nostr:nprofile1qqsf03c2gsmx5ef4c9zmxvlew04gdh7u94afnknp33qvv3c94kvwxgspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qgewaehxw309a5xyu3wvdhhyctrd3jjuum0vd5kzmp0er5gcs

Is there a way for me to intercept websocket traffic using your Welshman library?

For example, when doing the bunker url connection flow.

Reply to this note

Please Login to reply.

Discussion

SATOSHI LOTTERY - FIRST DRAW!

Starting on 21st August. Every week. Every thursday. Current Prize: 5000 sats. How to participate: Zap 500 sats -> Share this post and leave a comment below. That’s it! You are in the game! Don’t miss your chance to win and grow your stack! 💰🤑

Oh I figured it out. To set the context debug to true from the library.

Thanks nostr:nprofile1qqsf03c2gsmx5ef4c9zmxvlew04gdh7u94afnknp33qvv3c94kvwxgspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qgewaehxw309a5xyu3wvdhhyctrd3jjuum0vd5kzmp0er5gcs

Yep, you can also add handlers to the socket class (via pool or makeSocket if you want to do it for all sockets)

Amazing. Get the pool, subscribe to sockets, add handlers to each socket 👌

Get absolutely murdered in websocket spam.

💯