feat: Rebrand Polkadot/Substrate references to PezkuwiChain

This commit systematically rebrands various references from Parity Technologies'
Polkadot/Substrate ecosystem to PezkuwiChain within the kurdistan-sdk.

Key changes include:
- Updated external repository URLs (zombienet-sdk, parity-db, parity-scale-codec, wasm-instrument) to point to pezkuwichain forks.
- Modified internal documentation and code comments to reflect PezkuwiChain naming and structure.
- Replaced direct references to  with  or specific paths within the  for XCM, Pezkuwi, and other modules.
- Cleaned up deprecated  issue and PR references in various  and  files, particularly in  and  modules.
- Adjusted image and logo URLs in documentation to point to PezkuwiChain assets.
- Removed or rephrased comments related to external Polkadot/Substrate PRs and issues.

This is a significant step towards fully customizing the SDK for the PezkuwiChain ecosystem.
This commit is contained in:
2025-12-14 00:04:10 +03:00
parent e4778b4576
commit 379cb741ed
9082 changed files with 997824 additions and 997542 deletions
@@ -22,7 +22,7 @@ use std::{
use pezkuwi_node_subsystem::prometheus::prometheus::HistogramTimer;
use pezkuwi_node_subsystem_util::metrics::{self, prometheus};
use pezkuwi_primitives::{BlockNumber, CandidateReceiptV2 as CandidateReceipt, Hash};
use sp_core::H256;
use pezsp_core::H256;
use super::collation::CollationStatus;
@@ -25,7 +25,7 @@ use futures::{
};
use metrics::{CollationStats, CollationTracker};
use schnellru::{ByLength, LruMap};
use sp_core::Pair;
use pezsp_core::Pair;
use pezkuwi_node_network_protocol::{
self as net_protocol,
@@ -85,7 +85,7 @@ const COST_APPARENT_FLOOD: Rep =
///
/// This is to protect from a single slow validator preventing collations from happening.
///
/// For considerations on this value, see: https://github.com/paritytech/polkadot/issues/4386
/// For considerations on this value, see: https://github.com/pezkuwichain/kurdistan-sdk/issues/148
const MAX_UNSHARED_UPLOAD_TIME: Duration = Duration::from_millis(150);
/// A timeout for resetting validators' interests in collations.
@@ -27,10 +27,10 @@ use futures_timer::Delay;
use codec::{Decode, Encode};
use sc_network::config::IncomingRequest as RawIncomingRequest;
use sp_core::crypto::Pair;
use sp_keyring::Sr25519Keyring;
use sp_runtime::traits::AppVerify;
use pezsc_network::config::IncomingRequest as RawIncomingRequest;
use pezsp_core::crypto::Pair;
use pezsp_keyring::Sr25519Keyring;
use pezsp_runtime::traits::AppVerify;
use itertools::Itertools;
use pezkuwi_node_network_protocol::{
@@ -200,7 +200,7 @@ type VirtualOverseer =
struct TestHarness {
virtual_overseer: VirtualOverseer,
req_v2_cfg: sc_network::config::RequestResponseConfig,
req_v2_cfg: pezsc_network::config::RequestResponseConfig,
}
fn test_harness<T: Future<Output = TestHarness>>(
@@ -209,9 +209,9 @@ fn test_harness<T: Future<Output = TestHarness>>(
reputation: ReputationAggregator,
test: impl FnOnce(TestHarness) -> T,
) {
let _ = sp_tracing::init_for_tests();
let _ = pezsp_tracing::init_for_tests();
let pool = sp_core::testing::TaskExecutor::new();
let pool = pezsp_core::testing::TaskExecutor::new();
let (context, virtual_overseer) =
pezkuwi_node_subsystem_test_helpers::make_subsystem_context(pool.clone());
@@ -221,7 +221,7 @@ fn test_harness<T: Future<Output = TestHarness>>(
let (collation_req_v2_receiver, req_v2_cfg) = IncomingRequest::get_config_receiver::<
Block,
sc_network::NetworkWorker<Block, Hash>,
pezsc_network::NetworkWorker<Block, Hash>,
>(&req_protocol_names);
let subsystem = async {
run_inner(
@@ -1325,8 +1325,8 @@ fn collators_reject_declare_messages() {
/// successful completion.
fn test_validator_send_sequence<T, F>(handle_first_response: T)
where
T: FnOnce(oneshot::Receiver<sc_network::config::OutgoingResponse>, oneshot::Sender<()>) -> F,
F: Future<Output = oneshot::Receiver<sc_network::config::OutgoingResponse>>,
T: FnOnce(oneshot::Receiver<pezsc_network::config::OutgoingResponse>, oneshot::Sender<()>) -> F,
F: Future<Output = oneshot::Receiver<pezsc_network::config::OutgoingResponse>>,
{
let test_state = TestState::default();
let local_peer_id = test_state.local_peer_id;
@@ -32,7 +32,7 @@ use futures::{
};
use pezkuwi_node_subsystem_util::reputation::ReputationAggregator;
use sp_keystore::KeystorePtr;
use pezsp_keystore::KeystorePtr;
use pezkuwi_node_network_protocol::{
request_response::{v2 as protocol_v2, IncomingRequestReceiver},
@@ -25,7 +25,7 @@ use std::{
};
use tokio_util::sync::CancellationToken;
use sp_keystore::KeystorePtr;
use pezsp_keystore::KeystorePtr;
use pezkuwi_node_network_protocol::{
self as net_protocol,
@@ -876,7 +876,7 @@ async fn process_incoming_peer_message<Context>(
) {
use protocol_v1::CollatorProtocolMessage as V1;
use protocol_v2::CollatorProtocolMessage as V2;
use sp_runtime::traits::AppVerify;
use pezsp_runtime::traits::AppVerify;
match msg {
CollationProtocols::V1(V1::Declare(collator_id, para_id, signature)) |
@@ -2366,7 +2366,7 @@ async fn handle_collation_fetch_response(
"Request timed out"
);
// For now we don't want to change reputation on timeout, to mitigate issues like
// this: https://github.com/paritytech/polkadot/issues/4617
// this: https://github.com/pezkuwichain/kurdistan-sdk/issues/152
Err(None)
},
Err(RequestError::NetworkError(err)) => {
@@ -17,10 +17,10 @@
use super::*;
use assert_matches::assert_matches;
use futures::{executor, future, Future};
use sc_network::ProtocolName;
use sp_core::{crypto::Pair, Encode};
use sp_keyring::Sr25519Keyring;
use sp_keystore::Keystore;
use pezsc_network::ProtocolName;
use pezsp_core::{crypto::Pair, Encode};
use pezsp_keyring::Sr25519Keyring;
use pezsp_keystore::Keystore;
use std::{
collections::{BTreeMap, VecDeque},
iter,
@@ -208,14 +208,14 @@ fn test_harness<T: Future<Output = VirtualOverseer>>(
ah_invulnerable_collators: HashSet<PeerId>,
test: impl FnOnce(TestHarness) -> T,
) {
sp_tracing::init_for_tests();
pezsp_tracing::init_for_tests();
let pool = sp_core::testing::TaskExecutor::new();
let pool = pezsp_core::testing::TaskExecutor::new();
let (context, virtual_overseer) =
pezkuwi_node_subsystem_test_helpers::make_subsystem_context(pool.clone());
let keystore = Arc::new(sc_keystore::LocalKeystore::in_memory());
let keystore = Arc::new(pezsc_keystore::LocalKeystore::in_memory());
Keystore::sr25519_generate_new(
&*keystore,
pezkuwi_primitives::TEYRCHAIN_KEY_TYPE_ID,
@@ -39,7 +39,7 @@ use pezkuwi_node_subsystem_util::{
runtime::recv_runtime, signing_key_and_index,
};
use pezkuwi_primitives::{Hash, Id as ParaId};
use sp_keystore::KeystorePtr;
use pezsp_keystore::KeystorePtr;
use state::State;
pub use metrics::Metrics;
@@ -15,7 +15,7 @@
// along with Pezkuwi. If not, see <http://www.gnu.org/licenses/>.
use crate::validator_side_experimental::{peer_manager::Backend, Metrics, PeerManager};
use sp_keystore::KeystorePtr;
use pezsp_keystore::KeystorePtr;
/// All state relevant for the validator side of the protocol lives here.
pub struct State<B> {