-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"options: - from" is being ignored #72
Comments
Could you post your configuration and full debug log? e.g.:
|
Please note that puppet server in my case is integrated with Red Hat
Satellite 6.1 (a product derived from Foreman).
Puppet server package: puppet-server-3.6.2-4.el7sat.noarch
Below is the config. I noticed Satellite UI does not keep indentation in
the `- from` line. Not sure if this is the culprit. If this is the case,
then it is obviously a bug on Satellite side.
Originally I put the following:
```yaml
options:
- from="<redacted>"
```
Satellite rendered it as following (note thre is no indentation in "- from":
```yaml
inventory:
comment: Inventory
managehome: true
purge_ssh_keys: false
primary_group: <redacted>
manage_group: true
shell: /bin/bash
uid: 5005
pwhash: <redacted>
ssh_keys:
inventory@<redacted>:
type: ssh-rsa
key: <redacted>
options:
- from="<redacted>"
```
```
Debug: Puppet::Type::User::ProviderLdap: true value when expecting false
Debug: Puppet::Type::User::ProviderPw: file pw does not exist
Debug: Puppet::Type::User::ProviderUser_role_add: file roleadd does not
exist
Debug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/dsimport
does not exist
Debug: Puppet::Type::Group::ProviderLdap: true value when expecting false
Debug: Puppet::Type::Group::ProviderPw: file pw does not exist
Debug: Puppet::Type::Group::ProviderDirectoryservice: file /usr/bin/dscl
does not exist
Debug: Using settings: adding file resource 'localcacert':
'File[/var/lib/puppet/ssl/certs/ca.pem]{:backup=>false, :group=>"puppet",
:ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"644", :path=>"/var/lib/puppet/ssl/certs/ca.pem"}'
Debug: Using settings: adding file resource 'rundir':
'File[/var/run/puppet]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"755", :path=>"/var/run/puppet"}'
Debug: Using settings: adding file resource 'privatekeydir':
'File[/var/lib/puppet/ssl/private_keys]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"750", :path=>"/var/lib/puppet/ssl/private_keys"}'
Debug: Using settings: adding file resource 'pluginfactdest':
'File[/var/lib/puppet/facts.d]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet/facts.d"}'
Debug: Using settings: adding file resource 'graphdir':
'File[/var/lib/puppet/state/graphs]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet/state/graphs"}'
Debug: Using settings: adding file resource 'logdir':
'File[/var/log/puppet]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"750", :path=>"/var/log/puppet"}'
Debug: Using settings: adding file resource 'libdir':
'File[/var/lib/puppet/lib]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet/lib"}'
Debug: Using settings: adding file resource 'statefile':
'File[/var/lib/puppet/state/state.yaml]{:backup=>false, :ensure=>:file,
:loglevel=>:debug, :links=>:follow, :mode=>"660",
:path=>"/var/lib/puppet/state/state.yaml"}'
Debug: Using settings: adding file resource 'httplog':
'File[/var/log/puppet/http.log]{:backup=>false, :ensure=>:file,
:loglevel=>:debug, :owner=>"root", :links=>:follow, :mode=>"640",
:path=>"/var/log/puppet/http.log"}'
Debug: Using settings: adding file resource 'hostcert':
'File[/var/lib/puppet/ssl/certs/<redacted>.pem]{:backup=>false,
:group=>"puppet", :ensure=>:file, :loglevel=>:debug, :owner=>"puppet",
:links=>:follow, :mode=>"644",
:path=>"/var/lib/puppet/ssl/certs/<redacted>.pem"}'
Debug: Using settings: adding file resource 'vardir':
'File[/var/lib/puppet]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:path=>"/var/lib/puppet"}'
Debug: Using settings: adding file resource 'ssldir':
'File[/var/lib/puppet/ssl]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"771", :path=>"/var/lib/puppet/ssl"}'
Debug: Using settings: adding file resource 'client_datadir':
'File[/var/lib/puppet/client_data]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :mode=>"750",
:path=>"/var/lib/puppet/client_data"}'
Debug: Using settings: adding file resource 'lastrunfile':
'File[/var/lib/puppet/state/last_run_summary.yaml]{:backup=>false,
:ensure=>:file, :loglevel=>:debug, :links=>:follow, :mode=>"644",
:path=>"/var/lib/puppet/state/last_run_summary.yaml"}'
Debug: Using settings: adding file resource 'hostpubkey':
'File[/var/lib/puppet/ssl/public_keys/<redacted>.pem]{:backup=>false,
:group=>"puppet", :ensure=>:file, :loglevel=>:debug, :owner=>"puppet",
:links=>:follow, :mode=>"644",
:path=>"/var/lib/puppet/ssl/public_keys/<redacted>.pem"}'
Debug: Using settings: adding file resource 'requestdir':
'File[/var/lib/puppet/ssl/certificate_requests]{:backup=>false,
:group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet",
:links=>:follow, :mode=>"755",
:path=>"/var/lib/puppet/ssl/certificate_requests"}'
Debug: Using settings: adding file resource 'resourcefile':
'File[/var/lib/puppet/state/resources.txt]{:backup=>false, :ensure=>:file,
:loglevel=>:debug, :owner=>"root", :links=>:follow, :mode=>"640",
:path=>"/var/lib/puppet/state/resources.txt"}'
Debug: Using settings: adding file resource 'privatedir':
'File[/var/lib/puppet/ssl/private]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"750", :path=>"/var/lib/puppet/ssl/private"}'
Debug: Using settings: adding file resource 'hostcrl':
'File[/var/lib/puppet/ssl/crl.pem]{:backup=>false, :group=>"puppet",
:ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"644", :path=>"/var/lib/puppet/ssl/crl.pem"}'
Debug: Using settings: adding file resource 'confdir':
'File[/etc/puppet]{:backup=>false, :ensure=>:directory, :loglevel=>:debug,
:links=>:follow, :path=>"/etc/puppet"}'
Debug: Using settings: adding file resource 'certdir':
'File[/var/lib/puppet/ssl/certs]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"755", :path=>"/var/lib/puppet/ssl/certs"}'
Debug: Using settings: adding file resource 'clientyamldir':
'File[/var/lib/puppet/client_yaml]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :mode=>"750",
:path=>"/var/lib/puppet/client_yaml"}'
Debug: Using settings: adding file resource 'hostprivkey':
'File[/var/lib/puppet/ssl/private_keys/<redacted>.pem]{:backup=>false,
:group=>"puppet", :ensure=>:file, :loglevel=>:debug, :owner=>"puppet",
:links=>:follow, :mode=>"640",
:path=>"/var/lib/puppet/ssl/private_keys/<redacted>.pem"}'
Debug: Using settings: adding file resource 'publickeydir':
'File[/var/lib/puppet/ssl/public_keys]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"755", :path=>"/var/lib/puppet/ssl/public_keys"}'
Debug: Using settings: adding file resource 'classfile':
'File[/var/lib/puppet/state/classes.txt]{:backup=>false, :ensure=>:file,
:loglevel=>:debug, :owner=>"root", :links=>:follow, :mode=>"640",
:path=>"/var/lib/puppet/state/classes.txt"}'
Debug: Using settings: adding file resource 'lastrunreport':
'File[/var/lib/puppet/state/last_run_report.yaml]{:backup=>false,
:ensure=>:file, :loglevel=>:debug, :links=>:follow, :mode=>"640",
:path=>"/var/lib/puppet/state/last_run_report.yaml"}'
Debug: Using settings: adding file resource 'statedir':
'File[/var/lib/puppet/state]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :mode=>"1755",
:path=>"/var/lib/puppet/state"}'
Debug: Using settings: adding file resource 'clientbucketdir':
'File[/var/lib/puppet/clientbucket]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :mode=>"750",
:path=>"/var/lib/puppet/clientbucket"}'
Debug: /File[/var/lib/puppet/state/last_run_report.yaml]: Autorequiring
File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/log/puppet/http.log]: Autorequiring File[/var/log/puppet]
Debug: /File[/var/lib/puppet/clientbucket]: Autorequiring
File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/state/classes.txt]: Autorequiring
File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/client_data]: Autorequiring
File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/facts.d]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/client_yaml]: Autorequiring
File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/public_keys/<redacted>.pem]: Autorequiring
File[/var/lib/puppet/ssl/public_keys]
Debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/private_keys/<redacted>.pem]:
Autorequiring File[/var/lib/puppet/ssl/private_keys]
Debug: /File[/var/lib/puppet/state/last_run_summary.yaml]: Autorequiring
File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/state/resources.txt]: Autorequiring
File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certs/<redacted>.pem]: Autorequiring
File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring
File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/state/state.yaml]: Autorequiring
File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/state/graphs]: Autorequiring
File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet]
Debug: Finishing transaction 70319890848020
Debug: Using settings: adding file resource 'localcacert':
'File[/var/lib/puppet/ssl/certs/ca.pem]{:backup=>false, :group=>"puppet",
:ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"644", :path=>"/var/lib/puppet/ssl/certs/ca.pem"}'
Debug: Using settings: adding file resource 'rundir':
'File[/var/run/puppet]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"755", :path=>"/var/run/puppet"}'
Debug: Using settings: adding file resource 'privatekeydir':
'File[/var/lib/puppet/ssl/private_keys]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"750", :path=>"/var/lib/puppet/ssl/private_keys"}'
Debug: Using settings: adding file resource 'pluginfactdest':
'File[/var/lib/puppet/facts.d]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet/facts.d"}'
Debug: Using settings: adding file resource 'logdir':
'File[/var/log/puppet]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"750", :path=>"/var/log/puppet"}'
Debug: Using settings: adding file resource 'libdir':
'File[/var/lib/puppet/lib]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet/lib"}'
Debug: Using settings: adding file resource 'httplog':
'File[/var/log/puppet/http.log]{:backup=>false, :ensure=>:file,
:loglevel=>:debug, :owner=>"root", :links=>:follow, :mode=>"640",
:path=>"/var/log/puppet/http.log"}'
Debug: Using settings: adding file resource 'hostcert':
'File[/var/lib/puppet/ssl/certs/<redacted>.pem]{:backup=>false,
:group=>"puppet", :ensure=>:file, :loglevel=>:debug, :owner=>"puppet",
:links=>:follow, :mode=>"644",
:path=>"/var/lib/puppet/ssl/certs/<redacted>.pem"}'
Debug: Using settings: adding file resource 'vardir':
'File[/var/lib/puppet]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:path=>"/var/lib/puppet"}'
Debug: Using settings: adding file resource 'ssldir':
'File[/var/lib/puppet/ssl]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"771", :path=>"/var/lib/puppet/ssl"}'
Debug: Using settings: adding file resource 'hostpubkey':
'File[/var/lib/puppet/ssl/public_keys/<redacted>.pem]{:backup=>false,
:group=>"puppet", :ensure=>:file, :loglevel=>:debug, :owner=>"puppet",
:links=>:follow, :mode=>"644",
:path=>"/var/lib/puppet/ssl/public_keys/<redacted>.pem"}'
Debug: Using settings: adding file resource 'requestdir':
'File[/var/lib/puppet/ssl/certificate_requests]{:backup=>false,
:group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet",
:links=>:follow, :mode=>"755",
:path=>"/var/lib/puppet/ssl/certificate_requests"}'
Debug: Using settings: adding file resource 'privatedir':
'File[/var/lib/puppet/ssl/private]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"750", :path=>"/var/lib/puppet/ssl/private"}'
Debug: Using settings: adding file resource 'hostcrl':
'File[/var/lib/puppet/ssl/crl.pem]{:backup=>false, :group=>"puppet",
:ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"644", :path=>"/var/lib/puppet/ssl/crl.pem"}'
Debug: Using settings: adding file resource 'confdir':
'File[/etc/puppet]{:backup=>false, :ensure=>:directory, :loglevel=>:debug,
:links=>:follow, :path=>"/etc/puppet"}'
Debug: Using settings: adding file resource 'certdir':
'File[/var/lib/puppet/ssl/certs]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"755", :path=>"/var/lib/puppet/ssl/certs"}'
Debug: Using settings: adding file resource 'hostprivkey':
'File[/var/lib/puppet/ssl/private_keys/<redacted>.pem]{:backup=>false,
:group=>"puppet", :ensure=>:file, :loglevel=>:debug, :owner=>"puppet",
:links=>:follow, :mode=>"640",
:path=>"/var/lib/puppet/ssl/private_keys/<redacted>.pem"}'
Debug: Using settings: adding file resource 'publickeydir':
'File[/var/lib/puppet/ssl/public_keys]{:backup=>false, :group=>"puppet",
:ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow,
:mode=>"755", :path=>"/var/lib/puppet/ssl/public_keys"}'
Debug: Using settings: adding file resource 'statedir':
'File[/var/lib/puppet/state]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :mode=>"1755",
:path=>"/var/lib/puppet/state"}'
Debug: /File[/var/lib/puppet/ssl/certs/<redacted>.pem]: Autorequiring
File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/public_keys/<redacted>.pem]: Autorequiring
File[/var/lib/puppet/ssl/public_keys]
Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/facts.d]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/private_keys/<redacted>.pem]:
Autorequiring File[/var/lib/puppet/ssl/private_keys]
Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring
File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/log/puppet/http.log]: Autorequiring File[/var/log/puppet]
Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring
File[/var/lib/puppet/ssl]
Debug: Finishing transaction 70319887796920
Debug: Using cached certificate for ca
Debug: Using cached certificate for <redacted>
Notice: Ignoring --listen on onetime run
Debug: Using settings: adding file resource 'graphdir':
'File[/var/lib/puppet/state/graphs]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet/state/graphs"}'
Debug: Using settings: adding file resource 'statefile':
'File[/var/lib/puppet/state/state.yaml]{:backup=>false, :ensure=>:file,
:loglevel=>:debug, :links=>:follow, :mode=>"660",
:path=>"/var/lib/puppet/state/state.yaml"}'
Debug: Using settings: adding file resource 'client_datadir':
'File[/var/lib/puppet/client_data]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :mode=>"750",
:path=>"/var/lib/puppet/client_data"}'
Debug: Using settings: adding file resource 'lastrunfile':
'File[/var/lib/puppet/state/last_run_summary.yaml]{:backup=>false,
:ensure=>:file, :loglevel=>:debug, :links=>:follow, :mode=>"644",
:path=>"/var/lib/puppet/state/last_run_summary.yaml"}'
Debug: Using settings: adding file resource 'resourcefile':
'File[/var/lib/puppet/state/resources.txt]{:backup=>false, :ensure=>:file,
:loglevel=>:debug, :owner=>"root", :links=>:follow, :mode=>"640",
:path=>"/var/lib/puppet/state/resources.txt"}'
Debug: Using settings: adding file resource 'clientyamldir':
'File[/var/lib/puppet/client_yaml]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :mode=>"750",
:path=>"/var/lib/puppet/client_yaml"}'
Debug: Using settings: adding file resource 'classfile':
'File[/var/lib/puppet/state/classes.txt]{:backup=>false, :ensure=>:file,
:loglevel=>:debug, :owner=>"root", :links=>:follow, :mode=>"640",
:path=>"/var/lib/puppet/state/classes.txt"}'
Debug: Using settings: adding file resource 'lastrunreport':
'File[/var/lib/puppet/state/last_run_report.yaml]{:backup=>false,
:ensure=>:file, :loglevel=>:debug, :links=>:follow, :mode=>"640",
:path=>"/var/lib/puppet/state/last_run_report.yaml"}'
Debug: Using settings: adding file resource 'clientbucketdir':
'File[/var/lib/puppet/clientbucket]{:backup=>false, :ensure=>:directory,
:loglevel=>:debug, :links=>:follow, :mode=>"750",
:path=>"/var/lib/puppet/clientbucket"}'
Debug: Finishing transaction 70319898970440
Debug: Loaded state in 0.00 seconds
Debug: Failed to load library 'msgpack' for feature 'msgpack'
Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing
Debug: node supports formats: pson yaml b64_zlib_yaml raw
Debug: Using cached certificate for ca
Debug: Using cached certificate for <redacted>
Debug: Using cached certificate_revocation_list for ca
Info: Retrieving plugin
Debug: Failed to load library 'msgpack' for feature 'msgpack'
Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing
Debug: file_metadata supports formats: pson yaml b64_zlib_yaml raw
Debug: Finishing transaction 70319890940640
Info: Loading facts in /var/lib/puppet/lib/facter/root_home.rb
Info: Loading facts in /var/lib/puppet/lib/facter/puppet_vardir.rb
Info: Loading facts in /var/lib/puppet/lib/facter/pe_version.rb
Info: Loading facts in /var/lib/puppet/lib/facter/sendmail_version.rb
Info: Loading facts in /var/lib/puppet/lib/facter/windows_common_appdata.rb
Info: Loading facts in /var/lib/puppet/lib/facter/salts.rb
Info: Loading facts in /var/lib/puppet/lib/facter/facter_dot_d.rb
Info: Loading facts in /var/lib/puppet/lib/facter/last_run.rb
Info: Loading facts in /var/lib/puppet/lib/facter/puppi_projects.rb
Debug: Failed to load library 'msgpack' for feature 'msgpack'
Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing
Debug: catalog supports formats: pson dot yaml b64_zlib_yaml raw
Debug: Executing '/bin/rpm --version'
Debug: Executing '/bin/rpm -ql rpm'
Debug: Executing '/bin/rpm --version'
Info: Caching catalog for <redacted>
Debug: Puppet::Type::Package::ProviderPkgin: file pkgin does not exist
Debug: Puppet::Type::Package::ProviderZypper: file /usr/bin/zypper does not
exist
Debug: Puppet::Type::Package::ProviderAptrpm: file apt-get does not exist
Debug: Puppet::Type::Package::ProviderSunfreeware: file pkg-get does not
exist
Debug: Puppet::Type::Package::ProviderFink: file /sw/bin/fink does not exist
Debug: Puppet::Type::Package::ProviderRug: file /usr/bin/rug does not exist
Debug: Puppet::Type::Package::ProviderPortupgrade: file
/usr/local/sbin/portinstall does not exist
Debug: Puppet::Type::Package::ProviderApt: file /usr/bin/apt-get does not
exist
Debug: Puppet::Type::Package::ProviderPacman: file /usr/bin/pacman does not
exist
Debug: Puppet::Type::Package::ProviderPortage: file /usr/bin/emerge does
not exist
Debug: Puppet::Type::Package::ProviderDpkg: file /usr/bin/dpkg does not
exist
Debug: Puppet::Type::Package::ProviderNim: file /usr/bin/lslpp does not
exist
Debug: Puppet::Type::Package::ProviderFreebsd: file /usr/sbin/pkg_delete
does not exist
Debug: Puppet::Type::Package::ProviderOpkg: file opkg does not exist
Debug: Puppet::Type::Package::ProviderSun: file /usr/bin/pkginfo does not
exist
Debug: Puppet::Type::Package::ProviderOpenbsd: file pkg_delete does not
exist
Debug: Puppet::Type::Package::ProviderAix: file /usr/bin/lslpp does not
exist
Debug: Puppet::Type::Package::ProviderUp2date: file /usr/sbin/up2date-nox
does not exist
Debug: Puppet::Type::Package::ProviderPkg: file /usr/bin/pkg does not exist
Debug: Puppet::Type::Package::ProviderHpux: file /usr/sbin/swlist does not
exist
Debug: Puppet::Type::Package::ProviderAptitude: file /usr/bin/aptitude does
not exist
Debug: Puppet::Type::Package::ProviderUrpmi: file urpmq does not exist
Debug: Puppet::Type::Package::ProviderPorts: file
/usr/local/sbin/portupgrade does not exist
Debug: Puppet::Type::Service::ProviderDebian: file /usr/sbin/update-rc.d
does not exist
Debug: Puppet::Type::Service::ProviderRunit: file /usr/bin/sv does not exist
Debug: Puppet::Type::Service::ProviderOpenrc: file /bin/rc-status does not
exist
Debug: Puppet::Type::Service::ProviderGentoo: file /sbin/rc-update does not
exist
Debug: Puppet::Type::Service::ProviderSystemd: file systemctl does not exist
Debug: Puppet::Type::Service::ProviderLaunchd: file /bin/launchctl does not
exist
Debug: Puppet::Type::Service::ProviderDaemontools: file /usr/bin/svstat
does not exist
Debug: /Group[RHELadmin]: Provider groupadd does not support features
manages_members; not managing attribute members
Debug: /Group[uber]: Provider groupadd does not support features
manages_members; not managing attribute members
Debug: Creating default schedules
Debug: Loaded state in 0.00 seconds
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/require:
requires File[/home/inventory]
Debug: /Stage[main]/Ntp::Service/before: requires Anchor[ntp::end]
Debug: /Stage[main]/Sssd::Install/before: requires Class[Sssd::Config]
Debug: /Stage[main]/Sssd::Config/notify: subscribes to Class[Sssd::Service]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh]/require:
requires File[/home/inventory]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh]/before:
requires Anchor[accounts::ssh_dir_created_inventory]
Debug: /Stage[main]/Ntp::Config/notify: subscribes to Class[Ntp::Service]
Debug: /Stage[main]/Accounts/Accounts::Group[RHELadmin]/require: requires
User[inventory]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/require: requires
Anchor[accounts::users_created]
Debug: /Stage[main]/Openldap/Anchor[openldap::begin]/before: requires
Class[Openldap::Install]
Debug: /Stage[main]/Ntp::Install/before: requires Class[Ntp::Config]
Debug: /Stage[main]/Ntp/Anchor[ntp::begin]/before: requires
Class[Ntp::Install]
Debug: /Stage[main]/Openldap::Install/before: requires
Class[Openldap::Config]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]/require:
requires Anchor[accounts::ssh_dir_created_inventory]
Debug: /Stage[main]/Sssd::Service/before: requires Class[Sssd]
Debug: /Stage[main]/Openldap::Config/before: requires Anchor[openldap::end]
Debug: /Stage[main]/Accounts::Config/before: requires
Anchor[accounts::users_created]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/File[/home/inventory/.hushlogin]:
Autorequiring File[/home/inventory]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh]:
Autorequiring User[inventory]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh]:
Autorequiring Group[RHELadmin]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/File[/home/inventory]:
Autorequiring User[inventory]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/File[/home/inventory]:
Autorequiring Group[RHELadmin]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]:
Autorequiring User[inventory]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]:
Autorequiring File[/home/inventory/.ssh]
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]:
Autorequiring Group[RHELadmin]
Debug:
/Stage[main]/Openldap::Config/Openldap::Configuration[/etc/openldap/ldap.conf]/File[/etc/openldap/ldap.conf]:
Autorequiring File[/etc/openldap]
Info: Applying configuration version '1485781973'
Debug: Prefetching yum resources for package
Debug: Executing '/bin/rpm --version'
Debug: Executing '/bin/rpm -qa --nosignature --nodigest --qf '%{NAME}
%|EPOCH?{%{EPOCH}}:{0}| %{VERSION} %{RELEASE} %{ARCH}\n''
Debug: Exec[disable mkhomedir](provider=posix): Executing check '/bin/grep
-E '^USEMKHOMEDIR=yes$' /etc/sysconfig/authconfig'
Debug: Executing '/bin/grep -E '^USEMKHOMEDIR=yes$'
/etc/sysconfig/authconfig'
Debug: Executing '/sbin/service ntpd status'
Debug: Executing '/sbin/chkconfig ntpd'
Debug: Prefetching parsed resources for ssh_authorized_key
Debug:
/Stage[main]/Accounts/Accounts::User[inventory]/File[/home/inventory/.hushlogin]:
Nothing to manage: no ensure and the resource doesn't exist
Debug: Executing '/sbin/service sssd status'
Debug: Executing '/sbin/chkconfig sssd'
Debug: Finishing transaction 70319871760320
Debug: Storing state
Debug: Stored state in 0.02 seconds
Notice: Finished catalog run in 0.70 seconds
```
|
Indentation shouldn't be a problem, it seems to be a valid YAML. Just to be sure, you can try to write it this way: options: [ 'from="<redacted>"' ] Which version of |
It did not change anything. As a matter of fact it parsed it and at the end
replaced with previous format.
We use puppet 3.6 and 3.8
…On Mon, Jan 30, 2017 at 9:45 AM, Tomas Barton ***@***.***> wrote:
Indentation shouldn't be a problem, it seems to be a valid YAML. Just to
be sure, you can try to write it this way:
options: [ 'from="<redacted>"' ]
Which version of puppet agent do you use? It is also puppet 3.6?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#72 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AS2moy-xMQpEdyUujPmAmHMAQLc7hAusks5rXfd9gaJpZM4Lw5rB>
.
--
YP
|
It seems to be working on CentOS 7:
though the key shouldn't be there twice. The configuration is following. I not sure what could be different in your environment. |
Attached is debug from the moment where there is nothing on the system
configured by the module yet.
Please note the following excerpt:
…--- /home/inventory/.ssh/authorized_keys 2017-01-17
15:17:14.052187666 -0500
+++ /tmp/puppet-file20170201-20020-ypxdid 2017-02-01
09:15:07.091174874 -0500
@@ -1,4 +1,2 @@
-# HEADER: This file was autogenerated at 2017-01-17 15:17:14 -0500
-# HEADER: by puppet. While it can still be managed manually, it
-# HEADER: is definitely not recommended.
-from="10.<redacted>" ssh-rsa AAAAB3Nza<redacted>
+# NOTE: This file was autogenerated by Puppet
+ssh-rsa AAAAB3Nz<redacted>
It looks like it does notice the options at the beginning, but at the end
it removes them, along with the initial HEADER lines.
Same happens if I set "purge_ssh_keys: true" and the keys start refreshing
every puppet run (I know it is another bug, but nevertheless).
On Mon, Jan 30, 2017 at 1:07 PM, Tomas Barton ***@***.***> wrote:
It seems to be working on CentOS 7
<https://travis-ci.org/deric/puppet-accounts/jobs/196639400>:
centos7-3.8 16:42:45$ /bin/sh -c cat\ /home/george/.ssh/authorized_keys
# HEADER: This file was autogenerated at 2017-01-30 16:42:44 +0000
# HEADER: by puppet. While it can still be managed manually, it
# HEADER: is definitely not recommended.
# NOTE: This file was autogenerated by Puppet
ssh-dss AAAAB2...19Q== ***@***.***_ssh-dss
from="*.sales.example.net,!pc.sales.example.net",permitopen="192.0.2.1:80" ssh-dss AAAAB2...19Q== ***@***.***
though the key shouldn't be there twice. The configuration is following
<https://github.com/deric/puppet-accounts/blob/c03d9095aa11f6cfcc5aea22666bd1b7b1c5b6bd/spec/acceptance/hieradata/default.yaml>.
I not sure what could be different in your environment.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#72 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AS2mo3Od6gyg0pSj2OxNUKY8hv-mOk33ks5rXibsgaJpZM4Lw5rB>
.
--
YP
Debug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:path=>"/etc/puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/dsimport does not exist
Debug: Puppet::Type::User::ProviderUser_role_add: file roleadd does not exist
Debug: Puppet::Type::User::ProviderPw: file pw does not exist
Debug: Failed to load library 'ldap' for feature 'ldap'
Debug: Puppet::Type::User::ProviderLdap: feature ldap is missing
Debug: Puppet::Type::Group::ProviderDirectoryservice: file /usr/bin/dscl does not exist
Debug: Puppet::Type::Group::ProviderPw: file pw does not exist
Debug: Failed to load library 'ldap' for feature 'ldap'
Debug: Puppet::Type::Group::ProviderLdap: feature ldap is missing
Debug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:path=>"/var/lib/puppet", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:path=>"/var/log/puppet", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:path=>"/var/lib/puppet/state", :mode=>"1755", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:path=>"/var/run/puppet", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:path=>"/var/lib/puppet/lib", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:path=>"/var/lib/puppet/ssl/certs", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:path=>"/var/lib/puppet/ssl", :mode=>"771", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:path=>"/var/lib/puppet/ssl/public_keys", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:path=>"/var/lib/puppet/ssl/certificate_requests", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:path=>"/var/lib/puppet/ssl/private_keys", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:path=>"/var/lib/puppet/ssl/private", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/<redacted>]{:path=>"/var/lib/puppet/ssl/certs/<redacted>", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/<redacted>]{:path=>"/var/lib/puppet/ssl/private_keys/<redacted>", :mode=>"640", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/<redacted>]{:path=>"/var/lib/puppet/ssl/public_keys/<redacted>", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:path=>"/var/lib/puppet/ssl/certs/ca.pem", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:path=>"/var/lib/puppet/ssl/crl.pem", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:path=>"/var/lib/puppet/state/state.yaml", :mode=>"660", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:path=>"/var/lib/puppet/client_yaml", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:path=>"/var/lib/puppet/client_data", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'classfile': 'File[/var/lib/puppet/state/classes.txt]{:path=>"/var/lib/puppet/state/classes.txt", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'resourcefile': 'File[/var/lib/puppet/state/resources.txt]{:path=>"/var/lib/puppet/state/resources.txt", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:path=>"/var/lib/puppet/clientbucket", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:path=>"/var/lib/puppet/state/last_run_summary.yaml", :mode=>"644", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:path=>"/var/lib/puppet/state/last_run_report.yaml", :mode=>"640", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:path=>"/var/lib/puppet/state/graphs", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'pluginfactdest': 'File[/var/lib/puppet/facts.d]{:path=>"/var/lib/puppet/facts.d", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certs/<redacted>.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/ssl/private_keys/<redacted>.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys]
Debug: /File[/var/lib/puppet/ssl/public_keys/<redacted>.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys]
Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/state/state.yaml]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/client_yaml]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/client_data]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/state/classes.txt]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/state/resources.txt]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/clientbucket]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/state/last_run_summary.yaml]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/state/last_run_report.yaml]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/state/graphs]: Autorequiring File[/var/lib/puppet/state]
Debug: /File[/var/lib/puppet/facts.d]: Autorequiring File[/var/lib/puppet]
Debug: Finishing transaction 10176200
Debug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:path=>"/etc/puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:path=>"/var/lib/puppet", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:path=>"/var/log/puppet", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:path=>"/var/lib/puppet/state", :mode=>"1755", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:path=>"/var/run/puppet", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:path=>"/var/lib/puppet/lib", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:path=>"/var/lib/puppet/ssl/certs", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:path=>"/var/lib/puppet/ssl", :mode=>"771", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:path=>"/var/lib/puppet/ssl/public_keys", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:path=>"/var/lib/puppet/ssl/certificate_requests", :mode=>"755", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:path=>"/var/lib/puppet/ssl/private_keys", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:path=>"/var/lib/puppet/ssl/private", :mode=>"750", :owner=>"puppet", :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/<redacted>.pem]{:path=>"/var/lib/puppet/ssl/certs/<redacted>.pem", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/<redacted>.pem]{:path=>"/var/lib/puppet/ssl/private_keys/<redacted>.pem", :mode=>"640", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/<redacted>.pem]{:path=>"/var/lib/puppet/ssl/public_keys/<redacted>.pem", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:path=>"/var/lib/puppet/ssl/certs/ca.pem", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:path=>"/var/lib/puppet/ssl/crl.pem", :mode=>"644", :owner=>"puppet", :group=>"puppet", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'pluginfactdest': 'File[/var/lib/puppet/facts.d]{:path=>"/var/lib/puppet/facts.d", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet]
Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/ssl/certs/<redacted>.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/ssl/private_keys/<redacted>.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys]
Debug: /File[/var/lib/puppet/ssl/public_keys/<redacted>.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys]
Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]
Debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl]
Debug: /File[/var/lib/puppet/facts.d]: Autorequiring File[/var/lib/puppet]
Debug: Finishing transaction 15961980
Debug: Using cached certificate for ca
Debug: Using cached certificate for <redacted>
Notice: Ignoring --listen on onetime run
Debug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:path=>"/var/lib/puppet/state/state.yaml", :mode=>"660", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:path=>"/var/lib/puppet/client_yaml", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:path=>"/var/lib/puppet/client_data", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'classfile': 'File[/var/lib/puppet/state/classes.txt]{:path=>"/var/lib/puppet/state/classes.txt", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'resourcefile': 'File[/var/lib/puppet/state/resources.txt]{:path=>"/var/lib/puppet/state/resources.txt", :mode=>"640", :owner=>"root", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:path=>"/var/lib/puppet/clientbucket", :mode=>"750", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:path=>"/var/lib/puppet/state/last_run_summary.yaml", :mode=>"644", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:path=>"/var/lib/puppet/state/last_run_report.yaml", :mode=>"640", :ensure=>:file, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:path=>"/var/lib/puppet/state/graphs", :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :backup=>false}'
Debug: Finishing transaction 16245360
Debug: Loaded state in 0.03 seconds
Debug: Failed to load library 'msgpack' for feature 'msgpack'
Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing
Debug: node supports formats: pson b64_zlib_yaml yaml raw
Debug: Using cached certificate for ca
Debug: Using cached certificate for <redacted>
Debug: Using cached certificate_revocation_list for ca
Info: Retrieving plugin
Debug: Failed to load library 'msgpack' for feature 'msgpack'
Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing
Debug: file_metadata supports formats: pson b64_zlib_yaml yaml raw
Debug: Finishing transaction 15445340
Info: Loading facts in /var/lib/puppet/lib/facter/facter_dot_d.rb
Info: Loading facts in /var/lib/puppet/lib/facter/pe_version.rb
Info: Loading facts in /var/lib/puppet/lib/facter/windows_common_appdata.rb
Info: Loading facts in /var/lib/puppet/lib/facter/last_run.rb
Info: Loading facts in /var/lib/puppet/lib/facter/root_home.rb
Info: Loading facts in /var/lib/puppet/lib/facter/puppi_projects.rb
Info: Loading facts in /var/lib/puppet/lib/facter/puppet_vardir.rb
Info: Loading facts in /var/lib/puppet/lib/facter/salts.rb
Info: Loading facts in /var/lib/puppet/lib/facter/sendmail_version.rb
Debug: Failed to load library 'msgpack' for feature 'msgpack'
Debug: Puppet::Network::Format[msgpack]: feature msgpack is missing
Debug: catalog supports formats: pson b64_zlib_yaml yaml dot raw
Debug: Executing '/bin/rpm --version'
Debug: Executing '/bin/rpm --version'
Debug: Executing '/bin/rpm -ql rpm'
Info: Caching catalog for <redacted>
Debug: Puppet::Type::Package::ProviderHpux: file /usr/sbin/swinstall does not exist
Debug: Puppet::Type::Package::ProviderOpenbsd: file pkg_info does not exist
Debug: Puppet::Type::Package::ProviderFreebsd: file /usr/sbin/pkg_info does not exist
Debug: Puppet::Type::Package::ProviderPorts: file /usr/local/sbin/portupgrade does not exist
Debug: Puppet::Type::Package::ProviderSun: file /usr/bin/pkginfo does not exist
Debug: Puppet::Type::Package::ProviderSunfreeware: file pkg-get does not exist
Debug: Puppet::Type::Package::ProviderPacman: file /usr/bin/pacman does not exist
Debug: Puppet::Type::Package::ProviderPkgin: file pkgin does not exist
Debug: Puppet::Type::Package::ProviderOpkg: file opkg does not exist
Debug: Puppet::Type::Package::ProviderDpkg: file /usr/bin/dpkg does not exist
Debug: Puppet::Type::Package::ProviderAptrpm: file apt-get does not exist
Debug: Puppet::Type::Package::ProviderRug: file /usr/bin/rug does not exist
Debug: Puppet::Type::Package::ProviderPortage: file /usr/bin/emerge does not exist
Debug: Puppet::Type::Package::ProviderAix: file /usr/bin/lslpp does not exist
Debug: Puppet::Type::Package::ProviderZypper: file /usr/bin/zypper does not exist
Debug: Puppet::Type::Package::ProviderPkg: file /usr/bin/pkg does not exist
Debug: Puppet::Type::Package::ProviderApt: file /usr/bin/apt-get does not exist
Debug: Puppet::Type::Package::ProviderAptitude: file /usr/bin/aptitude does not exist
Debug: Puppet::Type::Package::ProviderNim: file /usr/sbin/nimclient does not exist
Debug: Puppet::Type::Package::ProviderFink: file /sw/bin/fink does not exist
Debug: Puppet::Type::Package::ProviderUp2date: file /usr/sbin/up2date-nox does not exist
Debug: Puppet::Type::Package::ProviderPortupgrade: file /usr/local/sbin/portupgrade does not exist
Debug: Puppet::Type::Package::ProviderUrpmi: file urpmi does not exist
Debug: Puppet::Type::Service::ProviderOpenrc: file /bin/rc-status does not exist
Debug: Puppet::Type::Service::ProviderDebian: file /usr/sbin/update-rc.d does not exist
Debug: Puppet::Type::Service::ProviderUpstart: 0 confines (of 2) were true
Debug: Puppet::Type::Service::ProviderGentoo: file /sbin/rc-update does not exist
Debug: Puppet::Type::Service::ProviderLaunchd: file /bin/launchctl does not exist
Debug: Puppet::Type::Service::ProviderRunit: file /usr/bin/sv does not exist
Debug: /Group[RHELadmin]: Provider groupadd does not support features manages_members; not managing attribute members
Debug: /Group[uber]: Provider groupadd does not support features manages_members; not managing attribute members
Debug: Creating default schedules
Debug: Loaded state in 0.02 seconds
Debug: /Stage[main]/Accounts::Config/before: requires Anchor[accounts::users_created]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/require: requires Anchor[accounts::users_created]
Debug: /Stage[main]/Accounts/Accounts::Group[RHELadmin]/require: requires User[inventory]
Debug: /Stage[main]/Chrony::Install/before: requires Class[Chrony::Config]
Debug: /Stage[main]/Chrony::Config/notify: subscribes to Class[Chrony::Service]
Debug: /Stage[main]/Chrony::Service/before: requires Anchor[chrony::end]
Debug: /Stage[main]/Chrony/Anchor[chrony::begin]/before: requires Class[Chrony::Install]
Debug: /Stage[main]/Openldap::Install/before: requires Class[Openldap::Config]
Debug: /Stage[main]/Openldap::Config/before: requires Anchor[openldap::end]
Debug: /Stage[main]/Openldap/Anchor[openldap::begin]/before: requires Class[Openldap::Install]
Debug: /Stage[main]/Sendmail::Package/require: requires Anchor[sendmail::begin]
Debug: /Stage[main]/Sendmail::Package/before: requires Anchor[sendmail::config]
Debug: /Stage[main]/Sendmail::Local_host_names/require: requires Class[Sendmail::Package]
Debug: /Stage[main]/Sendmail::Local_host_names/File[/etc/mail/local-host-names]/notify: subscribes to Class[Sendmail::Service]
Debug: /Stage[main]/Sendmail::Relay_domains/require: requires Class[Sendmail::Package]
Debug: /Stage[main]/Sendmail::Relay_domains/File[/etc/mail/relay-domains]/notify: subscribes to Class[Sendmail::Service]
Debug: /Stage[main]/Sendmail::Trusted_users/require: requires Class[Sendmail::Package]
Debug: /Stage[main]/Sendmail::Trusted_users/File[/etc/mail/trusted-users]/notify: subscribes to Class[Sendmail::Service]
Debug: /Stage[main]/Sendmail::Mc/require: requires Class[Sendmail::Package]
Debug: /Stage[main]/Sendmail::Mc/before: requires Anchor[sendmail::config]
Debug: /Stage[main]/Sendmail::Mc/notify: subscribes to Class[Sendmail::Service]
Debug: /Stage[main]/Sendmail::Makeall/Exec[sendmail::makeall]/require: requires Class[Sendmail::Package]
Debug: /Stage[main]/Sendmail::Makeall/Exec[sendmail::makeall]/before: requires Class[Sendmail::Service]
Debug: /Stage[main]/Sendmail::Mc/Concat::Fragment[sendmail_mc-header]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Sendmail::Submit/require: requires Class[Sendmail::Package]
Debug: /Stage[main]/Sendmail::Submit/before: requires Anchor[sendmail::config]
Debug: /Stage[main]/Sendmail::Submit/notify: subscribes to Class[Sendmail::Service]
Debug: /Stage[main]/Sendmail::Submit/File[/etc/mail/submit.mc]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Sendmail::Submit/File[/etc/mail/submit.mc]/notify: subscribes to Class[Sendmail::Service]
Debug: /Stage[main]/Sendmail::Service/require: requires Anchor[sendmail::config]
Debug: /Stage[main]/Sendmail::Service/before: requires Anchor[sendmail::end]
Debug: /Stage[main]/Sssd::Install/before: requires Class[Sssd::Config]
Debug: /Stage[main]/Sssd::Config/notify: subscribes to Class[Sssd::Service]
Debug: /Stage[main]/Sssd::Service/before: requires Class[Sssd]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/require: requires File[/home/inventory]
Debug: /Stage[main]/Sendmail::Mc/Sendmail::Mc::Ostype[linux]/Concat::Fragment[sendmail_mc-ostype-linux]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Sendmail::Mc/Sendmail::Mc::Define[SMART_HOST]/Concat::Fragment[sendmail_mc-define-SMART_HOST]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Sendmail::Mc::Define_section/Concat::Fragment[sendmail_mc-define_header]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Sendmail::Mc/Sendmail::Mc::Daemon_options[MTA-v4]/Concat::Fragment[sendmail_mc-daemon_options-MTA-v4]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Sendmail::Mc::Macro_section/Concat::Fragment[sendmail_mc-macro_header]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Sendmail::Mc/Sendmail::Mc::Daemon_options[MTA-v6]/Concat::Fragment[sendmail_mc-daemon_options-MTA-v6]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Sendmail::Mc/Sendmail::Mc::Mailer[smtp]/Concat::Fragment[sendmail_mc-mailer-smtp]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Sendmail::Mc::Mailer_section/Concat::Fragment[sendmail_mc-mailer_header]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Sendmail::Mc/Sendmail::Mc::Mailer[local]/Concat::Fragment[sendmail_mc-mailer-local]/notify: subscribes to Class[Sendmail::Makeall]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh]/require: requires File[/home/inventory]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh]/before: requires Anchor[accounts::ssh_dir_created_inventory]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]/require: requires Anchor[accounts::ssh_dir_created_inventory]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/File[/home/inventory]: Autorequiring User[inventory]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/File[/home/inventory]: Autorequiring Group[RHELadmin]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/File[/home/inventory/.hushlogin]: Autorequiring File[/home/inventory]
Debug: /Stage[main]/Openldap::Config/Openldap::Configuration[/etc/openldap/ldap.conf]/File[/etc/openldap/ldap.conf]: Autorequiring File[/etc/openldap]
Debug: /Stage[main]/Sendmail::Mc/Concat[sendmail.mc]/Concat_file[sendmail.mc]: Autorequiring Concat_fragment[sendmail_mc-header]
Debug: /Stage[main]/Sendmail::Mc/Concat[sendmail.mc]/Concat_file[sendmail.mc]: Autorequiring Concat_fragment[sendmail_mc-ostype-linux]
Debug: /Stage[main]/Sendmail::Mc/Concat[sendmail.mc]/Concat_file[sendmail.mc]: Autorequiring Concat_fragment[sendmail_mc-define-SMART_HOST]
Debug: /Stage[main]/Sendmail::Mc/Concat[sendmail.mc]/Concat_file[sendmail.mc]: Autorequiring Concat_fragment[sendmail_mc-define_header]
Debug: /Stage[main]/Sendmail::Mc/Concat[sendmail.mc]/Concat_file[sendmail.mc]: Autorequiring Concat_fragment[sendmail_mc-daemon_options-MTA-v4]
Debug: /Stage[main]/Sendmail::Mc/Concat[sendmail.mc]/Concat_file[sendmail.mc]: Autorequiring Concat_fragment[sendmail_mc-macro_header]
Debug: /Stage[main]/Sendmail::Mc/Concat[sendmail.mc]/Concat_file[sendmail.mc]: Autorequiring Concat_fragment[sendmail_mc-daemon_options-MTA-v6]
Debug: /Stage[main]/Sendmail::Mc/Concat[sendmail.mc]/Concat_file[sendmail.mc]: Autorequiring Concat_fragment[sendmail_mc-mailer-smtp]
Debug: /Stage[main]/Sendmail::Mc/Concat[sendmail.mc]/Concat_file[sendmail.mc]: Autorequiring Concat_fragment[sendmail_mc-mailer_header]
Debug: /Stage[main]/Sendmail::Mc/Concat[sendmail.mc]/Concat_file[sendmail.mc]: Autorequiring Concat_fragment[sendmail_mc-mailer-local]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh]: Autorequiring User[inventory]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh]: Autorequiring Group[RHELadmin]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]: Autorequiring File[/home/inventory/.ssh]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]: Autorequiring User[inventory]
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]: Autorequiring Group[RHELadmin]
Info: Applying configuration version '1485958505'
Debug: Prefetching yum resources for package
Debug: Executing '/bin/rpm --version'
Debug: Executing '/bin/rpm -qa --nosignature --nodigest --qf '%{NAME} %|EPOCH?{%{EPOCH}}:{0}| %{VERSION} %{RELEASE} %{ARCH}\n''
Debug: Exec[disable mkhomedir](provider=posix): Executing check '/bin/grep -E '^USEMKHOMEDIR=yes$' /etc/sysconfig/authconfig'
Debug: Executing '/bin/grep -E '^USEMKHOMEDIR=yes$' /etc/sysconfig/authconfig'
Debug: Executing '/sbin/usermod -p $6$BEgsLqXv$RB9IM47laX7LSK709MdYGYbhMyKdgoyR2iou.qksAt/PsdonPB.t4dybtSiepoSTJRqOUe1rn/y.v/ghjjMWr1 inventory'
Notice: /Stage[main]/Accounts/Accounts::User[inventory]/User[inventory]/password: changed password
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/User[inventory]: The container Accounts::User[inventory] will propagate my refresh event
Debug: Prefetching parsed resources for ssh_authorized_key
Debug: Executing 'diff -u /home/inventory/.ssh/authorized_keys /tmp/puppet-file20170201-20020-ypxdid'
Notice: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]/content:
--- /home/inventory/.ssh/authorized_keys 2017-01-17 15:17:14.052187666 -0500
+++ /tmp/puppet-file20170201-20020-ypxdid 2017-02-01 09:15:07.091174874 -0500
@@ -1,4 +1,2 @@
-# HEADER: This file was autogenerated at 2017-01-17 15:17:14 -0500
-# HEADER: by puppet. While it can still be managed manually, it
-# HEADER: is definitely not recommended.
-from="10.<redacted>" ssh-rsa AAAAB3Nza<redacted>
+# NOTE: This file was autogenerated by Puppet
+ssh-rsa AAAAB3Nz<redacted>
Info: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]: Filebucketed /home/inventory/.ssh/authorized_keys to puppet with sum 85ae85b18580458373bbb65814e1fe3e
Notice: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]/content: content changed '{md5}85ae85b18580458373bbb65814e1fe3e' to '{md5}53af400e984234dc4a86e6d8267243f8'
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/Accounts::Authorized_keys[inventory]/File[/home/inventory/.ssh/authorized_keys]: The container Accounts::Authorized_keys[inventory] will propagate my refresh event
Debug: Accounts::Authorized_keys[inventory]: The container Accounts::User[inventory] will propagate my refresh event
Debug: /Stage[main]/Accounts/Accounts::User[inventory]/File[/home/inventory/.hushlogin]: Nothing to manage: no ensure and the resource doesn't exist
Debug: Accounts::User[inventory]: The container Class[Accounts] will propagate my refresh event
Debug: Class[Accounts]: The container Stage[main] will propagate my refresh event
Debug: Executing '/bin/systemctl is-active chronyd'
Debug: Executing '/bin/systemctl is-enabled chronyd'
Debug: Executing '/bin/systemctl is-active sssd'
Debug: Executing '/bin/systemctl is-enabled sssd'
Debug: Executing '/bin/systemctl is-active sendmail'
Debug: Executing '/bin/systemctl is-enabled sendmail'
Debug: Finishing transaction 17806320
Debug: Storing state
Debug: Stored state in 0.03 seconds
Notice: Finished catalog run in 0.55 seconds
|
Currently I see there multiple problems. In certain situations we bypass using |
Released in v1.5.3. Please reopen if the problem persists. |
I am not sure what I might be doing wrong, but from= never appears in the public key entry.
I have not tried other options though.
The text was updated successfully, but these errors were encountered: