Set the routing table ip limits back to defaults (#2470)
This commit is contained in:
parent
5ae5bd8b69
commit
94340037bf
|
@ -224,7 +224,7 @@ type
|
|||
desc:
|
||||
"Maximum amount of nodes with the same IP in the routing table. " &
|
||||
"This option is currently required as many nodes are running from " &
|
||||
"the same machines. The option will be removed/adjusted in the future",
|
||||
"the same machines. The option might be removed/adjusted in the future",
|
||||
defaultValue: defaultPortalProtocolConfig.tableIpLimits.tableIpLimit,
|
||||
defaultValueDesc: $defaultTableIpLimitDesc,
|
||||
name: "table-ip-limit"
|
||||
|
@ -235,7 +235,7 @@ type
|
|||
desc:
|
||||
"Maximum amount of nodes with the same IP in the routing table's buckets. " &
|
||||
"This option is currently required as many nodes are running from " &
|
||||
"the same machines. The option will be removed/adjusted in the future",
|
||||
"the same machines. The option might be removed/adjusted in the future",
|
||||
defaultValue: defaultPortalProtocolConfig.tableIpLimits.bucketIpLimit,
|
||||
defaultValueDesc: $defaultBucketIpLimitDesc,
|
||||
name: "bucket-ip-limit"
|
||||
|
|
|
@ -48,12 +48,7 @@ const
|
|||
revalidationTimeout* = chronos.seconds(30)
|
||||
|
||||
defaultPortalProtocolConfig* = PortalProtocolConfig(
|
||||
# TODO / IMPORTANT NOTE:
|
||||
# This must be set back to `DefaultTableIpLimits` as soon as there are
|
||||
# enough nodes in the Portal network that we don't need to rely on the
|
||||
# Fluffy fleet. Currently, during development, convenience is taken above
|
||||
# security, this must not remain.
|
||||
tableIpLimits: TableIpLimits(tableIpLimit: 32, bucketIpLimit: 16),
|
||||
tableIpLimits: DefaultTableIpLimits,
|
||||
bitsPerHop: DefaultBitsPerHop,
|
||||
radiusConfig: defaultRadiusConfig,
|
||||
)
|
||||
|
|
Loading…
Reference in New Issue