-
Notifications
You must be signed in to change notification settings - Fork 1.2k
Extra websocket calls during .cat(cid) #2938
Comments
.cat(cid)
This is probably because the remote nodes report loopback addresses in their list of multiaddrs and libp2p dials them all trying to make a connection. @jacobheun could libp2p filter the addresses it's about to dial, removing say, anything with a loopback address that has the same port that the dialing node is listening on? |
Yes, but this won't solve this problem. In the browser you won't likely be listening on that loopback address, so you'll still get these errors. There are some things I think we can do here though, while it's not strictly a problem, this could help us avoid the extraneous dials.
|
Closing this as this will be fixed on #3427 by updating |
Hello, so basically I'm seeing websocket logs that are a little curious in my setup when doing a
.cat
call. So started looking into it because I'm hoping reducing those would improve performance of those calls if we can indeed reduce anything extraneous.I currently have a

js-ipfs
node in the browser (version 0.41.2). It's connecting to a private network ofgo-ipfs
nodes we have over websockets (using a custom protector and the swarm key for libp2p). I get the content back fine but between logging the request and logging my response I see the following:Further down after getting the content, I also see these:

It appears though it's trying to dial on the localhost and private IPs of those nodes, even though I added them to swarm peers using the public IP. And those are extra calls because I get my content fine despite those errors.
The text was updated successfully, but these errors were encountered: