Delete unused directories in base/base-files
Remove unbuilt directories and files which are note used in the build Change-Id: I2feec144ae0563584215479533176c0a94b6f649
This commit is contained in:
parent
66b9547716
commit
b0b7201758
@ -1,22 +0,0 @@
|
|||||||
[H[2J
|
|
||||||
Release xxxPLATFORM_RELEASExxx \n \l
|
|
||||||
------------------------------------------------------------------------
|
|
||||||
W A R N I N G *** W A R N I N G *** W A R N I N G *** W A R N I N G ***
|
|
||||||
------------------------------------------------------------------------
|
|
||||||
THIS IS A PRIVATE COMPUTER SYSTEM.
|
|
||||||
This computer system including all related equipment, network devices
|
|
||||||
(specifically including Internet access), are provided only for authorized use.
|
|
||||||
All computer systems may be monitored for all lawful purposes, including to
|
|
||||||
ensure that their use is authorized, for management of the system, to
|
|
||||||
facilitate protection against unauthorized access, and to verify security
|
|
||||||
procedures, survivability and operational security. Monitoring includes active
|
|
||||||
attacks by authorized personnel and their entities to test or verify the
|
|
||||||
security of the system. During monitoring, information may be examined,
|
|
||||||
recorded, copied and used for authorized purposes. All information including
|
|
||||||
personal information, placed on or sent over this system may be monitored. Uses
|
|
||||||
of this system, authorized or unauthorized, constitutes consent to monitoring
|
|
||||||
of this system. Unauthorized use may subject you to criminal prosecution.
|
|
||||||
Evidence of any such unauthorized use collected during monitoring may be used
|
|
||||||
for administrative, criminal or other adverse action. Use of this system
|
|
||||||
constitutes consent to monitoring for these purposes.
|
|
||||||
|
|
@ -1,21 +0,0 @@
|
|||||||
Release xxxPLATFORM_RELEASExxx
|
|
||||||
------------------------------------------------------------------------
|
|
||||||
W A R N I N G *** W A R N I N G *** W A R N I N G *** W A R N I N G ***
|
|
||||||
------------------------------------------------------------------------
|
|
||||||
THIS IS A PRIVATE COMPUTER SYSTEM.
|
|
||||||
This computer system including all related equipment, network devices
|
|
||||||
(specifically including Internet access), are provided only for authorized use.
|
|
||||||
All computer systems may be monitored for all lawful purposes, including to
|
|
||||||
ensure that their use is authorized, for management of the system, to
|
|
||||||
facilitate protection against unauthorized access, and to verify security
|
|
||||||
procedures, survivability and operational security. Monitoring includes active
|
|
||||||
attacks by authorized personnel and their entities to test or verify the
|
|
||||||
security of the system. During monitoring, information may be examined,
|
|
||||||
recorded, copied and used for authorized purposes. All information including
|
|
||||||
personal information, placed on or sent over this system may be monitored. Uses
|
|
||||||
of this system, authorized or unauthorized, constitutes consent to monitoring
|
|
||||||
of this system. Unauthorized use may subject you to criminal prosecution.
|
|
||||||
Evidence of any such unauthorized use collected during monitoring may be used
|
|
||||||
for administrative, criminal or other adverse action. Use of this system
|
|
||||||
constitutes consent to monitoring for these purposes.
|
|
||||||
|
|
@ -1,5 +0,0 @@
|
|||||||
[H[2J
|
|
||||||
WARNING: Unauthorized access to this system is forbidden and will be
|
|
||||||
prosecuted by law. By accessing this system, you agree that your
|
|
||||||
actions may be monitored if unauthorized usage is suspected.
|
|
||||||
|
|
@ -1,21 +0,0 @@
|
|||||||
# /etc/nsswitch.conf
|
|
||||||
#
|
|
||||||
# Example configuration of GNU Name Service Switch functionality.
|
|
||||||
# If you have the `glibc-doc' and `info' packages installed, try:
|
|
||||||
# `info libc "Name Service Switch"' for information about this file.
|
|
||||||
|
|
||||||
passwd: files ldap
|
|
||||||
group: files ldap
|
|
||||||
shadow: files ldap
|
|
||||||
|
|
||||||
hosts: files dns
|
|
||||||
networks: files
|
|
||||||
|
|
||||||
protocols: db files
|
|
||||||
services: db files
|
|
||||||
ethers: db files
|
|
||||||
rpc: db files
|
|
||||||
|
|
||||||
netgroup: nis
|
|
||||||
|
|
||||||
sudoers: files
|
|
Loading…
x
Reference in New Issue
Block a user