indeed, a code search shows it's this. whew
nostr:nprofile1qqsxg45ph8gx0vdrvtzta6xal7v86frx6jvstsnvhrlvtehmwwh4epqpzamhxue69uhhyetvv9ujuvrcvd5xzapwvdhk6tcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9nhwden5te0v4jx2m3wdehhxarj9ekxzmny9ua2vh28, it appears that pokey has a really tight reconnection or request loop when it encounters an auth challenge.. 30+req/second.
do you know how this could be happening?
Mmmm this might be related to the latests changes nostr:nprofile1qqs827g8dkd07zjvlhh60csytujgd3l9mz7x807xk3fewge7rwlukxgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qgswaehxw309ahx7um5wghx6mmd9usjfpck ?? - nostr:nprofile1qqs8eseg5zxak2hal8umuaa7laxgxjyll9uhyxp86c522shn9gj8crspz9mhxue69uhkummnw3ezuamfdejj7qgjwaehxw309ahx7um5wgerztnrdakj7qgwwaehxw309ahx7uewd3hkctc58hv2s are you able to say if the reason is an invalid auth?
it looks like the relay closes the sub and sends the auth, and pokey continues to send the same req each time it does this, in a loop
so it is pre-auth
Okay let me try to reproduce it with your relay in local, I'll keep you updated
I tried to connect to your relayandd I see no loops or weird, isn't wss://nostr21.com the address? Can you check? I used this account to test
try an auth relay like auth.nostr1.com
Wow that infinite loop was crazy AF. I just did what nostr:nprofile1qqs827g8dkd07zjvlhh60csytujgd3l9mz7x807xk3fewge7rwlukxgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qgswaehxw309ahx7um5wghx6mmd9usjfpck suggested and it worked 🎉 thank you all! I'll create a new release with the fix
Hum, seems like it's still happening from time to time, I'll need to take a deeper look into it
nostr:nevent1qqs8hsydmlf08mt8yezfp6fsyyc59gfs3qsfhw9960cg28w80gpn6gcpzemhxue69uhhwmm59ehx7um5wgh8qctjw3uj7q3qv3tgrwwsv7c6xckyhm5dmluc05jxd4yeqhpxew87chn0kua0tjzqxpqqqqqqzhqjty5
Might be, looking at amethyst code it looks like you just need to use relay.send because the relay.renewfilters is called inside the send when its an auth event