@@ -293,7 +293,7 @@ func (e *connectionedEndpoint) swapPeerCredsLocked(ctx context.Context, cend Con
293293}
294294
295295// BidirectionalConnect implements BoundEndpoint.BidirectionalConnect.
296- func (e * connectionedEndpoint ) BidirectionalConnect (ctx context.Context , ce ConnectingEndpoint , returnConnect func (Receiver , ConnectedEndpoint ), opts UnixSocketOpts ) * syserr.Error {
296+ func (e * connectionedEndpoint ) BidirectionalConnect (ctx context.Context , ce ConnectingEndpoint , returnConnect func (Receiver , ConnectedEndpoint )) * syserr.Error {
297297 if ce .Type () != e .stype {
298298 return syserr .ErrWrongProtocolForSocket
299299 }
@@ -400,13 +400,13 @@ func (e *connectionedEndpoint) BidirectionalConnect(ctx context.Context, ce Conn
400400}
401401
402402// UnidirectionalConnect implements BoundEndpoint.UnidirectionalConnect.
403- func (e * connectionedEndpoint ) UnidirectionalConnect (ctx context.Context , opts UnixSocketOpts ) (ConnectedEndpoint , * syserr.Error ) {
403+ func (e * connectionedEndpoint ) UnidirectionalConnect (ctx context.Context ) (ConnectedEndpoint , * syserr.Error ) {
404404 return nil , syserr .ErrConnectionRefused
405405}
406406
407407// Connect attempts to directly connect to another Endpoint.
408408// Implements Endpoint.Connect.
409- func (e * connectionedEndpoint ) Connect (ctx context.Context , server BoundEndpoint , opts UnixSocketOpts ) * syserr.Error {
409+ func (e * connectionedEndpoint ) Connect (ctx context.Context , server BoundEndpoint ) * syserr.Error {
410410 returnConnect := func (r Receiver , ce ConnectedEndpoint ) {
411411 e .receiver = r
412412 e .connected = ce
@@ -418,7 +418,7 @@ func (e *connectionedEndpoint) Connect(ctx context.Context, server BoundEndpoint
418418 }
419419 }
420420
421- return server .BidirectionalConnect (ctx , e , returnConnect , opts )
421+ return server .BidirectionalConnect (ctx , e , returnConnect )
422422}
423423
424424// Listen starts listening on the connection.
@@ -460,15 +460,15 @@ func (e *connectionedEndpoint) Listen(ctx context.Context, backlog int) *syserr.
460460}
461461
462462// Accept accepts a new connection.
463- func (e * connectionedEndpoint ) Accept (ctx context.Context , peerAddr * Address , opts UnixSocketOpts ) (Endpoint , * syserr.Error ) {
463+ func (e * connectionedEndpoint ) Accept (ctx context.Context , peerAddr * Address ) (Endpoint , * syserr.Error ) {
464464 e .Lock ()
465465
466466 if ! e .ListeningLocked () {
467467 e .Unlock ()
468468 return nil , syserr .ErrInvalidEndpointState
469469 }
470470
471- ne , err := e .getAcceptedEndpointLocked (ctx , opts )
471+ ne , err := e .getAcceptedEndpointLocked (ctx )
472472 e .Unlock ()
473473 if err != nil {
474474 return nil , err
@@ -492,7 +492,7 @@ func (e *connectionedEndpoint) Accept(ctx context.Context, peerAddr *Address, op
492492// Preconditions:
493493// - e.Listening()
494494// - e is locked.
495- func (e * connectionedEndpoint ) getAcceptedEndpointLocked (ctx context.Context , opts UnixSocketOpts ) (* connectionedEndpoint , * syserr.Error ) {
495+ func (e * connectionedEndpoint ) getAcceptedEndpointLocked (ctx context.Context ) (* connectionedEndpoint , * syserr.Error ) {
496496 // Accept connections from within the sentry first, since this avoids
497497 // an RPC to the gofer on the common path.
498498 select {
@@ -515,7 +515,7 @@ func (e *connectionedEndpoint) getAcceptedEndpointLocked(ctx context.Context, op
515515 return nil , syserr .FromError (err )
516516 }
517517 q := & waiter.Queue {}
518- scme , serr := NewSCMEndpoint (nfd , q , e .path , opts )
518+ scme , serr := NewSCMEndpoint (nfd , q , e .path )
519519 if serr != nil {
520520 unix .Close (nfd )
521521 return nil , serr
0 commit comments