From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 51E531396D0 for ; Sat, 9 Sep 2017 02:43:09 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 447811FC11A; Sat, 9 Sep 2017 02:43:05 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 121CD1FC118 for ; Sat, 9 Sep 2017 02:43:05 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 837BB3417DD for ; Sat, 9 Sep 2017 02:43:03 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 270DF907E for ; Sat, 9 Sep 2017 02:43:01 +0000 (UTC) From: "Jason Zaman" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Zaman" Message-ID: <1504910931.192f02005a5673e022d3cc7ff18af83855faceba.perfinion@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/abrt.if policy/modules/contrib/alsa.if policy/modules/contrib/automount.if policy/modules/contrib/awstats.if policy/modules/contrib/bind.if policy/modules/contrib/bluetooth.if policy/modules/contrib/certwatch.if policy/modules/contrib/clogd.if policy/modules/contrib/cobbler.if policy/modules/contrib/corosync.if policy/modules/contrib/cups.if policy/modules/contrib/dbus.if policy/modules/contrib/dictd.if policy/modules/contrib/finger.if policy/modules/contrib/ftp.if policy/modules/contrib/glusterfs.if policy/modules/contrib/gnome.if policy/modules/contrib/gpg.if policy/modules/contrib/i18n_input.if policy/modules/contrib/inetd.if policy/modules/contrib/iodine.if policy/modules/contrib/jabber.if policy/modules/contrib/kerberos.if policy/modules/contrib/ldap.if policy/modules/contrib/mandb.if policy/modules/contrib/mojomojo.if policy/modules/contrib/mozilla.if policy/modules/contrib/mpd.if policy/modules/contrib/mta.if policy/modules/contrib/mysql.if policy/modules/contrib/nessus.if policy/modules/contrib/nis.if policy/modules/contrib/nsd.if policy/modules/contrib/oident.if policy/modules/contrib/pcscd.if policy/modules/contrib/perdition.if policy/modules/contrib/portmap.if policy/modules/contrib/postfix.if policy/modules/contrib/ppp.if policy/modules/contrib/pulseaudio.if policy/modules/contrib/radius.if policy/modules/contrib/rpc.if policy/modules/contrib/rpm.if policy/modules/contrib/sendmail.if policy/modules/contrib/slocate.if policy/modules/contrib/snmp.if policy/modules/contrib/soundserver.if policy/modules/contrib/squid.if policy/modules/contrib/virt.if X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: perfinion X-VCS-Committer-Name: Jason Zaman X-VCS-Revision: 192f02005a5673e022d3cc7ff18af83855faceba X-VCS-Branch: master Date: Sat, 9 Sep 2017 02:43:01 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: f7210dab-8368-4b76-b21c-ba4b2e04cfcb X-Archives-Hash: c88bce62fd12f1fc6a0071805b90fc52 commit: 192f02005a5673e022d3cc7ff18af83855faceba Author: Chris PeBenito ieee org> AuthorDate: Sun Aug 6 21:03:06 2017 +0000 Commit: Jason Zaman gentoo org> CommitDate: Fri Sep 8 22:48:51 2017 +0000 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=192f0200 Remove deprecated interfaces more than one year old. policy/modules/contrib/abrt.if | 16 -------- policy/modules/contrib/alsa.if | 51 ------------------------ policy/modules/contrib/automount.if | 15 ------- policy/modules/contrib/awstats.if | 28 ------------- policy/modules/contrib/bind.if | 14 ------- policy/modules/contrib/bluetooth.if | 40 ------------------- policy/modules/contrib/certwatch.if | 29 -------------- policy/modules/contrib/clogd.if | 15 ------- policy/modules/contrib/cobbler.if | 22 ---------- policy/modules/contrib/corosync.if | 22 ---------- policy/modules/contrib/cups.if | 14 ------- policy/modules/contrib/dbus.if | 75 ----------------------------------- policy/modules/contrib/dictd.if | 15 ------- policy/modules/contrib/finger.if | 14 ------- policy/modules/contrib/ftp.if | 14 ------- policy/modules/contrib/glusterfs.if | 22 ---------- policy/modules/contrib/gnome.if | 66 ------------------------------ policy/modules/contrib/gpg.if | 14 ------- policy/modules/contrib/i18n_input.if | 14 ------- policy/modules/contrib/inetd.if | 28 ------------- policy/modules/contrib/iodine.if | 22 ---------- policy/modules/contrib/jabber.if | 14 ------- policy/modules/contrib/kerberos.if | 41 ------------------- policy/modules/contrib/ldap.if | 14 ------- policy/modules/contrib/mandb.if | 57 -------------------------- policy/modules/contrib/mojomojo.if | 22 ---------- policy/modules/contrib/mozilla.if | 31 --------------- policy/modules/contrib/mpd.if | 19 --------- policy/modules/contrib/mta.if | 14 ------- policy/modules/contrib/mysql.if | 34 ---------------- policy/modules/contrib/nessus.if | 14 ------- policy/modules/contrib/nis.if | 28 ------------- policy/modules/contrib/nsd.if | 28 ------------- policy/modules/contrib/oident.if | 19 --------- policy/modules/contrib/pcscd.if | 45 --------------------- policy/modules/contrib/perdition.if | 14 ------- policy/modules/contrib/portmap.if | 42 -------------------- policy/modules/contrib/postfix.if | 32 --------------- policy/modules/contrib/ppp.if | 19 --------- policy/modules/contrib/pulseaudio.if | 31 --------------- policy/modules/contrib/radius.if | 14 ------- policy/modules/contrib/rpc.if | 28 ------------- policy/modules/contrib/rpm.if | 16 -------- policy/modules/contrib/sendmail.if | 16 -------- policy/modules/contrib/slocate.if | 14 ------- policy/modules/contrib/snmp.if | 14 ------- policy/modules/contrib/soundserver.if | 14 ------- policy/modules/contrib/squid.if | 14 ------- policy/modules/contrib/virt.if | 16 -------- 49 files changed, 1214 deletions(-) diff --git a/policy/modules/contrib/abrt.if b/policy/modules/contrib/abrt.if index 39b6d291..9d1f00da 100644 --- a/policy/modules/contrib/abrt.if +++ b/policy/modules/contrib/abrt.if @@ -164,22 +164,6 @@ interface(`abrt_run_helper',` ######################################## ## ## Create, read, write, and delete -## abrt cache files. -## -## -## -## Domain allowed access. -## -## -# -interface(`abrt_cache_manage',` - refpolicywarn(`$0($*) has been deprecated, use abrt_manage_cache() instead.') - abrt_manage_cache($1) -') - -######################################## -## -## Create, read, write, and delete ## abrt cache content. ## ## diff --git a/policy/modules/contrib/alsa.if b/policy/modules/contrib/alsa.if index d50f5e33..9cff9efb 100644 --- a/policy/modules/contrib/alsa.if +++ b/policy/modules/contrib/alsa.if @@ -2,25 +2,6 @@ ######################################## ## -## Role access for alsa. -## -## -## -## Role allowed access. -## -## -## -## -## User domain for the role. -## -## -# -template(`alsa_role',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## ## Execute a domain transition to run Alsa. ## ## @@ -102,22 +83,6 @@ interface(`alsa_rw_shared_mem',` ######################################## ## -## Read writable Alsa configuration -## content. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`alsa_read_rw_config',` - refpolicywarn(`$0($*) has been deprecated, use alsa_read_config() instead.') - alsa_read_config($1) -') - -######################################## -## ## Read Alsa configuration content. ## ## @@ -139,22 +104,6 @@ interface(`alsa_read_config',` ######################################## ## -## Manage writable Alsa config -## files. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`alsa_manage_rw_config',` - refpolicywarn(`$0($*) has been deprecated, use alsa_manage_config() instead.') - alsa_manage_config($1) -') - -######################################## -## ## Manage Alsa config files. ## ## diff --git a/policy/modules/contrib/automount.if b/policy/modules/contrib/automount.if index 37847d93..fbaa3220 100644 --- a/policy/modules/contrib/automount.if +++ b/policy/modules/contrib/automount.if @@ -40,21 +40,6 @@ interface(`automount_signal',` ######################################## ## -## Execute automount in the caller domain. -## -## -## -## Domain allowed access. -## -## -# -interface(`automount_exec_config',` - refpolicywarn(`$0(): has been deprecated, please use files_exec_etc_files() instead.') - files_exec_etc_files($1) -') - -######################################## -## ## Read automount process state. ## ## diff --git a/policy/modules/contrib/awstats.if b/policy/modules/contrib/awstats.if index 68616dd9..e86fe87f 100644 --- a/policy/modules/contrib/awstats.if +++ b/policy/modules/contrib/awstats.if @@ -19,31 +19,3 @@ interface(`awstats_domtrans',` corecmd_search_bin($1) domtrans_pattern($1, awstats_exec_t, awstats_t) ') - -######################################## -## -## Read and write awstats unnamed pipes. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`awstats_rw_pipes',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## -## Execute awstats cgi scripts in the caller domain. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`awstats_cgi_exec',` - refpolicywarn(`$0($*) has been deprecated.') -') diff --git a/policy/modules/contrib/bind.if b/policy/modules/contrib/bind.if index 7193af63..a99bae9c 100644 --- a/policy/modules/contrib/bind.if +++ b/policy/modules/contrib/bind.if @@ -331,20 +331,6 @@ interface(`bind_manage_zone',` ######################################## ## -## Send and receive datagrams to and from named. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`bind_udp_chat_named',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## All of the rules required to ## administrate an bind environment. ## diff --git a/policy/modules/contrib/bluetooth.if b/policy/modules/contrib/bluetooth.if index 09d6248d..dc61988c 100644 --- a/policy/modules/contrib/bluetooth.if +++ b/policy/modules/contrib/bluetooth.if @@ -130,46 +130,6 @@ interface(`bluetooth_dbus_chat',` ######################################## ## -## Execute bluetooth_helper in the bluetooth_helper domain. (Deprecated) -## -## -## -## Domain allowed to transition. -## -## -# -interface(`bluetooth_domtrans_helper',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## -## Execute bluetooth_helper in the bluetooth_helper domain, and -## allow the specified role the bluetooth_helper domain. (Deprecated) -## -## -## -## Domain allowed to transition. -## -## -## -## -## Role allowed access. -## -## -## -## -## The type of the terminal allow the bluetooth_helper domain to use. -## -## -## -# -interface(`bluetooth_run_helper',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Do not audit attempts to read ## bluetooth process state files. ## diff --git a/policy/modules/contrib/certwatch.if b/policy/modules/contrib/certwatch.if index 9291c5cc..54e6e661 100644 --- a/policy/modules/contrib/certwatch.if +++ b/policy/modules/contrib/certwatch.if @@ -46,32 +46,3 @@ interface(`certwatch_run',` certwatch_domtrans($1) roleattribute $2 certwatch_roles; ') - -######################################## -## -## Execute certwatch in the certwatch domain, and -## allow the specified role the certwatch domain, -## and use the caller's terminal. Has a sigchld -## backchannel. (Deprecated) -## -## -## -## Domain allowed to transition. -## -## -## -## -## Role allowed access. -## -## -## -## -## The type of the terminal allow the certwatch domain to use. -## -## -## -# -interface(`certwatach_run',` - refpolicywarn(`$0($*) has been deprecated, please use certwatch_run() instead.') - certwatch_run($*) -') diff --git a/policy/modules/contrib/clogd.if b/policy/modules/contrib/clogd.if index 221d9143..dce4cb19 100644 --- a/policy/modules/contrib/clogd.if +++ b/policy/modules/contrib/clogd.if @@ -21,21 +21,6 @@ interface(`clogd_domtrans',` ##################################### ## -## Connect to clogd over a unix domain -## stream socket. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`clogd_stream_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -##################################### -## ## Read and write clogd semaphores. ## ## diff --git a/policy/modules/contrib/cobbler.if b/policy/modules/contrib/cobbler.if index 376fa84b..40f89990 100644 --- a/policy/modules/contrib/cobbler.if +++ b/policy/modules/contrib/cobbler.if @@ -151,28 +151,6 @@ interface(`cobbler_manage_lib_files',` ## ## # -interface(`cobblerd_admin',` - refpolicywarn(`$0($*) has been deprecated, use cobbler_admin() instead.') - cobbler_admin($1, $2) -') - -######################################## -## -## All of the rules required to -## administrate an cobbler environment. -## -## -## -## Domain allowed access. -## -## -## -## -## Role allowed access. -## -## -## -# interface(`cobbler_admin',` gen_require(` type cobblerd_t, cobbler_var_lib_t, cobbler_var_log_t; diff --git a/policy/modules/contrib/corosync.if b/policy/modules/contrib/corosync.if index 57736aab..2b2d11af 100644 --- a/policy/modules/contrib/corosync.if +++ b/policy/modules/contrib/corosync.if @@ -133,28 +133,6 @@ interface(`corosync_rw_tmpfs',` ## ## # -interface(`corosyncd_admin',` - refpolicywarn(`$0($*) has been deprecated, use corosync_admin() instead.') - corosync_admin($1, $2) -') - -###################################### -## -## All of the rules required to -## administrate an corosync environment. -## -## -## -## Domain allowed access. -## -## -## -## -## Role allowed access. -## -## -## -# interface(`corosync_admin',` gen_require(` type corosync_t, corosync_var_lib_t, corosync_var_log_t; diff --git a/policy/modules/contrib/cups.if b/policy/modules/contrib/cups.if index bd6b77f4..73887e50 100644 --- a/policy/modules/contrib/cups.if +++ b/policy/modules/contrib/cups.if @@ -75,20 +75,6 @@ interface(`cups_stream_connect',` ######################################## ## -## Connect to cups over TCP. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`cups_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Send and receive messages from ## cups over dbus. ## diff --git a/policy/modules/contrib/dbus.if b/policy/modules/contrib/dbus.if index 3893df7c..32824d9a 100644 --- a/policy/modules/contrib/dbus.if +++ b/policy/modules/contrib/dbus.if @@ -139,22 +139,6 @@ interface(`dbus_system_bus_client',` ####################################### ## -## Acquire service on DBUS -## session bus. -## -## -## -## Domain allowed access. -## -## -# -interface(`dbus_connect_session_bus',` - refpolicywarn(`$0($*) has been deprecated, use dbus_connect_all_session_bus() instead.') - dbus_connect_all_session_bus($1) -') - -####################################### -## ## Acquire service on all DBUS ## session busses. ## @@ -201,22 +185,6 @@ interface(`dbus_connect_spec_session_bus',` ####################################### ## -## Creating connections to DBUS -## session bus. -## -## -## -## Domain allowed access. -## -## -# -interface(`dbus_session_bus_client',` - refpolicywarn(`$0($*) has been deprecated, use dbus_all_session_bus_client() instead.') - dbus_all_session_bus_client($1) -') - -####################################### -## ## Creating connections to all ## DBUS session busses. ## @@ -276,21 +244,6 @@ interface(`dbus_spec_session_bus_client',` ####################################### ## -## Send messages to DBUS session bus. -## -## -## -## Domain allowed access. -## -## -# -interface(`dbus_send_session_bus',` - refpolicywarn(`$0($*) has been deprecated, use dbus_send_all_session_bus() instead.') - dbus_send_all_session_bus($1) -') - -####################################### -## ## Send messages to all DBUS ## session busses. ## @@ -399,34 +352,6 @@ interface(`dbus_manage_lib_files',` ## Allow a application domain to be ## started by the specified session bus. ## -## -## -## The prefix of the user role (e.g., user -## is the prefix for user_r). -## -## -## -## -## Type to be used as a domain. -## -## -## -## -## Type of the program to be used as an -## entry point to this domain. -## -## -# -interface(`dbus_session_domain',` - refpolicywarn(`$0($*) has been deprecated, use dbus_all_session_domain() instead.') - dbus_all_session_domain($1, $2) -') - -######################################## -## -## Allow a application domain to be -## started by the specified session bus. -## ## ## ## Type to be used as a domain. diff --git a/policy/modules/contrib/dictd.if b/policy/modules/contrib/dictd.if index 3878acc7..6feb8280 100644 --- a/policy/modules/contrib/dictd.if +++ b/policy/modules/contrib/dictd.if @@ -2,21 +2,6 @@ ######################################## ## -## Use dictionary services by connecting -## over TCP. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`dictd_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## All of the rules required to ## administrate an dictd environment. ## diff --git a/policy/modules/contrib/finger.if b/policy/modules/contrib/finger.if index 2656d2b5..a071cfd4 100644 --- a/policy/modules/contrib/finger.if +++ b/policy/modules/contrib/finger.if @@ -18,17 +18,3 @@ interface(`finger_domtrans',` corecmd_search_bin($1) domtrans_pattern($1, fingerd_exec_t, fingerd_t) ') - -######################################## -## -## Connect to fingerd with a tcp socket. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`finger_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') diff --git a/policy/modules/contrib/ftp.if b/policy/modules/contrib/ftp.if index 93fd4be4..349d1b3b 100644 --- a/policy/modules/contrib/ftp.if +++ b/policy/modules/contrib/ftp.if @@ -20,20 +20,6 @@ interface(`ftp_dyntrans_anon_sftpd',` ######################################## ## -## Connect to over ftpd over TCP. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`ftp_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Read ftpd configuration files. ## ## diff --git a/policy/modules/contrib/glusterfs.if b/policy/modules/contrib/glusterfs.if index 0945d876..b4f5d01c 100644 --- a/policy/modules/contrib/glusterfs.if +++ b/policy/modules/contrib/glusterfs.if @@ -17,28 +17,6 @@ ## ## # -interface(`glusterd_admin',` - refpolicywarn(`$0($*) has been deprecated, use glusterfs_admin() instead.') - glusterfs_admin($1, $2) -') - -######################################## -## -## All of the rules required to -## administrate an glusterfs environment. -## -## -## -## Domain allowed access. -## -## -## -## -## Role allowed access. -## -## -## -# interface(`glusterfs_admin',` gen_require(` type glusterd_t, glusterd_initrc_exec_t, glusterd_log_t; diff --git a/policy/modules/contrib/gnome.if b/policy/modules/contrib/gnome.if index edf4d4e6..2eb4f047 100644 --- a/policy/modules/contrib/gnome.if +++ b/policy/modules/contrib/gnome.if @@ -1,24 +1,5 @@ ## GNU network object model environment. -######################################## -## -## Role access for gnome. (Deprecated) -## -## -## -## Role allowed access. -## -## -## -## -## User domain for the role. -## -## -# -interface(`gnome_role',` - refpolicywarn(`$0($*) has been deprecated') -') - ####################################### ## ## The role template for gnome. @@ -267,22 +248,6 @@ interface(`gnome_create_generic_home_dirs',` ######################################## ## ## Set attributes of generic gnome -## user home directories. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`gnome_setattr_config_dirs',` - refpolicywarn(`$0($*) has been deprecated, use gnome_setattr_generic_home_dirs() instead.') - gnome_setattr_generic_home_dirs($1) -') - -######################################## -## -## Set attributes of generic gnome ## user home directories. ## ## @@ -302,21 +267,6 @@ interface(`gnome_setattr_generic_home_dirs',` ######################################## ## -## Read generic gnome user home content. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`gnome_read_config',` - refpolicywarn(`$0($*) has been deprecated, use gnome_read_generic_home_content() instead.') - gnome_read_generic_home_content($1) -') - -######################################## -## ## Read generic gnome home content. ## ## @@ -341,22 +291,6 @@ interface(`gnome_read_generic_home_content',` ######################################## ## ## Create, read, write, and delete -## generic gnome user home content. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`gnome_manage_config',` - refpolicywarn(`$0($*) has been deprecated, use gnome_manage_generic_home_content() instead.') - gnome_manage_generic_home_content($1) -') - -######################################## -## -## Create, read, write, and delete ## generic gnome home content. ## ## diff --git a/policy/modules/contrib/gpg.if b/policy/modules/contrib/gpg.if index 4f118bf3..c4b7c4cd 100644 --- a/policy/modules/contrib/gpg.if +++ b/policy/modules/contrib/gpg.if @@ -125,20 +125,6 @@ interface(`gpg_spec_domtrans',` ###################################### ## -## Execute gpg in the gpg web domain. (Deprecated) -## -## -## -## Domain allowed to transition. -## -## -# -interface(`gpg_domtrans_web',` - refpolicywarn(`$0($*) has been deprecated.') -') - -###################################### -## ## Make gpg executable files an ## entrypoint for the specified domain. ## diff --git a/policy/modules/contrib/i18n_input.if b/policy/modules/contrib/i18n_input.if index b9082642..4e08c3cf 100644 --- a/policy/modules/contrib/i18n_input.if +++ b/policy/modules/contrib/i18n_input.if @@ -2,20 +2,6 @@ ######################################## ## -## Use i18n_input over a TCP connection. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`i18n_use',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## All of the rules required to ## administrate an i18n input environment. ## diff --git a/policy/modules/contrib/inetd.if b/policy/modules/contrib/inetd.if index fbb54e7d..593cd40b 100644 --- a/policy/modules/contrib/inetd.if +++ b/policy/modules/contrib/inetd.if @@ -140,20 +140,6 @@ interface(`inetd_use_fds',` ######################################## ## -## Connect to the inetd service using a TCP connection. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`inetd_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Run inetd child process in the ## inet child domain. ## @@ -174,20 +160,6 @@ interface(`inetd_domtrans_child',` ######################################## ## -## Send UDP network traffic to inetd. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`inetd_udp_send',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Read and write inetd TCP sockets. ## ## diff --git a/policy/modules/contrib/iodine.if b/policy/modules/contrib/iodine.if index 87e47eb2..99f1afd1 100644 --- a/policy/modules/contrib/iodine.if +++ b/policy/modules/contrib/iodine.if @@ -17,28 +17,6 @@ ## ## # -interface(`iodined_admin',` - refpolicywarn(`$0($*) has been deprecated, use iodine_admin() instead.') - iodine_admin($1, $2) -') - -######################################## -## -## All of the rules required to -## administrate an iodined environment -## -## -## -## Domain allowed access. -## -## -## -## -## Role allowed access. -## -## -## -# interface(`iodine_admin',` gen_require(` type iodined_t, iodined_initrc_exec_t; diff --git a/policy/modules/contrib/jabber.if b/policy/modules/contrib/jabber.if index 549dac1f..9a31ee51 100644 --- a/policy/modules/contrib/jabber.if +++ b/policy/modules/contrib/jabber.if @@ -42,20 +42,6 @@ interface(`jabber_manage_lib_files',` ######################################## ## -## Connect to jabber over a TCP socket (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`jabber_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## All of the rules required to ## administrate an jabber environment. ## diff --git a/policy/modules/contrib/kerberos.if b/policy/modules/contrib/kerberos.if index 01caeead..c8c5a37d 100644 --- a/policy/modules/contrib/kerberos.if +++ b/policy/modules/contrib/kerberos.if @@ -2,25 +2,6 @@ ######################################## ## -## Role access for kerberos. -## -## -## -## Role allowed access. -## -## -## -## -## User domain for the role. -## -## -# -template(`kerberos_role',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## ## Execute kadmind in the caller domain. ## ## @@ -339,28 +320,6 @@ interface(`kerberos_etc_filetrans_keytab',` ######################################## ## -## Create a derived type for kerberos -## keytab files. -## -## -## -## The prefix to be used for deriving type names. -## -## -## -## -## Domain allowed access. -## -## -# -template(`kerberos_keytab_template',` - refpolicywarn(`$0($*) has been deprecated.') - kerberos_read_keytab($2) - kerberos_use($2) -') - -######################################## -## ## Read kerberos kdc configuration files. ## ## diff --git a/policy/modules/contrib/ldap.if b/policy/modules/contrib/ldap.if index b4eabc96..59752140 100644 --- a/policy/modules/contrib/ldap.if +++ b/policy/modules/contrib/ldap.if @@ -41,20 +41,6 @@ interface(`ldap_read_config',` ######################################## ## -## Use LDAP over TCP connection. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`ldap_use',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Connect to slapd over an unix ## stream socket. ## diff --git a/policy/modules/contrib/mandb.if b/policy/modules/contrib/mandb.if index 2b5d5385..e880655d 100644 --- a/policy/modules/contrib/mandb.if +++ b/policy/modules/contrib/mandb.if @@ -48,63 +48,6 @@ interface(`mandb_run',` ######################################## ## -## Search mandb cache directories. -## -## -## -## Domain allowed access. -## -## -# -interface(`mandb_search_cache',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## -## Delete mandb cache content. -## -## -## -## Domain allowed access. -## -## -# -interface(`mandb_delete_cache_content',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## -## Read mandb cache content. -## -## -## -## Domain allowed access. -## -## -# -interface(`mandb_read_cache_content',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## -## Create, read, write, and delete -## mandb cache files. -## -## -## -## Domain allowed access. -## -## -# -interface(`mandb_manage_cache_content',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## ## All of the rules required to ## administrate an mandb environment. ## diff --git a/policy/modules/contrib/mojomojo.if b/policy/modules/contrib/mojomojo.if index 73952f4c..6680a087 100644 --- a/policy/modules/contrib/mojomojo.if +++ b/policy/modules/contrib/mojomojo.if @@ -1,23 +1 @@ ## MojoMojo Wiki. - -######################################## -## -## All of the rules required to -## administrate an mojomojo environment. -## -## -## -## Domain allowed access. -## -## -## -## -## Role allowed access. -## -## -## -# -interface(`mojomojo_admin',` - refpolicywarn(`$0($*) has been deprecated, use apache_admin() instead.') - apache_admin($1, $2) -') diff --git a/policy/modules/contrib/mozilla.if b/policy/modules/contrib/mozilla.if index 70390632..178d68d8 100644 --- a/policy/modules/contrib/mozilla.if +++ b/policy/modules/contrib/mozilla.if @@ -242,21 +242,6 @@ interface(`mozilla_dontaudit_manage_user_home_files',` ######################################## ## -## Execute mozilla home directory files. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`mozilla_exec_user_home_files',` - refpolicywarn(`$0($*) has been deprecated, use mozilla_exec_user_plugin_home_files() instead.') - mozilla_exec_user_plugin_home_files($1) -') - -######################################## -## ## Execute mozilla plugin home directory files. ## ## @@ -276,22 +261,6 @@ interface(`mozilla_exec_user_plugin_home_files',` ######################################## ## -## Mozilla home directory file -## text relocation. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`mozilla_execmod_user_home_files',` - refpolicywarn(`$0($*) has been deprecated, use mozilla_execmod_user_plugin_home_files() instead.') - mozilla_execmod_user_plugin_home_files($1) -') - -######################################## -## ## Mozilla plugin home directory file ## text relocation. ## diff --git a/policy/modules/contrib/mpd.if b/policy/modules/contrib/mpd.if index 384599fd..02faa37e 100644 --- a/policy/modules/contrib/mpd.if +++ b/policy/modules/contrib/mpd.if @@ -2,25 +2,6 @@ ######################################## ## -## Role access for mpd. -## -## -## -## Role allowed access. -## -## -## -## -## User domain for the role. -## -## -# -template(`mpd_role',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## ## Execute a domain transition to run mpd. ## ## diff --git a/policy/modules/contrib/mta.if b/policy/modules/contrib/mta.if index 7e268b80..0602746b 100644 --- a/policy/modules/contrib/mta.if +++ b/policy/modules/contrib/mta.if @@ -753,20 +753,6 @@ interface(`mta_dontaudit_rw_delivery_tcp_sockets',` ####################################### ## -## Connect to all mail servers over TCP. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`mta_tcp_connect_all_mailservers',` - refpolicywarn(`$0($*) has been deprecated.') -') - -####################################### -## ## Do not audit attempts to read ## mail spool symlinks. ## diff --git a/policy/modules/contrib/mysql.if b/policy/modules/contrib/mysql.if index e7250f7f..af59114a 100644 --- a/policy/modules/contrib/mysql.if +++ b/policy/modules/contrib/mysql.if @@ -1,24 +1,5 @@ ## Open source database. -######################################## -## -## Role access for mysql. -## -## -## -## Role allowed access. -## -## -## -## -## User domain for the role. -## -## -# -interface(`mysql_role',` - refpolicywarn(`$0($*) has been deprecated') -') - ###################################### ## ## Execute MySQL in the mysql domain. @@ -263,21 +244,6 @@ interface(`mysql_manage_db_files',` ######################################## ## -## Read and write mysqld database sockets. -## named socket. -## -## -## -## Domain allowed access. -## -## -# -interface(`mysql_rw_db_sockets',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Create, read, write, and delete ## mysqld home files. ## diff --git a/policy/modules/contrib/nessus.if b/policy/modules/contrib/nessus.if index f41ec5f3..57bed033 100644 --- a/policy/modules/contrib/nessus.if +++ b/policy/modules/contrib/nessus.if @@ -2,20 +2,6 @@ ######################################## ## -## Connect to nessus over a TCP socket (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`nessus_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## All of the rules required to ## administrate an nessus environment. ## diff --git a/policy/modules/contrib/nis.if b/policy/modules/contrib/nis.if index 718db6ea..66a3ba28 100644 --- a/policy/modules/contrib/nis.if +++ b/policy/modules/contrib/nis.if @@ -215,34 +215,6 @@ interface(`nis_list_var_yp',` ######################################## ## -## Send UDP network traffic to NIS clients. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`nis_udp_send_ypbind',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## -## Connect to ypbind over TCP. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`nis_tcp_connect_ypbind',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Read ypbind pid files. ## ## diff --git a/policy/modules/contrib/nsd.if b/policy/modules/contrib/nsd.if index 8ec6ec4e..e071bcd0 100644 --- a/policy/modules/contrib/nsd.if +++ b/policy/modules/contrib/nsd.if @@ -2,34 +2,6 @@ ######################################## ## -## Send and receive datagrams from NSD. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`nsd_udp_chat',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## -## Connect to NSD over a TCP socket (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`nsd_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## All of the rules required to ## administrate an nsd environment. ## diff --git a/policy/modules/contrib/oident.if b/policy/modules/contrib/oident.if index c317a3aa..95b329ef 100644 --- a/policy/modules/contrib/oident.if +++ b/policy/modules/contrib/oident.if @@ -2,25 +2,6 @@ ######################################## ## -## Role access for oident. -## -## -## -## Role allowed access. -## -## -## -## -## User domain for the role. -## -## -# -interface(`oident_role',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## ## Read oidentd user home content. ## ## diff --git a/policy/modules/contrib/pcscd.if b/policy/modules/contrib/pcscd.if index b5c522d3..412c24aa 100644 --- a/policy/modules/contrib/pcscd.if +++ b/policy/modules/contrib/pcscd.if @@ -29,21 +29,6 @@ interface(`pcscd_domtrans',` ## ## # -interface(`pcscd_read_pub_files',` - refpolicywarn(`$0($*) has been deprecated, use pcscd_read_pid_files() instead.') - pcscd_read_pid_files($1) -') - -######################################## -## -## Read pcscd pid files. -## -## -## -## Domain allowed access. -## -## -# interface(`pcscd_read_pid_files',` gen_require(` type pcscd_var_run_t; @@ -55,36 +40,6 @@ interface(`pcscd_read_pid_files',` ######################################## ## -## Create, read, write, and delete -## pcscd pid files. -## -## -## -## Domain allowed access. -## -## -# -interface(`pcscd_manage_pub_files',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## -## Create, read, write, and delete -## pcscd pid fifo files. -## -## -## -## Domain allowed access. -## -## -# -interface(`pcscd_manage_pub_pipes',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## ## Connect to pcscd over an unix ## domain stream socket. ## diff --git a/policy/modules/contrib/perdition.if b/policy/modules/contrib/perdition.if index 092ac614..4d69d909 100644 --- a/policy/modules/contrib/perdition.if +++ b/policy/modules/contrib/perdition.if @@ -2,20 +2,6 @@ ######################################## ## -## Connect to perdition over a TCP socket (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`perdition_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## All of the rules required to ## administrate an perdition environment. ## diff --git a/policy/modules/contrib/portmap.if b/policy/modules/contrib/portmap.if index f0af3fe3..52208ce0 100644 --- a/policy/modules/contrib/portmap.if +++ b/policy/modules/contrib/portmap.if @@ -48,48 +48,6 @@ interface(`portmap_run_helper',` ######################################## ## -## Send UDP network traffic to portmap. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`portmap_udp_send',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## -## Send and receive UDP network traffic from portmap. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`portmap_udp_chat',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## -## Connect to portmap over a TCP socket (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`portmap_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## All of the rules required to ## administrate an portmap environment. ## diff --git a/policy/modules/contrib/postfix.if b/policy/modules/contrib/postfix.if index 19fe6132..fa17bde4 100644 --- a/policy/modules/contrib/postfix.if +++ b/policy/modules/contrib/postfix.if @@ -428,22 +428,6 @@ interface(`postfix_stream_connect_master',` ######################################## ## -## Read and write postfix master -## unnamed pipes. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`postfix_rw_master_pipes',` - refpolicywarn(`$0($*) has been deprecated, use postfix_rw_inherited_master_pipes() instead.') - postfix_rw_inherited_master_pipes($1) -') - -######################################## -## ## Execute the master postdrop in the ## postfix postdrop domain. ## @@ -484,22 +468,6 @@ interface(`postfix_domtrans_postqueue',` ####################################### ## -## Execute the master postqueue in -## the caller domain. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`posftix_exec_postqueue',` - refpolicywarn(`$0($*) has been deprecated.') - postfix_exec_postqueue($1) -') - -####################################### -## ## Execute postfix postqueue in ## the caller domain. ## diff --git a/policy/modules/contrib/ppp.if b/policy/modules/contrib/ppp.if index 0376e92f..070e565c 100644 --- a/policy/modules/contrib/ppp.if +++ b/policy/modules/contrib/ppp.if @@ -2,25 +2,6 @@ ######################################## ## -## Role access for ppp. -## -## -## -## Role allowed access. -## -## -## -## -## User domain for the role. -## -## -# -interface(`ppp_role',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## ## Create, read, write, and delete ## ppp home files. ## diff --git a/policy/modules/contrib/pulseaudio.if b/policy/modules/contrib/pulseaudio.if index 7236f624..921e519c 100644 --- a/policy/modules/contrib/pulseaudio.if +++ b/policy/modules/contrib/pulseaudio.if @@ -254,21 +254,6 @@ interface(`pulseaudio_setattr_home_dir',` ## ## # -interface(`pulseaudio_read_home_files',` - refpolicywarn(`$0($*) has been deprecated, use pulseaudio_read_home() instead.') - pulseaudio_read_home($1) -') - -######################################## -## -## Read pulseaudio home content. -## -## -## -## Domain allowed access. -## -## -# interface(`pulseaudio_read_home',` gen_require(` type pulseaudio_home_t; @@ -311,22 +296,6 @@ interface(`pulseaudio_rw_home_files',` ## ## # -interface(`pulseaudio_manage_home_files',` - refpolicywarn(`$0($*) has been deprecated, use pulseaudio_manage_home() instead.') - pulseaudio_manage_home($1) -') - -######################################## -## -## Create, read, write, and delete -## pulseaudio home content. -## -## -## -## Domain allowed access. -## -## -# interface(`pulseaudio_manage_home',` gen_require(` type pulseaudio_home_t; diff --git a/policy/modules/contrib/radius.if b/policy/modules/contrib/radius.if index 7703bc78..bce89c30 100644 --- a/policy/modules/contrib/radius.if +++ b/policy/modules/contrib/radius.if @@ -2,20 +2,6 @@ ######################################## ## -## Use radius over a UDP connection. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`radius_use',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## All of the rules required to ## administrate an radius environment. ## diff --git a/policy/modules/contrib/rpc.if b/policy/modules/contrib/rpc.if index fbf5995d..7063c42f 100644 --- a/policy/modules/contrib/rpc.if +++ b/policy/modules/contrib/rpc.if @@ -52,20 +52,6 @@ template(`rpc_domain_template',` ######################################## ## -## Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`rpc_udp_send',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Do not audit attempts to get ## attributes of export files. ## @@ -298,20 +284,6 @@ interface(`rpc_udp_rw_nfs_sockets',` ######################################## ## -## Send UDP traffic to NFSd. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`rpc_udp_send_nfs',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Search nfs lib directories. ## ## diff --git a/policy/modules/contrib/rpm.if b/policy/modules/contrib/rpm.if index 304e97cb..016cdb2a 100644 --- a/policy/modules/contrib/rpm.if +++ b/policy/modules/contrib/rpm.if @@ -564,22 +564,6 @@ interface(`rpm_manage_pid_files',` files_search_pids($1) ') -###################################### -## -## Create files in pid directories -## with the rpm pid file type. -## -## -## -## Domain allowed access. -## -## -# -interface(`rpm_pid_filetrans',` - refpolicywarn(`$0($*) has been deprecated, rpm_pid_filetrans_rpm_pid() instead.') - rpm_pid_filetrans_rpm_pid($1, file) -') - ######################################## ## ## Create specified objects in pid directories diff --git a/policy/modules/contrib/sendmail.if b/policy/modules/contrib/sendmail.if index d60de843..5358d159 100644 --- a/policy/modules/contrib/sendmail.if +++ b/policy/modules/contrib/sendmail.if @@ -228,22 +228,6 @@ interface(`sendmail_manage_log',` ## Domain allowed access. ## ## -# -interface(`sendmail_create_log',` - refpolicywarn(`$0($*) has been deprecated, use sendmail_log_filetrans_sendmail_log() instead.') - sendmail_log_filetrans_sendmail_log($1, $2, $3) -') - -######################################## -## -## Create specified objects in generic -## log directories sendmail log file type. -## -## -## -## Domain allowed access. -## -## ## ## ## Class of the object being created. diff --git a/policy/modules/contrib/slocate.if b/policy/modules/contrib/slocate.if index 1f25803d..82de1b68 100644 --- a/policy/modules/contrib/slocate.if +++ b/policy/modules/contrib/slocate.if @@ -2,20 +2,6 @@ ######################################## ## -## Create the locate log with append mode. -## -## -## -## Domain allowed access. -## -## -# -interface(`slocate_create_append_log',` - refpolicywarn(`$0($*) has been deprecated') -') - -######################################## -## ## Read locate lib files. ## ## diff --git a/policy/modules/contrib/snmp.if b/policy/modules/contrib/snmp.if index 96775032..d8a75680 100644 --- a/policy/modules/contrib/snmp.if +++ b/policy/modules/contrib/snmp.if @@ -43,20 +43,6 @@ interface(`snmp_tcp_connect',` ######################################## ## -## Send and receive UDP traffic to SNMP (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`snmp_udp_chat',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## Create, read, write, and delete ## snmp lib directories. ## diff --git a/policy/modules/contrib/soundserver.if b/policy/modules/contrib/soundserver.if index 8dc1c0f4..106e0700 100644 --- a/policy/modules/contrib/soundserver.if +++ b/policy/modules/contrib/soundserver.if @@ -2,20 +2,6 @@ ######################################## ## -## Connect to the sound server over a TCP socket (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`soundserver_tcp_connect',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## All of the rules required to ## administrate an soundd environment. ## diff --git a/policy/modules/contrib/squid.if b/policy/modules/contrib/squid.if index b5adfad3..2443afbd 100644 --- a/policy/modules/contrib/squid.if +++ b/policy/modules/contrib/squid.if @@ -177,20 +177,6 @@ interface(`squid_manage_logs',` ######################################## ## -## Use squid services by connecting over TCP. (Deprecated) -## -## -## -## Domain allowed access. -## -## -# -interface(`squid_use',` - refpolicywarn(`$0($*) has been deprecated.') -') - -######################################## -## ## dontaudit statting tmpfs files ## ## diff --git a/policy/modules/contrib/virt.if b/policy/modules/contrib/virt.if index 8016cccb..993ee6c8 100644 --- a/policy/modules/contrib/virt.if +++ b/policy/modules/contrib/virt.if @@ -1069,22 +1069,6 @@ interface(`virt_rw_all_image_chr_files',` ######################################## ## ## Create, read, write, and delete -## svirt cache files. -## -## -## -## Domain allowed access. -## -## -# -interface(`virt_manage_svirt_cache',` - refpolicywarn(`$0($*) has been deprecated, use virt_manage_virt_cache() instead.') - virt_manage_virt_cache($1) -') - -######################################## -## -## Create, read, write, and delete ## virt cache content. ## ##