chore(deps): bump libp2p packages to latest patch versions#319
Merged
branarakic merged 1 commit intomainfrom May 2, 2026
Merged
chore(deps): bump libp2p packages to latest patch versions#319branarakic merged 1 commit intomainfrom
branarakic merged 1 commit intomainfrom
Conversation
Bumps every direct libp2p dependency in packages/core and packages/agent to the latest semver-compatible patch within the existing caret ranges. All bumps stay within the same major version — pure `pnpm update -r libp2p '@libp2p/*'`. Notable upgrades: libp2p 3.1.3 -> 3.2.3 @libp2p/circuit-relay-v2 4.1.3 -> 4.2.3 @libp2p/identify 4.0.10 -> 4.1.3 @libp2p/gossipsub 15.0.12 -> 15.0.20 @libp2p/kad-dht 16.1.3 -> 16.2.4 @libp2p/tcp 11.0.10 -> 11.0.18 @libp2p/websockets 10.1.3 -> 10.1.11 @libp2p/peer-id 6.0.4 -> 6.0.8 @libp2p/crypto 5.1.13 -> 5.1.17 @libp2p/interface 3.1.0 -> 3.2.2 @libp2p/utils (transitive) 7.0.10 -> 7.1.0 @libp2p/peer-store (transit) 12.0.10 -> 12.0.18 + autonat, dcutr, bootstrap, mdns, ping bumped to latest patch Motivation: observed a fatal `RangeError: Maximum call stack size exceeded` in the running daemon's `@libp2p/[email protected]` job-queue progress propagation, immediately after a relayed peer-store dial hit recursion. Stack trace: [fatal] Uncaught exception: RangeError: Maximum call stack size exceeded at JobRecipient.onProgress (.../@libp2p/utils/dist/src/queue/job.js:59:29) at .../job.js:61:47 at Array.forEach (<anonymous>) at JobRecipient.onProgress (.../job.js:60:37) [recursive] The 7.0.10 -> 7.1.0 changelog doesn't explicitly name this fix, but a routine patch bump is cheap, brings ~weeks of upstream fixes across the libp2p surface, and may resolve the recursion empirically. Verification: full `pnpm install` + `pnpm build` green locally (19/19 packages). Tests deferred to CI (the suite spins up real P2P networks which take 5-10 min, CI is the right gate). No package.json ranges broadened — every bump stays inside the existing caret. Rollback is `git revert` + `pnpm install --frozen-lockfile`. Co-authored-by: Cursor <[email protected]>
Contributor
|
lgtm but can't approve for some reason? |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
libp2p/@libp2p/*dependency inpackages/coreandpackages/agentto the latest semver-compatible patch — purepnpm update -r libp2p '@libp2p/*'. No range broadening, no major-version jumps.RangeError: Maximum call stack size exceededobserved in the running daemon's@libp2p/[email protected]job-queue progress propagation (full trace below).Notable upgrades
libp2p3.1.33.2.3@libp2p/circuit-relay-v24.1.34.2.3@libp2p/identify4.0.104.1.3@libp2p/gossipsub15.0.1215.0.20@libp2p/kad-dht16.1.316.2.4@libp2p/tcp11.0.1011.0.18@libp2p/websockets10.1.310.1.11@libp2p/peer-id6.0.46.0.8@libp2p/crypto5.1.135.1.17@libp2p/interface3.1.03.2.2@libp2p/autonat,@libp2p/dcutr3.0.103.0.18@libp2p/bootstrap,@libp2p/mdns12.0.1112.0.19@libp2p/ping3.0.103.1.3@libp2p/utils(transitive)7.0.107.1.0@libp2p/peer-store(transitive)12.0.1012.0.18Crash trace that motivated this
This is recursive progress propagation in
@libp2p/utils's job queue, triggered after a relayed peer-store dial fails and falls back. Reproducible by runningdkg startagainst the testnet relay set; crashes after a few minutes of normal P2P sync (we saw it at ~8 min uptime on slot a / V10-RC build).The published 7.0.10 → 7.1.0 changelog doesn't explicitly name this fix, but the patch bump is cheap and brings several weeks of upstream patches across the whole libp2p surface. If 7.1.0 doesn't fix the recursion empirically, the next step is filing an upstream issue on
libp2p/js-libp2pwith a minimal repro.Verification
pnpm installresolves cleanly (no peer-dep new warnings beyond the pre-existinghardhat-deploy → zksync-ethersone)pnpm buildgreen locally — 19/19 packages, no TS errors introducedpnpm testspins up real P2P networks — 5-10 min — CI is the right gate)Test plan for the reviewer
dkg startfrom this branch against the testnet relay set and let it sit for >15 min — should NOT exit with theJobRecipient.onProgressstack overflowRollback
git reverton the merge commit, thenpnpm install --frozen-lockfileagainst the previous lockfile.Made with Cursor