From dbc20d4c4aae7302e9a714d1f1f7abdaa3583ef2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Daniel=20Kope=C4=8Dek?= Date: Fri, 12 May 2017 13:15:30 +0200 Subject: [PATCH 1/2] Fixed usbguard-daemon.conf man page --- doc/usbguard-daemon.conf.5 | 22 +++++++++++++++------- doc/usbguard-daemon.conf.5.md | 6 +++--- 2 files changed, 18 insertions(+), 10 deletions(-) diff --git a/doc/usbguard-daemon.conf.5 b/doc/usbguard-daemon.conf.5 index f7434b1..476a31e 100644 --- a/doc/usbguard-daemon.conf.5 +++ b/doc/usbguard-daemon.conf.5 @@ -1,4 +1,7 @@ +.\" Automatically generated by Pandoc 1.17.0.3 +.\" .TH "USBGUARD\-DAEMON.CONF" "5" "April 2017" "" "" +.hy .SH NAME .PP \f[B]usbguard\-daemon.conf\f[] \-\- USBGuard daemon configuration file @@ -52,8 +55,8 @@ One of \f[C]block\f[], \f[C]reject\f[], \f[C]apply\-policy\f[]. .B \f[B]RestoreControllerDeviceState\f[]=<\f[I]boolean\f[]> The USBGuard daemon modifies some attributes of controller devices like the default authorization state of new child device instances. -Using this setting, you can controll whether the daemon will try to -restore the attribute values to the state before modificaton on +Using this setting, you can control whether the daemon will try to +restore the attribute values to the state before modification on shutdown. .RS .RE @@ -70,11 +73,6 @@ connections from. .RS .RE .TP -.B \f[B]IPCAccessControlFiles\f[]=<\f[I]path\f[]> -Path to a directory holding the IPC access control files. -.RS -.RE -.TP .B \f[B]DeviceManagerBackend\f[]=<\f[I]backend\f[]> Which device manager backend implementation to use. Backend should be one of \f[C]uevent\f[] (default) or \f[C]dummy\f[]. @@ -88,6 +86,16 @@ See the \f[B]IPC ACCESS CONTROL\f[] section for more details. .RS .RE .TP +.B \f[B]DeviceRulesWithPort\f[]=<\f[I]boolean\f[]> +Generate device specific rules including the "via\-port" attribute. +This option modifies the behavior of the allowDevice action. +When instructed to generate a permanent rule, the action can generate a +port specific rule. +Because some systems have unstable port numbering, the generated rule +might not match the device after rebooting the system. +.RS +.RE +.TP .B \f[B]AuditFilePath\f[]=<\f[I]filepath\f[]> USBGuard audit events log file path. .RS diff --git a/doc/usbguard-daemon.conf.5.md b/doc/usbguard-daemon.conf.5.md index ea86ad1..58ca0ba 100644 --- a/doc/usbguard-daemon.conf.5.md +++ b/doc/usbguard-daemon.conf.5.md @@ -36,15 +36,15 @@ The **usbguard-daemon.conf** file is loaded by the USBGuard daemon after it pars **IPCAllowedGroups**=<*groupname*> [<*groupname*> ...] : A space delimited list of groupnames that the daemon will accept IPC connections from. -**IPCAccessControlFiles**=<*path*> -: Path to a directory holding the IPC access control files. - **DeviceManagerBackend**=<*backend*> : Which device manager backend implementation to use. Backend should be one of `uevent` (default) or `dummy`. **IPCAccessControlFiles**=<*path*> : The files at this location will be interpreted by the daemon as IPC access control definition files. See the **IPC ACCESS CONTROL** section for more details. +**DeviceRulesWithPort**=<*boolean*> +: Generate device specific rules including the "via-port" attribute. This option modifies the behavior of the allowDevice action. When instructed to generate a permanent rule, the action can generate a port specific rule. Because some systems have unstable port numbering, the generated rule might not match the device after rebooting the system. + **AuditFilePath**=<*filepath*> : USBGuard audit events log file path. -- 2.9.3