chore: sc-network full update to 0.55.1#413
Conversation
Co-authored-by: Ethan Cemer <tylercemer@gmail.com>
|
@codex review this PR |
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 423af7bf75
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
| // NOTE: 24 is somewhat arbitrary and should be tuned in the future if | ||
| // necessary. See <https://github.com/paritytech/substrate/pull/6080> | ||
| .with_per_connection_event_buffer_size(24) | ||
| .with_max_negotiating_inbound_streams(2048) |
There was a problem hiding this comment.
Restore inbound stream negotiation limit for busy bootnodes
The swarm config now sets .with_max_negotiating_inbound_streams(2048), which reverts the earlier higher cap used in this fork to absorb large bursts of concurrent inbound substream opens (DHT, sync, notifications). On high-fan-in nodes (especially bootnodes), hitting this lower ceiling can drop negotiations and degrade peer connectivity/discovery under load. Please keep the higher limit (or make it configurable) to avoid a production reliability regression.
Useful? React with 👍 / 👎.
| @@ -250,7 +246,6 @@ impl DiscoveryConfig { | |||
| config.set_kbucket_inserts(BucketInserts::Manual); | |||
| config.disjoint_query_paths(kademlia_disjoint_query_paths); | |||
There was a problem hiding this comment.
Keep enlarged Kademlia packet size in discovery setup
DiscoveryConfig::finish no longer applies an explicit max Kademlia packet size before enabling provider settings. This removes the fork-specific protection that allowed large FIND_NODE responses from bootnodes; falling back to the library default can cause oversized responses to be discarded, which hurts peer discovery in larger networks. Reintroducing the packet-size override (or equivalent) avoids that regression.
Useful? React with 👍 / 👎.
|
I have everything I need. Let me compile the review. PR #413 Review — Impact on the Peer‑Ban Tolerance FixShort answerYour "don't immediately ban peers on timeout" fix is not affected by this PR. The tolerance logic lives in Where the fix livesPlus the block‑request back‑off in
Nothing under BUT — two sibling hardenings ARE being silently revertedThese live in the very file set the PR rewrites and are in the same spirit as the ban‑tolerance fix (helping slow / overloaded bootnodes). They matter because tighter buffers produce more timeouts, which — even with your threshold — eventually trip drops. 1. Inbound stream budget cut 8x in PR 413 inlines literals and reverts 2. Kademlia packet size limit removed in PR 413 deletes both the const and the Other things worth flagging (not related to the peer‑ban fix)
RecommendationApprove the ban‑tolerance part — it's untouched and the APIs it calls are stable. Before merging, ask the author to either:
Also confirm |
|
"Restore MAX_NEGOTIATING_INBOUND_STREAMS = 16384 and the set_max_packet_size(2 MiB) call (preserving the original rationale comments), or I do not recall changing these values |
No description provided.