Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/
Date: Sat, 09 Sep 2017 02:43:09
Message-Id: 1504910931.192f02005a5673e022d3cc7ff18af83855faceba.perfinion@gentoo
1 commit: 192f02005a5673e022d3cc7ff18af83855faceba
2 Author: Chris PeBenito <pebenito <AT> ieee <DOT> org>
3 AuthorDate: Sun Aug 6 21:03:06 2017 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Fri Sep 8 22:48:51 2017 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=192f0200
7
8 Remove deprecated interfaces more than one year old.
9
10 policy/modules/contrib/abrt.if | 16 --------
11 policy/modules/contrib/alsa.if | 51 ------------------------
12 policy/modules/contrib/automount.if | 15 -------
13 policy/modules/contrib/awstats.if | 28 -------------
14 policy/modules/contrib/bind.if | 14 -------
15 policy/modules/contrib/bluetooth.if | 40 -------------------
16 policy/modules/contrib/certwatch.if | 29 --------------
17 policy/modules/contrib/clogd.if | 15 -------
18 policy/modules/contrib/cobbler.if | 22 ----------
19 policy/modules/contrib/corosync.if | 22 ----------
20 policy/modules/contrib/cups.if | 14 -------
21 policy/modules/contrib/dbus.if | 75 -----------------------------------
22 policy/modules/contrib/dictd.if | 15 -------
23 policy/modules/contrib/finger.if | 14 -------
24 policy/modules/contrib/ftp.if | 14 -------
25 policy/modules/contrib/glusterfs.if | 22 ----------
26 policy/modules/contrib/gnome.if | 66 ------------------------------
27 policy/modules/contrib/gpg.if | 14 -------
28 policy/modules/contrib/i18n_input.if | 14 -------
29 policy/modules/contrib/inetd.if | 28 -------------
30 policy/modules/contrib/iodine.if | 22 ----------
31 policy/modules/contrib/jabber.if | 14 -------
32 policy/modules/contrib/kerberos.if | 41 -------------------
33 policy/modules/contrib/ldap.if | 14 -------
34 policy/modules/contrib/mandb.if | 57 --------------------------
35 policy/modules/contrib/mojomojo.if | 22 ----------
36 policy/modules/contrib/mozilla.if | 31 ---------------
37 policy/modules/contrib/mpd.if | 19 ---------
38 policy/modules/contrib/mta.if | 14 -------
39 policy/modules/contrib/mysql.if | 34 ----------------
40 policy/modules/contrib/nessus.if | 14 -------
41 policy/modules/contrib/nis.if | 28 -------------
42 policy/modules/contrib/nsd.if | 28 -------------
43 policy/modules/contrib/oident.if | 19 ---------
44 policy/modules/contrib/pcscd.if | 45 ---------------------
45 policy/modules/contrib/perdition.if | 14 -------
46 policy/modules/contrib/portmap.if | 42 --------------------
47 policy/modules/contrib/postfix.if | 32 ---------------
48 policy/modules/contrib/ppp.if | 19 ---------
49 policy/modules/contrib/pulseaudio.if | 31 ---------------
50 policy/modules/contrib/radius.if | 14 -------
51 policy/modules/contrib/rpc.if | 28 -------------
52 policy/modules/contrib/rpm.if | 16 --------
53 policy/modules/contrib/sendmail.if | 16 --------
54 policy/modules/contrib/slocate.if | 14 -------
55 policy/modules/contrib/snmp.if | 14 -------
56 policy/modules/contrib/soundserver.if | 14 -------
57 policy/modules/contrib/squid.if | 14 -------
58 policy/modules/contrib/virt.if | 16 --------
59 49 files changed, 1214 deletions(-)
60
61 diff --git a/policy/modules/contrib/abrt.if b/policy/modules/contrib/abrt.if
62 index 39b6d291..9d1f00da 100644
63 --- a/policy/modules/contrib/abrt.if
64 +++ b/policy/modules/contrib/abrt.if
65 @@ -164,22 +164,6 @@ interface(`abrt_run_helper',`
66 ########################################
67 ## <summary>
68 ## Create, read, write, and delete
69 -## abrt cache files.
70 -## </summary>
71 -## <param name="domain">
72 -## <summary>
73 -## Domain allowed access.
74 -## </summary>
75 -## </param>
76 -#
77 -interface(`abrt_cache_manage',`
78 - refpolicywarn(`$0($*) has been deprecated, use abrt_manage_cache() instead.')
79 - abrt_manage_cache($1)
80 -')
81 -
82 -########################################
83 -## <summary>
84 -## Create, read, write, and delete
85 ## abrt cache content.
86 ## </summary>
87 ## <param name="domain">
88
89 diff --git a/policy/modules/contrib/alsa.if b/policy/modules/contrib/alsa.if
90 index d50f5e33..9cff9efb 100644
91 --- a/policy/modules/contrib/alsa.if
92 +++ b/policy/modules/contrib/alsa.if
93 @@ -2,25 +2,6 @@
94
95 ########################################
96 ## <summary>
97 -## Role access for alsa.
98 -## </summary>
99 -## <param name="role">
100 -## <summary>
101 -## Role allowed access.
102 -## </summary>
103 -## </param>
104 -## <param name="domain">
105 -## <summary>
106 -## User domain for the role.
107 -## </summary>
108 -## </param>
109 -#
110 -template(`alsa_role',`
111 - refpolicywarn(`$0($*) has been deprecated')
112 -')
113 -
114 -########################################
115 -## <summary>
116 ## Execute a domain transition to run Alsa.
117 ## </summary>
118 ## <param name="domain">
119 @@ -102,22 +83,6 @@ interface(`alsa_rw_shared_mem',`
120
121 ########################################
122 ## <summary>
123 -## Read writable Alsa configuration
124 -## content. (Deprecated)
125 -## </summary>
126 -## <param name="domain">
127 -## <summary>
128 -## Domain allowed access.
129 -## </summary>
130 -## </param>
131 -#
132 -interface(`alsa_read_rw_config',`
133 - refpolicywarn(`$0($*) has been deprecated, use alsa_read_config() instead.')
134 - alsa_read_config($1)
135 -')
136 -
137 -########################################
138 -## <summary>
139 ## Read Alsa configuration content.
140 ## </summary>
141 ## <param name="domain">
142 @@ -139,22 +104,6 @@ interface(`alsa_read_config',`
143
144 ########################################
145 ## <summary>
146 -## Manage writable Alsa config
147 -## files. (Deprecated)
148 -## </summary>
149 -## <param name="domain">
150 -## <summary>
151 -## Domain allowed access.
152 -## </summary>
153 -## </param>
154 -#
155 -interface(`alsa_manage_rw_config',`
156 - refpolicywarn(`$0($*) has been deprecated, use alsa_manage_config() instead.')
157 - alsa_manage_config($1)
158 -')
159 -
160 -########################################
161 -## <summary>
162 ## Manage Alsa config files.
163 ## </summary>
164 ## <param name="domain">
165
166 diff --git a/policy/modules/contrib/automount.if b/policy/modules/contrib/automount.if
167 index 37847d93..fbaa3220 100644
168 --- a/policy/modules/contrib/automount.if
169 +++ b/policy/modules/contrib/automount.if
170 @@ -40,21 +40,6 @@ interface(`automount_signal',`
171
172 ########################################
173 ## <summary>
174 -## Execute automount in the caller domain.
175 -## </summary>
176 -## <param name="domain">
177 -## <summary>
178 -## Domain allowed access.
179 -## </summary>
180 -## </param>
181 -#
182 -interface(`automount_exec_config',`
183 - refpolicywarn(`$0(): has been deprecated, please use files_exec_etc_files() instead.')
184 - files_exec_etc_files($1)
185 -')
186 -
187 -########################################
188 -## <summary>
189 ## Read automount process state.
190 ## </summary>
191 ## <param name="domain">
192
193 diff --git a/policy/modules/contrib/awstats.if b/policy/modules/contrib/awstats.if
194 index 68616dd9..e86fe87f 100644
195 --- a/policy/modules/contrib/awstats.if
196 +++ b/policy/modules/contrib/awstats.if
197 @@ -19,31 +19,3 @@ interface(`awstats_domtrans',`
198 corecmd_search_bin($1)
199 domtrans_pattern($1, awstats_exec_t, awstats_t)
200 ')
201 -
202 -########################################
203 -## <summary>
204 -## Read and write awstats unnamed pipes. (Deprecated)
205 -## </summary>
206 -## <param name="domain">
207 -## <summary>
208 -## Domain allowed access.
209 -## </summary>
210 -## </param>
211 -#
212 -interface(`awstats_rw_pipes',`
213 - refpolicywarn(`$0($*) has been deprecated.')
214 -')
215 -
216 -########################################
217 -## <summary>
218 -## Execute awstats cgi scripts in the caller domain. (Deprecated)
219 -## </summary>
220 -## <param name="domain">
221 -## <summary>
222 -## Domain allowed access.
223 -## </summary>
224 -## </param>
225 -#
226 -interface(`awstats_cgi_exec',`
227 - refpolicywarn(`$0($*) has been deprecated.')
228 -')
229
230 diff --git a/policy/modules/contrib/bind.if b/policy/modules/contrib/bind.if
231 index 7193af63..a99bae9c 100644
232 --- a/policy/modules/contrib/bind.if
233 +++ b/policy/modules/contrib/bind.if
234 @@ -331,20 +331,6 @@ interface(`bind_manage_zone',`
235
236 ########################################
237 ## <summary>
238 -## Send and receive datagrams to and from named. (Deprecated)
239 -## </summary>
240 -## <param name="domain">
241 -## <summary>
242 -## Domain allowed access.
243 -## </summary>
244 -## </param>
245 -#
246 -interface(`bind_udp_chat_named',`
247 - refpolicywarn(`$0($*) has been deprecated.')
248 -')
249 -
250 -########################################
251 -## <summary>
252 ## All of the rules required to
253 ## administrate an bind environment.
254 ## </summary>
255
256 diff --git a/policy/modules/contrib/bluetooth.if b/policy/modules/contrib/bluetooth.if
257 index 09d6248d..dc61988c 100644
258 --- a/policy/modules/contrib/bluetooth.if
259 +++ b/policy/modules/contrib/bluetooth.if
260 @@ -130,46 +130,6 @@ interface(`bluetooth_dbus_chat',`
261
262 ########################################
263 ## <summary>
264 -## Execute bluetooth_helper in the bluetooth_helper domain. (Deprecated)
265 -## </summary>
266 -## <param name="domain">
267 -## <summary>
268 -## Domain allowed to transition.
269 -## </summary>
270 -## </param>
271 -#
272 -interface(`bluetooth_domtrans_helper',`
273 - refpolicywarn(`$0($*) has been deprecated.')
274 -')
275 -
276 -########################################
277 -## <summary>
278 -## Execute bluetooth_helper in the bluetooth_helper domain, and
279 -## allow the specified role the bluetooth_helper domain. (Deprecated)
280 -## </summary>
281 -## <param name="domain">
282 -## <summary>
283 -## Domain allowed to transition.
284 -## </summary>
285 -## </param>
286 -## <param name="role">
287 -## <summary>
288 -## Role allowed access.
289 -## </summary>
290 -## </param>
291 -## <param name="terminal">
292 -## <summary>
293 -## The type of the terminal allow the bluetooth_helper domain to use.
294 -## </summary>
295 -## </param>
296 -## <rolecap/>
297 -#
298 -interface(`bluetooth_run_helper',`
299 - refpolicywarn(`$0($*) has been deprecated.')
300 -')
301 -
302 -########################################
303 -## <summary>
304 ## Do not audit attempts to read
305 ## bluetooth process state files.
306 ## </summary>
307
308 diff --git a/policy/modules/contrib/certwatch.if b/policy/modules/contrib/certwatch.if
309 index 9291c5cc..54e6e661 100644
310 --- a/policy/modules/contrib/certwatch.if
311 +++ b/policy/modules/contrib/certwatch.if
312 @@ -46,32 +46,3 @@ interface(`certwatch_run',`
313 certwatch_domtrans($1)
314 roleattribute $2 certwatch_roles;
315 ')
316 -
317 -########################################
318 -## <summary>
319 -## Execute certwatch in the certwatch domain, and
320 -## allow the specified role the certwatch domain,
321 -## and use the caller's terminal. Has a sigchld
322 -## backchannel. (Deprecated)
323 -## </summary>
324 -## <param name="domain">
325 -## <summary>
326 -## Domain allowed to transition.
327 -## </summary>
328 -## </param>
329 -## <param name="role">
330 -## <summary>
331 -## Role allowed access.
332 -## </summary>
333 -## </param>
334 -## <param name="terminal">
335 -## <summary>
336 -## The type of the terminal allow the certwatch domain to use.
337 -## </summary>
338 -## </param>
339 -## <rolecap/>
340 -#
341 -interface(`certwatach_run',`
342 - refpolicywarn(`$0($*) has been deprecated, please use certwatch_run() instead.')
343 - certwatch_run($*)
344 -')
345
346 diff --git a/policy/modules/contrib/clogd.if b/policy/modules/contrib/clogd.if
347 index 221d9143..dce4cb19 100644
348 --- a/policy/modules/contrib/clogd.if
349 +++ b/policy/modules/contrib/clogd.if
350 @@ -21,21 +21,6 @@ interface(`clogd_domtrans',`
351
352 #####################################
353 ## <summary>
354 -## Connect to clogd over a unix domain
355 -## stream socket. (Deprecated)
356 -## </summary>
357 -## <param name="domain">
358 -## <summary>
359 -## Domain allowed access.
360 -## </summary>
361 -## </param>
362 -#
363 -interface(`clogd_stream_connect',`
364 - refpolicywarn(`$0($*) has been deprecated.')
365 -')
366 -
367 -#####################################
368 -## <summary>
369 ## Read and write clogd semaphores.
370 ## </summary>
371 ## <param name="domain">
372
373 diff --git a/policy/modules/contrib/cobbler.if b/policy/modules/contrib/cobbler.if
374 index 376fa84b..40f89990 100644
375 --- a/policy/modules/contrib/cobbler.if
376 +++ b/policy/modules/contrib/cobbler.if
377 @@ -151,28 +151,6 @@ interface(`cobbler_manage_lib_files',`
378 ## </param>
379 ## <rolecap/>
380 #
381 -interface(`cobblerd_admin',`
382 - refpolicywarn(`$0($*) has been deprecated, use cobbler_admin() instead.')
383 - cobbler_admin($1, $2)
384 -')
385 -
386 -########################################
387 -## <summary>
388 -## All of the rules required to
389 -## administrate an cobbler environment.
390 -## </summary>
391 -## <param name="domain">
392 -## <summary>
393 -## Domain allowed access.
394 -## </summary>
395 -## </param>
396 -## <param name="role">
397 -## <summary>
398 -## Role allowed access.
399 -## </summary>
400 -## </param>
401 -## <rolecap/>
402 -#
403 interface(`cobbler_admin',`
404 gen_require(`
405 type cobblerd_t, cobbler_var_lib_t, cobbler_var_log_t;
406
407 diff --git a/policy/modules/contrib/corosync.if b/policy/modules/contrib/corosync.if
408 index 57736aab..2b2d11af 100644
409 --- a/policy/modules/contrib/corosync.if
410 +++ b/policy/modules/contrib/corosync.if
411 @@ -133,28 +133,6 @@ interface(`corosync_rw_tmpfs',`
412 ## </param>
413 ## <rolecap/>
414 #
415 -interface(`corosyncd_admin',`
416 - refpolicywarn(`$0($*) has been deprecated, use corosync_admin() instead.')
417 - corosync_admin($1, $2)
418 -')
419 -
420 -######################################
421 -## <summary>
422 -## All of the rules required to
423 -## administrate an corosync environment.
424 -## </summary>
425 -## <param name="domain">
426 -## <summary>
427 -## Domain allowed access.
428 -## </summary>
429 -## </param>
430 -## <param name="role">
431 -## <summary>
432 -## Role allowed access.
433 -## </summary>
434 -## </param>
435 -## <rolecap/>
436 -#
437 interface(`corosync_admin',`
438 gen_require(`
439 type corosync_t, corosync_var_lib_t, corosync_var_log_t;
440
441 diff --git a/policy/modules/contrib/cups.if b/policy/modules/contrib/cups.if
442 index bd6b77f4..73887e50 100644
443 --- a/policy/modules/contrib/cups.if
444 +++ b/policy/modules/contrib/cups.if
445 @@ -75,20 +75,6 @@ interface(`cups_stream_connect',`
446
447 ########################################
448 ## <summary>
449 -## Connect to cups over TCP. (Deprecated)
450 -## </summary>
451 -## <param name="domain">
452 -## <summary>
453 -## Domain allowed access.
454 -## </summary>
455 -## </param>
456 -#
457 -interface(`cups_tcp_connect',`
458 - refpolicywarn(`$0($*) has been deprecated.')
459 -')
460 -
461 -########################################
462 -## <summary>
463 ## Send and receive messages from
464 ## cups over dbus.
465 ## </summary>
466
467 diff --git a/policy/modules/contrib/dbus.if b/policy/modules/contrib/dbus.if
468 index 3893df7c..32824d9a 100644
469 --- a/policy/modules/contrib/dbus.if
470 +++ b/policy/modules/contrib/dbus.if
471 @@ -139,22 +139,6 @@ interface(`dbus_system_bus_client',`
472
473 #######################################
474 ## <summary>
475 -## Acquire service on DBUS
476 -## session bus.
477 -## </summary>
478 -## <param name="domain">
479 -## <summary>
480 -## Domain allowed access.
481 -## </summary>
482 -## </param>
483 -#
484 -interface(`dbus_connect_session_bus',`
485 - refpolicywarn(`$0($*) has been deprecated, use dbus_connect_all_session_bus() instead.')
486 - dbus_connect_all_session_bus($1)
487 -')
488 -
489 -#######################################
490 -## <summary>
491 ## Acquire service on all DBUS
492 ## session busses.
493 ## </summary>
494 @@ -201,22 +185,6 @@ interface(`dbus_connect_spec_session_bus',`
495
496 #######################################
497 ## <summary>
498 -## Creating connections to DBUS
499 -## session bus.
500 -## </summary>
501 -## <param name="domain">
502 -## <summary>
503 -## Domain allowed access.
504 -## </summary>
505 -## </param>
506 -#
507 -interface(`dbus_session_bus_client',`
508 - refpolicywarn(`$0($*) has been deprecated, use dbus_all_session_bus_client() instead.')
509 - dbus_all_session_bus_client($1)
510 -')
511 -
512 -#######################################
513 -## <summary>
514 ## Creating connections to all
515 ## DBUS session busses.
516 ## </summary>
517 @@ -276,21 +244,6 @@ interface(`dbus_spec_session_bus_client',`
518
519 #######################################
520 ## <summary>
521 -## Send messages to DBUS session bus.
522 -## </summary>
523 -## <param name="domain">
524 -## <summary>
525 -## Domain allowed access.
526 -## </summary>
527 -## </param>
528 -#
529 -interface(`dbus_send_session_bus',`
530 - refpolicywarn(`$0($*) has been deprecated, use dbus_send_all_session_bus() instead.')
531 - dbus_send_all_session_bus($1)
532 -')
533 -
534 -#######################################
535 -## <summary>
536 ## Send messages to all DBUS
537 ## session busses.
538 ## </summary>
539 @@ -399,34 +352,6 @@ interface(`dbus_manage_lib_files',`
540 ## Allow a application domain to be
541 ## started by the specified session bus.
542 ## </summary>
543 -## <param name="role_prefix">
544 -## <summary>
545 -## The prefix of the user role (e.g., user
546 -## is the prefix for user_r).
547 -## </summary>
548 -## </param>
549 -## <param name="domain">
550 -## <summary>
551 -## Type to be used as a domain.
552 -## </summary>
553 -## </param>
554 -## <param name="entry_point">
555 -## <summary>
556 -## Type of the program to be used as an
557 -## entry point to this domain.
558 -## </summary>
559 -## </param>
560 -#
561 -interface(`dbus_session_domain',`
562 - refpolicywarn(`$0($*) has been deprecated, use dbus_all_session_domain() instead.')
563 - dbus_all_session_domain($1, $2)
564 -')
565 -
566 -########################################
567 -## <summary>
568 -## Allow a application domain to be
569 -## started by the specified session bus.
570 -## </summary>
571 ## <param name="domain">
572 ## <summary>
573 ## Type to be used as a domain.
574
575 diff --git a/policy/modules/contrib/dictd.if b/policy/modules/contrib/dictd.if
576 index 3878acc7..6feb8280 100644
577 --- a/policy/modules/contrib/dictd.if
578 +++ b/policy/modules/contrib/dictd.if
579 @@ -2,21 +2,6 @@
580
581 ########################################
582 ## <summary>
583 -## Use dictionary services by connecting
584 -## over TCP. (Deprecated)
585 -## </summary>
586 -## <param name="domain">
587 -## <summary>
588 -## Domain allowed access.
589 -## </summary>
590 -## </param>
591 -#
592 -interface(`dictd_tcp_connect',`
593 - refpolicywarn(`$0($*) has been deprecated.')
594 -')
595 -
596 -########################################
597 -## <summary>
598 ## All of the rules required to
599 ## administrate an dictd environment.
600 ## </summary>
601
602 diff --git a/policy/modules/contrib/finger.if b/policy/modules/contrib/finger.if
603 index 2656d2b5..a071cfd4 100644
604 --- a/policy/modules/contrib/finger.if
605 +++ b/policy/modules/contrib/finger.if
606 @@ -18,17 +18,3 @@ interface(`finger_domtrans',`
607 corecmd_search_bin($1)
608 domtrans_pattern($1, fingerd_exec_t, fingerd_t)
609 ')
610 -
611 -########################################
612 -## <summary>
613 -## Connect to fingerd with a tcp socket. (Deprecated)
614 -## </summary>
615 -## <param name="domain">
616 -## <summary>
617 -## Domain allowed access.
618 -## </summary>
619 -## </param>
620 -#
621 -interface(`finger_tcp_connect',`
622 - refpolicywarn(`$0($*) has been deprecated.')
623 -')
624
625 diff --git a/policy/modules/contrib/ftp.if b/policy/modules/contrib/ftp.if
626 index 93fd4be4..349d1b3b 100644
627 --- a/policy/modules/contrib/ftp.if
628 +++ b/policy/modules/contrib/ftp.if
629 @@ -20,20 +20,6 @@ interface(`ftp_dyntrans_anon_sftpd',`
630
631 ########################################
632 ## <summary>
633 -## Connect to over ftpd over TCP. (Deprecated)
634 -## </summary>
635 -## <param name="domain">
636 -## <summary>
637 -## Domain allowed access.
638 -## </summary>
639 -## </param>
640 -#
641 -interface(`ftp_tcp_connect',`
642 - refpolicywarn(`$0($*) has been deprecated.')
643 -')
644 -
645 -########################################
646 -## <summary>
647 ## Read ftpd configuration files.
648 ## </summary>
649 ## <param name="domain">
650
651 diff --git a/policy/modules/contrib/glusterfs.if b/policy/modules/contrib/glusterfs.if
652 index 0945d876..b4f5d01c 100644
653 --- a/policy/modules/contrib/glusterfs.if
654 +++ b/policy/modules/contrib/glusterfs.if
655 @@ -17,28 +17,6 @@
656 ## </param>
657 ## <rolecap/>
658 #
659 -interface(`glusterd_admin',`
660 - refpolicywarn(`$0($*) has been deprecated, use glusterfs_admin() instead.')
661 - glusterfs_admin($1, $2)
662 -')
663 -
664 -########################################
665 -## <summary>
666 -## All of the rules required to
667 -## administrate an glusterfs environment.
668 -## </summary>
669 -## <param name="domain">
670 -## <summary>
671 -## Domain allowed access.
672 -## </summary>
673 -## </param>
674 -## <param name="role">
675 -## <summary>
676 -## Role allowed access.
677 -## </summary>
678 -## </param>
679 -## <rolecap/>
680 -#
681 interface(`glusterfs_admin',`
682 gen_require(`
683 type glusterd_t, glusterd_initrc_exec_t, glusterd_log_t;
684
685 diff --git a/policy/modules/contrib/gnome.if b/policy/modules/contrib/gnome.if
686 index edf4d4e6..2eb4f047 100644
687 --- a/policy/modules/contrib/gnome.if
688 +++ b/policy/modules/contrib/gnome.if
689 @@ -1,24 +1,5 @@
690 ## <summary>GNU network object model environment.</summary>
691
692 -########################################
693 -## <summary>
694 -## Role access for gnome. (Deprecated)
695 -## </summary>
696 -## <param name="role">
697 -## <summary>
698 -## Role allowed access.
699 -## </summary>
700 -## </param>
701 -## <param name="domain">
702 -## <summary>
703 -## User domain for the role.
704 -## </summary>
705 -## </param>
706 -#
707 -interface(`gnome_role',`
708 - refpolicywarn(`$0($*) has been deprecated')
709 -')
710 -
711 #######################################
712 ## <summary>
713 ## The role template for gnome.
714 @@ -267,22 +248,6 @@ interface(`gnome_create_generic_home_dirs',`
715 ########################################
716 ## <summary>
717 ## Set attributes of generic gnome
718 -## user home directories. (Deprecated)
719 -## </summary>
720 -## <param name="domain">
721 -## <summary>
722 -## Domain allowed access.
723 -## </summary>
724 -## </param>
725 -#
726 -interface(`gnome_setattr_config_dirs',`
727 - refpolicywarn(`$0($*) has been deprecated, use gnome_setattr_generic_home_dirs() instead.')
728 - gnome_setattr_generic_home_dirs($1)
729 -')
730 -
731 -########################################
732 -## <summary>
733 -## Set attributes of generic gnome
734 ## user home directories.
735 ## </summary>
736 ## <param name="domain">
737 @@ -302,21 +267,6 @@ interface(`gnome_setattr_generic_home_dirs',`
738
739 ########################################
740 ## <summary>
741 -## Read generic gnome user home content. (Deprecated)
742 -## </summary>
743 -## <param name="domain">
744 -## <summary>
745 -## Domain allowed access.
746 -## </summary>
747 -## </param>
748 -#
749 -interface(`gnome_read_config',`
750 - refpolicywarn(`$0($*) has been deprecated, use gnome_read_generic_home_content() instead.')
751 - gnome_read_generic_home_content($1)
752 -')
753 -
754 -########################################
755 -## <summary>
756 ## Read generic gnome home content.
757 ## </summary>
758 ## <param name="domain">
759 @@ -341,22 +291,6 @@ interface(`gnome_read_generic_home_content',`
760 ########################################
761 ## <summary>
762 ## Create, read, write, and delete
763 -## generic gnome user home content. (Deprecated)
764 -## </summary>
765 -## <param name="domain">
766 -## <summary>
767 -## Domain allowed access.
768 -## </summary>
769 -## </param>
770 -#
771 -interface(`gnome_manage_config',`
772 - refpolicywarn(`$0($*) has been deprecated, use gnome_manage_generic_home_content() instead.')
773 - gnome_manage_generic_home_content($1)
774 -')
775 -
776 -########################################
777 -## <summary>
778 -## Create, read, write, and delete
779 ## generic gnome home content.
780 ## </summary>
781 ## <param name="domain">
782
783 diff --git a/policy/modules/contrib/gpg.if b/policy/modules/contrib/gpg.if
784 index 4f118bf3..c4b7c4cd 100644
785 --- a/policy/modules/contrib/gpg.if
786 +++ b/policy/modules/contrib/gpg.if
787 @@ -125,20 +125,6 @@ interface(`gpg_spec_domtrans',`
788
789 ######################################
790 ## <summary>
791 -## Execute gpg in the gpg web domain. (Deprecated)
792 -## </summary>
793 -## <param name="domain">
794 -## <summary>
795 -## Domain allowed to transition.
796 -## </summary>
797 -## </param>
798 -#
799 -interface(`gpg_domtrans_web',`
800 - refpolicywarn(`$0($*) has been deprecated.')
801 -')
802 -
803 -######################################
804 -## <summary>
805 ## Make gpg executable files an
806 ## entrypoint for the specified domain.
807 ## </summary>
808
809 diff --git a/policy/modules/contrib/i18n_input.if b/policy/modules/contrib/i18n_input.if
810 index b9082642..4e08c3cf 100644
811 --- a/policy/modules/contrib/i18n_input.if
812 +++ b/policy/modules/contrib/i18n_input.if
813 @@ -2,20 +2,6 @@
814
815 ########################################
816 ## <summary>
817 -## Use i18n_input over a TCP connection. (Deprecated)
818 -## </summary>
819 -## <param name="domain">
820 -## <summary>
821 -## Domain allowed access.
822 -## </summary>
823 -## </param>
824 -#
825 -interface(`i18n_use',`
826 - refpolicywarn(`$0($*) has been deprecated.')
827 -')
828 -
829 -########################################
830 -## <summary>
831 ## All of the rules required to
832 ## administrate an i18n input environment.
833 ## </summary>
834
835 diff --git a/policy/modules/contrib/inetd.if b/policy/modules/contrib/inetd.if
836 index fbb54e7d..593cd40b 100644
837 --- a/policy/modules/contrib/inetd.if
838 +++ b/policy/modules/contrib/inetd.if
839 @@ -140,20 +140,6 @@ interface(`inetd_use_fds',`
840
841 ########################################
842 ## <summary>
843 -## Connect to the inetd service using a TCP connection. (Deprecated)
844 -## </summary>
845 -## <param name="domain">
846 -## <summary>
847 -## Domain allowed access.
848 -## </summary>
849 -## </param>
850 -#
851 -interface(`inetd_tcp_connect',`
852 - refpolicywarn(`$0($*) has been deprecated.')
853 -')
854 -
855 -########################################
856 -## <summary>
857 ## Run inetd child process in the
858 ## inet child domain.
859 ## </summary>
860 @@ -174,20 +160,6 @@ interface(`inetd_domtrans_child',`
861
862 ########################################
863 ## <summary>
864 -## Send UDP network traffic to inetd. (Deprecated)
865 -## </summary>
866 -## <param name="domain">
867 -## <summary>
868 -## Domain allowed access.
869 -## </summary>
870 -## </param>
871 -#
872 -interface(`inetd_udp_send',`
873 - refpolicywarn(`$0($*) has been deprecated.')
874 -')
875 -
876 -########################################
877 -## <summary>
878 ## Read and write inetd TCP sockets.
879 ## </summary>
880 ## <param name="domain">
881
882 diff --git a/policy/modules/contrib/iodine.if b/policy/modules/contrib/iodine.if
883 index 87e47eb2..99f1afd1 100644
884 --- a/policy/modules/contrib/iodine.if
885 +++ b/policy/modules/contrib/iodine.if
886 @@ -17,28 +17,6 @@
887 ## </param>
888 ## <rolecap/>
889 #
890 -interface(`iodined_admin',`
891 - refpolicywarn(`$0($*) has been deprecated, use iodine_admin() instead.')
892 - iodine_admin($1, $2)
893 -')
894 -
895 -########################################
896 -## <summary>
897 -## All of the rules required to
898 -## administrate an iodined environment
899 -## </summary>
900 -## <param name="domain">
901 -## <summary>
902 -## Domain allowed access.
903 -## </summary>
904 -## </param>
905 -## <param name="role">
906 -## <summary>
907 -## Role allowed access.
908 -## </summary>
909 -## </param>
910 -## <rolecap/>
911 -#
912 interface(`iodine_admin',`
913 gen_require(`
914 type iodined_t, iodined_initrc_exec_t;
915
916 diff --git a/policy/modules/contrib/jabber.if b/policy/modules/contrib/jabber.if
917 index 549dac1f..9a31ee51 100644
918 --- a/policy/modules/contrib/jabber.if
919 +++ b/policy/modules/contrib/jabber.if
920 @@ -42,20 +42,6 @@ interface(`jabber_manage_lib_files',`
921
922 ########################################
923 ## <summary>
924 -## Connect to jabber over a TCP socket (Deprecated)
925 -## </summary>
926 -## <param name="domain">
927 -## <summary>
928 -## Domain allowed access.
929 -## </summary>
930 -## </param>
931 -#
932 -interface(`jabber_tcp_connect',`
933 - refpolicywarn(`$0($*) has been deprecated.')
934 -')
935 -
936 -########################################
937 -## <summary>
938 ## All of the rules required to
939 ## administrate an jabber environment.
940 ## </summary>
941
942 diff --git a/policy/modules/contrib/kerberos.if b/policy/modules/contrib/kerberos.if
943 index 01caeead..c8c5a37d 100644
944 --- a/policy/modules/contrib/kerberos.if
945 +++ b/policy/modules/contrib/kerberos.if
946 @@ -2,25 +2,6 @@
947
948 ########################################
949 ## <summary>
950 -## Role access for kerberos.
951 -## </summary>
952 -## <param name="role">
953 -## <summary>
954 -## Role allowed access.
955 -## </summary>
956 -## </param>
957 -## <param name="domain">
958 -## <summary>
959 -## User domain for the role.
960 -## </summary>
961 -## </param>
962 -#
963 -template(`kerberos_role',`
964 - refpolicywarn(`$0($*) has been deprecated')
965 -')
966 -
967 -########################################
968 -## <summary>
969 ## Execute kadmind in the caller domain.
970 ## </summary>
971 ## <param name="domain">
972 @@ -339,28 +320,6 @@ interface(`kerberos_etc_filetrans_keytab',`
973
974 ########################################
975 ## <summary>
976 -## Create a derived type for kerberos
977 -## keytab files.
978 -## </summary>
979 -## <param name="prefix">
980 -## <summary>
981 -## The prefix to be used for deriving type names.
982 -## </summary>
983 -## </param>
984 -## <param name="domain">
985 -## <summary>
986 -## Domain allowed access.
987 -## </summary>
988 -## </param>
989 -#
990 -template(`kerberos_keytab_template',`
991 - refpolicywarn(`$0($*) has been deprecated.')
992 - kerberos_read_keytab($2)
993 - kerberos_use($2)
994 -')
995 -
996 -########################################
997 -## <summary>
998 ## Read kerberos kdc configuration files.
999 ## </summary>
1000 ## <param name="domain">
1001
1002 diff --git a/policy/modules/contrib/ldap.if b/policy/modules/contrib/ldap.if
1003 index b4eabc96..59752140 100644
1004 --- a/policy/modules/contrib/ldap.if
1005 +++ b/policy/modules/contrib/ldap.if
1006 @@ -41,20 +41,6 @@ interface(`ldap_read_config',`
1007
1008 ########################################
1009 ## <summary>
1010 -## Use LDAP over TCP connection. (Deprecated)
1011 -## </summary>
1012 -## <param name="domain">
1013 -## <summary>
1014 -## Domain allowed access.
1015 -## </summary>
1016 -## </param>
1017 -#
1018 -interface(`ldap_use',`
1019 - refpolicywarn(`$0($*) has been deprecated.')
1020 -')
1021 -
1022 -########################################
1023 -## <summary>
1024 ## Connect to slapd over an unix
1025 ## stream socket.
1026 ## </summary>
1027
1028 diff --git a/policy/modules/contrib/mandb.if b/policy/modules/contrib/mandb.if
1029 index 2b5d5385..e880655d 100644
1030 --- a/policy/modules/contrib/mandb.if
1031 +++ b/policy/modules/contrib/mandb.if
1032 @@ -48,63 +48,6 @@ interface(`mandb_run',`
1033
1034 ########################################
1035 ## <summary>
1036 -## Search mandb cache directories.
1037 -## </summary>
1038 -## <param name="domain">
1039 -## <summary>
1040 -## Domain allowed access.
1041 -## </summary>
1042 -## </param>
1043 -#
1044 -interface(`mandb_search_cache',`
1045 - refpolicywarn(`$0($*) has been deprecated')
1046 -')
1047 -
1048 -########################################
1049 -## <summary>
1050 -## Delete mandb cache content.
1051 -## </summary>
1052 -## <param name="domain">
1053 -## <summary>
1054 -## Domain allowed access.
1055 -## </summary>
1056 -## </param>
1057 -#
1058 -interface(`mandb_delete_cache_content',`
1059 - refpolicywarn(`$0($*) has been deprecated')
1060 -')
1061 -
1062 -########################################
1063 -## <summary>
1064 -## Read mandb cache content.
1065 -## </summary>
1066 -## <param name="domain">
1067 -## <summary>
1068 -## Domain allowed access.
1069 -## </summary>
1070 -## </param>
1071 -#
1072 -interface(`mandb_read_cache_content',`
1073 - refpolicywarn(`$0($*) has been deprecated')
1074 -')
1075 -
1076 -########################################
1077 -## <summary>
1078 -## Create, read, write, and delete
1079 -## mandb cache files.
1080 -## </summary>
1081 -## <param name="domain">
1082 -## <summary>
1083 -## Domain allowed access.
1084 -## </summary>
1085 -## </param>
1086 -#
1087 -interface(`mandb_manage_cache_content',`
1088 - refpolicywarn(`$0($*) has been deprecated')
1089 -')
1090 -
1091 -########################################
1092 -## <summary>
1093 ## All of the rules required to
1094 ## administrate an mandb environment.
1095 ## </summary>
1096
1097 diff --git a/policy/modules/contrib/mojomojo.if b/policy/modules/contrib/mojomojo.if
1098 index 73952f4c..6680a087 100644
1099 --- a/policy/modules/contrib/mojomojo.if
1100 +++ b/policy/modules/contrib/mojomojo.if
1101 @@ -1,23 +1 @@
1102 ## <summary>MojoMojo Wiki.</summary>
1103 -
1104 -########################################
1105 -## <summary>
1106 -## All of the rules required to
1107 -## administrate an mojomojo environment.
1108 -## </summary>
1109 -## <param name="domain">
1110 -## <summary>
1111 -## Domain allowed access.
1112 -## </summary>
1113 -## </param>
1114 -## <param name="role">
1115 -## <summary>
1116 -## Role allowed access.
1117 -## </summary>
1118 -## </param>
1119 -## <rolecap/>
1120 -#
1121 -interface(`mojomojo_admin',`
1122 - refpolicywarn(`$0($*) has been deprecated, use apache_admin() instead.')
1123 - apache_admin($1, $2)
1124 -')
1125
1126 diff --git a/policy/modules/contrib/mozilla.if b/policy/modules/contrib/mozilla.if
1127 index 70390632..178d68d8 100644
1128 --- a/policy/modules/contrib/mozilla.if
1129 +++ b/policy/modules/contrib/mozilla.if
1130 @@ -242,21 +242,6 @@ interface(`mozilla_dontaudit_manage_user_home_files',`
1131
1132 ########################################
1133 ## <summary>
1134 -## Execute mozilla home directory files. (Deprecated)
1135 -## </summary>
1136 -## <param name="domain">
1137 -## <summary>
1138 -## Domain allowed access.
1139 -## </summary>
1140 -## </param>
1141 -#
1142 -interface(`mozilla_exec_user_home_files',`
1143 - refpolicywarn(`$0($*) has been deprecated, use mozilla_exec_user_plugin_home_files() instead.')
1144 - mozilla_exec_user_plugin_home_files($1)
1145 -')
1146 -
1147 -########################################
1148 -## <summary>
1149 ## Execute mozilla plugin home directory files.
1150 ## </summary>
1151 ## <param name="domain">
1152 @@ -276,22 +261,6 @@ interface(`mozilla_exec_user_plugin_home_files',`
1153
1154 ########################################
1155 ## <summary>
1156 -## Mozilla home directory file
1157 -## text relocation. (Deprecated)
1158 -## </summary>
1159 -## <param name="domain">
1160 -## <summary>
1161 -## Domain allowed access.
1162 -## </summary>
1163 -## </param>
1164 -#
1165 -interface(`mozilla_execmod_user_home_files',`
1166 - refpolicywarn(`$0($*) has been deprecated, use mozilla_execmod_user_plugin_home_files() instead.')
1167 - mozilla_execmod_user_plugin_home_files($1)
1168 -')
1169 -
1170 -########################################
1171 -## <summary>
1172 ## Mozilla plugin home directory file
1173 ## text relocation.
1174 ## </summary>
1175
1176 diff --git a/policy/modules/contrib/mpd.if b/policy/modules/contrib/mpd.if
1177 index 384599fd..02faa37e 100644
1178 --- a/policy/modules/contrib/mpd.if
1179 +++ b/policy/modules/contrib/mpd.if
1180 @@ -2,25 +2,6 @@
1181
1182 ########################################
1183 ## <summary>
1184 -## Role access for mpd.
1185 -## </summary>
1186 -## <param name="role">
1187 -## <summary>
1188 -## Role allowed access.
1189 -## </summary>
1190 -## </param>
1191 -## <param name="domain">
1192 -## <summary>
1193 -## User domain for the role.
1194 -## </summary>
1195 -## </param>
1196 -#
1197 -template(`mpd_role',`
1198 - refpolicywarn(`$0($*) has been deprecated')
1199 -')
1200 -
1201 -########################################
1202 -## <summary>
1203 ## Execute a domain transition to run mpd.
1204 ## </summary>
1205 ## <param name="domain">
1206
1207 diff --git a/policy/modules/contrib/mta.if b/policy/modules/contrib/mta.if
1208 index 7e268b80..0602746b 100644
1209 --- a/policy/modules/contrib/mta.if
1210 +++ b/policy/modules/contrib/mta.if
1211 @@ -753,20 +753,6 @@ interface(`mta_dontaudit_rw_delivery_tcp_sockets',`
1212
1213 #######################################
1214 ## <summary>
1215 -## Connect to all mail servers over TCP. (Deprecated)
1216 -## </summary>
1217 -## <param name="domain">
1218 -## <summary>
1219 -## Domain allowed access.
1220 -## </summary>
1221 -## </param>
1222 -#
1223 -interface(`mta_tcp_connect_all_mailservers',`
1224 - refpolicywarn(`$0($*) has been deprecated.')
1225 -')
1226 -
1227 -#######################################
1228 -## <summary>
1229 ## Do not audit attempts to read
1230 ## mail spool symlinks.
1231 ## </summary>
1232
1233 diff --git a/policy/modules/contrib/mysql.if b/policy/modules/contrib/mysql.if
1234 index e7250f7f..af59114a 100644
1235 --- a/policy/modules/contrib/mysql.if
1236 +++ b/policy/modules/contrib/mysql.if
1237 @@ -1,24 +1,5 @@
1238 ## <summary>Open source database.</summary>
1239
1240 -########################################
1241 -## <summary>
1242 -## Role access for mysql.
1243 -## </summary>
1244 -## <param name="role">
1245 -## <summary>
1246 -## Role allowed access.
1247 -## </summary>
1248 -## </param>
1249 -## <param name="domain">
1250 -## <summary>
1251 -## User domain for the role.
1252 -## </summary>
1253 -## </param>
1254 -#
1255 -interface(`mysql_role',`
1256 - refpolicywarn(`$0($*) has been deprecated')
1257 -')
1258 -
1259 ######################################
1260 ## <summary>
1261 ## Execute MySQL in the mysql domain.
1262 @@ -263,21 +244,6 @@ interface(`mysql_manage_db_files',`
1263
1264 ########################################
1265 ## <summary>
1266 -## Read and write mysqld database sockets.
1267 -## named socket.
1268 -## </summary>
1269 -## <param name="domain">
1270 -## <summary>
1271 -## Domain allowed access.
1272 -## </summary>
1273 -## </param>
1274 -#
1275 -interface(`mysql_rw_db_sockets',`
1276 - refpolicywarn(`$0($*) has been deprecated.')
1277 -')
1278 -
1279 -########################################
1280 -## <summary>
1281 ## Create, read, write, and delete
1282 ## mysqld home files.
1283 ## </summary>
1284
1285 diff --git a/policy/modules/contrib/nessus.if b/policy/modules/contrib/nessus.if
1286 index f41ec5f3..57bed033 100644
1287 --- a/policy/modules/contrib/nessus.if
1288 +++ b/policy/modules/contrib/nessus.if
1289 @@ -2,20 +2,6 @@
1290
1291 ########################################
1292 ## <summary>
1293 -## Connect to nessus over a TCP socket (Deprecated)
1294 -## </summary>
1295 -## <param name="domain">
1296 -## <summary>
1297 -## Domain allowed access.
1298 -## </summary>
1299 -## </param>
1300 -#
1301 -interface(`nessus_tcp_connect',`
1302 - refpolicywarn(`$0($*) has been deprecated.')
1303 -')
1304 -
1305 -########################################
1306 -## <summary>
1307 ## All of the rules required to
1308 ## administrate an nessus environment.
1309 ## </summary>
1310
1311 diff --git a/policy/modules/contrib/nis.if b/policy/modules/contrib/nis.if
1312 index 718db6ea..66a3ba28 100644
1313 --- a/policy/modules/contrib/nis.if
1314 +++ b/policy/modules/contrib/nis.if
1315 @@ -215,34 +215,6 @@ interface(`nis_list_var_yp',`
1316
1317 ########################################
1318 ## <summary>
1319 -## Send UDP network traffic to NIS clients. (Deprecated)
1320 -## </summary>
1321 -## <param name="domain">
1322 -## <summary>
1323 -## Domain allowed access.
1324 -## </summary>
1325 -## </param>
1326 -#
1327 -interface(`nis_udp_send_ypbind',`
1328 - refpolicywarn(`$0($*) has been deprecated.')
1329 -')
1330 -
1331 -########################################
1332 -## <summary>
1333 -## Connect to ypbind over TCP. (Deprecated)
1334 -## </summary>
1335 -## <param name="domain">
1336 -## <summary>
1337 -## Domain allowed access.
1338 -## </summary>
1339 -## </param>
1340 -#
1341 -interface(`nis_tcp_connect_ypbind',`
1342 - refpolicywarn(`$0($*) has been deprecated.')
1343 -')
1344 -
1345 -########################################
1346 -## <summary>
1347 ## Read ypbind pid files.
1348 ## </summary>
1349 ## <param name="domain">
1350
1351 diff --git a/policy/modules/contrib/nsd.if b/policy/modules/contrib/nsd.if
1352 index 8ec6ec4e..e071bcd0 100644
1353 --- a/policy/modules/contrib/nsd.if
1354 +++ b/policy/modules/contrib/nsd.if
1355 @@ -2,34 +2,6 @@
1356
1357 ########################################
1358 ## <summary>
1359 -## Send and receive datagrams from NSD. (Deprecated)
1360 -## </summary>
1361 -## <param name="domain">
1362 -## <summary>
1363 -## Domain allowed access.
1364 -## </summary>
1365 -## </param>
1366 -#
1367 -interface(`nsd_udp_chat',`
1368 - refpolicywarn(`$0($*) has been deprecated.')
1369 -')
1370 -
1371 -########################################
1372 -## <summary>
1373 -## Connect to NSD over a TCP socket (Deprecated)
1374 -## </summary>
1375 -## <param name="domain">
1376 -## <summary>
1377 -## Domain allowed access.
1378 -## </summary>
1379 -## </param>
1380 -#
1381 -interface(`nsd_tcp_connect',`
1382 - refpolicywarn(`$0($*) has been deprecated.')
1383 -')
1384 -
1385 -########################################
1386 -## <summary>
1387 ## All of the rules required to
1388 ## administrate an nsd environment.
1389 ## </summary>
1390
1391 diff --git a/policy/modules/contrib/oident.if b/policy/modules/contrib/oident.if
1392 index c317a3aa..95b329ef 100644
1393 --- a/policy/modules/contrib/oident.if
1394 +++ b/policy/modules/contrib/oident.if
1395 @@ -2,25 +2,6 @@
1396
1397 ########################################
1398 ## <summary>
1399 -## Role access for oident.
1400 -## </summary>
1401 -## <param name="role">
1402 -## <summary>
1403 -## Role allowed access.
1404 -## </summary>
1405 -## </param>
1406 -## <param name="domain">
1407 -## <summary>
1408 -## User domain for the role.
1409 -## </summary>
1410 -## </param>
1411 -#
1412 -interface(`oident_role',`
1413 - refpolicywarn(`$0($*) has been deprecated')
1414 -')
1415 -
1416 -########################################
1417 -## <summary>
1418 ## Read oidentd user home content.
1419 ## </summary>
1420 ## <param name="domain">
1421
1422 diff --git a/policy/modules/contrib/pcscd.if b/policy/modules/contrib/pcscd.if
1423 index b5c522d3..412c24aa 100644
1424 --- a/policy/modules/contrib/pcscd.if
1425 +++ b/policy/modules/contrib/pcscd.if
1426 @@ -29,21 +29,6 @@ interface(`pcscd_domtrans',`
1427 ## </summary>
1428 ## </param>
1429 #
1430 -interface(`pcscd_read_pub_files',`
1431 - refpolicywarn(`$0($*) has been deprecated, use pcscd_read_pid_files() instead.')
1432 - pcscd_read_pid_files($1)
1433 -')
1434 -
1435 -########################################
1436 -## <summary>
1437 -## Read pcscd pid files.
1438 -## </summary>
1439 -## <param name="domain">
1440 -## <summary>
1441 -## Domain allowed access.
1442 -## </summary>
1443 -## </param>
1444 -#
1445 interface(`pcscd_read_pid_files',`
1446 gen_require(`
1447 type pcscd_var_run_t;
1448 @@ -55,36 +40,6 @@ interface(`pcscd_read_pid_files',`
1449
1450 ########################################
1451 ## <summary>
1452 -## Create, read, write, and delete
1453 -## pcscd pid files.
1454 -## </summary>
1455 -## <param name="domain">
1456 -## <summary>
1457 -## Domain allowed access.
1458 -## </summary>
1459 -## </param>
1460 -#
1461 -interface(`pcscd_manage_pub_files',`
1462 - refpolicywarn(`$0($*) has been deprecated')
1463 -')
1464 -
1465 -########################################
1466 -## <summary>
1467 -## Create, read, write, and delete
1468 -## pcscd pid fifo files.
1469 -## </summary>
1470 -## <param name="domain">
1471 -## <summary>
1472 -## Domain allowed access.
1473 -## </summary>
1474 -## </param>
1475 -#
1476 -interface(`pcscd_manage_pub_pipes',`
1477 - refpolicywarn(`$0($*) has been deprecated')
1478 -')
1479 -
1480 -########################################
1481 -## <summary>
1482 ## Connect to pcscd over an unix
1483 ## domain stream socket.
1484 ## </summary>
1485
1486 diff --git a/policy/modules/contrib/perdition.if b/policy/modules/contrib/perdition.if
1487 index 092ac614..4d69d909 100644
1488 --- a/policy/modules/contrib/perdition.if
1489 +++ b/policy/modules/contrib/perdition.if
1490 @@ -2,20 +2,6 @@
1491
1492 ########################################
1493 ## <summary>
1494 -## Connect to perdition over a TCP socket (Deprecated)
1495 -## </summary>
1496 -## <param name="domain">
1497 -## <summary>
1498 -## Domain allowed access.
1499 -## </summary>
1500 -## </param>
1501 -#
1502 -interface(`perdition_tcp_connect',`
1503 - refpolicywarn(`$0($*) has been deprecated.')
1504 -')
1505 -
1506 -########################################
1507 -## <summary>
1508 ## All of the rules required to
1509 ## administrate an perdition environment.
1510 ## </summary>
1511
1512 diff --git a/policy/modules/contrib/portmap.if b/policy/modules/contrib/portmap.if
1513 index f0af3fe3..52208ce0 100644
1514 --- a/policy/modules/contrib/portmap.if
1515 +++ b/policy/modules/contrib/portmap.if
1516 @@ -48,48 +48,6 @@ interface(`portmap_run_helper',`
1517
1518 ########################################
1519 ## <summary>
1520 -## Send UDP network traffic to portmap. (Deprecated)
1521 -## </summary>
1522 -## <param name="domain">
1523 -## <summary>
1524 -## Domain allowed access.
1525 -## </summary>
1526 -## </param>
1527 -#
1528 -interface(`portmap_udp_send',`
1529 - refpolicywarn(`$0($*) has been deprecated.')
1530 -')
1531 -
1532 -########################################
1533 -## <summary>
1534 -## Send and receive UDP network traffic from portmap. (Deprecated)
1535 -## </summary>
1536 -## <param name="domain">
1537 -## <summary>
1538 -## Domain allowed access.
1539 -## </summary>
1540 -## </param>
1541 -#
1542 -interface(`portmap_udp_chat',`
1543 - refpolicywarn(`$0($*) has been deprecated.')
1544 -')
1545 -
1546 -########################################
1547 -## <summary>
1548 -## Connect to portmap over a TCP socket (Deprecated)
1549 -## </summary>
1550 -## <param name="domain">
1551 -## <summary>
1552 -## Domain allowed access.
1553 -## </summary>
1554 -## </param>
1555 -#
1556 -interface(`portmap_tcp_connect',`
1557 - refpolicywarn(`$0($*) has been deprecated.')
1558 -')
1559 -
1560 -########################################
1561 -## <summary>
1562 ## All of the rules required to
1563 ## administrate an portmap environment.
1564 ## </summary>
1565
1566 diff --git a/policy/modules/contrib/postfix.if b/policy/modules/contrib/postfix.if
1567 index 19fe6132..fa17bde4 100644
1568 --- a/policy/modules/contrib/postfix.if
1569 +++ b/policy/modules/contrib/postfix.if
1570 @@ -428,22 +428,6 @@ interface(`postfix_stream_connect_master',`
1571
1572 ########################################
1573 ## <summary>
1574 -## Read and write postfix master
1575 -## unnamed pipes. (Deprecated)
1576 -## </summary>
1577 -## <param name="domain">
1578 -## <summary>
1579 -## Domain allowed access.
1580 -## </summary>
1581 -## </param>
1582 -#
1583 -interface(`postfix_rw_master_pipes',`
1584 - refpolicywarn(`$0($*) has been deprecated, use postfix_rw_inherited_master_pipes() instead.')
1585 - postfix_rw_inherited_master_pipes($1)
1586 -')
1587 -
1588 -########################################
1589 -## <summary>
1590 ## Execute the master postdrop in the
1591 ## postfix postdrop domain.
1592 ## </summary>
1593 @@ -484,22 +468,6 @@ interface(`postfix_domtrans_postqueue',`
1594
1595 #######################################
1596 ## <summary>
1597 -## Execute the master postqueue in
1598 -## the caller domain. (Deprecated)
1599 -## </summary>
1600 -## <param name="domain">
1601 -## <summary>
1602 -## Domain allowed access.
1603 -## </summary>
1604 -## </param>
1605 -#
1606 -interface(`posftix_exec_postqueue',`
1607 - refpolicywarn(`$0($*) has been deprecated.')
1608 - postfix_exec_postqueue($1)
1609 -')
1610 -
1611 -#######################################
1612 -## <summary>
1613 ## Execute postfix postqueue in
1614 ## the caller domain.
1615 ## </summary>
1616
1617 diff --git a/policy/modules/contrib/ppp.if b/policy/modules/contrib/ppp.if
1618 index 0376e92f..070e565c 100644
1619 --- a/policy/modules/contrib/ppp.if
1620 +++ b/policy/modules/contrib/ppp.if
1621 @@ -2,25 +2,6 @@
1622
1623 ########################################
1624 ## <summary>
1625 -## Role access for ppp.
1626 -## </summary>
1627 -## <param name="role">
1628 -## <summary>
1629 -## Role allowed access.
1630 -## </summary>
1631 -## </param>
1632 -## <param name="domain">
1633 -## <summary>
1634 -## User domain for the role.
1635 -## </summary>
1636 -## </param>
1637 -#
1638 -interface(`ppp_role',`
1639 - refpolicywarn(`$0($*) has been deprecated')
1640 -')
1641 -
1642 -########################################
1643 -## <summary>
1644 ## Create, read, write, and delete
1645 ## ppp home files.
1646 ## </summary>
1647
1648 diff --git a/policy/modules/contrib/pulseaudio.if b/policy/modules/contrib/pulseaudio.if
1649 index 7236f624..921e519c 100644
1650 --- a/policy/modules/contrib/pulseaudio.if
1651 +++ b/policy/modules/contrib/pulseaudio.if
1652 @@ -254,21 +254,6 @@ interface(`pulseaudio_setattr_home_dir',`
1653 ## </summary>
1654 ## </param>
1655 #
1656 -interface(`pulseaudio_read_home_files',`
1657 - refpolicywarn(`$0($*) has been deprecated, use pulseaudio_read_home() instead.')
1658 - pulseaudio_read_home($1)
1659 -')
1660 -
1661 -########################################
1662 -## <summary>
1663 -## Read pulseaudio home content.
1664 -## </summary>
1665 -## <param name="domain">
1666 -## <summary>
1667 -## Domain allowed access.
1668 -## </summary>
1669 -## </param>
1670 -#
1671 interface(`pulseaudio_read_home',`
1672 gen_require(`
1673 type pulseaudio_home_t;
1674 @@ -311,22 +296,6 @@ interface(`pulseaudio_rw_home_files',`
1675 ## </summary>
1676 ## </param>
1677 #
1678 -interface(`pulseaudio_manage_home_files',`
1679 - refpolicywarn(`$0($*) has been deprecated, use pulseaudio_manage_home() instead.')
1680 - pulseaudio_manage_home($1)
1681 -')
1682 -
1683 -########################################
1684 -## <summary>
1685 -## Create, read, write, and delete
1686 -## pulseaudio home content.
1687 -## </summary>
1688 -## <param name="domain">
1689 -## <summary>
1690 -## Domain allowed access.
1691 -## </summary>
1692 -## </param>
1693 -#
1694 interface(`pulseaudio_manage_home',`
1695 gen_require(`
1696 type pulseaudio_home_t;
1697
1698 diff --git a/policy/modules/contrib/radius.if b/policy/modules/contrib/radius.if
1699 index 7703bc78..bce89c30 100644
1700 --- a/policy/modules/contrib/radius.if
1701 +++ b/policy/modules/contrib/radius.if
1702 @@ -2,20 +2,6 @@
1703
1704 ########################################
1705 ## <summary>
1706 -## Use radius over a UDP connection. (Deprecated)
1707 -## </summary>
1708 -## <param name="domain">
1709 -## <summary>
1710 -## Domain allowed access.
1711 -## </summary>
1712 -## </param>
1713 -#
1714 -interface(`radius_use',`
1715 - refpolicywarn(`$0($*) has been deprecated.')
1716 -')
1717 -
1718 -########################################
1719 -## <summary>
1720 ## All of the rules required to
1721 ## administrate an radius environment.
1722 ## </summary>
1723
1724 diff --git a/policy/modules/contrib/rpc.if b/policy/modules/contrib/rpc.if
1725 index fbf5995d..7063c42f 100644
1726 --- a/policy/modules/contrib/rpc.if
1727 +++ b/policy/modules/contrib/rpc.if
1728 @@ -52,20 +52,6 @@ template(`rpc_domain_template',`
1729
1730 ########################################
1731 ## <summary>
1732 -## Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated)
1733 -## </summary>
1734 -## <param name="domain">
1735 -## <summary>
1736 -## Domain allowed access.
1737 -## </summary>
1738 -## </param>
1739 -#
1740 -interface(`rpc_udp_send',`
1741 - refpolicywarn(`$0($*) has been deprecated.')
1742 -')
1743 -
1744 -########################################
1745 -## <summary>
1746 ## Do not audit attempts to get
1747 ## attributes of export files.
1748 ## </summary>
1749 @@ -298,20 +284,6 @@ interface(`rpc_udp_rw_nfs_sockets',`
1750
1751 ########################################
1752 ## <summary>
1753 -## Send UDP traffic to NFSd. (Deprecated)
1754 -## </summary>
1755 -## <param name="domain">
1756 -## <summary>
1757 -## Domain allowed access.
1758 -## </summary>
1759 -## </param>
1760 -#
1761 -interface(`rpc_udp_send_nfs',`
1762 - refpolicywarn(`$0($*) has been deprecated.')
1763 -')
1764 -
1765 -########################################
1766 -## <summary>
1767 ## Search nfs lib directories.
1768 ## </summary>
1769 ## <param name="domain">
1770
1771 diff --git a/policy/modules/contrib/rpm.if b/policy/modules/contrib/rpm.if
1772 index 304e97cb..016cdb2a 100644
1773 --- a/policy/modules/contrib/rpm.if
1774 +++ b/policy/modules/contrib/rpm.if
1775 @@ -564,22 +564,6 @@ interface(`rpm_manage_pid_files',`
1776 files_search_pids($1)
1777 ')
1778
1779 -######################################
1780 -## <summary>
1781 -## Create files in pid directories
1782 -## with the rpm pid file type.
1783 -## </summary>
1784 -## <param name="domain">
1785 -## <summary>
1786 -## Domain allowed access.
1787 -## </summary>
1788 -## </param>
1789 -#
1790 -interface(`rpm_pid_filetrans',`
1791 - refpolicywarn(`$0($*) has been deprecated, rpm_pid_filetrans_rpm_pid() instead.')
1792 - rpm_pid_filetrans_rpm_pid($1, file)
1793 -')
1794 -
1795 ########################################
1796 ## <summary>
1797 ## Create specified objects in pid directories
1798
1799 diff --git a/policy/modules/contrib/sendmail.if b/policy/modules/contrib/sendmail.if
1800 index d60de843..5358d159 100644
1801 --- a/policy/modules/contrib/sendmail.if
1802 +++ b/policy/modules/contrib/sendmail.if
1803 @@ -228,22 +228,6 @@ interface(`sendmail_manage_log',`
1804 ## Domain allowed access.
1805 ## </summary>
1806 ## </param>
1807 -#
1808 -interface(`sendmail_create_log',`
1809 - refpolicywarn(`$0($*) has been deprecated, use sendmail_log_filetrans_sendmail_log() instead.')
1810 - sendmail_log_filetrans_sendmail_log($1, $2, $3)
1811 -')
1812 -
1813 -########################################
1814 -## <summary>
1815 -## Create specified objects in generic
1816 -## log directories sendmail log file type.
1817 -## </summary>
1818 -## <param name="domain">
1819 -## <summary>
1820 -## Domain allowed access.
1821 -## </summary>
1822 -## </param>
1823 ## <param name="object_class">
1824 ## <summary>
1825 ## Class of the object being created.
1826
1827 diff --git a/policy/modules/contrib/slocate.if b/policy/modules/contrib/slocate.if
1828 index 1f25803d..82de1b68 100644
1829 --- a/policy/modules/contrib/slocate.if
1830 +++ b/policy/modules/contrib/slocate.if
1831 @@ -2,20 +2,6 @@
1832
1833 ########################################
1834 ## <summary>
1835 -## Create the locate log with append mode.
1836 -## </summary>
1837 -## <param name="domain">
1838 -## <summary>
1839 -## Domain allowed access.
1840 -## </summary>
1841 -## </param>
1842 -#
1843 -interface(`slocate_create_append_log',`
1844 - refpolicywarn(`$0($*) has been deprecated')
1845 -')
1846 -
1847 -########################################
1848 -## <summary>
1849 ## Read locate lib files.
1850 ## </summary>
1851 ## <param name="domain">
1852
1853 diff --git a/policy/modules/contrib/snmp.if b/policy/modules/contrib/snmp.if
1854 index 96775032..d8a75680 100644
1855 --- a/policy/modules/contrib/snmp.if
1856 +++ b/policy/modules/contrib/snmp.if
1857 @@ -43,20 +43,6 @@ interface(`snmp_tcp_connect',`
1858
1859 ########################################
1860 ## <summary>
1861 -## Send and receive UDP traffic to SNMP (Deprecated)
1862 -## </summary>
1863 -## <param name="domain">
1864 -## <summary>
1865 -## Domain allowed access.
1866 -## </summary>
1867 -## </param>
1868 -#
1869 -interface(`snmp_udp_chat',`
1870 - refpolicywarn(`$0($*) has been deprecated.')
1871 -')
1872 -
1873 -########################################
1874 -## <summary>
1875 ## Create, read, write, and delete
1876 ## snmp lib directories.
1877 ## </summary>
1878
1879 diff --git a/policy/modules/contrib/soundserver.if b/policy/modules/contrib/soundserver.if
1880 index 8dc1c0f4..106e0700 100644
1881 --- a/policy/modules/contrib/soundserver.if
1882 +++ b/policy/modules/contrib/soundserver.if
1883 @@ -2,20 +2,6 @@
1884
1885 ########################################
1886 ## <summary>
1887 -## Connect to the sound server over a TCP socket (Deprecated)
1888 -## </summary>
1889 -## <param name="domain">
1890 -## <summary>
1891 -## Domain allowed access.
1892 -## </summary>
1893 -## </param>
1894 -#
1895 -interface(`soundserver_tcp_connect',`
1896 - refpolicywarn(`$0($*) has been deprecated.')
1897 -')
1898 -
1899 -########################################
1900 -## <summary>
1901 ## All of the rules required to
1902 ## administrate an soundd environment.
1903 ## </summary>
1904
1905 diff --git a/policy/modules/contrib/squid.if b/policy/modules/contrib/squid.if
1906 index b5adfad3..2443afbd 100644
1907 --- a/policy/modules/contrib/squid.if
1908 +++ b/policy/modules/contrib/squid.if
1909 @@ -177,20 +177,6 @@ interface(`squid_manage_logs',`
1910
1911 ########################################
1912 ## <summary>
1913 -## Use squid services by connecting over TCP. (Deprecated)
1914 -## </summary>
1915 -## <param name="domain">
1916 -## <summary>
1917 -## Domain allowed access.
1918 -## </summary>
1919 -## </param>
1920 -#
1921 -interface(`squid_use',`
1922 - refpolicywarn(`$0($*) has been deprecated.')
1923 -')
1924 -
1925 -########################################
1926 -## <summary>
1927 ## dontaudit statting tmpfs files
1928 ## </summary>
1929 ## <param name="domain">
1930
1931 diff --git a/policy/modules/contrib/virt.if b/policy/modules/contrib/virt.if
1932 index 8016cccb..993ee6c8 100644
1933 --- a/policy/modules/contrib/virt.if
1934 +++ b/policy/modules/contrib/virt.if
1935 @@ -1069,22 +1069,6 @@ interface(`virt_rw_all_image_chr_files',`
1936 ########################################
1937 ## <summary>
1938 ## Create, read, write, and delete
1939 -## svirt cache files.
1940 -## </summary>
1941 -## <param name="domain">
1942 -## <summary>
1943 -## Domain allowed access.
1944 -## </summary>
1945 -## </param>
1946 -#
1947 -interface(`virt_manage_svirt_cache',`
1948 - refpolicywarn(`$0($*) has been deprecated, use virt_manage_virt_cache() instead.')
1949 - virt_manage_virt_cache($1)
1950 -')
1951 -
1952 -########################################
1953 -## <summary>
1954 -## Create, read, write, and delete
1955 ## virt cache content.
1956 ## </summary>
1957 ## <param name="domain">