Skip to content
This repository has been archived by the owner on Jun 24, 2022. It is now read-only.

Commit

Permalink
Fixed running ansible in check mode (#701)
Browse files Browse the repository at this point in the history
Co-authored-by: Julien Mailleret <[email protected]>
  • Loading branch information
SuRaMoN and jmlrt authored Jun 29, 2020
1 parent 9539712 commit d99c0c8
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion tasks/elasticsearch-RedHat.yml
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@
state: present
update_cache: yes
allow_downgrade: '{{ allow_downgrade }}'
when: es_use_repository
when: es_use_repository and not ansible_check_mode
register: redhat_elasticsearch_install_from_repo
notify: restart elasticsearch
until: redhat_elasticsearch_install_from_repo.rc == 0
Expand Down
2 changes: 1 addition & 1 deletion tasks/elasticsearch-parameters.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
#If the user attempts to lock memory they must specify a heap size
- name: fail when heap size is not specified when using memory lock
fail: msg="If locking memory with bootstrap.memory_lock a heap size must be specified"
when: es_config['bootstrap.memory_lock'] is defined and es_config['bootstrap.memory_lock'] == True and es_heap_size is not defined
when: es_config['bootstrap.memory_lock'] is defined and es_config['bootstrap.memory_lock'] == True and es_heap_size is not defined and not ansible_check_mode

#Check if working with security we have an es_api_basic_auth_username and es_api_basic_auth_username - otherwise any http calls wont work
- name: fail when api credentials are not declared when using security
Expand Down

0 comments on commit d99c0c8

Please sign in to comment.