commit:     192f02005a5673e022d3cc7ff18af83855faceba
Author:     Chris PeBenito <pebenito <AT> ieee <DOT> org>
AuthorDate: Sun Aug  6 21:03:06 2017 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Fri Sep  8 22:48:51 2017 +0000
URL:        
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=192f0200

Remove deprecated interfaces more than one year old.

 policy/modules/contrib/abrt.if        | 16 --------
 policy/modules/contrib/alsa.if        | 51 ------------------------
 policy/modules/contrib/automount.if   | 15 -------
 policy/modules/contrib/awstats.if     | 28 -------------
 policy/modules/contrib/bind.if        | 14 -------
 policy/modules/contrib/bluetooth.if   | 40 -------------------
 policy/modules/contrib/certwatch.if   | 29 --------------
 policy/modules/contrib/clogd.if       | 15 -------
 policy/modules/contrib/cobbler.if     | 22 ----------
 policy/modules/contrib/corosync.if    | 22 ----------
 policy/modules/contrib/cups.if        | 14 -------
 policy/modules/contrib/dbus.if        | 75 -----------------------------------
 policy/modules/contrib/dictd.if       | 15 -------
 policy/modules/contrib/finger.if      | 14 -------
 policy/modules/contrib/ftp.if         | 14 -------
 policy/modules/contrib/glusterfs.if   | 22 ----------
 policy/modules/contrib/gnome.if       | 66 ------------------------------
 policy/modules/contrib/gpg.if         | 14 -------
 policy/modules/contrib/i18n_input.if  | 14 -------
 policy/modules/contrib/inetd.if       | 28 -------------
 policy/modules/contrib/iodine.if      | 22 ----------
 policy/modules/contrib/jabber.if      | 14 -------
 policy/modules/contrib/kerberos.if    | 41 -------------------
 policy/modules/contrib/ldap.if        | 14 -------
 policy/modules/contrib/mandb.if       | 57 --------------------------
 policy/modules/contrib/mojomojo.if    | 22 ----------
 policy/modules/contrib/mozilla.if     | 31 ---------------
 policy/modules/contrib/mpd.if         | 19 ---------
 policy/modules/contrib/mta.if         | 14 -------
 policy/modules/contrib/mysql.if       | 34 ----------------
 policy/modules/contrib/nessus.if      | 14 -------
 policy/modules/contrib/nis.if         | 28 -------------
 policy/modules/contrib/nsd.if         | 28 -------------
 policy/modules/contrib/oident.if      | 19 ---------
 policy/modules/contrib/pcscd.if       | 45 ---------------------
 policy/modules/contrib/perdition.if   | 14 -------
 policy/modules/contrib/portmap.if     | 42 --------------------
 policy/modules/contrib/postfix.if     | 32 ---------------
 policy/modules/contrib/ppp.if         | 19 ---------
 policy/modules/contrib/pulseaudio.if  | 31 ---------------
 policy/modules/contrib/radius.if      | 14 -------
 policy/modules/contrib/rpc.if         | 28 -------------
 policy/modules/contrib/rpm.if         | 16 --------
 policy/modules/contrib/sendmail.if    | 16 --------
 policy/modules/contrib/slocate.if     | 14 -------
 policy/modules/contrib/snmp.if        | 14 -------
 policy/modules/contrib/soundserver.if | 14 -------
 policy/modules/contrib/squid.if       | 14 -------
 policy/modules/contrib/virt.if        | 16 --------
 49 files changed, 1214 deletions(-)

diff --git a/policy/modules/contrib/abrt.if b/policy/modules/contrib/abrt.if
index 39b6d291..9d1f00da 100644
--- a/policy/modules/contrib/abrt.if
+++ b/policy/modules/contrib/abrt.if
@@ -164,22 +164,6 @@ interface(`abrt_run_helper',`
 ########################################
 ## <summary>
 ##     Create, read, write, and delete
-##     abrt cache files.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`abrt_cache_manage',`
-       refpolicywarn(`$0($*) has been deprecated, use abrt_manage_cache() 
instead.')
-       abrt_manage_cache($1)
-')
-
-########################################
-## <summary>
-##     Create, read, write, and delete
 ##     abrt cache content.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/alsa.if b/policy/modules/contrib/alsa.if
index d50f5e33..9cff9efb 100644
--- a/policy/modules/contrib/alsa.if
+++ b/policy/modules/contrib/alsa.if
@@ -2,25 +2,6 @@
 
 ########################################
 ## <summary>
-##     Role access for alsa.
-## </summary>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <param name="domain">
-##     <summary>
-##     User domain for the role.
-##     </summary>
-## </param>
-#
-template(`alsa_role',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
 ##     Execute a domain transition to run Alsa.
 ## </summary>
 ## <param name="domain">
@@ -102,22 +83,6 @@ interface(`alsa_rw_shared_mem',`
 
 ########################################
 ## <summary>
-##     Read writable Alsa configuration
-##     content.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`alsa_read_rw_config',`
-       refpolicywarn(`$0($*) has been deprecated, use alsa_read_config() 
instead.')
-       alsa_read_config($1)
-')
-
-########################################
-## <summary>
 ##     Read Alsa configuration content.
 ## </summary>
 ## <param name="domain">
@@ -139,22 +104,6 @@ interface(`alsa_read_config',`
 
 ########################################
 ## <summary>
-##     Manage writable Alsa config
-##     files.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`alsa_manage_rw_config',`
-       refpolicywarn(`$0($*) has been deprecated, use alsa_manage_config() 
instead.')
-       alsa_manage_config($1)
-')
-
-########################################
-## <summary>
 ##     Manage Alsa config files.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/automount.if 
b/policy/modules/contrib/automount.if
index 37847d93..fbaa3220 100644
--- a/policy/modules/contrib/automount.if
+++ b/policy/modules/contrib/automount.if
@@ -40,21 +40,6 @@ interface(`automount_signal',`
 
 ########################################
 ## <summary>
-##     Execute automount in the caller domain.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`automount_exec_config',`
-       refpolicywarn(`$0(): has been deprecated, please use 
files_exec_etc_files() instead.')
-       files_exec_etc_files($1)
-')
-
-########################################
-## <summary>
 ##     Read automount process state.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/awstats.if 
b/policy/modules/contrib/awstats.if
index 68616dd9..e86fe87f 100644
--- a/policy/modules/contrib/awstats.if
+++ b/policy/modules/contrib/awstats.if
@@ -19,31 +19,3 @@ interface(`awstats_domtrans',`
        corecmd_search_bin($1)
        domtrans_pattern($1, awstats_exec_t, awstats_t)
 ')
-
-########################################
-## <summary>
-##     Read and write awstats unnamed pipes. (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`awstats_rw_pipes',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
-##     Execute awstats cgi scripts in the caller domain. (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`awstats_cgi_exec',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')

diff --git a/policy/modules/contrib/bind.if b/policy/modules/contrib/bind.if
index 7193af63..a99bae9c 100644
--- a/policy/modules/contrib/bind.if
+++ b/policy/modules/contrib/bind.if
@@ -331,20 +331,6 @@ interface(`bind_manage_zone',`
 
 ########################################
 ## <summary>
-##     Send and receive datagrams to and from named.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`bind_udp_chat_named',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an bind environment.
 ## </summary>

diff --git a/policy/modules/contrib/bluetooth.if 
b/policy/modules/contrib/bluetooth.if
index 09d6248d..dc61988c 100644
--- a/policy/modules/contrib/bluetooth.if
+++ b/policy/modules/contrib/bluetooth.if
@@ -130,46 +130,6 @@ interface(`bluetooth_dbus_chat',`
 
 ########################################
 ## <summary>
-##     Execute bluetooth_helper in the bluetooth_helper domain.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed to transition.
-##     </summary>
-## </param>
-#
-interface(`bluetooth_domtrans_helper',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
-##     Execute bluetooth_helper in the bluetooth_helper domain, and
-##     allow the specified role the bluetooth_helper domain.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed to transition.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <param name="terminal">
-##     <summary>
-##     The type of the terminal allow the bluetooth_helper domain to use.
-##     </summary>
-## </param>
-## <rolecap/>
-#
-interface(`bluetooth_run_helper',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Do not audit attempts to read
 ##     bluetooth process state files.
 ## </summary>

diff --git a/policy/modules/contrib/certwatch.if 
b/policy/modules/contrib/certwatch.if
index 9291c5cc..54e6e661 100644
--- a/policy/modules/contrib/certwatch.if
+++ b/policy/modules/contrib/certwatch.if
@@ -46,32 +46,3 @@ interface(`certwatch_run',`
        certwatch_domtrans($1)
        roleattribute $2 certwatch_roles;
 ')
-
-########################################
-## <summary>
-##     Execute certwatch in the certwatch domain, and
-##     allow the specified role the certwatch domain,
-##     and use the caller's terminal. Has a sigchld
-##     backchannel.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed to transition.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <param name="terminal">
-##     <summary>
-##     The type of the terminal allow the certwatch domain to use.
-##     </summary>
-## </param>
-## <rolecap/>
-#
-interface(`certwatach_run',`
-       refpolicywarn(`$0($*) has been deprecated, please use certwatch_run() 
instead.')
-       certwatch_run($*)
-')

diff --git a/policy/modules/contrib/clogd.if b/policy/modules/contrib/clogd.if
index 221d9143..dce4cb19 100644
--- a/policy/modules/contrib/clogd.if
+++ b/policy/modules/contrib/clogd.if
@@ -21,21 +21,6 @@ interface(`clogd_domtrans',`
 
 #####################################
 ## <summary>
-##     Connect to clogd over a unix domain
-##     stream socket.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`clogd_stream_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-#####################################
-## <summary>
 ##     Read and write clogd semaphores.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/cobbler.if 
b/policy/modules/contrib/cobbler.if
index 376fa84b..40f89990 100644
--- a/policy/modules/contrib/cobbler.if
+++ b/policy/modules/contrib/cobbler.if
@@ -151,28 +151,6 @@ interface(`cobbler_manage_lib_files',`
 ## </param>
 ## <rolecap/>
 #
-interface(`cobblerd_admin',`
-       refpolicywarn(`$0($*) has been deprecated, use cobbler_admin() 
instead.')
-       cobbler_admin($1, $2)
-')
-
-########################################
-## <summary>
-##     All of the rules required to
-##     administrate an cobbler environment.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <rolecap/>
-#
 interface(`cobbler_admin',`
        gen_require(`
                type cobblerd_t, cobbler_var_lib_t, cobbler_var_log_t;

diff --git a/policy/modules/contrib/corosync.if 
b/policy/modules/contrib/corosync.if
index 57736aab..2b2d11af 100644
--- a/policy/modules/contrib/corosync.if
+++ b/policy/modules/contrib/corosync.if
@@ -133,28 +133,6 @@ interface(`corosync_rw_tmpfs',`
 ## </param>
 ## <rolecap/>
 #
-interface(`corosyncd_admin',`
-       refpolicywarn(`$0($*) has been deprecated, use corosync_admin() 
instead.')
-       corosync_admin($1, $2)
-')
-
-######################################
-## <summary>
-##     All of the rules required to
-##     administrate an corosync environment.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <rolecap/>
-#
 interface(`corosync_admin',`
        gen_require(`
                type corosync_t, corosync_var_lib_t, corosync_var_log_t;

diff --git a/policy/modules/contrib/cups.if b/policy/modules/contrib/cups.if
index bd6b77f4..73887e50 100644
--- a/policy/modules/contrib/cups.if
+++ b/policy/modules/contrib/cups.if
@@ -75,20 +75,6 @@ interface(`cups_stream_connect',`
 
 ########################################
 ## <summary>
-##     Connect to cups over TCP.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`cups_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Send and receive messages from
 ##     cups over dbus.
 ## </summary>

diff --git a/policy/modules/contrib/dbus.if b/policy/modules/contrib/dbus.if
index 3893df7c..32824d9a 100644
--- a/policy/modules/contrib/dbus.if
+++ b/policy/modules/contrib/dbus.if
@@ -139,22 +139,6 @@ interface(`dbus_system_bus_client',`
 
 #######################################
 ## <summary>
-##     Acquire service on DBUS
-##     session bus.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`dbus_connect_session_bus',`
-       refpolicywarn(`$0($*) has been deprecated, use 
dbus_connect_all_session_bus() instead.')
-       dbus_connect_all_session_bus($1)
-')
-
-#######################################
-## <summary>
 ##     Acquire service on all DBUS
 ##     session busses.
 ## </summary>
@@ -201,22 +185,6 @@ interface(`dbus_connect_spec_session_bus',`
 
 #######################################
 ## <summary>
-##     Creating connections to DBUS
-##     session bus.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`dbus_session_bus_client',`
-       refpolicywarn(`$0($*) has been deprecated, use 
dbus_all_session_bus_client() instead.')
-       dbus_all_session_bus_client($1)
-')
-
-#######################################
-## <summary>
 ##     Creating connections to all
 ##     DBUS session busses.
 ## </summary>
@@ -276,21 +244,6 @@ interface(`dbus_spec_session_bus_client',`
 
 #######################################
 ## <summary>
-##     Send messages to DBUS session bus.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`dbus_send_session_bus',`
-       refpolicywarn(`$0($*) has been deprecated, use 
dbus_send_all_session_bus() instead.')
-       dbus_send_all_session_bus($1)
-')
-
-#######################################
-## <summary>
 ##     Send messages to all DBUS
 ##     session busses.
 ## </summary>
@@ -399,34 +352,6 @@ interface(`dbus_manage_lib_files',`
 ##     Allow a application domain to be
 ##     started by the specified session bus.
 ## </summary>
-## <param name="role_prefix">
-##     <summary>
-##     The prefix of the user role (e.g., user
-##     is the prefix for user_r).
-##     </summary>
-## </param>
-## <param name="domain">
-##     <summary>
-##     Type to be used as a domain.
-##     </summary>
-## </param>
-## <param name="entry_point">
-##     <summary>
-##     Type of the program to be used as an
-##     entry point to this domain.
-##     </summary>
-## </param>
-#
-interface(`dbus_session_domain',`
-       refpolicywarn(`$0($*) has been deprecated, use 
dbus_all_session_domain() instead.')
-       dbus_all_session_domain($1, $2)
-')
-
-########################################
-## <summary>
-##     Allow a application domain to be
-##     started by the specified session bus.
-## </summary>
 ## <param name="domain">
 ##     <summary>
 ##     Type to be used as a domain.

diff --git a/policy/modules/contrib/dictd.if b/policy/modules/contrib/dictd.if
index 3878acc7..6feb8280 100644
--- a/policy/modules/contrib/dictd.if
+++ b/policy/modules/contrib/dictd.if
@@ -2,21 +2,6 @@
 
 ########################################
 ## <summary>
-##     Use dictionary services by connecting
-##     over TCP.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`dictd_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an dictd environment.
 ## </summary>

diff --git a/policy/modules/contrib/finger.if b/policy/modules/contrib/finger.if
index 2656d2b5..a071cfd4 100644
--- a/policy/modules/contrib/finger.if
+++ b/policy/modules/contrib/finger.if
@@ -18,17 +18,3 @@ interface(`finger_domtrans',`
        corecmd_search_bin($1)
        domtrans_pattern($1, fingerd_exec_t, fingerd_t)
 ')
-
-########################################
-## <summary>
-##     Connect to fingerd with a tcp socket.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`finger_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')

diff --git a/policy/modules/contrib/ftp.if b/policy/modules/contrib/ftp.if
index 93fd4be4..349d1b3b 100644
--- a/policy/modules/contrib/ftp.if
+++ b/policy/modules/contrib/ftp.if
@@ -20,20 +20,6 @@ interface(`ftp_dyntrans_anon_sftpd',`
 
 ########################################
 ## <summary>
-##     Connect to over ftpd over TCP.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`ftp_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Read ftpd configuration files.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/glusterfs.if 
b/policy/modules/contrib/glusterfs.if
index 0945d876..b4f5d01c 100644
--- a/policy/modules/contrib/glusterfs.if
+++ b/policy/modules/contrib/glusterfs.if
@@ -17,28 +17,6 @@
 ## </param>
 ## <rolecap/>
 #
-interface(`glusterd_admin',`
-       refpolicywarn(`$0($*) has been deprecated, use glusterfs_admin() 
instead.')
-       glusterfs_admin($1, $2)
-')
-
-########################################
-## <summary>
-##     All of the rules required to
-##     administrate an glusterfs environment.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <rolecap/>
-#
 interface(`glusterfs_admin',`
        gen_require(`
                type glusterd_t, glusterd_initrc_exec_t, glusterd_log_t;

diff --git a/policy/modules/contrib/gnome.if b/policy/modules/contrib/gnome.if
index edf4d4e6..2eb4f047 100644
--- a/policy/modules/contrib/gnome.if
+++ b/policy/modules/contrib/gnome.if
@@ -1,24 +1,5 @@
 ## <summary>GNU network object model environment.</summary>
 
-########################################
-## <summary>
-##     Role access for gnome.  (Deprecated)
-## </summary>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <param name="domain">
-##     <summary>
-##     User domain for the role.
-##     </summary>
-## </param>
-#
-interface(`gnome_role',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
 #######################################
 ## <summary>
 ##     The role template for gnome.
@@ -267,22 +248,6 @@ interface(`gnome_create_generic_home_dirs',`
 ########################################
 ## <summary>
 ##     Set attributes of generic gnome
-##     user home directories.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`gnome_setattr_config_dirs',`
-       refpolicywarn(`$0($*) has been deprecated, use 
gnome_setattr_generic_home_dirs() instead.')
-       gnome_setattr_generic_home_dirs($1)
-')
-
-########################################
-## <summary>
-##     Set attributes of generic gnome
 ##     user home directories.
 ## </summary>
 ## <param name="domain">
@@ -302,21 +267,6 @@ interface(`gnome_setattr_generic_home_dirs',`
 
 ########################################
 ## <summary>
-##     Read generic gnome user home content.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`gnome_read_config',`
-       refpolicywarn(`$0($*) has been deprecated, use 
gnome_read_generic_home_content() instead.')
-       gnome_read_generic_home_content($1)
-')
-
-########################################
-## <summary>
 ##     Read generic gnome home content.
 ## </summary>
 ## <param name="domain">
@@ -341,22 +291,6 @@ interface(`gnome_read_generic_home_content',`
 ########################################
 ## <summary>
 ##     Create, read, write, and delete
-##     generic gnome user home content.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`gnome_manage_config',`
-       refpolicywarn(`$0($*) has been deprecated, use 
gnome_manage_generic_home_content() instead.')
-       gnome_manage_generic_home_content($1)
-')
-
-########################################
-## <summary>
-##     Create, read, write, and delete
 ##     generic gnome home content.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/gpg.if b/policy/modules/contrib/gpg.if
index 4f118bf3..c4b7c4cd 100644
--- a/policy/modules/contrib/gpg.if
+++ b/policy/modules/contrib/gpg.if
@@ -125,20 +125,6 @@ interface(`gpg_spec_domtrans',`
 
 ######################################
 ## <summary>
-##     Execute gpg in the gpg web domain.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed to transition.
-##     </summary>
-## </param>
-#
-interface(`gpg_domtrans_web',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-######################################
-## <summary>
 ##     Make gpg executable files an
 ##     entrypoint for the specified domain.
 ## </summary>

diff --git a/policy/modules/contrib/i18n_input.if 
b/policy/modules/contrib/i18n_input.if
index b9082642..4e08c3cf 100644
--- a/policy/modules/contrib/i18n_input.if
+++ b/policy/modules/contrib/i18n_input.if
@@ -2,20 +2,6 @@
 
 ########################################
 ## <summary>
-##     Use i18n_input over a TCP connection.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`i18n_use',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an i18n input environment.
 ## </summary>

diff --git a/policy/modules/contrib/inetd.if b/policy/modules/contrib/inetd.if
index fbb54e7d..593cd40b 100644
--- a/policy/modules/contrib/inetd.if
+++ b/policy/modules/contrib/inetd.if
@@ -140,20 +140,6 @@ interface(`inetd_use_fds',`
 
 ########################################
 ## <summary>
-##     Connect to the inetd service using a TCP connection.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`inetd_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Run inetd child process in the
 ##     inet child domain.
 ## </summary>
@@ -174,20 +160,6 @@ interface(`inetd_domtrans_child',`
 
 ########################################
 ## <summary>
-##     Send UDP network traffic to inetd.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`inetd_udp_send',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Read and write inetd TCP sockets.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/iodine.if b/policy/modules/contrib/iodine.if
index 87e47eb2..99f1afd1 100644
--- a/policy/modules/contrib/iodine.if
+++ b/policy/modules/contrib/iodine.if
@@ -17,28 +17,6 @@
 ## </param>
 ## <rolecap/>
 #
-interface(`iodined_admin',`
-       refpolicywarn(`$0($*) has been deprecated, use iodine_admin() instead.')
-       iodine_admin($1, $2)
-')
-
-########################################
-## <summary>
-##     All of the rules required to
-##     administrate an iodined environment
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <rolecap/>
-#
 interface(`iodine_admin',`
        gen_require(`
                type iodined_t, iodined_initrc_exec_t;

diff --git a/policy/modules/contrib/jabber.if b/policy/modules/contrib/jabber.if
index 549dac1f..9a31ee51 100644
--- a/policy/modules/contrib/jabber.if
+++ b/policy/modules/contrib/jabber.if
@@ -42,20 +42,6 @@ interface(`jabber_manage_lib_files',`
 
 ########################################
 ## <summary>
-##     Connect to jabber over a TCP socket  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`jabber_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an jabber environment.
 ## </summary>

diff --git a/policy/modules/contrib/kerberos.if 
b/policy/modules/contrib/kerberos.if
index 01caeead..c8c5a37d 100644
--- a/policy/modules/contrib/kerberos.if
+++ b/policy/modules/contrib/kerberos.if
@@ -2,25 +2,6 @@
 
 ########################################
 ## <summary>
-##     Role access for kerberos.
-## </summary>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <param name="domain">
-##     <summary>
-##     User domain for the role.
-##     </summary>
-## </param>
-#
-template(`kerberos_role',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
 ##     Execute kadmind in the caller domain.
 ## </summary>
 ## <param name="domain">
@@ -339,28 +320,6 @@ interface(`kerberos_etc_filetrans_keytab',`
 
 ########################################
 ## <summary>
-##     Create a derived type for kerberos
-##     keytab files.
-## </summary>
-## <param name="prefix">
-##     <summary>
-##     The prefix to be used for deriving type names.
-##     </summary>
-## </param>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-template(`kerberos_keytab_template',`
-       refpolicywarn(`$0($*) has been deprecated.')
-       kerberos_read_keytab($2)
-       kerberos_use($2)
-')
-
-########################################
-## <summary>
 ##     Read kerberos kdc configuration files.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/ldap.if b/policy/modules/contrib/ldap.if
index b4eabc96..59752140 100644
--- a/policy/modules/contrib/ldap.if
+++ b/policy/modules/contrib/ldap.if
@@ -41,20 +41,6 @@ interface(`ldap_read_config',`
 
 ########################################
 ## <summary>
-##     Use LDAP over TCP connection.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`ldap_use',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Connect to slapd over an unix
 ##     stream socket.
 ## </summary>

diff --git a/policy/modules/contrib/mandb.if b/policy/modules/contrib/mandb.if
index 2b5d5385..e880655d 100644
--- a/policy/modules/contrib/mandb.if
+++ b/policy/modules/contrib/mandb.if
@@ -48,63 +48,6 @@ interface(`mandb_run',`
 
 ########################################
 ## <summary>
-##     Search mandb cache directories.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`mandb_search_cache',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
-##     Delete mandb cache content.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`mandb_delete_cache_content',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
-##     Read mandb cache content.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`mandb_read_cache_content',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
-##     Create, read, write, and delete
-##     mandb cache files.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`mandb_manage_cache_content',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an mandb environment.
 ## </summary>

diff --git a/policy/modules/contrib/mojomojo.if 
b/policy/modules/contrib/mojomojo.if
index 73952f4c..6680a087 100644
--- a/policy/modules/contrib/mojomojo.if
+++ b/policy/modules/contrib/mojomojo.if
@@ -1,23 +1 @@
 ## <summary>MojoMojo Wiki.</summary>
-
-########################################
-## <summary>
-##     All of the rules required to
-##     administrate an mojomojo environment.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <rolecap/>
-#
-interface(`mojomojo_admin',`
-       refpolicywarn(`$0($*) has been deprecated, use apache_admin() instead.')
-       apache_admin($1, $2)
-')

diff --git a/policy/modules/contrib/mozilla.if 
b/policy/modules/contrib/mozilla.if
index 70390632..178d68d8 100644
--- a/policy/modules/contrib/mozilla.if
+++ b/policy/modules/contrib/mozilla.if
@@ -242,21 +242,6 @@ interface(`mozilla_dontaudit_manage_user_home_files',`
 
 ########################################
 ## <summary>
-##     Execute mozilla home directory files.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`mozilla_exec_user_home_files',`
-       refpolicywarn(`$0($*) has been deprecated, use 
mozilla_exec_user_plugin_home_files() instead.')
-       mozilla_exec_user_plugin_home_files($1)
-')
-
-########################################
-## <summary>
 ##     Execute mozilla plugin home directory files.
 ## </summary>
 ## <param name="domain">
@@ -276,22 +261,6 @@ interface(`mozilla_exec_user_plugin_home_files',`
 
 ########################################
 ## <summary>
-##     Mozilla home directory file
-##     text relocation.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`mozilla_execmod_user_home_files',`
-       refpolicywarn(`$0($*) has been deprecated, use 
mozilla_execmod_user_plugin_home_files() instead.')
-       mozilla_execmod_user_plugin_home_files($1)
-')
-
-########################################
-## <summary>
 ##     Mozilla plugin home directory file
 ##     text relocation.
 ## </summary>

diff --git a/policy/modules/contrib/mpd.if b/policy/modules/contrib/mpd.if
index 384599fd..02faa37e 100644
--- a/policy/modules/contrib/mpd.if
+++ b/policy/modules/contrib/mpd.if
@@ -2,25 +2,6 @@
 
 ########################################
 ## <summary>
-##     Role access for mpd.
-## </summary>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <param name="domain">
-##     <summary>
-##     User domain for the role.
-##     </summary>
-## </param>
-#
-template(`mpd_role',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
 ##     Execute a domain transition to run mpd.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/mta.if b/policy/modules/contrib/mta.if
index 7e268b80..0602746b 100644
--- a/policy/modules/contrib/mta.if
+++ b/policy/modules/contrib/mta.if
@@ -753,20 +753,6 @@ interface(`mta_dontaudit_rw_delivery_tcp_sockets',`
 
 #######################################
 ## <summary>
-##     Connect to all mail servers over TCP.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`mta_tcp_connect_all_mailservers',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-#######################################
-## <summary>
 ##     Do not audit attempts to read
 ##     mail spool symlinks.
 ## </summary>

diff --git a/policy/modules/contrib/mysql.if b/policy/modules/contrib/mysql.if
index e7250f7f..af59114a 100644
--- a/policy/modules/contrib/mysql.if
+++ b/policy/modules/contrib/mysql.if
@@ -1,24 +1,5 @@
 ## <summary>Open source database.</summary>
 
-########################################
-## <summary>
-##     Role access for mysql.
-## </summary>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <param name="domain">
-##     <summary>
-##     User domain for the role.
-##     </summary>
-## </param>
-#
-interface(`mysql_role',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
 ######################################
 ## <summary>
 ##     Execute MySQL in the mysql domain.
@@ -263,21 +244,6 @@ interface(`mysql_manage_db_files',`
 
 ########################################
 ## <summary>
-##     Read and write mysqld database sockets.
-##     named socket.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`mysql_rw_db_sockets',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Create, read, write, and delete
 ##     mysqld home files.
 ## </summary>

diff --git a/policy/modules/contrib/nessus.if b/policy/modules/contrib/nessus.if
index f41ec5f3..57bed033 100644
--- a/policy/modules/contrib/nessus.if
+++ b/policy/modules/contrib/nessus.if
@@ -2,20 +2,6 @@
 
 ########################################
 ## <summary>
-##     Connect to nessus over a TCP socket  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`nessus_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an nessus environment.
 ## </summary>

diff --git a/policy/modules/contrib/nis.if b/policy/modules/contrib/nis.if
index 718db6ea..66a3ba28 100644
--- a/policy/modules/contrib/nis.if
+++ b/policy/modules/contrib/nis.if
@@ -215,34 +215,6 @@ interface(`nis_list_var_yp',`
 
 ########################################
 ## <summary>
-##     Send UDP network traffic to NIS clients.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`nis_udp_send_ypbind',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
-##     Connect to ypbind over TCP.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`nis_tcp_connect_ypbind',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Read ypbind pid files.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/nsd.if b/policy/modules/contrib/nsd.if
index 8ec6ec4e..e071bcd0 100644
--- a/policy/modules/contrib/nsd.if
+++ b/policy/modules/contrib/nsd.if
@@ -2,34 +2,6 @@
 
 ########################################
 ## <summary>
-##     Send and receive datagrams from NSD.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`nsd_udp_chat',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
-##     Connect to NSD over a TCP socket  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`nsd_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an nsd environment.
 ## </summary>

diff --git a/policy/modules/contrib/oident.if b/policy/modules/contrib/oident.if
index c317a3aa..95b329ef 100644
--- a/policy/modules/contrib/oident.if
+++ b/policy/modules/contrib/oident.if
@@ -2,25 +2,6 @@
 
 ########################################
 ## <summary>
-##     Role access for oident.
-## </summary>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <param name="domain">
-##     <summary>
-##     User domain for the role.
-##     </summary>
-## </param>
-#
-interface(`oident_role',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
 ##     Read oidentd user home content.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/pcscd.if b/policy/modules/contrib/pcscd.if
index b5c522d3..412c24aa 100644
--- a/policy/modules/contrib/pcscd.if
+++ b/policy/modules/contrib/pcscd.if
@@ -29,21 +29,6 @@ interface(`pcscd_domtrans',`
 ##     </summary>
 ## </param>
 #
-interface(`pcscd_read_pub_files',`
-       refpolicywarn(`$0($*) has been deprecated, use pcscd_read_pid_files() 
instead.')
-       pcscd_read_pid_files($1)
-')
-
-########################################
-## <summary>
-##     Read pcscd pid files.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
 interface(`pcscd_read_pid_files',`
        gen_require(`
                type pcscd_var_run_t;
@@ -55,36 +40,6 @@ interface(`pcscd_read_pid_files',`
 
 ########################################
 ## <summary>
-##     Create, read, write, and delete
-##     pcscd pid files.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`pcscd_manage_pub_files',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
-##     Create, read, write, and delete
-##     pcscd pid fifo files.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`pcscd_manage_pub_pipes',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
 ##     Connect to pcscd over an unix
 ##     domain stream socket.
 ## </summary>

diff --git a/policy/modules/contrib/perdition.if 
b/policy/modules/contrib/perdition.if
index 092ac614..4d69d909 100644
--- a/policy/modules/contrib/perdition.if
+++ b/policy/modules/contrib/perdition.if
@@ -2,20 +2,6 @@
 
 ########################################
 ## <summary>
-##     Connect to perdition over a TCP socket  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`perdition_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an perdition environment.
 ## </summary>

diff --git a/policy/modules/contrib/portmap.if 
b/policy/modules/contrib/portmap.if
index f0af3fe3..52208ce0 100644
--- a/policy/modules/contrib/portmap.if
+++ b/policy/modules/contrib/portmap.if
@@ -48,48 +48,6 @@ interface(`portmap_run_helper',`
 
 ########################################
 ## <summary>
-##     Send UDP network traffic to portmap.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`portmap_udp_send',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
-##     Send and receive UDP network traffic from portmap.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`portmap_udp_chat',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
-##     Connect to portmap over a TCP socket  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`portmap_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an portmap environment.
 ## </summary>

diff --git a/policy/modules/contrib/postfix.if 
b/policy/modules/contrib/postfix.if
index 19fe6132..fa17bde4 100644
--- a/policy/modules/contrib/postfix.if
+++ b/policy/modules/contrib/postfix.if
@@ -428,22 +428,6 @@ interface(`postfix_stream_connect_master',`
 
 ########################################
 ## <summary>
-##     Read and write postfix master
-##     unnamed pipes.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`postfix_rw_master_pipes',`
-       refpolicywarn(`$0($*) has been deprecated, use 
postfix_rw_inherited_master_pipes() instead.')
-       postfix_rw_inherited_master_pipes($1)
-')
-
-########################################
-## <summary>
 ##     Execute the master postdrop in the
 ##     postfix postdrop domain.
 ## </summary>
@@ -484,22 +468,6 @@ interface(`postfix_domtrans_postqueue',`
 
 #######################################
 ## <summary>
-##     Execute the master postqueue in
-##     the caller domain.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`posftix_exec_postqueue',`
-       refpolicywarn(`$0($*) has been deprecated.')
-       postfix_exec_postqueue($1)
-')
-
-#######################################
-## <summary>
 ##     Execute postfix postqueue in
 ##     the caller domain.
 ## </summary>

diff --git a/policy/modules/contrib/ppp.if b/policy/modules/contrib/ppp.if
index 0376e92f..070e565c 100644
--- a/policy/modules/contrib/ppp.if
+++ b/policy/modules/contrib/ppp.if
@@ -2,25 +2,6 @@
 
 ########################################
 ## <summary>
-##     Role access for ppp.
-## </summary>
-## <param name="role">
-##     <summary>
-##     Role allowed access.
-##     </summary>
-## </param>
-## <param name="domain">
-##     <summary>
-##     User domain for the role.
-##     </summary>
-## </param>
-#
-interface(`ppp_role',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
 ##     Create, read, write, and delete
 ##     ppp home files.
 ## </summary>

diff --git a/policy/modules/contrib/pulseaudio.if 
b/policy/modules/contrib/pulseaudio.if
index 7236f624..921e519c 100644
--- a/policy/modules/contrib/pulseaudio.if
+++ b/policy/modules/contrib/pulseaudio.if
@@ -254,21 +254,6 @@ interface(`pulseaudio_setattr_home_dir',`
 ##     </summary>
 ## </param>
 #
-interface(`pulseaudio_read_home_files',`
-       refpolicywarn(`$0($*) has been deprecated, use pulseaudio_read_home() 
instead.')
-       pulseaudio_read_home($1)
-')
-
-########################################
-## <summary>
-##     Read pulseaudio home content.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
 interface(`pulseaudio_read_home',`
        gen_require(`
                type pulseaudio_home_t;
@@ -311,22 +296,6 @@ interface(`pulseaudio_rw_home_files',`
 ##     </summary>
 ## </param>
 #
-interface(`pulseaudio_manage_home_files',`
-       refpolicywarn(`$0($*) has been deprecated, use pulseaudio_manage_home() 
instead.')
-       pulseaudio_manage_home($1)
-')
-
-########################################
-## <summary>
-##     Create, read, write, and delete
-##     pulseaudio home content.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
 interface(`pulseaudio_manage_home',`
        gen_require(`
                type pulseaudio_home_t;

diff --git a/policy/modules/contrib/radius.if b/policy/modules/contrib/radius.if
index 7703bc78..bce89c30 100644
--- a/policy/modules/contrib/radius.if
+++ b/policy/modules/contrib/radius.if
@@ -2,20 +2,6 @@
 
 ########################################
 ## <summary>
-##     Use radius over a UDP connection.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`radius_use',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an radius environment.
 ## </summary>

diff --git a/policy/modules/contrib/rpc.if b/policy/modules/contrib/rpc.if
index fbf5995d..7063c42f 100644
--- a/policy/modules/contrib/rpc.if
+++ b/policy/modules/contrib/rpc.if
@@ -52,20 +52,6 @@ template(`rpc_domain_template',`
 
 ########################################
 ## <summary>
-##     Send UDP network traffic to rpc and recieve UDP traffic from rpc.  
(Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`rpc_udp_send',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Do not audit attempts to get
 ##     attributes of export files.
 ## </summary>
@@ -298,20 +284,6 @@ interface(`rpc_udp_rw_nfs_sockets',`
 
 ########################################
 ## <summary>
-##     Send UDP traffic to NFSd.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`rpc_udp_send_nfs',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Search nfs lib directories.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/rpm.if b/policy/modules/contrib/rpm.if
index 304e97cb..016cdb2a 100644
--- a/policy/modules/contrib/rpm.if
+++ b/policy/modules/contrib/rpm.if
@@ -564,22 +564,6 @@ interface(`rpm_manage_pid_files',`
        files_search_pids($1)
 ')
 
-######################################
-## <summary>
-##     Create files in pid directories
-##     with the rpm pid file type.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`rpm_pid_filetrans',`
-       refpolicywarn(`$0($*) has been deprecated, rpm_pid_filetrans_rpm_pid() 
instead.')
-       rpm_pid_filetrans_rpm_pid($1, file)
-')
-
 ########################################
 ## <summary>
 ##     Create specified objects in pid directories

diff --git a/policy/modules/contrib/sendmail.if 
b/policy/modules/contrib/sendmail.if
index d60de843..5358d159 100644
--- a/policy/modules/contrib/sendmail.if
+++ b/policy/modules/contrib/sendmail.if
@@ -228,22 +228,6 @@ interface(`sendmail_manage_log',`
 ##     Domain allowed access.
 ##     </summary>
 ## </param>
-#
-interface(`sendmail_create_log',`
-       refpolicywarn(`$0($*) has been deprecated, use 
sendmail_log_filetrans_sendmail_log() instead.')
-       sendmail_log_filetrans_sendmail_log($1, $2, $3)
-')
-
-########################################
-## <summary>
-##     Create specified objects in generic
-##     log directories sendmail log file type.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
 ## <param name="object_class">
 ##     <summary>
 ##     Class of the object being created.

diff --git a/policy/modules/contrib/slocate.if 
b/policy/modules/contrib/slocate.if
index 1f25803d..82de1b68 100644
--- a/policy/modules/contrib/slocate.if
+++ b/policy/modules/contrib/slocate.if
@@ -2,20 +2,6 @@
 
 ########################################
 ## <summary>
-##     Create the locate log with append mode.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`slocate_create_append_log',`
-       refpolicywarn(`$0($*) has been deprecated')
-')
-
-########################################
-## <summary>
 ##     Read locate lib files.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/snmp.if b/policy/modules/contrib/snmp.if
index 96775032..d8a75680 100644
--- a/policy/modules/contrib/snmp.if
+++ b/policy/modules/contrib/snmp.if
@@ -43,20 +43,6 @@ interface(`snmp_tcp_connect',`
 
 ########################################
 ## <summary>
-##     Send and receive UDP traffic to SNMP  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`snmp_udp_chat',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     Create, read, write, and delete
 ##     snmp lib directories.
 ## </summary>

diff --git a/policy/modules/contrib/soundserver.if 
b/policy/modules/contrib/soundserver.if
index 8dc1c0f4..106e0700 100644
--- a/policy/modules/contrib/soundserver.if
+++ b/policy/modules/contrib/soundserver.if
@@ -2,20 +2,6 @@
 
 ########################################
 ## <summary>
-##     Connect to the sound server over a TCP socket  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`soundserver_tcp_connect',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     All of the rules required to
 ##     administrate an soundd environment.
 ## </summary>

diff --git a/policy/modules/contrib/squid.if b/policy/modules/contrib/squid.if
index b5adfad3..2443afbd 100644
--- a/policy/modules/contrib/squid.if
+++ b/policy/modules/contrib/squid.if
@@ -177,20 +177,6 @@ interface(`squid_manage_logs',`
 
 ########################################
 ## <summary>
-##     Use squid services by connecting over TCP.  (Deprecated)
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`squid_use',`
-       refpolicywarn(`$0($*) has been deprecated.')
-')
-
-########################################
-## <summary>
 ##     dontaudit statting tmpfs files
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/contrib/virt.if b/policy/modules/contrib/virt.if
index 8016cccb..993ee6c8 100644
--- a/policy/modules/contrib/virt.if
+++ b/policy/modules/contrib/virt.if
@@ -1069,22 +1069,6 @@ interface(`virt_rw_all_image_chr_files',`
 ########################################
 ## <summary>
 ##     Create, read, write, and delete
-##     svirt cache files.
-## </summary>
-## <param name="domain">
-##     <summary>
-##     Domain allowed access.
-##     </summary>
-## </param>
-#
-interface(`virt_manage_svirt_cache',`
-       refpolicywarn(`$0($*) has been deprecated, use virt_manage_virt_cache() 
instead.')
-       virt_manage_virt_cache($1)
-')
-
-########################################
-## <summary>
-##     Create, read, write, and delete
 ##     virt cache content.
 ## </summary>
 ## <param name="domain">

Reply via email to