Set the routing table ip limits back to defaults (#2470)

This commit is contained in:
Kim De Mey 2024-07-10 17:26:30 +02:00 committed by GitHub
parent 5ae5bd8b69
commit 94340037bf
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 3 additions and 8 deletions

View File

@ -224,7 +224,7 @@ type
desc:
"Maximum amount of nodes with the same IP in the routing table. " &
"This option is currently required as many nodes are running from " &
"the same machines. The option will be removed/adjusted in the future",
"the same machines. The option might be removed/adjusted in the future",
defaultValue: defaultPortalProtocolConfig.tableIpLimits.tableIpLimit,
defaultValueDesc: $defaultTableIpLimitDesc,
name: "table-ip-limit"
@ -235,7 +235,7 @@ type
desc:
"Maximum amount of nodes with the same IP in the routing table's buckets. " &
"This option is currently required as many nodes are running from " &
"the same machines. The option will be removed/adjusted in the future",
"the same machines. The option might be removed/adjusted in the future",
defaultValue: defaultPortalProtocolConfig.tableIpLimits.bucketIpLimit,
defaultValueDesc: $defaultBucketIpLimitDesc,
name: "bucket-ip-limit"

View File

@ -48,12 +48,7 @@ const
revalidationTimeout* = chronos.seconds(30)
defaultPortalProtocolConfig* = PortalProtocolConfig(
# TODO / IMPORTANT NOTE:
# This must be set back to `DefaultTableIpLimits` as soon as there are
# enough nodes in the Portal network that we don't need to rely on the
# Fluffy fleet. Currently, during development, convenience is taken above
# security, this must not remain.
tableIpLimits: TableIpLimits(tableIpLimit: 32, bucketIpLimit: 16),
tableIpLimits: DefaultTableIpLimits,
bitsPerHop: DefaultBitsPerHop,
radiusConfig: defaultRadiusConfig,
)