fence_virt: Remove remaining references to checkpoints

Remove all remaining references to the checkpoint backend plugin,
which has been removed.

Signed-off-by: Ryan McCabe <rmccabe@redhat.com>
This commit is contained in:
Ryan McCabe 2017-05-29 14:45:59 -04:00
parent b0aa3ad784
commit f075a5b45b
2 changed files with 7 additions and 14 deletions

View File

@ -17,10 +17,6 @@
MA 02139, USA. MA 02139, USA.
*/ */
/* /*
* @file fence_virtd.c: Implementation of server daemon for Xen virtual
* machine fencing. This uses SA AIS CKPT b.1.0 checkpointing API to
* store virtual machine states.
*
* Author: Lon Hohberger <lhh at redhat.com> * Author: Lon Hohberger <lhh at redhat.com>
*/ */
#include <stdio.h> #include <stdio.h>
@ -197,7 +193,6 @@ send_multicast_packets(ip_list_t *ipl, fence_virt_args_t *args,
sizeof(struct sockaddr_in)); sizeof(struct sockaddr_in));
tgt = (struct sockaddr *)&tgt4; tgt = (struct sockaddr *)&tgt4;
tgt_len = sizeof(tgt4); tgt_len = sizeof(tgt4);
} else if (args->net.family == PF_INET6) { } else if (args->net.family == PF_INET6) {
mc_sock = ipv6_send_sk(ipa->ipa_address, args->net.addr, mc_sock = ipv6_send_sk(ipa->ipa_address, args->net.addr,
args->net.port, args->net.port,

View File

@ -116,12 +116,10 @@ plugin is used (you could, if you wanted, use 'direct serial' with
'cluster cpg', or 'multicast' with 'RHEV-H' for example). 'cluster cpg', or 'multicast' with 'RHEV-H' for example).
These plugins must also be able to discover where appropriate. For These plugins must also be able to discover where appropriate. For
example, the Checkpoint plugin can only be used if corosync/openais example, the cpg plugin can only be used if corosync/openais
is running. Likewise, the RHEV-M plugin may only be used in the is running. A defined plugin preference order should be specified/documented
cases where the host operating system is a RHEV-H. A defined plugin so that the host daemon behaves in a predictable manner in absence of
preference order should be specified/documented so that the host host-side configuration data (about which plugin to use).
daemon behaves in a predictable manner in absence of host-side
configuration data (about which plugin to use).
[1] TCP was also explored, however, the security is much better [1] TCP was also explored, however, the security is much better