Admins will be upgrading ORNL GitLab Servers on Saturday, 16 May 2026, from 7 AM until 11 AM EST. Repositories will experience intermittent outages during this time.
# generated by nixos/modules/services/security/usbguard.nix
@@ -51,6 +49,19 @@ in
'';
};
ruleFile=mkOption{
type=types.nullOrtypes.path;
default=/var/lib/usbguard/rules.conf;
example=/run/secrets/usbguard-rules;
description=lib.mdDoc''
This tells the USBGuard daemon which file to load as policy rule set.
The file can be changed manually or via the IPC interface assuming it has the right file permissions.
For more details see {manpage}`usbguard-rules.conf(5)`.
'';
};
rules=mkOption{
type=types.nullOrtypes.lines;
default=null;
@@ -63,8 +74,7 @@ in
be changed by the IPC interface.
If you do not set this option, the USBGuard daemon will load
it's policy rule set from `${defaultRuleFile}`.
This file can be changed manually or via the IPC interface.
it's policy rule set from the option configured in `services.usbguard.ruleFile`.
Running `usbguard generate-policy` as root will
generate a config for your currently plugged in devices.
@@ -248,7 +258,6 @@ in
'';
};
imports=[
(mkRemovedOptionModule["services""usbguard""ruleFile"]"The usbguard module now uses ${defaultRuleFile} as ruleFile. Alternatively, use services.usbguard.rules to configure rules.")
(mkRemovedOptionModule["services""usbguard""IPCAccessControlFiles"]"The usbguard module now hardcodes IPCAccessControlFiles to /var/lib/usbguard/IPCAccessControl.d.")
(mkRemovedOptionModule["services""usbguard""auditFilePath"]"Removed usbguard module audit log files. Audit logs can be found in the systemd journal.")