consul: kill unused struct fields

pull/336/head
Ryan Uber 2014-09-29 13:01:26 -07:00
parent a163db2269
commit 9d01174521
4 changed files with 1 additions and 11 deletions

View File

@ -131,8 +131,6 @@ type KeyringInfo struct {
Datacenter string Datacenter string
Pool string Pool string
NumNodes int NumNodes int
NumResp int
NumErr int
Error string Error string
} }
@ -686,8 +684,6 @@ func (i *AgentRPC) handleKeyring(client *rpcClient, seq uint64, cmd string) erro
Datacenter: kr.Datacenter, Datacenter: kr.Datacenter,
Pool: pool, Pool: pool,
NumNodes: kr.NumNodes, NumNodes: kr.NumNodes,
NumResp: kr.NumResp,
NumErr: kr.NumErr,
Error: kr.Error, Error: kr.Error,
} }
r.Info = append(r.Info, info) r.Info = append(r.Info, info)

View File

@ -81,9 +81,7 @@ func (m *Internal) ingestKeyringResponse(
Datacenter: m.srv.config.Datacenter, Datacenter: m.srv.config.Datacenter,
Messages: serfResp.Messages, Messages: serfResp.Messages,
Keys: serfResp.Keys, Keys: serfResp.Keys,
NumResp: serfResp.NumResp,
NumNodes: serfResp.NumNodes, NumNodes: serfResp.NumNodes,
NumErr: serfResp.NumErr,
Error: errStr, Error: errStr,
}) })
} }

View File

@ -548,8 +548,6 @@ type KeyringResponse struct {
Messages map[string]string Messages map[string]string
Keys map[string]int Keys map[string]int
NumNodes int NumNodes int
NumResp int
NumErr int
Error string Error string
} }

View File

@ -14,9 +14,7 @@ distributing new encryption keys to the cluster, retiring old encryption keys,
and changing the keys used by the cluster to encrypt messages. and changing the keys used by the cluster to encrypt messages.
Because Consul utilizes multiple gossip pools, this command will only operate Because Consul utilizes multiple gossip pools, this command will only operate
against a server node for most operations. By default, all operations carried against a server node for most operations.
out by this command are run against the LAN gossip pool in the datacenter of the
agent.
Consul allows multiple encryption keys to be in use simultaneously. This is Consul allows multiple encryption keys to be in use simultaneously. This is
intended to provide a transition state while the cluster converges. It is the intended to provide a transition state while the cluster converges. It is the