Hi,

I want to set some values in sshd_config. Example:

KexAlgorithms
curve25519-sha...@libssh.org,diffie-hellman-group-exchange-sha256

keys($sshdCfg).each |String $comment| {
  augeas { "$file: $comment":
    context => $sshdCfg[$comment]['context'],
    changes => [ $sshdCfg[$comment]['changes'] ],
    notify  => Service["${sshdService}"],
  }
}

'sshd_config Security Settings':
  context:                       '/files/etc/ssh/sshd_config'
  changes:
    - 'set KexAlgorithms
curve25519-sha...@libssh.org,diffie-hellman-group-exchange-sha256'

This does not work, error below. I can work around that with

'sshd_config Security Settings':
  context:                       '/files/etc/ssh/sshd_config'
  changes:
    - 'set KexAlgorithms/1 curve25519-sha...@libssh.org'
    - 'set KexAlgorithms/2 diffie-hellman-group-exchange-sha256'

but this does not remove existing values 3, 4, 5, ... How can I solve
that?

Thank you!

Debug: /Stage[main]/My_sshd/Notify[sshd_config PrintMotd]: The
container Class[My_sshd] will propagate my refresh event
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Opening augeas
with root /, lens path , flags 32
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Augeas version
1.12.0 is installed
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Will attempt
to save and only run if files changed
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): sending
command 'set' with params ["/files/etc/ssh/sshd_config/PrintMotd",
"yes"]
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Skipping
because no files were changed
Debug: Augeas[: sshd_config PrintMotd](provider=augeas): Closed the
augeas connection
Notice: {"context"=>"/files/etc/ssh/sshd_config", "changes"=>["set
KexAlgorithms
curve25519-sha...@libssh.org,curve25519-sha...@libssh.org"]}
Notice: /Stage[main]/My_sshd/Notify[sshd_config Security
Settings]/message: defined 'message' as {
  'context' => '/files/etc/ssh/sshd_config',
  'changes' => ['set KexAlgorithms
curve25519-sha...@libssh.org,curve25519-sha...@libssh.org']
}
Debug: /Stage[main]/My_sshd/Notify[sshd_config Security Settings]: The
container Class[My_sshd] will propagate my refresh event
Debug: Augeas[: sshd_config Security Settings](provider=augeas):
Opening augeas with root /, lens path , flags 32
Debug: Augeas[: sshd_config Security Settings](provider=augeas): Augeas
version 1.12.0 is installed
Debug: Augeas[: sshd_config Security Settings](provider=augeas): Will
attempt to save and only run if files changed
Debug: Augeas[: sshd_config Security Settings](provider=augeas):
sending command 'set' with params
["/files/etc/ssh/sshd_config/KexAlgorithms",
"curve25519-sha...@libssh.org,curve25519-sha...@libssh.org"]
Debug: Augeas[: sshd_config Security Settings](provider=augeas): Put
failed on one or more files, output from /augeas//error:
Debug: Augeas[: sshd_config Security Settings](provider=augeas):
/augeas/files/etc/ssh/sshd_config/error = put_failed
Debug: Augeas[: sshd_config Security Settings](provider=augeas):
/augeas/files/etc/ssh/sshd_config/error/path =
/files/etc/ssh/sshd_config/
Debug: Augeas[: sshd_config Security Settings](provider=augeas):
/augeas/files/etc/ssh/sshd_config/error/lens =
/usr/local/share/augeas/lenses/dist/sshd.aug:142.12-.47:

     { "#comment" = "$FreeBSD: releng/11.2/crypto/openssh/sshd_config
323136 2017-09-02 23:39:51Z des $" }
     {  }
     { "#comment" = "This is the sshd server system-wide configuration
file.  See" }
     { "#comment" = "sshd_config(5) for more information." }
     {  }
     { "#comment" = "This sshd was compiled with
PATH=/usr/bin:/bin:/usr/sbin:/sbin" }
     {  }
     { "#comment" = "The strategy used for options in the default
sshd_config shipped with" }
     { "#comment" = "OpenSSH is to specify options with their default
value where" }
     { "#comment" = "possible, but leave them commented.  Uncommented
options override the" }
     { "#comment" = "default value." }
     {  }
     { "#comment" = "Note that some of FreeBSD's defaults differ from
OpenBSD's, and" }
     { "#comment" = "FreeBSD has a few additional options." }
     {  }
     { "#comment" = "Port 22" }
     { "#comment" = "AddressFamily any" }
     { "#comment" = "ListenAddress 0.0.0.0" }
     { "#comment" = "ListenAddress ::" }
     {  }
     { "#comment" = "HostKey /etc/ssh/ssh_host_rsa_key" }
     { "#comment" = "HostKey /etc/ssh/ssh_host_dsa_key" }
     { "#comment" = "HostKey /etc/ssh/ssh_host_ecdsa_key" }
     { "#comment" = "HostKey /etc/ssh/ssh_host_ed25519_key" }
     {  }
     { "#comment" = "Ciphers and keying" }
     { "#comment" = "RekeyLimit default none" }
     {  }
     { "#comment" = "Logging" }
     { "#comment" = "SyslogFacility AUTH" }
     { "#comment" = "LogLevel INFO" }
     {  }
     { "#comment" = "Authentication:" }
     {  }
     { "#comment" = "LoginGraceTime 2m" }
     { "#comment" = "PermitRootLogin no" }
     { "#comment" = "StrictModes yes" }
     { "#comment" = "MaxAuthTries 6"
     { "#comment" = "PubkeyAuthentication yes" }
     {  }
     { "#comment" = "The default is to check both .ssh/authorized_keys
and .ssh/authorized_keys2" }
     { "#comment" = "but this is overridden so installations will only
check .ssh/authorized_keys" }
     { "AuthorizedKeysFile" = ".ssh/authorized_keys" }
     {  }
     { "#comment" = "AuthorizedPrincipalsFile none" }
     {  }
     { "#comment" = "AuthorizedKeysCommand none" }
     { "#comment" = "AuthorizedKeysCommandUser nobody" }
     {  }
     { "#comment" = "For this to work you will also need host keys in
/etc/ssh/ssh_known_hosts" }
     { "#comment" = "HostbasedAuthentication no" }
     { "#comment" = "Change to yes if you don't trust
~/.ssh/known_hosts for" }
     { "#comment" = "HostbasedAuthentication" }
     { "#comment" = "IgnoreUserKnownHosts no" }
     { "#comment" = "Don't read the user's ~/.rhosts and ~/.shosts
files" }
     { "#comment" = "IgnoreRhosts yes" }
     {  }
     { "#comment" = "Change to yes to enable built-in password
authentication." }
     { "#comment" = "PasswordAuthentication no" }
     { "#comment" = "PermitEmptyPasswords no" }
     {  }
     { "#comment" = "Change to no to disable PAM authentication" }
     { "#comment" = "ChallengeResponseAuthentication yes" }
     {  }
     { "#comment" = "Kerberos options" }
     { "#comment" = "KerberosAuthentication no" }
     { "#comment" = "KerberosOrLocalPasswd yes" }
     { "#comment" = "KerberosTicketCleanup yes" }
     { "#comment" = "KerberosGetAFSToken no" }
     {  }
     { "#comment" = "GSSAPI options" }
     { "#comment" = "GSSAPIAuthentication no" }
     { "#comment" = "GSSAPICleanupCredentials yes" }
     {  }
     { "#comment" = "Set this to 'no' to disable PAM authentication,
account processing," }
     { "#comment" = "and session processing. If this is enabled, PAM
authentication will" }
     { "#comment" = "be
     { "#comment" = "the setting of "PermitRootLogin
without-password"." }
     { "#comment" = "If you just want the PAM account and session
checks to run without" }
     { "#comment" = "PAM authentication, then enable this but set
PasswordAuthentication" }
     { "#comment" = "and ChallengeResponseAuthentication to 'no'." }
     { "#comment" = "UsePAM yes" }
     {  }
     { "#comment" = "AllowAgentForwarding yes" }
     { "#comment" = "AllowTcpForwarding yes" }
     { "#comment" = "GatewayPorts no" }
     { "#comment" = "X11Forwarding yes" }
     { "#comment" = "X11DisplayOffset 10" }
     { "#comment" = "X11UseLocalhost yes" }
     { "#comment" = "PermitTTY yes" }
     { "#comment" = "PrintMotd yes" }
     { "#comment" = "PrintLastLog yes" }
     { "#comment" = "TCPKeepAlive yes" }
     { "#comment" = "PermitUserEnvironment no" }
     { "#comment" = "Compression delayed" }
     { "#comment" = "ClientAliveInterval 0" }
     { "#comment" = "ClientAliveCountMax 3" }
     { "#comment" = "UseDNS yes" }
     { "#comment" = "PidFile /var/run/sshd.pid" }
     { "#comment" = "MaxStartups 10:30:100" }
     { "#comment" = "PermitTunnel no" }
     { "#comment" = "ChrootDirectory none" }
     { "#comment" = "UseBlacklist no" }
     { "#comment" = "VersionAddendum FreeBSD-20170903" }
     {  }
     { "#comment" = "no default banner path" }
     { "#comment" = "Banner none" }
     {  }
     { "#comment" = "override default of no subsystems" }
     { "Subsystem" }
     {  }
     { "#comment" = "Example of overriding settings on a per-user
basis" }
     { "#comment" = "Match User anoncvs" }
     { "#comment" = "X11Forwarding no" }
     { "#comment" = "AllowTcpForwarding no" }
     { "#comment"
     { "#comment" = "ForceCommand cvs server" }
     {  }
     { "KexAlgorithms" =
"curve25519-sha...@libssh.org,curve25519-sha...@libssh.org" }
     { "Ciphers" }
     { "MACs" }
     {  }
     { "ChallengeResponseAuthentication" = "no" }
     { "ClientAliveInterval" = "30" }
     { "ClientAliveCountMax" = "2" }
     { "PasswordAuthentication" = "no" }
     { "PermitRootLogin" = "prohibit-password" }
     { "PrintMotd" = "yes" }
     {  }
     { "#comment" = "Match address
10.0.0.0/8,172.16.0.0/12,192.168.0.0/24,2001:6f8:1013:1::/64" }
     { "Match" }
     { "Match" }

  with pattern
   (    { /AcceptEnv/ }
      | { /AllowGroups/ }
      | { /AllowUsers/ }
      | { /DenyGroups/ }
      | { /Subsystem/ }
      | { /DenyUsers/ }
      | { /MACs/ }
      | { /Ciphers/ }
      | { /KexAlgorithms/ }
      | { /HostKeyAlgorithms/ }
      | {
/[Aa][Cc][Cc][Ee][Pp][Tt][Ee][Nn](([Vv][0-9A-Za-z]|[0-9A-UW-Za-uw-z])[0-
9A-Za-z]*|)|[Aa][Cc][Cc][Ee][Pp][Tt][Ee]([0-9A-MO-Za-mo-z][0-9A-Za-z]*|)
|[Aa][Cc][Cc][Ee][Pp][Tt]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Aa][Cc][Cc][E
e][Pp]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Aa][Cc][Cc][Ee]([0-9A-OQ-Za-oq-z
][0-9A-Za-z]*|)|[Aa][Cc][Cc]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Aa][Ll][Ll
][Oo][Ww]([Gg][Rr][Oo][Uu][Pp](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-
Za-z]*|)|[Gg][Rr][Oo][Uu]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Gg][Rr][Oo]([
0-9A-TV-Za-tv-z][0-9A-Za-z]*|)|[Gg][Rr]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|
[Uu][Ss][Ee][Rr](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Uu][
Ss][Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Uu][Ss]([0-9A-DF-Za-df-z][0-9A-
Za-z]*|)|[Uu]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Gg]([0-9A-QS-Za-qs-z][0-9
A-Za-z]*|)|[0-9A-FH-TV-Za-fh-tv-z][0-9A-Za-z]*|)|[Aa][Ll][Ll][Oo]([0-9A-
VX-Za-vx-z][0-9A-Za-z]*|)|[Aa][Ll][Ll]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[
Aa][Ll]([0-9A-KM-Za-km-z][0-9A-Za-z]*|)|[Aa][Cc]([0-9ABD-Zabd-z][0-9A-Za
-z]*|)|[Cc][Ii][Pp][Hh][Ee][Rr](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A
-Za-z]*|)|[Cc][Ii][Pp][Hh][Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Cc][Ii][
Pp][Hh]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Cc][Ii][Pp]([0-9A-GI-Za-gi-z][0
-9A-Za-z]*|)|[Cc][Ii]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][G
g][Rr][Oo][Uu][Pp](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Dd
][Ee][Nn][Yy][Gg][Rr][Oo][Uu]([0-9A-OQ-Za-oq-z][0-9A-Za-z]*|)|[Dd][Ee][N
n][Yy][Gg][Rr][Oo]([0-9A-TV-Za-tv-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Gg][
Rr]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss][Ee][Rr](([S
s][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss][
Ee]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu][Ss]([0-9A-DF-Za
-df-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy][Uu]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|
)|[Dd][Ee][Nn][Yy][Gg]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Dd][Ee][Nn][Yy](
[0-9A-FH-TV-Za-fh-tv-z][0-9A-Za-z]*|)|[Dd][Ee][Nn]([0-9A-XZa-xz][0-9A-Za
-z]*|)|[Dd][Ee]([0-9A-MO-Za-mo-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt][Kk][Ee]
[Yy]([Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh][Mm](([Ss][0-9A-Za-z]|[0-9A-RT-Za-r
t-z])[0-9A-Za-z]*|)|[Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh]([0-9A-LN-Za-ln-z][0
-9A-Za-z]*|)|[Aa][Ll][Gg][Oo][Rr][Ii][Tt]([0-9A-GI-Za-gi-z][0-9A-Za-z]*|
)|[Aa][Ll][Gg][Oo][Rr][Ii]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Aa][Ll][Gg][
Oo][Rr]([0-9A-HJ-Za-hj-z][0-9A-Za-z]*|)|[Aa][Ll][Gg][Oo]([0-9A-QS-Za-qs-
z][0-9A-Za-z]*|)|[Aa][Ll][Gg]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Aa][Ll]([
0-9A-FH-Za-fh-z][0-9A-Za-z]*|)|[Aa]([0-9A-KM-Za-km-z][0-9A-Za-z]*|)|[0-9
B-Zb-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt][Kk][Ee]([0-9A-XZa-xz][0-9A-Za-z]*
|)|[Hh][Oo][Ss][Tt][Kk]([0-9A-DF-Za-df-z][0-9A-Za-z]*|)|[Hh][Oo][Ss][Tt]
([0-9A-JL-Za-jl-z][0-9A-Za-z]*|)|[Hh][Oo][Ss]([0-9A-SU-Za-su-z][0-9A-Za-
z]*|)|[Hh][Oo]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][
Oo][Rr][Ii][Tt][Hh][Mm](([Ss][0-9A-Za-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|
)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii][Tt][Hh]([0-9A-LN-Za-ln-z][0-9A-Za
-z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii][Tt]([0-9A-GI-Za-gi-z][0-9A-Z
a-z]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr][Ii]([0-9A-SU-Za-su-z][0-9A-Za-z
]*|)|[Kk][Ee][Xx][Aa][Ll][Gg][Oo][Rr]([0-9A-HJ-Za-hj-z][0-9A-Za-z]*|)|[K
k][Ee][Xx][Aa][Ll][Gg][Oo]([0-9A-QS-Za-qs-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][
Aa][Ll][Gg]([0-9A-NP-Za-np-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa][Ll]([0-9A-F
H-Za-fh-z][0-9A-Za-z]*|)|[Kk][Ee][Xx][Aa]([0-9A-KM-Za-km-z][0-9A-Za-z]*|
)|[Kk][Ee][Xx]([0-9B-Zb-z][0-9A-Za-z]*|)|[Kk][Ee]([0-9A-WYZa-wyz][0-9A-Z
a-z]*|)|[Mm][Aa][Tt][Cc](([Hh][0-9A-Za-z]|[0-9A-GI-Za-gi-z])[0-9A-Za-z]*
|)|[Mm][Aa][Tt]([0-9ABD-Zabd-z][0-9A-Za-z]*|)|[Mm][Aa][Cc](([Ss][0-9A-Za
-z]|[0-9A-RT-Za-rt-z])[0-9A-Za-z]*|)|[Mm][Aa]([0-9ABD-SU-Zabd-su-z][0-9A
-Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss][Tt][Ee](([Mm][0-9A-Za-z]|[0-9A-LN-Za-
ln-z])[0-9A-Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss][Tt]([0-9A-DF-Za-df-z][0-9A
-Za-z]*|)|[Ss][Uu][Bb][Ss][Yy][Ss]([0-9A-SU-Za-su-z][0-9A-Za-z]*|)|[Ss][
Uu][Bb][Ss][Yy]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Ss][Uu][Bb][Ss]([0-9A-X
Za-xz][0-9A-Za-z]*|)|[Ss][Uu][Bb]([0-9A-RT-Za-rt-z][0-9A-Za-z]*|)|[Ss][U
u]([0-9AC-Zac-z][0-9A-Za-z]*|)|([Ss][0-9A-TV-Za-tv-z]|[Mm][0-9B-Zb-z]|[K
k][0-9A-DF-Za-df-z]|[Hh][0-9A-NP-Za-np-z]|[Dd][0-9A-DF-Za-df-z]|[Cc][0-9
A-HJ-Za-hj-z]|[Aa][0-9ABD-KM-Zabd-km-z]|[0-9BE-GIJLN-RT-Zbe-gijln-rt-z][
0-9A-Za-z])[0-9A-Za-z]*|[Ss]|[Mm]|[Kk]|[Hh]|[Dd]|[Cc]|[Aa]|[0-9BE-GIJLN-
RT-Zbe-gijln-rt-z]/ = /[^\t\n =]+([\t =]+[^\t\n =]+)*/ }
      | { /#comment/ = /[^\t\n\r ].*[^\t\n\r ]|[^\t\n\r ]/ }
      | { })*
    { /Match/ }*

Debug: Augeas[: sshd_config Security Settings](provider=augeas): Closed
the augeas connection
Error: /Stage[main]/My_sshd/Augeas[: sshd_config Security Settings]:
Could not evaluate: Saving failed, see debug
/usr/local/lib/ruby/site_ruby/2.5/puppet/util/errors.rb:157:in `fail'
/usr/local/lib/ruby/site_ruby/2.5/puppet/provider/augeas/augeas.rb:444:i
n `need_to_run?'
/usr/local/lib/ruby/site_ruby/2.5/puppet/type/augeas.rb:198:in
`retrieve'
/usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1080:in `block in
retrieve'
/usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1075:in `each'
/usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1075:in `retrieve'
/usr/local/lib/ruby/site_ruby/2.5/puppet/type.rb:1098:in
`retrieve_resource'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/resource_harness.rb
:305:in `from_resource'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/resource_harness.rb
:20:in `evaluate'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:259:in `apply'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:279:in
`eval_resource'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `call'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `block
(2 levels) in evaluate'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in
thinmark'
/usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:183:in `block
in evaluate'
/usr/local/lib/ruby/site_ruby/2.5/puppet/graph/relationship_graph.rb:121
:in `traverse'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction.rb:173:in
`evaluate'
/usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:239:in
`block (2 levels) in apply'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in
thinmark'
/usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark'
/usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:238:in
`block in apply'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util/log.rb:161:in
`with_destination'
/usr/local/lib/ruby/site_ruby/2.5/puppet/transaction/report.rb:146:in
`as_logging_destination'
/usr/local/lib/ruby/site_ruby/2.5/puppet/resource/catalog.rb:237:in
`apply'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:186:in `block (2
levels) in apply_catalog'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:519:in `block in
thinmark'
/usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:518:in `thinmark'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:185:in `block in
apply_catalog'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:232:in `block in
benchmark'
/usr/local/lib/ruby/2.5/benchmark.rb:308:in `realtime'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:231:in `benchmark'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:184:in
`apply_catalog'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:366:in
`run_internal'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:234:in `block in
run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/context.rb:65:in `override'
/usr/local/lib/ruby/site_ruby/2.5/puppet.rb:260:in `override'
/usr/local/lib/ruby/site_ruby/2.5/puppet/configurer.rb:211:in `run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:59:in `block (5
levels) in run'
/usr/local/lib/ruby/2.5/timeout.rb:76:in `timeout'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:58:in `block (4
levels) in run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent/locker.rb:21:in `lock'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:52:in `block (3
levels) in run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:130:in `with_client'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:49:in `block (2
levels) in run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:87:in `run_in_fork'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:48:in `block in run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:179:in
`controlled_run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/agent.rb:46:in `run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/application/agent.rb:372:in
`onetime'
/usr/local/lib/ruby/site_ruby/2.5/puppet/application/agent.rb:350:in
`run_command'
/usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:375:in `block
in run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util.rb:667:in `exit_on_fail'
/usr/local/lib/ruby/site_ruby/2.5/puppet/application.rb:375:in `run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util/command_line.rb:139:in
`run'
/usr/local/lib/ruby/site_ruby/2.5/puppet/util/command_line.rb:77:in
`execute'
/usr/local/bin/puppet:5:in `<main>'
Notice: /Stage[main]/My_sshd/Service[sshd]: Dependency Augeas[:
sshd_config Security Settings] has failures: true
Warning: /Stage[main]/My_sshd/Service[sshd]: Skipping because of failed
dependencies

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to puppet-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/puppet-users/xn0lzb6638rbt6f000%40news.gmane.org.

Reply via email to