diff --git a/targeted/domains/program/postfix.te b/targeted/domains/program/postfix.te
index 8bdbfb3f..25ec4c47 100644
--- a/targeted/domains/program/postfix.te
+++ b/targeted/domains/program/postfix.te
@@ -77,8 +77,8 @@ dontaudit postfix_master_t security_t:dir search;
 read_sysctl(postfix_master_t)
 
 ifdef(`targeted_policy', `
-bool disable_postfix_trans false;
-if (!disable_postfix_trans) {
+bool postfix_disable_trans false;
+if (!postfix_disable_trans) {
 ')
 domain_auto_trans(initrc_t, postfix_master_exec_t, postfix_master_t)
 allow initrc_t postfix_master_t:process { noatsecure siginh rlimitinh };
diff --git a/targeted/macros/program/apache_macros.te b/targeted/macros/program/apache_macros.te
index a1422bec..a0d0e5ff 100644
--- a/targeted/macros/program/apache_macros.te
+++ b/targeted/macros/program/apache_macros.te
@@ -108,7 +108,7 @@ allow httpd_$1_script_t httpd_$1_script_rw_t:sock_file rw_file_perms;
 ra_dir_file(httpd_$1_script_t, httpd_$1_script_ra_t)
 anonymous_domain(httpd_$1_script)
 
-if (httpd_enable_cgi && httpd_unified ifdef(`targeted_policy', ` && ! httpd_disable_trans')) {
+if (httpd_enable_cgi && httpd_unified) {
 create_dir_file(httpd_$1_script_t, httpdcontent)
 can_exec(httpd_$1_script_t, httpdcontent)
 }
@@ -153,11 +153,11 @@ apache_domain($1)
 
 typeattribute httpd_$1_content_t $1_file_type;
 
-if (httpd_enable_cgi && httpd_unified ifdef(`targeted_policy', ` && ! httpd_disable_trans')) {
+if (httpd_enable_cgi && httpd_unified) {
 domain_auto_trans($1_t, httpdcontent, httpd_$1_script_t)
 }
 
-if (httpd_enable_cgi ifdef(`targeted_policy', ` && ! httpd_disable_trans')) {
+if (httpd_enable_cgi) {
 # If a user starts a script by hand it gets the proper context
 domain_auto_trans($1_t, httpd_$1_script_exec_t, httpd_$1_script_t)
 }