diff --git a/roles/persistent-firewall/tasks/persist/Debian.yaml b/roles/persistent-firewall/tasks/persist/Debian.yaml index ecf6ce4a9..56bde398e 100644 --- a/roles/persistent-firewall/tasks/persist/Debian.yaml +++ b/roles/persistent-firewall/tasks/persist/Debian.yaml @@ -9,12 +9,14 @@ copy: content: "{{ iptables_rules.stdout }}" dest: "/etc/iptables/rules.v4" + mode: 0644 - name: Persist ipv6 rules become: yes copy: content: "{{ ip6tables_rules.stdout }}" dest: "/etc/iptables/rules.v6" + mode: 0644 - name: Ensure netfilter-persistent is started become: yes diff --git a/roles/persistent-firewall/tasks/persist/Gentoo.yaml b/roles/persistent-firewall/tasks/persist/Gentoo.yaml index 86b70ccff..692db329f 100644 --- a/roles/persistent-firewall/tasks/persist/Gentoo.yaml +++ b/roles/persistent-firewall/tasks/persist/Gentoo.yaml @@ -3,12 +3,14 @@ copy: content: "{{ iptables_rules.stdout }}" dest: "/var/lib/iptables/rules-save" + mode: 0644 - name: Persist ipv6 rules become: yes copy: content: "{{ ip6tables_rules.stdout }}" dest: "/var/lib/ip6tables/rules-save" + mode: 0644 - name: Ensure iptables is started become: yes diff --git a/roles/persistent-firewall/tasks/persist/RedHat.yaml b/roles/persistent-firewall/tasks/persist/RedHat.yaml index 83944c17a..db7dcc2e2 100644 --- a/roles/persistent-firewall/tasks/persist/RedHat.yaml +++ b/roles/persistent-firewall/tasks/persist/RedHat.yaml @@ -3,12 +3,14 @@ copy: content: "{{ iptables_rules.stdout }}" dest: "/etc/sysconfig/iptables" + mode: 0644 - name: Persist ipv6 rules become: yes copy: content: "{{ ip6tables_rules.stdout }}" dest: "/etc/sysconfig/ip6tables" + mode: 0644 # This provides the systemd unit file for iptables which might not be installed - name: Ensure iptables-services is installed diff --git a/roles/persistent-firewall/tasks/persist/Suse.yaml b/roles/persistent-firewall/tasks/persist/Suse.yaml index d3d3a8f19..534624ac6 100644 --- a/roles/persistent-firewall/tasks/persist/Suse.yaml +++ b/roles/persistent-firewall/tasks/persist/Suse.yaml @@ -3,12 +3,14 @@ copy: content: "{{ iptables_rules.stdout }}" dest: "/etc/sysconfig/iptables" + mode: 0644 - name: Persist ipv6 rules become: yes copy: content: "{{ ip6tables_rules.stdout }}" dest: "/etc/sysconfig/ip6tables" + mode: 0644 - name: Configure rc.local to restore saved rules on restart become: yes diff --git a/roles/persistent-firewall/tasks/persist/Ubuntu_trusty.yaml b/roles/persistent-firewall/tasks/persist/Ubuntu_trusty.yaml index b5dff4621..a7ddf86b7 100644 --- a/roles/persistent-firewall/tasks/persist/Ubuntu_trusty.yaml +++ b/roles/persistent-firewall/tasks/persist/Ubuntu_trusty.yaml @@ -9,12 +9,14 @@ copy: content: "{{ iptables_rules.stdout }}" dest: "/etc/iptables/rules.v4" + mode: 0644 - name: Persist ipv6 rules become: yes copy: content: "{{ ip6tables_rules.stdout }}" dest: "/etc/iptables/rules.v6" + mode: 0644 - name: Ensure iptables-persistent is started become: yes diff --git a/roles/phoronix-combine-results/tasks/fetch-result.yaml b/roles/phoronix-combine-results/tasks/fetch-result.yaml index 83e42183d..c6b5c55d7 100644 --- a/roles/phoronix-combine-results/tasks/fetch-result.yaml +++ b/roles/phoronix-combine-results/tasks/fetch-result.yaml @@ -3,6 +3,7 @@ file: path: "{{ ansible_env.HOME }}/test-results/{{ zj_artifact.url.rstrip('/')|basename }}" state: directory + mode: 0755 - name: Fetch artifact get_url: