1 |
commit: 192f02005a5673e022d3cc7ff18af83855faceba |
2 |
Author: Chris PeBenito <pebenito <AT> ieee <DOT> org> |
3 |
AuthorDate: Sun Aug 6 21:03:06 2017 +0000 |
4 |
Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org> |
5 |
CommitDate: Fri Sep 8 22:48:51 2017 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=192f0200 |
7 |
|
8 |
Remove deprecated interfaces more than one year old. |
9 |
|
10 |
policy/modules/contrib/abrt.if | 16 -------- |
11 |
policy/modules/contrib/alsa.if | 51 ------------------------ |
12 |
policy/modules/contrib/automount.if | 15 ------- |
13 |
policy/modules/contrib/awstats.if | 28 ------------- |
14 |
policy/modules/contrib/bind.if | 14 ------- |
15 |
policy/modules/contrib/bluetooth.if | 40 ------------------- |
16 |
policy/modules/contrib/certwatch.if | 29 -------------- |
17 |
policy/modules/contrib/clogd.if | 15 ------- |
18 |
policy/modules/contrib/cobbler.if | 22 ---------- |
19 |
policy/modules/contrib/corosync.if | 22 ---------- |
20 |
policy/modules/contrib/cups.if | 14 ------- |
21 |
policy/modules/contrib/dbus.if | 75 ----------------------------------- |
22 |
policy/modules/contrib/dictd.if | 15 ------- |
23 |
policy/modules/contrib/finger.if | 14 ------- |
24 |
policy/modules/contrib/ftp.if | 14 ------- |
25 |
policy/modules/contrib/glusterfs.if | 22 ---------- |
26 |
policy/modules/contrib/gnome.if | 66 ------------------------------ |
27 |
policy/modules/contrib/gpg.if | 14 ------- |
28 |
policy/modules/contrib/i18n_input.if | 14 ------- |
29 |
policy/modules/contrib/inetd.if | 28 ------------- |
30 |
policy/modules/contrib/iodine.if | 22 ---------- |
31 |
policy/modules/contrib/jabber.if | 14 ------- |
32 |
policy/modules/contrib/kerberos.if | 41 ------------------- |
33 |
policy/modules/contrib/ldap.if | 14 ------- |
34 |
policy/modules/contrib/mandb.if | 57 -------------------------- |
35 |
policy/modules/contrib/mojomojo.if | 22 ---------- |
36 |
policy/modules/contrib/mozilla.if | 31 --------------- |
37 |
policy/modules/contrib/mpd.if | 19 --------- |
38 |
policy/modules/contrib/mta.if | 14 ------- |
39 |
policy/modules/contrib/mysql.if | 34 ---------------- |
40 |
policy/modules/contrib/nessus.if | 14 ------- |
41 |
policy/modules/contrib/nis.if | 28 ------------- |
42 |
policy/modules/contrib/nsd.if | 28 ------------- |
43 |
policy/modules/contrib/oident.if | 19 --------- |
44 |
policy/modules/contrib/pcscd.if | 45 --------------------- |
45 |
policy/modules/contrib/perdition.if | 14 ------- |
46 |
policy/modules/contrib/portmap.if | 42 -------------------- |
47 |
policy/modules/contrib/postfix.if | 32 --------------- |
48 |
policy/modules/contrib/ppp.if | 19 --------- |
49 |
policy/modules/contrib/pulseaudio.if | 31 --------------- |
50 |
policy/modules/contrib/radius.if | 14 ------- |
51 |
policy/modules/contrib/rpc.if | 28 ------------- |
52 |
policy/modules/contrib/rpm.if | 16 -------- |
53 |
policy/modules/contrib/sendmail.if | 16 -------- |
54 |
policy/modules/contrib/slocate.if | 14 ------- |
55 |
policy/modules/contrib/snmp.if | 14 ------- |
56 |
policy/modules/contrib/soundserver.if | 14 ------- |
57 |
policy/modules/contrib/squid.if | 14 ------- |
58 |
policy/modules/contrib/virt.if | 16 -------- |
59 |
49 files changed, 1214 deletions(-) |
60 |
|
61 |
diff --git a/policy/modules/contrib/abrt.if b/policy/modules/contrib/abrt.if |
62 |
index 39b6d291..9d1f00da 100644 |
63 |
--- a/policy/modules/contrib/abrt.if |
64 |
+++ b/policy/modules/contrib/abrt.if |
65 |
@@ -164,22 +164,6 @@ interface(`abrt_run_helper',` |
66 |
######################################## |
67 |
## <summary> |
68 |
## Create, read, write, and delete |
69 |
-## abrt cache files. |
70 |
-## </summary> |
71 |
-## <param name="domain"> |
72 |
-## <summary> |
73 |
-## Domain allowed access. |
74 |
-## </summary> |
75 |
-## </param> |
76 |
-# |
77 |
-interface(`abrt_cache_manage',` |
78 |
- refpolicywarn(`$0($*) has been deprecated, use abrt_manage_cache() instead.') |
79 |
- abrt_manage_cache($1) |
80 |
-') |
81 |
- |
82 |
-######################################## |
83 |
-## <summary> |
84 |
-## Create, read, write, and delete |
85 |
## abrt cache content. |
86 |
## </summary> |
87 |
## <param name="domain"> |
88 |
|
89 |
diff --git a/policy/modules/contrib/alsa.if b/policy/modules/contrib/alsa.if |
90 |
index d50f5e33..9cff9efb 100644 |
91 |
--- a/policy/modules/contrib/alsa.if |
92 |
+++ b/policy/modules/contrib/alsa.if |
93 |
@@ -2,25 +2,6 @@ |
94 |
|
95 |
######################################## |
96 |
## <summary> |
97 |
-## Role access for alsa. |
98 |
-## </summary> |
99 |
-## <param name="role"> |
100 |
-## <summary> |
101 |
-## Role allowed access. |
102 |
-## </summary> |
103 |
-## </param> |
104 |
-## <param name="domain"> |
105 |
-## <summary> |
106 |
-## User domain for the role. |
107 |
-## </summary> |
108 |
-## </param> |
109 |
-# |
110 |
-template(`alsa_role',` |
111 |
- refpolicywarn(`$0($*) has been deprecated') |
112 |
-') |
113 |
- |
114 |
-######################################## |
115 |
-## <summary> |
116 |
## Execute a domain transition to run Alsa. |
117 |
## </summary> |
118 |
## <param name="domain"> |
119 |
@@ -102,22 +83,6 @@ interface(`alsa_rw_shared_mem',` |
120 |
|
121 |
######################################## |
122 |
## <summary> |
123 |
-## Read writable Alsa configuration |
124 |
-## content. (Deprecated) |
125 |
-## </summary> |
126 |
-## <param name="domain"> |
127 |
-## <summary> |
128 |
-## Domain allowed access. |
129 |
-## </summary> |
130 |
-## </param> |
131 |
-# |
132 |
-interface(`alsa_read_rw_config',` |
133 |
- refpolicywarn(`$0($*) has been deprecated, use alsa_read_config() instead.') |
134 |
- alsa_read_config($1) |
135 |
-') |
136 |
- |
137 |
-######################################## |
138 |
-## <summary> |
139 |
## Read Alsa configuration content. |
140 |
## </summary> |
141 |
## <param name="domain"> |
142 |
@@ -139,22 +104,6 @@ interface(`alsa_read_config',` |
143 |
|
144 |
######################################## |
145 |
## <summary> |
146 |
-## Manage writable Alsa config |
147 |
-## files. (Deprecated) |
148 |
-## </summary> |
149 |
-## <param name="domain"> |
150 |
-## <summary> |
151 |
-## Domain allowed access. |
152 |
-## </summary> |
153 |
-## </param> |
154 |
-# |
155 |
-interface(`alsa_manage_rw_config',` |
156 |
- refpolicywarn(`$0($*) has been deprecated, use alsa_manage_config() instead.') |
157 |
- alsa_manage_config($1) |
158 |
-') |
159 |
- |
160 |
-######################################## |
161 |
-## <summary> |
162 |
## Manage Alsa config files. |
163 |
## </summary> |
164 |
## <param name="domain"> |
165 |
|
166 |
diff --git a/policy/modules/contrib/automount.if b/policy/modules/contrib/automount.if |
167 |
index 37847d93..fbaa3220 100644 |
168 |
--- a/policy/modules/contrib/automount.if |
169 |
+++ b/policy/modules/contrib/automount.if |
170 |
@@ -40,21 +40,6 @@ interface(`automount_signal',` |
171 |
|
172 |
######################################## |
173 |
## <summary> |
174 |
-## Execute automount in the caller domain. |
175 |
-## </summary> |
176 |
-## <param name="domain"> |
177 |
-## <summary> |
178 |
-## Domain allowed access. |
179 |
-## </summary> |
180 |
-## </param> |
181 |
-# |
182 |
-interface(`automount_exec_config',` |
183 |
- refpolicywarn(`$0(): has been deprecated, please use files_exec_etc_files() instead.') |
184 |
- files_exec_etc_files($1) |
185 |
-') |
186 |
- |
187 |
-######################################## |
188 |
-## <summary> |
189 |
## Read automount process state. |
190 |
## </summary> |
191 |
## <param name="domain"> |
192 |
|
193 |
diff --git a/policy/modules/contrib/awstats.if b/policy/modules/contrib/awstats.if |
194 |
index 68616dd9..e86fe87f 100644 |
195 |
--- a/policy/modules/contrib/awstats.if |
196 |
+++ b/policy/modules/contrib/awstats.if |
197 |
@@ -19,31 +19,3 @@ interface(`awstats_domtrans',` |
198 |
corecmd_search_bin($1) |
199 |
domtrans_pattern($1, awstats_exec_t, awstats_t) |
200 |
') |
201 |
- |
202 |
-######################################## |
203 |
-## <summary> |
204 |
-## Read and write awstats unnamed pipes. (Deprecated) |
205 |
-## </summary> |
206 |
-## <param name="domain"> |
207 |
-## <summary> |
208 |
-## Domain allowed access. |
209 |
-## </summary> |
210 |
-## </param> |
211 |
-# |
212 |
-interface(`awstats_rw_pipes',` |
213 |
- refpolicywarn(`$0($*) has been deprecated.') |
214 |
-') |
215 |
- |
216 |
-######################################## |
217 |
-## <summary> |
218 |
-## Execute awstats cgi scripts in the caller domain. (Deprecated) |
219 |
-## </summary> |
220 |
-## <param name="domain"> |
221 |
-## <summary> |
222 |
-## Domain allowed access. |
223 |
-## </summary> |
224 |
-## </param> |
225 |
-# |
226 |
-interface(`awstats_cgi_exec',` |
227 |
- refpolicywarn(`$0($*) has been deprecated.') |
228 |
-') |
229 |
|
230 |
diff --git a/policy/modules/contrib/bind.if b/policy/modules/contrib/bind.if |
231 |
index 7193af63..a99bae9c 100644 |
232 |
--- a/policy/modules/contrib/bind.if |
233 |
+++ b/policy/modules/contrib/bind.if |
234 |
@@ -331,20 +331,6 @@ interface(`bind_manage_zone',` |
235 |
|
236 |
######################################## |
237 |
## <summary> |
238 |
-## Send and receive datagrams to and from named. (Deprecated) |
239 |
-## </summary> |
240 |
-## <param name="domain"> |
241 |
-## <summary> |
242 |
-## Domain allowed access. |
243 |
-## </summary> |
244 |
-## </param> |
245 |
-# |
246 |
-interface(`bind_udp_chat_named',` |
247 |
- refpolicywarn(`$0($*) has been deprecated.') |
248 |
-') |
249 |
- |
250 |
-######################################## |
251 |
-## <summary> |
252 |
## All of the rules required to |
253 |
## administrate an bind environment. |
254 |
## </summary> |
255 |
|
256 |
diff --git a/policy/modules/contrib/bluetooth.if b/policy/modules/contrib/bluetooth.if |
257 |
index 09d6248d..dc61988c 100644 |
258 |
--- a/policy/modules/contrib/bluetooth.if |
259 |
+++ b/policy/modules/contrib/bluetooth.if |
260 |
@@ -130,46 +130,6 @@ interface(`bluetooth_dbus_chat',` |
261 |
|
262 |
######################################## |
263 |
## <summary> |
264 |
-## Execute bluetooth_helper in the bluetooth_helper domain. (Deprecated) |
265 |
-## </summary> |
266 |
-## <param name="domain"> |
267 |
-## <summary> |
268 |
-## Domain allowed to transition. |
269 |
-## </summary> |
270 |
-## </param> |
271 |
-# |
272 |
-interface(`bluetooth_domtrans_helper',` |
273 |
- refpolicywarn(`$0($*) has been deprecated.') |
274 |
-') |
275 |
- |
276 |
-######################################## |
277 |
-## <summary> |
278 |
-## Execute bluetooth_helper in the bluetooth_helper domain, and |
279 |
-## allow the specified role the bluetooth_helper domain. (Deprecated) |
280 |
-## </summary> |
281 |
-## <param name="domain"> |
282 |
-## <summary> |
283 |
-## Domain allowed to transition. |
284 |
-## </summary> |
285 |
-## </param> |
286 |
-## <param name="role"> |
287 |
-## <summary> |
288 |
-## Role allowed access. |
289 |
-## </summary> |
290 |
-## </param> |
291 |
-## <param name="terminal"> |
292 |
-## <summary> |
293 |
-## The type of the terminal allow the bluetooth_helper domain to use. |
294 |
-## </summary> |
295 |
-## </param> |
296 |
-## <rolecap/> |
297 |
-# |
298 |
-interface(`bluetooth_run_helper',` |
299 |
- refpolicywarn(`$0($*) has been deprecated.') |
300 |
-') |
301 |
- |
302 |
-######################################## |
303 |
-## <summary> |
304 |
## Do not audit attempts to read |
305 |
## bluetooth process state files. |
306 |
## </summary> |
307 |
|
308 |
diff --git a/policy/modules/contrib/certwatch.if b/policy/modules/contrib/certwatch.if |
309 |
index 9291c5cc..54e6e661 100644 |
310 |
--- a/policy/modules/contrib/certwatch.if |
311 |
+++ b/policy/modules/contrib/certwatch.if |
312 |
@@ -46,32 +46,3 @@ interface(`certwatch_run',` |
313 |
certwatch_domtrans($1) |
314 |
roleattribute $2 certwatch_roles; |
315 |
') |
316 |
- |
317 |
-######################################## |
318 |
-## <summary> |
319 |
-## Execute certwatch in the certwatch domain, and |
320 |
-## allow the specified role the certwatch domain, |
321 |
-## and use the caller's terminal. Has a sigchld |
322 |
-## backchannel. (Deprecated) |
323 |
-## </summary> |
324 |
-## <param name="domain"> |
325 |
-## <summary> |
326 |
-## Domain allowed to transition. |
327 |
-## </summary> |
328 |
-## </param> |
329 |
-## <param name="role"> |
330 |
-## <summary> |
331 |
-## Role allowed access. |
332 |
-## </summary> |
333 |
-## </param> |
334 |
-## <param name="terminal"> |
335 |
-## <summary> |
336 |
-## The type of the terminal allow the certwatch domain to use. |
337 |
-## </summary> |
338 |
-## </param> |
339 |
-## <rolecap/> |
340 |
-# |
341 |
-interface(`certwatach_run',` |
342 |
- refpolicywarn(`$0($*) has been deprecated, please use certwatch_run() instead.') |
343 |
- certwatch_run($*) |
344 |
-') |
345 |
|
346 |
diff --git a/policy/modules/contrib/clogd.if b/policy/modules/contrib/clogd.if |
347 |
index 221d9143..dce4cb19 100644 |
348 |
--- a/policy/modules/contrib/clogd.if |
349 |
+++ b/policy/modules/contrib/clogd.if |
350 |
@@ -21,21 +21,6 @@ interface(`clogd_domtrans',` |
351 |
|
352 |
##################################### |
353 |
## <summary> |
354 |
-## Connect to clogd over a unix domain |
355 |
-## stream socket. (Deprecated) |
356 |
-## </summary> |
357 |
-## <param name="domain"> |
358 |
-## <summary> |
359 |
-## Domain allowed access. |
360 |
-## </summary> |
361 |
-## </param> |
362 |
-# |
363 |
-interface(`clogd_stream_connect',` |
364 |
- refpolicywarn(`$0($*) has been deprecated.') |
365 |
-') |
366 |
- |
367 |
-##################################### |
368 |
-## <summary> |
369 |
## Read and write clogd semaphores. |
370 |
## </summary> |
371 |
## <param name="domain"> |
372 |
|
373 |
diff --git a/policy/modules/contrib/cobbler.if b/policy/modules/contrib/cobbler.if |
374 |
index 376fa84b..40f89990 100644 |
375 |
--- a/policy/modules/contrib/cobbler.if |
376 |
+++ b/policy/modules/contrib/cobbler.if |
377 |
@@ -151,28 +151,6 @@ interface(`cobbler_manage_lib_files',` |
378 |
## </param> |
379 |
## <rolecap/> |
380 |
# |
381 |
-interface(`cobblerd_admin',` |
382 |
- refpolicywarn(`$0($*) has been deprecated, use cobbler_admin() instead.') |
383 |
- cobbler_admin($1, $2) |
384 |
-') |
385 |
- |
386 |
-######################################## |
387 |
-## <summary> |
388 |
-## All of the rules required to |
389 |
-## administrate an cobbler environment. |
390 |
-## </summary> |
391 |
-## <param name="domain"> |
392 |
-## <summary> |
393 |
-## Domain allowed access. |
394 |
-## </summary> |
395 |
-## </param> |
396 |
-## <param name="role"> |
397 |
-## <summary> |
398 |
-## Role allowed access. |
399 |
-## </summary> |
400 |
-## </param> |
401 |
-## <rolecap/> |
402 |
-# |
403 |
interface(`cobbler_admin',` |
404 |
gen_require(` |
405 |
type cobblerd_t, cobbler_var_lib_t, cobbler_var_log_t; |
406 |
|
407 |
diff --git a/policy/modules/contrib/corosync.if b/policy/modules/contrib/corosync.if |
408 |
index 57736aab..2b2d11af 100644 |
409 |
--- a/policy/modules/contrib/corosync.if |
410 |
+++ b/policy/modules/contrib/corosync.if |
411 |
@@ -133,28 +133,6 @@ interface(`corosync_rw_tmpfs',` |
412 |
## </param> |
413 |
## <rolecap/> |
414 |
# |
415 |
-interface(`corosyncd_admin',` |
416 |
- refpolicywarn(`$0($*) has been deprecated, use corosync_admin() instead.') |
417 |
- corosync_admin($1, $2) |
418 |
-') |
419 |
- |
420 |
-###################################### |
421 |
-## <summary> |
422 |
-## All of the rules required to |
423 |
-## administrate an corosync environment. |
424 |
-## </summary> |
425 |
-## <param name="domain"> |
426 |
-## <summary> |
427 |
-## Domain allowed access. |
428 |
-## </summary> |
429 |
-## </param> |
430 |
-## <param name="role"> |
431 |
-## <summary> |
432 |
-## Role allowed access. |
433 |
-## </summary> |
434 |
-## </param> |
435 |
-## <rolecap/> |
436 |
-# |
437 |
interface(`corosync_admin',` |
438 |
gen_require(` |
439 |
type corosync_t, corosync_var_lib_t, corosync_var_log_t; |
440 |
|
441 |
diff --git a/policy/modules/contrib/cups.if b/policy/modules/contrib/cups.if |
442 |
index bd6b77f4..73887e50 100644 |
443 |
--- a/policy/modules/contrib/cups.if |
444 |
+++ b/policy/modules/contrib/cups.if |
445 |
@@ -75,20 +75,6 @@ interface(`cups_stream_connect',` |
446 |
|
447 |
######################################## |
448 |
## <summary> |
449 |
-## Connect to cups over TCP. (Deprecated) |
450 |
-## </summary> |
451 |
-## <param name="domain"> |
452 |
-## <summary> |
453 |
-## Domain allowed access. |
454 |
-## </summary> |
455 |
-## </param> |
456 |
-# |
457 |
-interface(`cups_tcp_connect',` |
458 |
- refpolicywarn(`$0($*) has been deprecated.') |
459 |
-') |
460 |
- |
461 |
-######################################## |
462 |
-## <summary> |
463 |
## Send and receive messages from |
464 |
## cups over dbus. |
465 |
## </summary> |
466 |
|
467 |
diff --git a/policy/modules/contrib/dbus.if b/policy/modules/contrib/dbus.if |
468 |
index 3893df7c..32824d9a 100644 |
469 |
--- a/policy/modules/contrib/dbus.if |
470 |
+++ b/policy/modules/contrib/dbus.if |
471 |
@@ -139,22 +139,6 @@ interface(`dbus_system_bus_client',` |
472 |
|
473 |
####################################### |
474 |
## <summary> |
475 |
-## Acquire service on DBUS |
476 |
-## session bus. |
477 |
-## </summary> |
478 |
-## <param name="domain"> |
479 |
-## <summary> |
480 |
-## Domain allowed access. |
481 |
-## </summary> |
482 |
-## </param> |
483 |
-# |
484 |
-interface(`dbus_connect_session_bus',` |
485 |
- refpolicywarn(`$0($*) has been deprecated, use dbus_connect_all_session_bus() instead.') |
486 |
- dbus_connect_all_session_bus($1) |
487 |
-') |
488 |
- |
489 |
-####################################### |
490 |
-## <summary> |
491 |
## Acquire service on all DBUS |
492 |
## session busses. |
493 |
## </summary> |
494 |
@@ -201,22 +185,6 @@ interface(`dbus_connect_spec_session_bus',` |
495 |
|
496 |
####################################### |
497 |
## <summary> |
498 |
-## Creating connections to DBUS |
499 |
-## session bus. |
500 |
-## </summary> |
501 |
-## <param name="domain"> |
502 |
-## <summary> |
503 |
-## Domain allowed access. |
504 |
-## </summary> |
505 |
-## </param> |
506 |
-# |
507 |
-interface(`dbus_session_bus_client',` |
508 |
- refpolicywarn(`$0($*) has been deprecated, use dbus_all_session_bus_client() instead.') |
509 |
- dbus_all_session_bus_client($1) |
510 |
-') |
511 |
- |
512 |
-####################################### |
513 |
-## <summary> |
514 |
## Creating connections to all |
515 |
## DBUS session busses. |
516 |
## </summary> |
517 |
@@ -276,21 +244,6 @@ interface(`dbus_spec_session_bus_client',` |
518 |
|
519 |
####################################### |
520 |
## <summary> |
521 |
-## Send messages to DBUS session bus. |
522 |
-## </summary> |
523 |
-## <param name="domain"> |
524 |
-## <summary> |
525 |
-## Domain allowed access. |
526 |
-## </summary> |
527 |
-## </param> |
528 |
-# |
529 |
-interface(`dbus_send_session_bus',` |
530 |
- refpolicywarn(`$0($*) has been deprecated, use dbus_send_all_session_bus() instead.') |
531 |
- dbus_send_all_session_bus($1) |
532 |
-') |
533 |
- |
534 |
-####################################### |
535 |
-## <summary> |
536 |
## Send messages to all DBUS |
537 |
## session busses. |
538 |
## </summary> |
539 |
@@ -399,34 +352,6 @@ interface(`dbus_manage_lib_files',` |
540 |
## Allow a application domain to be |
541 |
## started by the specified session bus. |
542 |
## </summary> |
543 |
-## <param name="role_prefix"> |
544 |
-## <summary> |
545 |
-## The prefix of the user role (e.g., user |
546 |
-## is the prefix for user_r). |
547 |
-## </summary> |
548 |
-## </param> |
549 |
-## <param name="domain"> |
550 |
-## <summary> |
551 |
-## Type to be used as a domain. |
552 |
-## </summary> |
553 |
-## </param> |
554 |
-## <param name="entry_point"> |
555 |
-## <summary> |
556 |
-## Type of the program to be used as an |
557 |
-## entry point to this domain. |
558 |
-## </summary> |
559 |
-## </param> |
560 |
-# |
561 |
-interface(`dbus_session_domain',` |
562 |
- refpolicywarn(`$0($*) has been deprecated, use dbus_all_session_domain() instead.') |
563 |
- dbus_all_session_domain($1, $2) |
564 |
-') |
565 |
- |
566 |
-######################################## |
567 |
-## <summary> |
568 |
-## Allow a application domain to be |
569 |
-## started by the specified session bus. |
570 |
-## </summary> |
571 |
## <param name="domain"> |
572 |
## <summary> |
573 |
## Type to be used as a domain. |
574 |
|
575 |
diff --git a/policy/modules/contrib/dictd.if b/policy/modules/contrib/dictd.if |
576 |
index 3878acc7..6feb8280 100644 |
577 |
--- a/policy/modules/contrib/dictd.if |
578 |
+++ b/policy/modules/contrib/dictd.if |
579 |
@@ -2,21 +2,6 @@ |
580 |
|
581 |
######################################## |
582 |
## <summary> |
583 |
-## Use dictionary services by connecting |
584 |
-## over TCP. (Deprecated) |
585 |
-## </summary> |
586 |
-## <param name="domain"> |
587 |
-## <summary> |
588 |
-## Domain allowed access. |
589 |
-## </summary> |
590 |
-## </param> |
591 |
-# |
592 |
-interface(`dictd_tcp_connect',` |
593 |
- refpolicywarn(`$0($*) has been deprecated.') |
594 |
-') |
595 |
- |
596 |
-######################################## |
597 |
-## <summary> |
598 |
## All of the rules required to |
599 |
## administrate an dictd environment. |
600 |
## </summary> |
601 |
|
602 |
diff --git a/policy/modules/contrib/finger.if b/policy/modules/contrib/finger.if |
603 |
index 2656d2b5..a071cfd4 100644 |
604 |
--- a/policy/modules/contrib/finger.if |
605 |
+++ b/policy/modules/contrib/finger.if |
606 |
@@ -18,17 +18,3 @@ interface(`finger_domtrans',` |
607 |
corecmd_search_bin($1) |
608 |
domtrans_pattern($1, fingerd_exec_t, fingerd_t) |
609 |
') |
610 |
- |
611 |
-######################################## |
612 |
-## <summary> |
613 |
-## Connect to fingerd with a tcp socket. (Deprecated) |
614 |
-## </summary> |
615 |
-## <param name="domain"> |
616 |
-## <summary> |
617 |
-## Domain allowed access. |
618 |
-## </summary> |
619 |
-## </param> |
620 |
-# |
621 |
-interface(`finger_tcp_connect',` |
622 |
- refpolicywarn(`$0($*) has been deprecated.') |
623 |
-') |
624 |
|
625 |
diff --git a/policy/modules/contrib/ftp.if b/policy/modules/contrib/ftp.if |
626 |
index 93fd4be4..349d1b3b 100644 |
627 |
--- a/policy/modules/contrib/ftp.if |
628 |
+++ b/policy/modules/contrib/ftp.if |
629 |
@@ -20,20 +20,6 @@ interface(`ftp_dyntrans_anon_sftpd',` |
630 |
|
631 |
######################################## |
632 |
## <summary> |
633 |
-## Connect to over ftpd over TCP. (Deprecated) |
634 |
-## </summary> |
635 |
-## <param name="domain"> |
636 |
-## <summary> |
637 |
-## Domain allowed access. |
638 |
-## </summary> |
639 |
-## </param> |
640 |
-# |
641 |
-interface(`ftp_tcp_connect',` |
642 |
- refpolicywarn(`$0($*) has been deprecated.') |
643 |
-') |
644 |
- |
645 |
-######################################## |
646 |
-## <summary> |
647 |
## Read ftpd configuration files. |
648 |
## </summary> |
649 |
## <param name="domain"> |
650 |
|
651 |
diff --git a/policy/modules/contrib/glusterfs.if b/policy/modules/contrib/glusterfs.if |
652 |
index 0945d876..b4f5d01c 100644 |
653 |
--- a/policy/modules/contrib/glusterfs.if |
654 |
+++ b/policy/modules/contrib/glusterfs.if |
655 |
@@ -17,28 +17,6 @@ |
656 |
## </param> |
657 |
## <rolecap/> |
658 |
# |
659 |
-interface(`glusterd_admin',` |
660 |
- refpolicywarn(`$0($*) has been deprecated, use glusterfs_admin() instead.') |
661 |
- glusterfs_admin($1, $2) |
662 |
-') |
663 |
- |
664 |
-######################################## |
665 |
-## <summary> |
666 |
-## All of the rules required to |
667 |
-## administrate an glusterfs environment. |
668 |
-## </summary> |
669 |
-## <param name="domain"> |
670 |
-## <summary> |
671 |
-## Domain allowed access. |
672 |
-## </summary> |
673 |
-## </param> |
674 |
-## <param name="role"> |
675 |
-## <summary> |
676 |
-## Role allowed access. |
677 |
-## </summary> |
678 |
-## </param> |
679 |
-## <rolecap/> |
680 |
-# |
681 |
interface(`glusterfs_admin',` |
682 |
gen_require(` |
683 |
type glusterd_t, glusterd_initrc_exec_t, glusterd_log_t; |
684 |
|
685 |
diff --git a/policy/modules/contrib/gnome.if b/policy/modules/contrib/gnome.if |
686 |
index edf4d4e6..2eb4f047 100644 |
687 |
--- a/policy/modules/contrib/gnome.if |
688 |
+++ b/policy/modules/contrib/gnome.if |
689 |
@@ -1,24 +1,5 @@ |
690 |
## <summary>GNU network object model environment.</summary> |
691 |
|
692 |
-######################################## |
693 |
-## <summary> |
694 |
-## Role access for gnome. (Deprecated) |
695 |
-## </summary> |
696 |
-## <param name="role"> |
697 |
-## <summary> |
698 |
-## Role allowed access. |
699 |
-## </summary> |
700 |
-## </param> |
701 |
-## <param name="domain"> |
702 |
-## <summary> |
703 |
-## User domain for the role. |
704 |
-## </summary> |
705 |
-## </param> |
706 |
-# |
707 |
-interface(`gnome_role',` |
708 |
- refpolicywarn(`$0($*) has been deprecated') |
709 |
-') |
710 |
- |
711 |
####################################### |
712 |
## <summary> |
713 |
## The role template for gnome. |
714 |
@@ -267,22 +248,6 @@ interface(`gnome_create_generic_home_dirs',` |
715 |
######################################## |
716 |
## <summary> |
717 |
## Set attributes of generic gnome |
718 |
-## user home directories. (Deprecated) |
719 |
-## </summary> |
720 |
-## <param name="domain"> |
721 |
-## <summary> |
722 |
-## Domain allowed access. |
723 |
-## </summary> |
724 |
-## </param> |
725 |
-# |
726 |
-interface(`gnome_setattr_config_dirs',` |
727 |
- refpolicywarn(`$0($*) has been deprecated, use gnome_setattr_generic_home_dirs() instead.') |
728 |
- gnome_setattr_generic_home_dirs($1) |
729 |
-') |
730 |
- |
731 |
-######################################## |
732 |
-## <summary> |
733 |
-## Set attributes of generic gnome |
734 |
## user home directories. |
735 |
## </summary> |
736 |
## <param name="domain"> |
737 |
@@ -302,21 +267,6 @@ interface(`gnome_setattr_generic_home_dirs',` |
738 |
|
739 |
######################################## |
740 |
## <summary> |
741 |
-## Read generic gnome user home content. (Deprecated) |
742 |
-## </summary> |
743 |
-## <param name="domain"> |
744 |
-## <summary> |
745 |
-## Domain allowed access. |
746 |
-## </summary> |
747 |
-## </param> |
748 |
-# |
749 |
-interface(`gnome_read_config',` |
750 |
- refpolicywarn(`$0($*) has been deprecated, use gnome_read_generic_home_content() instead.') |
751 |
- gnome_read_generic_home_content($1) |
752 |
-') |
753 |
- |
754 |
-######################################## |
755 |
-## <summary> |
756 |
## Read generic gnome home content. |
757 |
## </summary> |
758 |
## <param name="domain"> |
759 |
@@ -341,22 +291,6 @@ interface(`gnome_read_generic_home_content',` |
760 |
######################################## |
761 |
## <summary> |
762 |
## Create, read, write, and delete |
763 |
-## generic gnome user home content. (Deprecated) |
764 |
-## </summary> |
765 |
-## <param name="domain"> |
766 |
-## <summary> |
767 |
-## Domain allowed access. |
768 |
-## </summary> |
769 |
-## </param> |
770 |
-# |
771 |
-interface(`gnome_manage_config',` |
772 |
- refpolicywarn(`$0($*) has been deprecated, use gnome_manage_generic_home_content() instead.') |
773 |
- gnome_manage_generic_home_content($1) |
774 |
-') |
775 |
- |
776 |
-######################################## |
777 |
-## <summary> |
778 |
-## Create, read, write, and delete |
779 |
## generic gnome home content. |
780 |
## </summary> |
781 |
## <param name="domain"> |
782 |
|
783 |
diff --git a/policy/modules/contrib/gpg.if b/policy/modules/contrib/gpg.if |
784 |
index 4f118bf3..c4b7c4cd 100644 |
785 |
--- a/policy/modules/contrib/gpg.if |
786 |
+++ b/policy/modules/contrib/gpg.if |
787 |
@@ -125,20 +125,6 @@ interface(`gpg_spec_domtrans',` |
788 |
|
789 |
###################################### |
790 |
## <summary> |
791 |
-## Execute gpg in the gpg web domain. (Deprecated) |
792 |
-## </summary> |
793 |
-## <param name="domain"> |
794 |
-## <summary> |
795 |
-## Domain allowed to transition. |
796 |
-## </summary> |
797 |
-## </param> |
798 |
-# |
799 |
-interface(`gpg_domtrans_web',` |
800 |
- refpolicywarn(`$0($*) has been deprecated.') |
801 |
-') |
802 |
- |
803 |
-###################################### |
804 |
-## <summary> |
805 |
## Make gpg executable files an |
806 |
## entrypoint for the specified domain. |
807 |
## </summary> |
808 |
|
809 |
diff --git a/policy/modules/contrib/i18n_input.if b/policy/modules/contrib/i18n_input.if |
810 |
index b9082642..4e08c3cf 100644 |
811 |
--- a/policy/modules/contrib/i18n_input.if |
812 |
+++ b/policy/modules/contrib/i18n_input.if |
813 |
@@ -2,20 +2,6 @@ |
814 |
|
815 |
######################################## |
816 |
## <summary> |
817 |
-## Use i18n_input over a TCP connection. (Deprecated) |
818 |
-## </summary> |
819 |
-## <param name="domain"> |
820 |
-## <summary> |
821 |
-## Domain allowed access. |
822 |
-## </summary> |
823 |
-## </param> |
824 |
-# |
825 |
-interface(`i18n_use',` |
826 |
- refpolicywarn(`$0($*) has been deprecated.') |
827 |
-') |
828 |
- |
829 |
-######################################## |
830 |
-## <summary> |
831 |
## All of the rules required to |
832 |
## administrate an i18n input environment. |
833 |
## </summary> |
834 |
|
835 |
diff --git a/policy/modules/contrib/inetd.if b/policy/modules/contrib/inetd.if |
836 |
index fbb54e7d..593cd40b 100644 |
837 |
--- a/policy/modules/contrib/inetd.if |
838 |
+++ b/policy/modules/contrib/inetd.if |
839 |
@@ -140,20 +140,6 @@ interface(`inetd_use_fds',` |
840 |
|
841 |
######################################## |
842 |
## <summary> |
843 |
-## Connect to the inetd service using a TCP connection. (Deprecated) |
844 |
-## </summary> |
845 |
-## <param name="domain"> |
846 |
-## <summary> |
847 |
-## Domain allowed access. |
848 |
-## </summary> |
849 |
-## </param> |
850 |
-# |
851 |
-interface(`inetd_tcp_connect',` |
852 |
- refpolicywarn(`$0($*) has been deprecated.') |
853 |
-') |
854 |
- |
855 |
-######################################## |
856 |
-## <summary> |
857 |
## Run inetd child process in the |
858 |
## inet child domain. |
859 |
## </summary> |
860 |
@@ -174,20 +160,6 @@ interface(`inetd_domtrans_child',` |
861 |
|
862 |
######################################## |
863 |
## <summary> |
864 |
-## Send UDP network traffic to inetd. (Deprecated) |
865 |
-## </summary> |
866 |
-## <param name="domain"> |
867 |
-## <summary> |
868 |
-## Domain allowed access. |
869 |
-## </summary> |
870 |
-## </param> |
871 |
-# |
872 |
-interface(`inetd_udp_send',` |
873 |
- refpolicywarn(`$0($*) has been deprecated.') |
874 |
-') |
875 |
- |
876 |
-######################################## |
877 |
-## <summary> |
878 |
## Read and write inetd TCP sockets. |
879 |
## </summary> |
880 |
## <param name="domain"> |
881 |
|
882 |
diff --git a/policy/modules/contrib/iodine.if b/policy/modules/contrib/iodine.if |
883 |
index 87e47eb2..99f1afd1 100644 |
884 |
--- a/policy/modules/contrib/iodine.if |
885 |
+++ b/policy/modules/contrib/iodine.if |
886 |
@@ -17,28 +17,6 @@ |
887 |
## </param> |
888 |
## <rolecap/> |
889 |
# |
890 |
-interface(`iodined_admin',` |
891 |
- refpolicywarn(`$0($*) has been deprecated, use iodine_admin() instead.') |
892 |
- iodine_admin($1, $2) |
893 |
-') |
894 |
- |
895 |
-######################################## |
896 |
-## <summary> |
897 |
-## All of the rules required to |
898 |
-## administrate an iodined environment |
899 |
-## </summary> |
900 |
-## <param name="domain"> |
901 |
-## <summary> |
902 |
-## Domain allowed access. |
903 |
-## </summary> |
904 |
-## </param> |
905 |
-## <param name="role"> |
906 |
-## <summary> |
907 |
-## Role allowed access. |
908 |
-## </summary> |
909 |
-## </param> |
910 |
-## <rolecap/> |
911 |
-# |
912 |
interface(`iodine_admin',` |
913 |
gen_require(` |
914 |
type iodined_t, iodined_initrc_exec_t; |
915 |
|
916 |
diff --git a/policy/modules/contrib/jabber.if b/policy/modules/contrib/jabber.if |
917 |
index 549dac1f..9a31ee51 100644 |
918 |
--- a/policy/modules/contrib/jabber.if |
919 |
+++ b/policy/modules/contrib/jabber.if |
920 |
@@ -42,20 +42,6 @@ interface(`jabber_manage_lib_files',` |
921 |
|
922 |
######################################## |
923 |
## <summary> |
924 |
-## Connect to jabber over a TCP socket (Deprecated) |
925 |
-## </summary> |
926 |
-## <param name="domain"> |
927 |
-## <summary> |
928 |
-## Domain allowed access. |
929 |
-## </summary> |
930 |
-## </param> |
931 |
-# |
932 |
-interface(`jabber_tcp_connect',` |
933 |
- refpolicywarn(`$0($*) has been deprecated.') |
934 |
-') |
935 |
- |
936 |
-######################################## |
937 |
-## <summary> |
938 |
## All of the rules required to |
939 |
## administrate an jabber environment. |
940 |
## </summary> |
941 |
|
942 |
diff --git a/policy/modules/contrib/kerberos.if b/policy/modules/contrib/kerberos.if |
943 |
index 01caeead..c8c5a37d 100644 |
944 |
--- a/policy/modules/contrib/kerberos.if |
945 |
+++ b/policy/modules/contrib/kerberos.if |
946 |
@@ -2,25 +2,6 @@ |
947 |
|
948 |
######################################## |
949 |
## <summary> |
950 |
-## Role access for kerberos. |
951 |
-## </summary> |
952 |
-## <param name="role"> |
953 |
-## <summary> |
954 |
-## Role allowed access. |
955 |
-## </summary> |
956 |
-## </param> |
957 |
-## <param name="domain"> |
958 |
-## <summary> |
959 |
-## User domain for the role. |
960 |
-## </summary> |
961 |
-## </param> |
962 |
-# |
963 |
-template(`kerberos_role',` |
964 |
- refpolicywarn(`$0($*) has been deprecated') |
965 |
-') |
966 |
- |
967 |
-######################################## |
968 |
-## <summary> |
969 |
## Execute kadmind in the caller domain. |
970 |
## </summary> |
971 |
## <param name="domain"> |
972 |
@@ -339,28 +320,6 @@ interface(`kerberos_etc_filetrans_keytab',` |
973 |
|
974 |
######################################## |
975 |
## <summary> |
976 |
-## Create a derived type for kerberos |
977 |
-## keytab files. |
978 |
-## </summary> |
979 |
-## <param name="prefix"> |
980 |
-## <summary> |
981 |
-## The prefix to be used for deriving type names. |
982 |
-## </summary> |
983 |
-## </param> |
984 |
-## <param name="domain"> |
985 |
-## <summary> |
986 |
-## Domain allowed access. |
987 |
-## </summary> |
988 |
-## </param> |
989 |
-# |
990 |
-template(`kerberos_keytab_template',` |
991 |
- refpolicywarn(`$0($*) has been deprecated.') |
992 |
- kerberos_read_keytab($2) |
993 |
- kerberos_use($2) |
994 |
-') |
995 |
- |
996 |
-######################################## |
997 |
-## <summary> |
998 |
## Read kerberos kdc configuration files. |
999 |
## </summary> |
1000 |
## <param name="domain"> |
1001 |
|
1002 |
diff --git a/policy/modules/contrib/ldap.if b/policy/modules/contrib/ldap.if |
1003 |
index b4eabc96..59752140 100644 |
1004 |
--- a/policy/modules/contrib/ldap.if |
1005 |
+++ b/policy/modules/contrib/ldap.if |
1006 |
@@ -41,20 +41,6 @@ interface(`ldap_read_config',` |
1007 |
|
1008 |
######################################## |
1009 |
## <summary> |
1010 |
-## Use LDAP over TCP connection. (Deprecated) |
1011 |
-## </summary> |
1012 |
-## <param name="domain"> |
1013 |
-## <summary> |
1014 |
-## Domain allowed access. |
1015 |
-## </summary> |
1016 |
-## </param> |
1017 |
-# |
1018 |
-interface(`ldap_use',` |
1019 |
- refpolicywarn(`$0($*) has been deprecated.') |
1020 |
-') |
1021 |
- |
1022 |
-######################################## |
1023 |
-## <summary> |
1024 |
## Connect to slapd over an unix |
1025 |
## stream socket. |
1026 |
## </summary> |
1027 |
|
1028 |
diff --git a/policy/modules/contrib/mandb.if b/policy/modules/contrib/mandb.if |
1029 |
index 2b5d5385..e880655d 100644 |
1030 |
--- a/policy/modules/contrib/mandb.if |
1031 |
+++ b/policy/modules/contrib/mandb.if |
1032 |
@@ -48,63 +48,6 @@ interface(`mandb_run',` |
1033 |
|
1034 |
######################################## |
1035 |
## <summary> |
1036 |
-## Search mandb cache directories. |
1037 |
-## </summary> |
1038 |
-## <param name="domain"> |
1039 |
-## <summary> |
1040 |
-## Domain allowed access. |
1041 |
-## </summary> |
1042 |
-## </param> |
1043 |
-# |
1044 |
-interface(`mandb_search_cache',` |
1045 |
- refpolicywarn(`$0($*) has been deprecated') |
1046 |
-') |
1047 |
- |
1048 |
-######################################## |
1049 |
-## <summary> |
1050 |
-## Delete mandb cache content. |
1051 |
-## </summary> |
1052 |
-## <param name="domain"> |
1053 |
-## <summary> |
1054 |
-## Domain allowed access. |
1055 |
-## </summary> |
1056 |
-## </param> |
1057 |
-# |
1058 |
-interface(`mandb_delete_cache_content',` |
1059 |
- refpolicywarn(`$0($*) has been deprecated') |
1060 |
-') |
1061 |
- |
1062 |
-######################################## |
1063 |
-## <summary> |
1064 |
-## Read mandb cache content. |
1065 |
-## </summary> |
1066 |
-## <param name="domain"> |
1067 |
-## <summary> |
1068 |
-## Domain allowed access. |
1069 |
-## </summary> |
1070 |
-## </param> |
1071 |
-# |
1072 |
-interface(`mandb_read_cache_content',` |
1073 |
- refpolicywarn(`$0($*) has been deprecated') |
1074 |
-') |
1075 |
- |
1076 |
-######################################## |
1077 |
-## <summary> |
1078 |
-## Create, read, write, and delete |
1079 |
-## mandb cache files. |
1080 |
-## </summary> |
1081 |
-## <param name="domain"> |
1082 |
-## <summary> |
1083 |
-## Domain allowed access. |
1084 |
-## </summary> |
1085 |
-## </param> |
1086 |
-# |
1087 |
-interface(`mandb_manage_cache_content',` |
1088 |
- refpolicywarn(`$0($*) has been deprecated') |
1089 |
-') |
1090 |
- |
1091 |
-######################################## |
1092 |
-## <summary> |
1093 |
## All of the rules required to |
1094 |
## administrate an mandb environment. |
1095 |
## </summary> |
1096 |
|
1097 |
diff --git a/policy/modules/contrib/mojomojo.if b/policy/modules/contrib/mojomojo.if |
1098 |
index 73952f4c..6680a087 100644 |
1099 |
--- a/policy/modules/contrib/mojomojo.if |
1100 |
+++ b/policy/modules/contrib/mojomojo.if |
1101 |
@@ -1,23 +1 @@ |
1102 |
## <summary>MojoMojo Wiki.</summary> |
1103 |
- |
1104 |
-######################################## |
1105 |
-## <summary> |
1106 |
-## All of the rules required to |
1107 |
-## administrate an mojomojo environment. |
1108 |
-## </summary> |
1109 |
-## <param name="domain"> |
1110 |
-## <summary> |
1111 |
-## Domain allowed access. |
1112 |
-## </summary> |
1113 |
-## </param> |
1114 |
-## <param name="role"> |
1115 |
-## <summary> |
1116 |
-## Role allowed access. |
1117 |
-## </summary> |
1118 |
-## </param> |
1119 |
-## <rolecap/> |
1120 |
-# |
1121 |
-interface(`mojomojo_admin',` |
1122 |
- refpolicywarn(`$0($*) has been deprecated, use apache_admin() instead.') |
1123 |
- apache_admin($1, $2) |
1124 |
-') |
1125 |
|
1126 |
diff --git a/policy/modules/contrib/mozilla.if b/policy/modules/contrib/mozilla.if |
1127 |
index 70390632..178d68d8 100644 |
1128 |
--- a/policy/modules/contrib/mozilla.if |
1129 |
+++ b/policy/modules/contrib/mozilla.if |
1130 |
@@ -242,21 +242,6 @@ interface(`mozilla_dontaudit_manage_user_home_files',` |
1131 |
|
1132 |
######################################## |
1133 |
## <summary> |
1134 |
-## Execute mozilla home directory files. (Deprecated) |
1135 |
-## </summary> |
1136 |
-## <param name="domain"> |
1137 |
-## <summary> |
1138 |
-## Domain allowed access. |
1139 |
-## </summary> |
1140 |
-## </param> |
1141 |
-# |
1142 |
-interface(`mozilla_exec_user_home_files',` |
1143 |
- refpolicywarn(`$0($*) has been deprecated, use mozilla_exec_user_plugin_home_files() instead.') |
1144 |
- mozilla_exec_user_plugin_home_files($1) |
1145 |
-') |
1146 |
- |
1147 |
-######################################## |
1148 |
-## <summary> |
1149 |
## Execute mozilla plugin home directory files. |
1150 |
## </summary> |
1151 |
## <param name="domain"> |
1152 |
@@ -276,22 +261,6 @@ interface(`mozilla_exec_user_plugin_home_files',` |
1153 |
|
1154 |
######################################## |
1155 |
## <summary> |
1156 |
-## Mozilla home directory file |
1157 |
-## text relocation. (Deprecated) |
1158 |
-## </summary> |
1159 |
-## <param name="domain"> |
1160 |
-## <summary> |
1161 |
-## Domain allowed access. |
1162 |
-## </summary> |
1163 |
-## </param> |
1164 |
-# |
1165 |
-interface(`mozilla_execmod_user_home_files',` |
1166 |
- refpolicywarn(`$0($*) has been deprecated, use mozilla_execmod_user_plugin_home_files() instead.') |
1167 |
- mozilla_execmod_user_plugin_home_files($1) |
1168 |
-') |
1169 |
- |
1170 |
-######################################## |
1171 |
-## <summary> |
1172 |
## Mozilla plugin home directory file |
1173 |
## text relocation. |
1174 |
## </summary> |
1175 |
|
1176 |
diff --git a/policy/modules/contrib/mpd.if b/policy/modules/contrib/mpd.if |
1177 |
index 384599fd..02faa37e 100644 |
1178 |
--- a/policy/modules/contrib/mpd.if |
1179 |
+++ b/policy/modules/contrib/mpd.if |
1180 |
@@ -2,25 +2,6 @@ |
1181 |
|
1182 |
######################################## |
1183 |
## <summary> |
1184 |
-## Role access for mpd. |
1185 |
-## </summary> |
1186 |
-## <param name="role"> |
1187 |
-## <summary> |
1188 |
-## Role allowed access. |
1189 |
-## </summary> |
1190 |
-## </param> |
1191 |
-## <param name="domain"> |
1192 |
-## <summary> |
1193 |
-## User domain for the role. |
1194 |
-## </summary> |
1195 |
-## </param> |
1196 |
-# |
1197 |
-template(`mpd_role',` |
1198 |
- refpolicywarn(`$0($*) has been deprecated') |
1199 |
-') |
1200 |
- |
1201 |
-######################################## |
1202 |
-## <summary> |
1203 |
## Execute a domain transition to run mpd. |
1204 |
## </summary> |
1205 |
## <param name="domain"> |
1206 |
|
1207 |
diff --git a/policy/modules/contrib/mta.if b/policy/modules/contrib/mta.if |
1208 |
index 7e268b80..0602746b 100644 |
1209 |
--- a/policy/modules/contrib/mta.if |
1210 |
+++ b/policy/modules/contrib/mta.if |
1211 |
@@ -753,20 +753,6 @@ interface(`mta_dontaudit_rw_delivery_tcp_sockets',` |
1212 |
|
1213 |
####################################### |
1214 |
## <summary> |
1215 |
-## Connect to all mail servers over TCP. (Deprecated) |
1216 |
-## </summary> |
1217 |
-## <param name="domain"> |
1218 |
-## <summary> |
1219 |
-## Domain allowed access. |
1220 |
-## </summary> |
1221 |
-## </param> |
1222 |
-# |
1223 |
-interface(`mta_tcp_connect_all_mailservers',` |
1224 |
- refpolicywarn(`$0($*) has been deprecated.') |
1225 |
-') |
1226 |
- |
1227 |
-####################################### |
1228 |
-## <summary> |
1229 |
## Do not audit attempts to read |
1230 |
## mail spool symlinks. |
1231 |
## </summary> |
1232 |
|
1233 |
diff --git a/policy/modules/contrib/mysql.if b/policy/modules/contrib/mysql.if |
1234 |
index e7250f7f..af59114a 100644 |
1235 |
--- a/policy/modules/contrib/mysql.if |
1236 |
+++ b/policy/modules/contrib/mysql.if |
1237 |
@@ -1,24 +1,5 @@ |
1238 |
## <summary>Open source database.</summary> |
1239 |
|
1240 |
-######################################## |
1241 |
-## <summary> |
1242 |
-## Role access for mysql. |
1243 |
-## </summary> |
1244 |
-## <param name="role"> |
1245 |
-## <summary> |
1246 |
-## Role allowed access. |
1247 |
-## </summary> |
1248 |
-## </param> |
1249 |
-## <param name="domain"> |
1250 |
-## <summary> |
1251 |
-## User domain for the role. |
1252 |
-## </summary> |
1253 |
-## </param> |
1254 |
-# |
1255 |
-interface(`mysql_role',` |
1256 |
- refpolicywarn(`$0($*) has been deprecated') |
1257 |
-') |
1258 |
- |
1259 |
###################################### |
1260 |
## <summary> |
1261 |
## Execute MySQL in the mysql domain. |
1262 |
@@ -263,21 +244,6 @@ interface(`mysql_manage_db_files',` |
1263 |
|
1264 |
######################################## |
1265 |
## <summary> |
1266 |
-## Read and write mysqld database sockets. |
1267 |
-## named socket. |
1268 |
-## </summary> |
1269 |
-## <param name="domain"> |
1270 |
-## <summary> |
1271 |
-## Domain allowed access. |
1272 |
-## </summary> |
1273 |
-## </param> |
1274 |
-# |
1275 |
-interface(`mysql_rw_db_sockets',` |
1276 |
- refpolicywarn(`$0($*) has been deprecated.') |
1277 |
-') |
1278 |
- |
1279 |
-######################################## |
1280 |
-## <summary> |
1281 |
## Create, read, write, and delete |
1282 |
## mysqld home files. |
1283 |
## </summary> |
1284 |
|
1285 |
diff --git a/policy/modules/contrib/nessus.if b/policy/modules/contrib/nessus.if |
1286 |
index f41ec5f3..57bed033 100644 |
1287 |
--- a/policy/modules/contrib/nessus.if |
1288 |
+++ b/policy/modules/contrib/nessus.if |
1289 |
@@ -2,20 +2,6 @@ |
1290 |
|
1291 |
######################################## |
1292 |
## <summary> |
1293 |
-## Connect to nessus over a TCP socket (Deprecated) |
1294 |
-## </summary> |
1295 |
-## <param name="domain"> |
1296 |
-## <summary> |
1297 |
-## Domain allowed access. |
1298 |
-## </summary> |
1299 |
-## </param> |
1300 |
-# |
1301 |
-interface(`nessus_tcp_connect',` |
1302 |
- refpolicywarn(`$0($*) has been deprecated.') |
1303 |
-') |
1304 |
- |
1305 |
-######################################## |
1306 |
-## <summary> |
1307 |
## All of the rules required to |
1308 |
## administrate an nessus environment. |
1309 |
## </summary> |
1310 |
|
1311 |
diff --git a/policy/modules/contrib/nis.if b/policy/modules/contrib/nis.if |
1312 |
index 718db6ea..66a3ba28 100644 |
1313 |
--- a/policy/modules/contrib/nis.if |
1314 |
+++ b/policy/modules/contrib/nis.if |
1315 |
@@ -215,34 +215,6 @@ interface(`nis_list_var_yp',` |
1316 |
|
1317 |
######################################## |
1318 |
## <summary> |
1319 |
-## Send UDP network traffic to NIS clients. (Deprecated) |
1320 |
-## </summary> |
1321 |
-## <param name="domain"> |
1322 |
-## <summary> |
1323 |
-## Domain allowed access. |
1324 |
-## </summary> |
1325 |
-## </param> |
1326 |
-# |
1327 |
-interface(`nis_udp_send_ypbind',` |
1328 |
- refpolicywarn(`$0($*) has been deprecated.') |
1329 |
-') |
1330 |
- |
1331 |
-######################################## |
1332 |
-## <summary> |
1333 |
-## Connect to ypbind over TCP. (Deprecated) |
1334 |
-## </summary> |
1335 |
-## <param name="domain"> |
1336 |
-## <summary> |
1337 |
-## Domain allowed access. |
1338 |
-## </summary> |
1339 |
-## </param> |
1340 |
-# |
1341 |
-interface(`nis_tcp_connect_ypbind',` |
1342 |
- refpolicywarn(`$0($*) has been deprecated.') |
1343 |
-') |
1344 |
- |
1345 |
-######################################## |
1346 |
-## <summary> |
1347 |
## Read ypbind pid files. |
1348 |
## </summary> |
1349 |
## <param name="domain"> |
1350 |
|
1351 |
diff --git a/policy/modules/contrib/nsd.if b/policy/modules/contrib/nsd.if |
1352 |
index 8ec6ec4e..e071bcd0 100644 |
1353 |
--- a/policy/modules/contrib/nsd.if |
1354 |
+++ b/policy/modules/contrib/nsd.if |
1355 |
@@ -2,34 +2,6 @@ |
1356 |
|
1357 |
######################################## |
1358 |
## <summary> |
1359 |
-## Send and receive datagrams from NSD. (Deprecated) |
1360 |
-## </summary> |
1361 |
-## <param name="domain"> |
1362 |
-## <summary> |
1363 |
-## Domain allowed access. |
1364 |
-## </summary> |
1365 |
-## </param> |
1366 |
-# |
1367 |
-interface(`nsd_udp_chat',` |
1368 |
- refpolicywarn(`$0($*) has been deprecated.') |
1369 |
-') |
1370 |
- |
1371 |
-######################################## |
1372 |
-## <summary> |
1373 |
-## Connect to NSD over a TCP socket (Deprecated) |
1374 |
-## </summary> |
1375 |
-## <param name="domain"> |
1376 |
-## <summary> |
1377 |
-## Domain allowed access. |
1378 |
-## </summary> |
1379 |
-## </param> |
1380 |
-# |
1381 |
-interface(`nsd_tcp_connect',` |
1382 |
- refpolicywarn(`$0($*) has been deprecated.') |
1383 |
-') |
1384 |
- |
1385 |
-######################################## |
1386 |
-## <summary> |
1387 |
## All of the rules required to |
1388 |
## administrate an nsd environment. |
1389 |
## </summary> |
1390 |
|
1391 |
diff --git a/policy/modules/contrib/oident.if b/policy/modules/contrib/oident.if |
1392 |
index c317a3aa..95b329ef 100644 |
1393 |
--- a/policy/modules/contrib/oident.if |
1394 |
+++ b/policy/modules/contrib/oident.if |
1395 |
@@ -2,25 +2,6 @@ |
1396 |
|
1397 |
######################################## |
1398 |
## <summary> |
1399 |
-## Role access for oident. |
1400 |
-## </summary> |
1401 |
-## <param name="role"> |
1402 |
-## <summary> |
1403 |
-## Role allowed access. |
1404 |
-## </summary> |
1405 |
-## </param> |
1406 |
-## <param name="domain"> |
1407 |
-## <summary> |
1408 |
-## User domain for the role. |
1409 |
-## </summary> |
1410 |
-## </param> |
1411 |
-# |
1412 |
-interface(`oident_role',` |
1413 |
- refpolicywarn(`$0($*) has been deprecated') |
1414 |
-') |
1415 |
- |
1416 |
-######################################## |
1417 |
-## <summary> |
1418 |
## Read oidentd user home content. |
1419 |
## </summary> |
1420 |
## <param name="domain"> |
1421 |
|
1422 |
diff --git a/policy/modules/contrib/pcscd.if b/policy/modules/contrib/pcscd.if |
1423 |
index b5c522d3..412c24aa 100644 |
1424 |
--- a/policy/modules/contrib/pcscd.if |
1425 |
+++ b/policy/modules/contrib/pcscd.if |
1426 |
@@ -29,21 +29,6 @@ interface(`pcscd_domtrans',` |
1427 |
## </summary> |
1428 |
## </param> |
1429 |
# |
1430 |
-interface(`pcscd_read_pub_files',` |
1431 |
- refpolicywarn(`$0($*) has been deprecated, use pcscd_read_pid_files() instead.') |
1432 |
- pcscd_read_pid_files($1) |
1433 |
-') |
1434 |
- |
1435 |
-######################################## |
1436 |
-## <summary> |
1437 |
-## Read pcscd pid files. |
1438 |
-## </summary> |
1439 |
-## <param name="domain"> |
1440 |
-## <summary> |
1441 |
-## Domain allowed access. |
1442 |
-## </summary> |
1443 |
-## </param> |
1444 |
-# |
1445 |
interface(`pcscd_read_pid_files',` |
1446 |
gen_require(` |
1447 |
type pcscd_var_run_t; |
1448 |
@@ -55,36 +40,6 @@ interface(`pcscd_read_pid_files',` |
1449 |
|
1450 |
######################################## |
1451 |
## <summary> |
1452 |
-## Create, read, write, and delete |
1453 |
-## pcscd pid files. |
1454 |
-## </summary> |
1455 |
-## <param name="domain"> |
1456 |
-## <summary> |
1457 |
-## Domain allowed access. |
1458 |
-## </summary> |
1459 |
-## </param> |
1460 |
-# |
1461 |
-interface(`pcscd_manage_pub_files',` |
1462 |
- refpolicywarn(`$0($*) has been deprecated') |
1463 |
-') |
1464 |
- |
1465 |
-######################################## |
1466 |
-## <summary> |
1467 |
-## Create, read, write, and delete |
1468 |
-## pcscd pid fifo files. |
1469 |
-## </summary> |
1470 |
-## <param name="domain"> |
1471 |
-## <summary> |
1472 |
-## Domain allowed access. |
1473 |
-## </summary> |
1474 |
-## </param> |
1475 |
-# |
1476 |
-interface(`pcscd_manage_pub_pipes',` |
1477 |
- refpolicywarn(`$0($*) has been deprecated') |
1478 |
-') |
1479 |
- |
1480 |
-######################################## |
1481 |
-## <summary> |
1482 |
## Connect to pcscd over an unix |
1483 |
## domain stream socket. |
1484 |
## </summary> |
1485 |
|
1486 |
diff --git a/policy/modules/contrib/perdition.if b/policy/modules/contrib/perdition.if |
1487 |
index 092ac614..4d69d909 100644 |
1488 |
--- a/policy/modules/contrib/perdition.if |
1489 |
+++ b/policy/modules/contrib/perdition.if |
1490 |
@@ -2,20 +2,6 @@ |
1491 |
|
1492 |
######################################## |
1493 |
## <summary> |
1494 |
-## Connect to perdition over a TCP socket (Deprecated) |
1495 |
-## </summary> |
1496 |
-## <param name="domain"> |
1497 |
-## <summary> |
1498 |
-## Domain allowed access. |
1499 |
-## </summary> |
1500 |
-## </param> |
1501 |
-# |
1502 |
-interface(`perdition_tcp_connect',` |
1503 |
- refpolicywarn(`$0($*) has been deprecated.') |
1504 |
-') |
1505 |
- |
1506 |
-######################################## |
1507 |
-## <summary> |
1508 |
## All of the rules required to |
1509 |
## administrate an perdition environment. |
1510 |
## </summary> |
1511 |
|
1512 |
diff --git a/policy/modules/contrib/portmap.if b/policy/modules/contrib/portmap.if |
1513 |
index f0af3fe3..52208ce0 100644 |
1514 |
--- a/policy/modules/contrib/portmap.if |
1515 |
+++ b/policy/modules/contrib/portmap.if |
1516 |
@@ -48,48 +48,6 @@ interface(`portmap_run_helper',` |
1517 |
|
1518 |
######################################## |
1519 |
## <summary> |
1520 |
-## Send UDP network traffic to portmap. (Deprecated) |
1521 |
-## </summary> |
1522 |
-## <param name="domain"> |
1523 |
-## <summary> |
1524 |
-## Domain allowed access. |
1525 |
-## </summary> |
1526 |
-## </param> |
1527 |
-# |
1528 |
-interface(`portmap_udp_send',` |
1529 |
- refpolicywarn(`$0($*) has been deprecated.') |
1530 |
-') |
1531 |
- |
1532 |
-######################################## |
1533 |
-## <summary> |
1534 |
-## Send and receive UDP network traffic from portmap. (Deprecated) |
1535 |
-## </summary> |
1536 |
-## <param name="domain"> |
1537 |
-## <summary> |
1538 |
-## Domain allowed access. |
1539 |
-## </summary> |
1540 |
-## </param> |
1541 |
-# |
1542 |
-interface(`portmap_udp_chat',` |
1543 |
- refpolicywarn(`$0($*) has been deprecated.') |
1544 |
-') |
1545 |
- |
1546 |
-######################################## |
1547 |
-## <summary> |
1548 |
-## Connect to portmap over a TCP socket (Deprecated) |
1549 |
-## </summary> |
1550 |
-## <param name="domain"> |
1551 |
-## <summary> |
1552 |
-## Domain allowed access. |
1553 |
-## </summary> |
1554 |
-## </param> |
1555 |
-# |
1556 |
-interface(`portmap_tcp_connect',` |
1557 |
- refpolicywarn(`$0($*) has been deprecated.') |
1558 |
-') |
1559 |
- |
1560 |
-######################################## |
1561 |
-## <summary> |
1562 |
## All of the rules required to |
1563 |
## administrate an portmap environment. |
1564 |
## </summary> |
1565 |
|
1566 |
diff --git a/policy/modules/contrib/postfix.if b/policy/modules/contrib/postfix.if |
1567 |
index 19fe6132..fa17bde4 100644 |
1568 |
--- a/policy/modules/contrib/postfix.if |
1569 |
+++ b/policy/modules/contrib/postfix.if |
1570 |
@@ -428,22 +428,6 @@ interface(`postfix_stream_connect_master',` |
1571 |
|
1572 |
######################################## |
1573 |
## <summary> |
1574 |
-## Read and write postfix master |
1575 |
-## unnamed pipes. (Deprecated) |
1576 |
-## </summary> |
1577 |
-## <param name="domain"> |
1578 |
-## <summary> |
1579 |
-## Domain allowed access. |
1580 |
-## </summary> |
1581 |
-## </param> |
1582 |
-# |
1583 |
-interface(`postfix_rw_master_pipes',` |
1584 |
- refpolicywarn(`$0($*) has been deprecated, use postfix_rw_inherited_master_pipes() instead.') |
1585 |
- postfix_rw_inherited_master_pipes($1) |
1586 |
-') |
1587 |
- |
1588 |
-######################################## |
1589 |
-## <summary> |
1590 |
## Execute the master postdrop in the |
1591 |
## postfix postdrop domain. |
1592 |
## </summary> |
1593 |
@@ -484,22 +468,6 @@ interface(`postfix_domtrans_postqueue',` |
1594 |
|
1595 |
####################################### |
1596 |
## <summary> |
1597 |
-## Execute the master postqueue in |
1598 |
-## the caller domain. (Deprecated) |
1599 |
-## </summary> |
1600 |
-## <param name="domain"> |
1601 |
-## <summary> |
1602 |
-## Domain allowed access. |
1603 |
-## </summary> |
1604 |
-## </param> |
1605 |
-# |
1606 |
-interface(`posftix_exec_postqueue',` |
1607 |
- refpolicywarn(`$0($*) has been deprecated.') |
1608 |
- postfix_exec_postqueue($1) |
1609 |
-') |
1610 |
- |
1611 |
-####################################### |
1612 |
-## <summary> |
1613 |
## Execute postfix postqueue in |
1614 |
## the caller domain. |
1615 |
## </summary> |
1616 |
|
1617 |
diff --git a/policy/modules/contrib/ppp.if b/policy/modules/contrib/ppp.if |
1618 |
index 0376e92f..070e565c 100644 |
1619 |
--- a/policy/modules/contrib/ppp.if |
1620 |
+++ b/policy/modules/contrib/ppp.if |
1621 |
@@ -2,25 +2,6 @@ |
1622 |
|
1623 |
######################################## |
1624 |
## <summary> |
1625 |
-## Role access for ppp. |
1626 |
-## </summary> |
1627 |
-## <param name="role"> |
1628 |
-## <summary> |
1629 |
-## Role allowed access. |
1630 |
-## </summary> |
1631 |
-## </param> |
1632 |
-## <param name="domain"> |
1633 |
-## <summary> |
1634 |
-## User domain for the role. |
1635 |
-## </summary> |
1636 |
-## </param> |
1637 |
-# |
1638 |
-interface(`ppp_role',` |
1639 |
- refpolicywarn(`$0($*) has been deprecated') |
1640 |
-') |
1641 |
- |
1642 |
-######################################## |
1643 |
-## <summary> |
1644 |
## Create, read, write, and delete |
1645 |
## ppp home files. |
1646 |
## </summary> |
1647 |
|
1648 |
diff --git a/policy/modules/contrib/pulseaudio.if b/policy/modules/contrib/pulseaudio.if |
1649 |
index 7236f624..921e519c 100644 |
1650 |
--- a/policy/modules/contrib/pulseaudio.if |
1651 |
+++ b/policy/modules/contrib/pulseaudio.if |
1652 |
@@ -254,21 +254,6 @@ interface(`pulseaudio_setattr_home_dir',` |
1653 |
## </summary> |
1654 |
## </param> |
1655 |
# |
1656 |
-interface(`pulseaudio_read_home_files',` |
1657 |
- refpolicywarn(`$0($*) has been deprecated, use pulseaudio_read_home() instead.') |
1658 |
- pulseaudio_read_home($1) |
1659 |
-') |
1660 |
- |
1661 |
-######################################## |
1662 |
-## <summary> |
1663 |
-## Read pulseaudio home content. |
1664 |
-## </summary> |
1665 |
-## <param name="domain"> |
1666 |
-## <summary> |
1667 |
-## Domain allowed access. |
1668 |
-## </summary> |
1669 |
-## </param> |
1670 |
-# |
1671 |
interface(`pulseaudio_read_home',` |
1672 |
gen_require(` |
1673 |
type pulseaudio_home_t; |
1674 |
@@ -311,22 +296,6 @@ interface(`pulseaudio_rw_home_files',` |
1675 |
## </summary> |
1676 |
## </param> |
1677 |
# |
1678 |
-interface(`pulseaudio_manage_home_files',` |
1679 |
- refpolicywarn(`$0($*) has been deprecated, use pulseaudio_manage_home() instead.') |
1680 |
- pulseaudio_manage_home($1) |
1681 |
-') |
1682 |
- |
1683 |
-######################################## |
1684 |
-## <summary> |
1685 |
-## Create, read, write, and delete |
1686 |
-## pulseaudio home content. |
1687 |
-## </summary> |
1688 |
-## <param name="domain"> |
1689 |
-## <summary> |
1690 |
-## Domain allowed access. |
1691 |
-## </summary> |
1692 |
-## </param> |
1693 |
-# |
1694 |
interface(`pulseaudio_manage_home',` |
1695 |
gen_require(` |
1696 |
type pulseaudio_home_t; |
1697 |
|
1698 |
diff --git a/policy/modules/contrib/radius.if b/policy/modules/contrib/radius.if |
1699 |
index 7703bc78..bce89c30 100644 |
1700 |
--- a/policy/modules/contrib/radius.if |
1701 |
+++ b/policy/modules/contrib/radius.if |
1702 |
@@ -2,20 +2,6 @@ |
1703 |
|
1704 |
######################################## |
1705 |
## <summary> |
1706 |
-## Use radius over a UDP connection. (Deprecated) |
1707 |
-## </summary> |
1708 |
-## <param name="domain"> |
1709 |
-## <summary> |
1710 |
-## Domain allowed access. |
1711 |
-## </summary> |
1712 |
-## </param> |
1713 |
-# |
1714 |
-interface(`radius_use',` |
1715 |
- refpolicywarn(`$0($*) has been deprecated.') |
1716 |
-') |
1717 |
- |
1718 |
-######################################## |
1719 |
-## <summary> |
1720 |
## All of the rules required to |
1721 |
## administrate an radius environment. |
1722 |
## </summary> |
1723 |
|
1724 |
diff --git a/policy/modules/contrib/rpc.if b/policy/modules/contrib/rpc.if |
1725 |
index fbf5995d..7063c42f 100644 |
1726 |
--- a/policy/modules/contrib/rpc.if |
1727 |
+++ b/policy/modules/contrib/rpc.if |
1728 |
@@ -52,20 +52,6 @@ template(`rpc_domain_template',` |
1729 |
|
1730 |
######################################## |
1731 |
## <summary> |
1732 |
-## Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated) |
1733 |
-## </summary> |
1734 |
-## <param name="domain"> |
1735 |
-## <summary> |
1736 |
-## Domain allowed access. |
1737 |
-## </summary> |
1738 |
-## </param> |
1739 |
-# |
1740 |
-interface(`rpc_udp_send',` |
1741 |
- refpolicywarn(`$0($*) has been deprecated.') |
1742 |
-') |
1743 |
- |
1744 |
-######################################## |
1745 |
-## <summary> |
1746 |
## Do not audit attempts to get |
1747 |
## attributes of export files. |
1748 |
## </summary> |
1749 |
@@ -298,20 +284,6 @@ interface(`rpc_udp_rw_nfs_sockets',` |
1750 |
|
1751 |
######################################## |
1752 |
## <summary> |
1753 |
-## Send UDP traffic to NFSd. (Deprecated) |
1754 |
-## </summary> |
1755 |
-## <param name="domain"> |
1756 |
-## <summary> |
1757 |
-## Domain allowed access. |
1758 |
-## </summary> |
1759 |
-## </param> |
1760 |
-# |
1761 |
-interface(`rpc_udp_send_nfs',` |
1762 |
- refpolicywarn(`$0($*) has been deprecated.') |
1763 |
-') |
1764 |
- |
1765 |
-######################################## |
1766 |
-## <summary> |
1767 |
## Search nfs lib directories. |
1768 |
## </summary> |
1769 |
## <param name="domain"> |
1770 |
|
1771 |
diff --git a/policy/modules/contrib/rpm.if b/policy/modules/contrib/rpm.if |
1772 |
index 304e97cb..016cdb2a 100644 |
1773 |
--- a/policy/modules/contrib/rpm.if |
1774 |
+++ b/policy/modules/contrib/rpm.if |
1775 |
@@ -564,22 +564,6 @@ interface(`rpm_manage_pid_files',` |
1776 |
files_search_pids($1) |
1777 |
') |
1778 |
|
1779 |
-###################################### |
1780 |
-## <summary> |
1781 |
-## Create files in pid directories |
1782 |
-## with the rpm pid file type. |
1783 |
-## </summary> |
1784 |
-## <param name="domain"> |
1785 |
-## <summary> |
1786 |
-## Domain allowed access. |
1787 |
-## </summary> |
1788 |
-## </param> |
1789 |
-# |
1790 |
-interface(`rpm_pid_filetrans',` |
1791 |
- refpolicywarn(`$0($*) has been deprecated, rpm_pid_filetrans_rpm_pid() instead.') |
1792 |
- rpm_pid_filetrans_rpm_pid($1, file) |
1793 |
-') |
1794 |
- |
1795 |
######################################## |
1796 |
## <summary> |
1797 |
## Create specified objects in pid directories |
1798 |
|
1799 |
diff --git a/policy/modules/contrib/sendmail.if b/policy/modules/contrib/sendmail.if |
1800 |
index d60de843..5358d159 100644 |
1801 |
--- a/policy/modules/contrib/sendmail.if |
1802 |
+++ b/policy/modules/contrib/sendmail.if |
1803 |
@@ -228,22 +228,6 @@ interface(`sendmail_manage_log',` |
1804 |
## Domain allowed access. |
1805 |
## </summary> |
1806 |
## </param> |
1807 |
-# |
1808 |
-interface(`sendmail_create_log',` |
1809 |
- refpolicywarn(`$0($*) has been deprecated, use sendmail_log_filetrans_sendmail_log() instead.') |
1810 |
- sendmail_log_filetrans_sendmail_log($1, $2, $3) |
1811 |
-') |
1812 |
- |
1813 |
-######################################## |
1814 |
-## <summary> |
1815 |
-## Create specified objects in generic |
1816 |
-## log directories sendmail log file type. |
1817 |
-## </summary> |
1818 |
-## <param name="domain"> |
1819 |
-## <summary> |
1820 |
-## Domain allowed access. |
1821 |
-## </summary> |
1822 |
-## </param> |
1823 |
## <param name="object_class"> |
1824 |
## <summary> |
1825 |
## Class of the object being created. |
1826 |
|
1827 |
diff --git a/policy/modules/contrib/slocate.if b/policy/modules/contrib/slocate.if |
1828 |
index 1f25803d..82de1b68 100644 |
1829 |
--- a/policy/modules/contrib/slocate.if |
1830 |
+++ b/policy/modules/contrib/slocate.if |
1831 |
@@ -2,20 +2,6 @@ |
1832 |
|
1833 |
######################################## |
1834 |
## <summary> |
1835 |
-## Create the locate log with append mode. |
1836 |
-## </summary> |
1837 |
-## <param name="domain"> |
1838 |
-## <summary> |
1839 |
-## Domain allowed access. |
1840 |
-## </summary> |
1841 |
-## </param> |
1842 |
-# |
1843 |
-interface(`slocate_create_append_log',` |
1844 |
- refpolicywarn(`$0($*) has been deprecated') |
1845 |
-') |
1846 |
- |
1847 |
-######################################## |
1848 |
-## <summary> |
1849 |
## Read locate lib files. |
1850 |
## </summary> |
1851 |
## <param name="domain"> |
1852 |
|
1853 |
diff --git a/policy/modules/contrib/snmp.if b/policy/modules/contrib/snmp.if |
1854 |
index 96775032..d8a75680 100644 |
1855 |
--- a/policy/modules/contrib/snmp.if |
1856 |
+++ b/policy/modules/contrib/snmp.if |
1857 |
@@ -43,20 +43,6 @@ interface(`snmp_tcp_connect',` |
1858 |
|
1859 |
######################################## |
1860 |
## <summary> |
1861 |
-## Send and receive UDP traffic to SNMP (Deprecated) |
1862 |
-## </summary> |
1863 |
-## <param name="domain"> |
1864 |
-## <summary> |
1865 |
-## Domain allowed access. |
1866 |
-## </summary> |
1867 |
-## </param> |
1868 |
-# |
1869 |
-interface(`snmp_udp_chat',` |
1870 |
- refpolicywarn(`$0($*) has been deprecated.') |
1871 |
-') |
1872 |
- |
1873 |
-######################################## |
1874 |
-## <summary> |
1875 |
## Create, read, write, and delete |
1876 |
## snmp lib directories. |
1877 |
## </summary> |
1878 |
|
1879 |
diff --git a/policy/modules/contrib/soundserver.if b/policy/modules/contrib/soundserver.if |
1880 |
index 8dc1c0f4..106e0700 100644 |
1881 |
--- a/policy/modules/contrib/soundserver.if |
1882 |
+++ b/policy/modules/contrib/soundserver.if |
1883 |
@@ -2,20 +2,6 @@ |
1884 |
|
1885 |
######################################## |
1886 |
## <summary> |
1887 |
-## Connect to the sound server over a TCP socket (Deprecated) |
1888 |
-## </summary> |
1889 |
-## <param name="domain"> |
1890 |
-## <summary> |
1891 |
-## Domain allowed access. |
1892 |
-## </summary> |
1893 |
-## </param> |
1894 |
-# |
1895 |
-interface(`soundserver_tcp_connect',` |
1896 |
- refpolicywarn(`$0($*) has been deprecated.') |
1897 |
-') |
1898 |
- |
1899 |
-######################################## |
1900 |
-## <summary> |
1901 |
## All of the rules required to |
1902 |
## administrate an soundd environment. |
1903 |
## </summary> |
1904 |
|
1905 |
diff --git a/policy/modules/contrib/squid.if b/policy/modules/contrib/squid.if |
1906 |
index b5adfad3..2443afbd 100644 |
1907 |
--- a/policy/modules/contrib/squid.if |
1908 |
+++ b/policy/modules/contrib/squid.if |
1909 |
@@ -177,20 +177,6 @@ interface(`squid_manage_logs',` |
1910 |
|
1911 |
######################################## |
1912 |
## <summary> |
1913 |
-## Use squid services by connecting over TCP. (Deprecated) |
1914 |
-## </summary> |
1915 |
-## <param name="domain"> |
1916 |
-## <summary> |
1917 |
-## Domain allowed access. |
1918 |
-## </summary> |
1919 |
-## </param> |
1920 |
-# |
1921 |
-interface(`squid_use',` |
1922 |
- refpolicywarn(`$0($*) has been deprecated.') |
1923 |
-') |
1924 |
- |
1925 |
-######################################## |
1926 |
-## <summary> |
1927 |
## dontaudit statting tmpfs files |
1928 |
## </summary> |
1929 |
## <param name="domain"> |
1930 |
|
1931 |
diff --git a/policy/modules/contrib/virt.if b/policy/modules/contrib/virt.if |
1932 |
index 8016cccb..993ee6c8 100644 |
1933 |
--- a/policy/modules/contrib/virt.if |
1934 |
+++ b/policy/modules/contrib/virt.if |
1935 |
@@ -1069,22 +1069,6 @@ interface(`virt_rw_all_image_chr_files',` |
1936 |
######################################## |
1937 |
## <summary> |
1938 |
## Create, read, write, and delete |
1939 |
-## svirt cache files. |
1940 |
-## </summary> |
1941 |
-## <param name="domain"> |
1942 |
-## <summary> |
1943 |
-## Domain allowed access. |
1944 |
-## </summary> |
1945 |
-## </param> |
1946 |
-# |
1947 |
-interface(`virt_manage_svirt_cache',` |
1948 |
- refpolicywarn(`$0($*) has been deprecated, use virt_manage_virt_cache() instead.') |
1949 |
- virt_manage_virt_cache($1) |
1950 |
-') |
1951 |
- |
1952 |
-######################################## |
1953 |
-## <summary> |
1954 |
-## Create, read, write, and delete |
1955 |
## virt cache content. |
1956 |
## </summary> |
1957 |
## <param name="domain"> |