha...@libssh.org' - 'set KexAlgorithms/2 diffie-hellman-group-exchange-sha256' but this does not remove existing values 3, 4, 5, ... How can I solve that? Thank you! Debug: /Stage[main]/My_sshd/Notify[sshd_config PrintMotd]: The container Class[My_sshd] will propagate my refresh event Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Opening augeas with root /, lens path , flags 32 Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Augeas version 1.12.0 is installed Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Will attempt to save and only run if files changed Debug: Augeas[: sshd_config PrintMotd](provider=augeas): sending command 'set' with params ["/files/etc/ssh/sshd_config/PrintMotd", "yes"] Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Skipping because no files were changed Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Closed the augeas connection Notice: {"context"=>"/files/etc/ssh/sshd_config", "changes"=>["set KexAlgorithms curve25519-sha...@libssh.org,curve25519-sha...@libssh.org"]} Notice: /Stage[main]/My_sshd/Notify[sshd_config Security Settings]/message: defined 'message' as { 'context' => '/files/etc/ssh/sshd_config', 'changes' => ['set KexAlgorithms curve25519-sha...@libssh.org,curve25519-sha...@libssh.org'] } Debug: /Stage[main]/My_sshd/Notify[sshd_config Security Settings]: The container Class[My_sshd] will propagate my refresh event Debug: Augeas[: sshd_config Security Settings](provider=augeas): Opening augeas with root /, lens path , flags 32 Debug: Augeas[: sshd_config Security Settings](provider=augeas): Augeas version 1.12.0 is installed Debug: Augeas[: sshd_config Security Settings](provider=augeas): Will attempt to save and only run if files changed Debug: Augeas[: sshd_config Security Settings](provider=augeas): sending command 'set' with params ["/files/etc/ssh/sshd_config/KexAlgorithms", "curve25519-sha...@libssh.org,curve25519-sha...@libssh.org"] Debug: Augeas[: sshd_config Security Settings](provider=augeas): Put failed on one or more files, output from /augeas//error: Debug: Augeas[: sshd_config Security Settings](provider=augeas): /augeas/files/etc/ssh/sshd_config/error = put_failed Debug: Augeas[: sshd_config Security Settings](provider=augeas): /augeas/files/etc/ssh/sshd_config/error/path = /files/etc/ssh/sshd_config/ Debug: Augeas[: sshd_config Security Settings](provider=augeas): /augeas/files/etc/ssh/sshd_config/error/lens = /usr/local/share/augeas/lenses/dist/sshd.aug:142.12-.47: { "#comment" = "$FreeBSD: releng/11.2/crypto/openssh/sshd_config 323136 2017-09-02 23:39:51Z des $" } { } { "#comment" = "This is the sshd server system-wide configuration file. See" } { "#comment" = "sshd_config(5) for more information." } { } { "#comment" = "This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin" } { } { "#comment" = "The strategy used for options in the default sshd_config shipped with" } { "#comment" = "OpenSSH is to specify options with their default value where" } { "#comment" = "possible, but leave them commented. Uncommented options override the" } { "#comment" = "default value." } { } { "#comment" = "Note that some of FreeBSD's defaults differ from OpenBSD's, and" } { "#comment" = "FreeBSD has a few additional options." } { } { "#comment" = "Port 22" } { "#comment" = "AddressFamily any" } { "#comment" = "ListenAddress 0.0.0.0" } { "#comment" = "ListenAddress ::" } { } { "#comment" = "HostKey /etc/ssh/ssh_host_rsa_key" } { "#comment" = "HostKey /etc/ssh/ssh_host_dsa_key" } { "#comment" = "HostKey /etc/ssh/ssh_host_ecdsa_key" } { "#comment" = "HostKey /etc/ssh/ssh_host_ed25519_key" } { } { "#comment" = "Ciphers and keying" } { "#comment" = "RekeyLimit default none" } { } { "#comment" = "Logging" } { "#comment" = "SyslogFacility AUTH" } { "#comment" = "LogLevel INFO" } { } { "#comment" = "Authentication:" } { } { "#comment" = "LoginGraceTime 2m" } { "#comment" = "PermitRootLogin no" } { "#comment" = "StrictModes yes" } { "#comment" = "MaxAuthTries 6" { "#comment" = "PubkeyAuthentication yes" } { } { "#comment" = "The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2" } { "#comment" = "but this is overridden so installations will only check .ssh/authorized_keys" } { "AuthorizedKeysFile" = ".ssh/authorized_keys" } { } { "#comment" = "AuthorizedPrincipalsFile none" } { } { "#comment" = "AuthorizedKeysCommand none" } { "#comment" = "AuthorizedKeysCommandUser nobody" } { } { "#comment" = "For this to work you will also need host keys in /etc/ssh/ssh_known_hosts" } { "#comment" = "HostbasedAuthentication no" } { "#comment" = "Change to yes if you don't trust ~/.ssh/known_hosts for" } { "#comment" = "HostbasedAuthentication" } { "#comment" = "IgnoreUserKnownHosts no" } { "#comment" = "Don't read the user's ~/.rhosts and ~/.shosts files" } { "#comment" = "IgnoreRhosts yes" } { } { "#comment" = "Change to yes to enable built-in password authentication." } { "#comment" = "PasswordAuthentication no" } { "#comment" = "PermitEmptyPasswords no" } { } { "#comment" = "Change to no to disable PAM authentication" } { "#comment" = "ChallengeResponseAuthentication yes" } { } { "#comment" = "Kerberos options" } { "#comment" = "KerberosAuthentication no" } { "#comment" = "KerberosOrLocalPasswd yes" } { "#comment" = "KerberosTicketCleanup yes" } { "#comment" = "KerberosGetAFSToken no" } { } { "#comment" = "GSSAPI options" } { "#comment" = "GSSAPIAuthentication no" } { "#comment" = "GSSAPICleanupCredentials yes" } { } { "#comment" = "Set this to 'no' to disable PAM authentication, account processing," } { "#comment" = "and session processing. If this is enabled, PAM authentication will" } { "#comment" = "be { "#comment" = "the setting of "PermitRootLogin without-password"." } { "#comment" = "If you just want the PAM account and session checks to run without" } { "#comment" = "PAM authentication, then enable this but set PasswordAuthentication" } { "#comment" = "and ChallengeResponseAuthentication to 'no'." } { "#comment" = "UsePAM yes" } { } { "#comment" = "AllowAgentForwarding yes" } { "#comment" = "AllowTcpForwarding yes" } { "#comment" = "GatewayPorts no" } { "#comment" = "X11Forwarding yes" } { "#comment" = "X11DisplayOffset 10" } { "#comment" = "X11UseLocalhost yes" } { "#comment" = "PermitTTY yes" } { "#comment" = "PrintMotd yes" } { "#comment" = "PrintLastLog yes" } { "#comment" = "TCPKeepAlive yes" } { "#comment" = "PermitUserEnvironment no" } { "#comment" = "Compression delayed" } { "#comment" = "ClientAliveInterval 0" } { "#comment" = "ClientAliveCountMax 3" } { "#comment" = "UseDNS yes" } { "#comment" = "PidFile /var/run/sshd.pid" } { "#comment" = "MaxStartups 10:30:100" } { "#comment" = "PermitTunnel no" } { "#comment" = "ChrootDirectory none" } { "#comment" = "UseBlacklist no" } { "#comment" = "VersionAddendum FreeBSD-20170903" } { } { "#comment" = "no default banner path" } { "#comment" = "Banner none" } { } { "#comment" = "override default of no subsystems" } { "Subsystem" } { } { "#comment" = "Example of overriding settings on a per-user basis" } { "#comment" = "Match User anoncvs" } { "#comment" = "X11Forwarding no" } { "#comment" = "AllowTcpForwarding no" } { "#comment" { "#comment" = "ForceCommand cvs server" } { } { "KexAlgorithms" = "curve25519-sha...@libssh.org,curve25519-sha...@libssh.org" } { "Ciphers" } { "MACs" } { } { "ChallengeResponseAuthentication" = "no" } { "ClientAliveInterval" = "30" } { "ClientAliveCountMax" = "2" } { "PasswordAuthentication" = "no" } { "PermitRootLogin" = "prohibit-password" } { "PrintMotd" = "yes" } { } { "#comment" = "Match address 10.0.0.0/8,172.16.0.0/12,192.168.0.0/24,2001:6f8:1013:1::/64" } { "Match" } { "Match" } with pattern ( { /AcceptEnv/ } | { /AllowGroups/ } | { /AllowUsers/ } | { /DenyGroups/ } | { /Subsystem/ } | { /DenyUsers/ } | { /MACs/ } | { /Ciphers/ } | { /KexAlgorithms/ } | { /HostKeyAlgorithms/ } | { /[Aa][Cc][Cc][Ee][Pp][Tt][Ee][Nn](([Vv][0-9A-Za-z]|[0-9A-UW-Za-uw-z])[0- 9A-Za-z]*|)|[Aa][Cc][Cc][Ee][Pp][Tt][Ee]([0-9A-MO-Za-mo-z][0-9A-Za-z]*|) |[Aa][Cc][Cc][Ee][Pp][Tt]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Aa][Cc][Cc][E e][Pp]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Aa][Cc][Cc][Ee]([0-9A-OQ-Za-oq-z ][0-9A-Za-z]*|)|[Aa][Cc][Cc]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Aa][Ll][Ll ][Oo][Ww]([Gg][Rr][Oo][Uu][Pp](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A- Za-z]*|)|[Gg][Rr][Oo][Uu]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Gg][Rr][Oo]([ 0-9A-TV-Za-tv-z][0-9A-Za-z]*|)|[Gg][Rr]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)| [Uu][Ss][Ee][Rr](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Uu][ Ss][Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Uu][Ss]([0-9A-DF-Za-df-z][0-9A- Za-z]*|)|[Uu]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Gg]([0-9A-QS-Za-qs-z][0-9 A-Za-z]*|)|[0-9A-FH-TV-Za-fh-tv-z][0-9A-Za-z]*|)|[Aa][Ll][Ll][Oo]([0-9A- VX-Za-vx-z][0-9A-Za-z]*|)|[Aa][Ll][Ll]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[ Aa][Ll]([0-9A-KM-Za-km-z][0-9A-Za-z]*|)|[Aa][Cc]([0-9ABD-Zabd-z][0-9A-Za -z]*|)|[Cc][Ii][Pp][Hh][Ee][Rr](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A -Za-z]*|)|[Cc][Ii][Pp][Hh][Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Cc][Ii][ Pp][Hh]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Cc][Ii][Pp]([0-9A-GI-Za-gi-z][0 -9A-Za-z]*|)|[Cc][Ii]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][G g][Rr][Oo][Uu][Pp](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Dd ][Ee][Nn][Yy][Gg][Rr][Oo][Uu]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Dd][Ee][N n][Yy][Gg][Rr][Oo]([0-9A-TV-Za-tv-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Gg][ Rr]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss][Ee][Rr](([S s][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss][ Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss]([0-9A-DF-Za -df-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu]([0-9A-RT-Za-rt-z][0-9A-Za-z]*| )|[Dd][Ee][Nn][Yy][Gg]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy]( [0-9A-FH-TV-Za-fh-tv-z][0-9A-Za-z]*|)|[Dd][Ee][Nn]([0-9A-XZa-xz][0-9A-Za -z]*|)|[Dd][Ee]([0-9A-MO-Za-mo-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt][Kk][Ee] [Yy]([Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh][Mm](([Ss][0-9A-Za-z]|[0-9A-RT-Za-r t-z])[0-9A-Za-z]*|)|[Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh]([0-9A-LN-Za-ln-z][0 -9A-Za-z]*|)|[Aa][Ll][Gg][Oo][Rr][Ii][Tt]([0-9A-GI-Za-gi-z][0-9A-Za-z]*| )|[Aa][Ll][Gg][Oo][Rr][Ii]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Aa][Ll][Gg][ Oo][Rr]([0-9A-HJ-Za-hj-z][0-9A-Za-z]*|)|[Aa][Ll][Gg][Oo]([0-9A-QS-Za-qs- z][0-9A-Za-z]*|)|[Aa][Ll][Gg]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Aa][Ll]([ 0-9A-FH-Za-fh-z][0-9A-Za-z]*|)|[Aa]([0-9A-KM-Za-km-z][0-9A-Za-z]*|)|[0-9 B-Zb-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt][Kk][Ee]([0-9A-XZa-xz][0-9A-Za-z]* |)|[Hh][Oo][Ss][Tt][Kk]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt] ([0-9A-JL-Za-jl-z][0-9A-Za-z]*|)|[Hh][Oo][Ss]([0-9A-SU-Za-su-z][0-9A-Za- z]*|)|[Hh][Oo]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][ Oo][Rr][Ii][Tt][Hh][Mm](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*| )|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh]([0-9A-LN-Za-ln-z][0-9A-Za -z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii][Tt]([0-9A-GI-Za-gi-z][0-9A-Z a-z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii]([0-9A-SU-Za-su-z][0-9A-Za-z ]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr]([0-9A-HJ-Za-hj-z][0-9A-Za-z]*|)|[K k][Ee][Xx][Aa][Ll][Gg][Oo]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][ Aa][Ll][Gg]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa][Ll]([0-9A-F H-Za-fh-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa]([0-9A-KM-Za-km-z][0-9A-Za-z]*| )|[Kk][Ee][Xx]([0-9B-Zb-z][0-9A-Za-z]*|)|[Kk][Ee]([0-9A-WYZa-wyz][0-9A-Z a-z]*|)|[Mm][Aa][Tt][Cc](([Hh][0-9A-Za-z]|[0-9A-GI-Za-gi-z])[0-9A-Za-z]* |)|[Mm][Aa][Tt]([0-9ABD-Zabd-z][0-9A-Za-z]*|)|[Mm][Aa][Cc](([Ss][0-9A-Za -z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Mm][Aa]([0-9ABD-SU-Zabd-su-z][0-9A -Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss][Tt][Ee](([Mm][0-9A-Za-z]|[0-9A-LN-Za- ln-z])[0-9A-Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss][Tt]([0-9A-DF-Za-df-z][0-9A -Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Ss][ Uu][Bb][Ss][Yy]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Ss][Uu][Bb][Ss]([0-9A-X Za-xz][0-9A-Za-z]*|)|[Ss][Uu][Bb]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Ss][U u]([0-9AC-Zac-z][0-9A-Za-z]*|)|([Ss][0-9A-TV-Za-tv-z]|[Mm][0-9B-Zb-z]|[K k][0-9A-DF-Za-df-z]|[Hh][0-9A-NP-Za-np-z]|[Dd][0-9A-DF-Za-df-z]|[Cc][0-9 A-HJ-Za-hj-z]|[Aa][0-9ABD-KM-Zabd-km-z]|[0-9BE-GIJLN-RT-Zbe-gijln-rt-z][ 0-9A-Za-z])[0-9A-Za-z]*|[Ss]|[Mm]|[Kk]|[Hh]|[Dd]|[Cc]|[Aa]|[0-9BE-GIJLN- RT-Zbe-gijln-rt-z]/ = /[^\t\n =]+([\t =]+[^\t\n =]+)*/ } | { /#comment/ = /[^\t\n\r ].*[^\t\n\r ]|[^\t\n\r ]/ } | { })* { /Match/ }* Debug: Augeas[: sshd_config Security Settings](provider=augeas): Closed the augeas connection Error: /Stage[main]/My_sshd/Augeas[: sshd_config Security Settings]: Could not evaluate: Saving failed, see debug /usr/local/lib/ruby/site_ruby/2.5/puppet/util/errors.rb:157:in `fail' /usr/local/lib/ruby/site_ruby/2.5/puppet/provider/augeas/augeas.rb:444:i n `need_to_run?' /usr/local/lib/ruby/site_ruby/2.5/puppet/type/augeas.rb:198:in `retrieve' /usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1080:in `block in retrieve' /usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1075:in `each' /usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1075:in `retrieve' /usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1098:in `retrieve_resource' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/resource_harness.rb :305:in `from_resource' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/resource_harness.rb :20:in `evaluate' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:259:in `apply' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:279:in `eval_resource' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `call' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `block (2 levels) in evaluate' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in thinmark' /usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `block in evaluate' /usr/local/lib/ruby/site_ruby/2.5/puppet/graph/relationship_graph.rb:121 :in `traverse' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:173:in `evaluate' /usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:239:in `block (2 levels) in apply' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in thinmark' /usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark' /usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:238:in `block in apply' /usr/local/lib/ruby/site_ruby/2.5/puppet/util/log.rb:161:in `with_destination' /usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/report.rb:146:in `as_logging_destination' /usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:237:in `apply' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:186:in `block (2 levels) in apply_catalog' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in thinmark' /usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:185:in `block in apply_catalog' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:232:in `block in benchmark' /usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:231:in `benchmark' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:184:in `apply_catalog' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:366:in `run_internal' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:234:in `block in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/context.rb:65:in `override' /usr/local/lib/ruby/site_ruby/2.5/puppet.rb:260:in `override' /usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:211:in `run' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:59:in `block (5 levels) in run' /usr/local/lib/ruby/2.5/timeout.rb:76:in `timeout' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:58:in `block (4 levels) in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent/locker.rb:21:in `lock' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:52:in `block (3 levels) in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:130:in `with_client' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:49:in `block (2 levels) in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:87:in `run_in_fork' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:48:in `block in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:179:in `controlled_run' /usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:46:in `run' /usr/local/lib/ruby/site_ruby/2.5/puppet/application/agent.rb:372:in `onetime' /usr/local/lib/ruby/site_ruby/2.5/puppet/application/agent.rb:350:in `run_command' /usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:375:in `block in run' /usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:667:in `exit_on_fail' /usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:375:in `run' /usr/local/lib/ruby/site_ruby/2.5/puppet/util/command_line.rb:139:in `run' /usr/local/lib/ruby/site_ruby/2.5/puppet/util/command_line.rb:77:in `execute' /usr/local/bin/puppet:5:in `<main>' Notice: /Stage[main]/My_sshd/Service[sshd]: Dependency Augeas[: sshd_config Security Settings] has failures: true Warning: /Stage[main]/My_sshd/Service[sshd]: Skipping because of failed dependencies -- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to puppet-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/xn0lzb6638rbt6f000%40news.gmane.org.