[root@ca-sna-pm01 manifests]# puppet apply --debug --exec " group { "bb":
name => 'bb',
ensure => present,
gid => 500,
members => 'bb,mtg',
}
"
> > > > > >
[0;36mDebug: Puppet::Type::Group::ProviderLdap: true value when expecting false[0m
[0;36mDebug: Puppet::Type::Group::ProviderDirectoryservice: file /usr/bin/dscl does not exist[0m
[0;36mDebug: Puppet::Type::Group::ProviderPw: file pw does not exist[0m
[0;36mDebug: /Group[bb]: Provider groupadd does not support features manages_members; not managing attribute members[0m
[0;36mDebug: /Group[bb]: Provider groupadd does not support features libuser; not managing attribute forcelocal[0m
[0;36mDebug: Creating default schedules[0m
[0;36mDebug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/var/lib/puppet"}'[0m
[0;36mDebug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/client_data"}'[0m
[0;36mDebug: Puppet::Type::User::ProviderLdap: true value when expecting false[0m
[0;36mDebug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/dsimport does not exist[0m
[0;36mDebug: Puppet::Type::User::ProviderPw: file pw does not exist[0m
[0;36mDebug: Puppet::Type::User::ProviderUser_role_add: file roledel does not exist[0m
[0;36mDebug: /User[puppet]: Provider useradd does not support features libuser; not managing attribute forcelocal[0m
[0;36mDebug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/ca-sna-pm01.mercurytechnology.com.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/public_keys/ca-sna-pm01.mercurytechnology.com.pem"}'[0m
[0;36mDebug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"755", :loglevel=>:debug, :path=>"/var/run/puppet"}'[0m
[0;36mDebug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/var/lib/puppet/lib"}'[0m
[0;36mDebug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/public_keys"}'[0m
[0;36mDebug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/private"}'[0m
[0;36mDebug: /Group[puppet]: Provider groupadd does not support features libuser; not managing attribute forcelocal[0m
[0;36mDebug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:links=>:follow, :group=>"puppet", :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"750", :loglevel=>:debug, :path=>"/var/log/puppet"}'[0m
[0;36mDebug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:links=>:follow, :ensure=>:file, :backup=>false, :mode=>"660", :loglevel=>:debug, :path=>"/var/lib/puppet/state/state.yaml"}'[0m
[0;36mDebug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/ca-sna-pm01.mercurytechnology.com.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certs/ca-sna-pm01.mercurytechnology.com.pem"}'[0m
[0;36mDebug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/clientbucket"}'[0m
[0;36mDebug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certs/ca.pem"}'[0m
[0;36mDebug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/crl.pem"}'[0m
[0;36mDebug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:links=>:follow, :ensure=>:file, :backup=>false, :mode=>"644", :loglevel=>:debug, :path=>"/var/lib/puppet/state/last_run_summary.yaml"}'[0m
[0;36mDebug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certs"}'[0m
[0;36mDebug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/var/lib/puppet/state/graphs"}'[0m
[0;36mDebug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/certificate_requests"}'[0m
[0;36mDebug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:links=>:follow, :ensure=>:directory, :backup=>false, :loglevel=>:debug, :path=>"/etc/puppet"}'[0m
[0;36mDebug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/client_yaml"}'[0m
[0;36mDebug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/ca-sna-pm01.mercurytechnology.com.pem]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"puppet", :mode=>"600", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/private_keys/ca-sna-pm01.mercurytechnology.com.pem"}'[0m
[0;36mDebug: Using settings: adding file resource 'resourcefile': 'File[/var/lib/puppet/state/resources.txt]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"root", :mode=>"640", :loglevel=>:debug, :path=>"/var/lib/puppet/state/resources.txt"}'[0m
[0;36mDebug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:links=>:follow, :ensure=>:directory, :backup=>false, :mode=>"1755", :loglevel=>:debug, :path=>"/var/lib/puppet/state"}'[0m
[0;36mDebug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:links=>:follow, :ensure=>:file, :backup=>false, :mode=>"640", :loglevel=>:debug, :path=>"/var/lib/puppet/state/last_run_report.yaml"}'[0m
[0;36mDebug: Using settings: adding file resource 'httplog': 'File[/var/log/puppet/http.log]{:links=>:follow, :ensure=>:file, :backup=>false, :owner=>"root", :mode=>"640", :loglevel=>:debug, :path=>"/var/log/puppet/http.log"}'[0m
[0;36mDebug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"771", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl"}'[0m
[0;36mDebug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:links=>:follow, :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/ssl/private_keys"}'[0m
[0;36mDebug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl][0m
[0;36mDebug: /File[/var/lib/puppet/state/last_run_report.yaml]: Autorequiring File[/var/lib/puppet/state][0m
[0;36mDebug: /File[/var/lib/puppet/state/state.yaml]: Autorequiring File[/var/lib/puppet/state][0m
[0;36mDebug: /File[/var/lib/puppet/clientbucket]: Autorequiring File[/var/lib/puppet][0m
[0;36mDebug: /File[/var/lib/puppet/state/last_run_summary.yaml]: Autorequiring File[/var/lib/puppet/state][0m
[0;36mDebug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl][0m
[0;36mDebug: /File[/var/lib/puppet/client_yaml]: Autorequiring File[/var/lib/puppet][0m
[0;36mDebug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl][0m
[0;36mDebug: /File[/var/lib/puppet/ssl/public_keys/ca-sna-pm01.mercurytechnology.com.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys][0m
[0;36mDebug: /File[/var/lib/puppet/ssl/private_keys/ca-sna-pm01.mercurytechnology.com.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys][0m
[0;36mDebug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl][0m
[0;36mDebug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl][0m
[0;36mDebug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs][0m
[0;36mDebug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet][0m
[0;36mDebug: /File[/var/lib/puppet/client_data]: Autorequiring File[/var/lib/puppet][0m
[0;36mDebug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet][0m
[0;36mDebug: /File[/var/lib/puppet/ssl/certs/ca-sna-pm01.mercurytechnology.com.pem]: Autorequiring File[/var/lib/puppet/ssl/certs][0m
[0;36mDebug: /File[/var/log/puppet/http.log]: Autorequiring File[/var/log/puppet][0m
[0;36mDebug: /File[/var/lib/puppet/state/graphs]: Autorequiring File[/var/lib/puppet/state][0m
[0;36mDebug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl][0m
[0;36mDebug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet][0m
[0;36mDebug: /File[/var/lib/puppet/state/resources.txt]: Autorequiring File[/var/lib/puppet/state][0m
[0;36mDebug: Finishing transaction 70000528421020[0m
[0;36mDebug: Loaded state in 0.00 seconds[0m
[0;36mDebug: Loaded state in 0.00 seconds[0m
[0;32mInfo: Applying configuration version '1384804821'[0m
[0;36mDebug: /Schedule[daily]: Skipping device resources because running on a host[0m
[0;36mDebug: /Schedule[monthly]: Skipping device resources because running on a host[0m
[0;36mDebug: /Schedule[hourly]: Skipping device resources because running on a host[0m
[0;36mDebug: /Schedule[never]: Skipping device resources because running on a host[0m
[0;36mDebug: /Schedule[weekly]: Skipping device resources because running on a host[0m
[0;36mDebug: /Schedule[puppet]: Skipping device resources because running on a host[0m
[0;36mDebug: Finishing transaction 70000527187220[0m
[0;36mDebug: Storing state[0m
[0;36mDebug: Stored state in 0.03 seconds[0m
[mNotice: Finished catalog run in 0.16 seconds[0m
[0;36mDebug: Using settings: adding file resource 'rrddir': 'File[/var/lib/puppet/rrd]{:links=>:follow, :group=>"puppet", :ensure=>:directory, :backup=>false, :owner=>"puppet", :mode=>"750", :loglevel=>:debug, :path=>"/var/lib/puppet/rrd"}'[0m
[0;36mDebug: Finishing transaction 70000528357160[0m
[0;36mDebug: Received report to process from ca-sna-pm01.mercurytechnology.com[0m
[0;36mDebug: Processing report from ca-sna-pm01.mercurytechnology.com with processor Puppet::Reports::Store[0m
[root@ca-sna-pm01 manifests]# [root@ca-sna-pm01 manifests]# [root@ca-sna-pm01 manifests]# [root@ca-sna-pm01 manifests]#
[root@ca-sna-pm01 manifests]#
[root@ca-sna-pm01 manifests]#
[root@ca-sna-pm01 manifests]# !eg
egrep bb /etc/group /etc/passwd
/etc/group:bb:x:500:
/etc/passwd:bb:x:500:500:bb:/home/bb:/bin/bash
[root@ca-sna-pm01 manifests]#
--
To unsubscribe from this group and stop receiving emails from it, send an email to puppet-users+unsubscribe@googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to puppet-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/6b1c2004-54bd-4ea1-bd5b-513a94447caf%40googlegroups.com.
You received this message because you are subscribed to a topic in the Google Groups "Puppet Users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/puppet-users/39Qwntp2yrs/unsubscribe.
To unsubscribe from this group and all its topics, send an email to puppet-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/CAPGcbtCADPaop9QazQd3YGbZK%2BtX72OktuHKoyVt4OrbWf-KLg%40mail.gmail.com.
If you really mean assign, no. UIDs are managed through the user resource type: