indeed, a code search shows it's this. whew

nostr:nprofile1qqsxg45ph8gx0vdrvtzta6xal7v86frx6jvstsnvhrlvtehmwwh4epqpzamhxue69uhhyetvv9ujuvrcvd5xzapwvdhk6tcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9nhwden5te0v4jx2m3wdehhxarj9ekxzmny9ua2vh28, it appears that pokey has a really tight reconnection or request loop when it encounters an auth challenge.. 30+req/second.

do you know how this could be happening?

Reply to this note

Please Login to reply.

Discussion

it looks like the relay closes the sub and sends the auth, and pokey continues to send the same req each time it does this, in a loop

so it is pre-auth

Okay let me try to reproduce it with your relay in local, I'll keep you updated

I tried to connect to your relayandd I see no loops or weird, isn't wss://nostr21.com the address? Can you check? I used this account to test

try an auth relay like auth.nostr1.com

Wow that infinite loop was crazy AF. I just did what nostr:nprofile1qqs827g8dkd07zjvlhh60csytujgd3l9mz7x807xk3fewge7rwlukxgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qgswaehxw309ahx7um5wghx6mmd9usjfpck suggested and it worked 🎉 thank you all! I'll create a new release with the fix

awesome 🔥

Might be, looking at amethyst code it looks like you just need to use relay.send because the relay.renewfilters is called inside the send when its an auth event