diff --git a/polkadot/node/network/bridge/src/lib.rs b/polkadot/node/network/bridge/src/lib.rs index 5d2808bb5e..1f8d89d4ea 100644 --- a/polkadot/node/network/bridge/src/lib.rs +++ b/polkadot/node/network/bridge/src/lib.rs @@ -436,6 +436,8 @@ where if !rep.is_benefit() { tracing::debug!( target: LOG_TARGET, + ?peer, + ?rep, action = "ReportPeer" ); } diff --git a/polkadot/node/network/bridge/src/network.rs b/polkadot/node/network/bridge/src/network.rs index 8eda64a2c2..e219f932e8 100644 --- a/polkadot/node/network/bridge/src/network.rs +++ b/polkadot/node/network/bridge/src/network.rs @@ -211,12 +211,6 @@ impl Network for Arc> { fn start_send(self: Pin<&mut Self>, action: NetworkAction) -> SubsystemResult<()> { match action { NetworkAction::ReputationChange(peer, cost_benefit) => { - tracing::debug!( - target: LOG_TARGET, - "Changing reputation: {:?} for {}", - cost_benefit, - peer - ); self.0.report_peer(peer, cost_benefit.into_base_rep()) } NetworkAction::DisconnectPeer(peer, peer_set) => self diff --git a/polkadot/node/network/bridge/src/validator_discovery.rs b/polkadot/node/network/bridge/src/validator_discovery.rs index 94e7fd3171..1378a457b5 100644 --- a/polkadot/node/network/bridge/src/validator_discovery.rs +++ b/polkadot/node/network/bridge/src/validator_discovery.rs @@ -89,6 +89,7 @@ impl Service { // collect multiaddress of validators let mut failed_to_resolve: usize = 0; let mut newly_requested = HashSet::new(); + let requested = validator_ids.len(); for authority in validator_ids.into_iter() { let result = authority_discovery_service.get_addresses_by_authority_id(authority.clone()).await; if let Some(addresses) = result { @@ -101,15 +102,24 @@ impl Service { let state = &mut self.state[peer_set]; // clean up revoked requests - let multiaddr_to_remove = state.previously_requested + let multiaddr_to_remove: HashSet<_> = state.previously_requested .difference(&newly_requested) .cloned() .collect(); - let multiaddr_to_add = newly_requested.difference(&state.previously_requested) + let multiaddr_to_add: HashSet<_> = newly_requested.difference(&state.previously_requested) .cloned() .collect(); state.previously_requested = newly_requested; + tracing::debug!( + target: LOG_TARGET, + ?peer_set, + ?requested, + added = multiaddr_to_add.len(), + removed = multiaddr_to_remove.len(), + ?failed_to_resolve, + "New ConnectToValidators request", + ); // ask the network to connect to these nodes and not disconnect // from them until removed from the set if let Err(e) = network_service.add_to_peers_set(