Both before and after daemon-reload the units have the same definition:
$ systemctl cat apt-news.service esm-cache.service
# /usr/lib/systemd/system/apt-news.service
# APT News is hosted at https://motd.ubuntu.com/aptnews.json and can include
# timely information related to apt updates available to your system.
# This service runs in the background during an `apt update` to download the
# latest news and set it to appear in the output of the next `apt upgrade`.
# The script won't do anything if you've run: `pro config set apt_news=false`.
# The script will limit network requests to at most once per 24 hours.
# You can also host your own aptnews.json and configure your system to use it
# with the command:
# `pro config set apt_news_url=https://yourhostname/path/to/aptnews.json`
[Unit]
Description=Update APT News
[Service]
Type=oneshot
ExecStart=/usr/bin/python3 /usr/lib/ubuntu-advantage/apt_news.py
AppArmorProfile=ubuntu_pro_apt_news
CapabilityBoundingSet=~CAP_SYS_ADMIN
CapabilityBoundingSet=~CAP_NET_ADMIN
CapabilityBoundingSet=~CAP_NET_BIND_SERVICE
CapabilityBoundingSet=~CAP_SYS_PTRACE
CapabilityBoundingSet=~CAP_NET_RAW
PrivateTmp=true
RestrictAddressFamilies=~AF_NETLINK
RestrictAddressFamilies=~AF_PACKET
# These may break some tests, and should be enabled carefully
#NoNewPrivileges=true
#PrivateDevices=true
#ProtectControlGroups=true
# ProtectHome=true seems to reliably break the GH integration test with a lunar lxd on jammy host
#ProtectHome=true
#ProtectKernelModules=true
#ProtectKernelTunables=true
#ProtectSystem=full
#RestrictSUIDSGID=true
# Unsupported in bionic
# Suggestion from systemd.exec(5) manpage on SystemCallFilter
#SystemCallFilter=@system-service
#SystemCallFilter=~@mount
#SystemCallErrorNumber=EPERM
#ProtectClock=true
#ProtectKernelLogs=true
# /usr/lib/systemd/system/esm-cache.service
# The ESM apt cache will maintain information about what ESM updates are
# available to a system. This information will be presented to users in the apt
# output, or when running pro security-status. These caches are maintained
# entirely outside the system apt configuration to avoid interference with user
# definitions. This service updates those caches. This will only have effect
# on releases where ESM is applicable, starting from Xenial: esm-apps for
# every LTS, and esm-infra for systems in expanded support period after the LTS
# expires.
Both before and after daemon-reload the units have the same definition:
$ systemctl cat apt-news.service esm-cache.service systemd/ system/ apt-news. service /motd.ubuntu. com/aptnews. json and can include /yourhostname/ path/to/ aptnews. json`
# /usr/lib/
# APT News is hosted at https:/
# timely information related to apt updates available to your system.
# This service runs in the background during an `apt update` to download the
# latest news and set it to appear in the output of the next `apt upgrade`.
# The script won't do anything if you've run: `pro config set apt_news=false`.
# The script will limit network requests to at most once per 24 hours.
# You can also host your own aptnews.json and configure your system to use it
# with the command:
# `pro config set apt_news_url=https:/
[Unit]
Description=Update APT News
[Service] /usr/bin/ python3 /usr/lib/ ubuntu- advantage/ apt_news. py =ubuntu_ pro_apt_ news ingSet= ~CAP_SYS_ ADMIN ingSet= ~CAP_NET_ ADMIN ingSet= ~CAP_NET_ BIND_SERVICE ingSet= ~CAP_SYS_ PTRACE ingSet= ~CAP_NET_ RAW Families= ~AF_NETLINK Families= ~AF_PACKET s=true =true Groups= true odules= true unables= true ID=true er=@system- service er=~@mount rNumber= EPERM ogs=true
Type=oneshot
ExecStart=
AppArmorProfile
CapabilityBound
CapabilityBound
CapabilityBound
CapabilityBound
CapabilityBound
PrivateTmp=true
RestrictAddress
RestrictAddress
# These may break some tests, and should be enabled carefully
#NoNewPrivilege
#PrivateDevices
#ProtectControl
# ProtectHome=true seems to reliably break the GH integration test with a lunar lxd on jammy host
#ProtectHome=true
#ProtectKernelM
#ProtectKernelT
#ProtectSystem=full
#RestrictSUIDSG
# Unsupported in bionic
# Suggestion from systemd.exec(5) manpage on SystemCallFilter
#SystemCallFilt
#SystemCallFilt
#SystemCallErro
#ProtectClock=true
#ProtectKernelL
# /usr/lib/ systemd/ system/ esm-cache. service
# The ESM apt cache will maintain information about what ESM updates are
# available to a system. This information will be presented to users in the apt
# output, or when running pro security-status. These caches are maintained
# entirely outside the system apt configuration to avoid interference with user
# definitions. This service updates those caches. This will only have effect
# on releases where ESM is applicable, starting from Xenial: esm-apps for
# every LTS, and esm-infra for systems in expanded support period after the LTS
# expires.
[Unit]
Description=Update the local ESM caches
[Service] /usr/bin/ python3 /usr/lib/ ubuntu- advantage/ esm_cache. py
Type=oneshot
ExecStart=