--- - name: template ssh private key become: true ansible.builtin.template: src: private_key.j2 dest: "/etc/sanoid/.ssh/id_sanoid" owner: "{{ sanoid_user }}" group: "{{ sanoid_user_group }}" mode: "0400" no_log: true when: - sanoid_syncoid_destination_host - name: Ensure user is added to sudoers become: true community.general.sudoers: name: "users-sudo-{{ sanoid_user }}" state: present user: "{{ sanoid_user }}" commands: ALL nopassword: true when: - sanoid_syncoid_destination_host - name: template syncoid.service become: true ansible.builtin.template: src: "syncoid.service.j2" dest: /etc/systemd/system/syncoid.service owner: root group: root mode: "0644" notify: - systemctl daemon-reload when: - sanoid_syncoid_destination_host - name: template syncoid.sh become: true ansible.builtin.template: src: "syncoid.sh.j2" dest: /usr/bin/syncoid.sh owner: root group: root mode: "0755" when: - sanoid_syncoid_destination_host - name: template syncoid_mail.service become: true ansible.builtin.template: src: "syncoid_mail.service.j2" dest: /etc/systemd/system/syncoid_mail.service owner: root group: root mode: "0644" notify: - systemctl daemon-reload when: - sanoid_syncoid_destination_host - name: template syncoid.timer become: true ansible.builtin.template: src: "syncoid.timer.j2" dest: "/etc/systemd/system/syncoid.timer" owner: root group: root mode: "0644" notify: - systemctl daemon-reload when: - sanoid_syncoid_destination_host - name: enable syncoid.timer become: true ansible.builtin.systemd: name: "syncoid.timer" enabled: true masked: false state: started notify: - systemctl daemon-reload when: - sanoid_syncoid_destination_host