feat: Rebrand Polkadot/Substrate references to PezkuwiChain
This commit systematically rebrands various references from Parity Technologies' Polkadot/Substrate ecosystem to PezkuwiChain within the kurdistan-sdk. Key changes include: - Updated external repository URLs (zombienet-sdk, parity-db, parity-scale-codec, wasm-instrument) to point to pezkuwichain forks. - Modified internal documentation and code comments to reflect PezkuwiChain naming and structure. - Replaced direct references to with or specific paths within the for XCM, Pezkuwi, and other modules. - Cleaned up deprecated issue and PR references in various and files, particularly in and modules. - Adjusted image and logo URLs in documentation to point to PezkuwiChain assets. - Removed or rephrased comments related to external Polkadot/Substrate PRs and issues. This is a significant step towards fully customizing the SDK for the PezkuwiChain ecosystem.
This commit is contained in:
@@ -34,7 +34,7 @@ use pezkuwi_node_subsystem::{
|
||||
use pezkuwi_node_subsystem_util::reputation::{ReputationAggregator, REPUTATION_CHANGE_INTERVAL};
|
||||
|
||||
use futures::{channel::mpsc, prelude::*};
|
||||
use sp_keystore::KeystorePtr;
|
||||
use pezsp_keystore::KeystorePtr;
|
||||
|
||||
use fatality::Nested;
|
||||
|
||||
|
||||
@@ -1096,8 +1096,8 @@ mod tests {
|
||||
use super::*;
|
||||
use assert_matches::assert_matches;
|
||||
use pezkuwi_node_network_protocol::grid_topology::TopologyPeerInfo;
|
||||
use sp_authority_discovery::AuthorityPair as AuthorityDiscoveryPair;
|
||||
use sp_core::crypto::Pair as PairT;
|
||||
use pezsp_authority_discovery::AuthorityPair as AuthorityDiscoveryPair;
|
||||
use pezsp_core::crypto::Pair as PairT;
|
||||
|
||||
fn dummy_groups(group_size: usize) -> Groups {
|
||||
let groups = vec![(0..(group_size as u32)).map(ValidatorIndex).collect()].into();
|
||||
|
||||
@@ -53,7 +53,7 @@ use pezkuwi_primitives::{
|
||||
SigningContext, TransposedClaimQueue, UncheckedSignedStatement, ValidatorId, ValidatorIndex,
|
||||
};
|
||||
|
||||
use sp_keystore::KeystorePtr;
|
||||
use pezsp_keystore::KeystorePtr;
|
||||
|
||||
use fatality::Nested;
|
||||
use futures::{
|
||||
@@ -483,7 +483,7 @@ pub(crate) async fn handle_network_update<Context>(
|
||||
state.unused_topologies.insert(*new_session_index, topology);
|
||||
}
|
||||
|
||||
// TODO [https://github.com/paritytech/polkadot/issues/6194]
|
||||
// TODO [https://github.com/pezkuwichain/kurdistan-sdk/issues/165]
|
||||
// technically, we should account for the fact that the session topology might
|
||||
// come late, and for all relay-parents with this session, send all grid peers
|
||||
// any `BackedCandidateInv` messages they might need.
|
||||
|
||||
@@ -293,7 +293,7 @@ mod tests {
|
||||
use super::*;
|
||||
|
||||
use pezkuwi_primitives::{Hash, SigningContext, ValidatorPair};
|
||||
use sp_application_crypto::Pair as PairT;
|
||||
use pezsp_application_crypto::Pair as PairT;
|
||||
|
||||
#[test]
|
||||
fn always_provides_fresh_statements_in_order() {
|
||||
|
||||
@@ -1231,7 +1231,7 @@ fn delayed_reputation_changes() {
|
||||
let req_protocol_names = ReqProtocolNames::new(&GENESIS_HASH, None);
|
||||
let (candidate_req_receiver, req_cfg) = IncomingRequest::get_config_receiver::<
|
||||
Block,
|
||||
sc_network::NetworkWorker<Block, Hash>,
|
||||
pezsc_network::NetworkWorker<Block, Hash>,
|
||||
>(&req_protocol_names);
|
||||
let mut rng = rand_chacha::ChaCha8Rng::seed_from_u64(0);
|
||||
|
||||
@@ -1240,7 +1240,7 @@ fn delayed_reputation_changes() {
|
||||
// We can't use the test harness as we need to spawn our own subsystem with custom config.
|
||||
let (context, mut virtual_overseer) =
|
||||
pezkuwi_node_subsystem_test_helpers::make_subsystem_context(
|
||||
sp_core::testing::TaskExecutor::new(),
|
||||
pezsp_core::testing::TaskExecutor::new(),
|
||||
);
|
||||
let subsystem = async move {
|
||||
let subsystem = crate::StatementDistributionSubsystem {
|
||||
|
||||
@@ -2040,7 +2040,7 @@ fn elastic_scaling_grid_statements_imported_to_backing() {
|
||||
|
||||
#[test]
|
||||
fn advertisements_rejected_from_incorrect_peers() {
|
||||
sp_tracing::try_init_simple();
|
||||
pezsp_tracing::try_init_simple();
|
||||
let validator_count = 6;
|
||||
let group_size = 3;
|
||||
let config = TestConfig {
|
||||
|
||||
@@ -37,11 +37,11 @@ use pezkuwi_primitives::{
|
||||
GroupRotationInfo, HeadData, Header, IndexedVec, NodeFeatures, PersistedValidationData,
|
||||
SessionIndex, SessionInfo, ValidatorPair, DEFAULT_SCHEDULING_LOOKAHEAD,
|
||||
};
|
||||
use sc_keystore::LocalKeystore;
|
||||
use sc_network::ProtocolName;
|
||||
use sp_application_crypto::Pair as PairT;
|
||||
use sp_authority_discovery::AuthorityPair as AuthorityDiscoveryPair;
|
||||
use sp_keyring::Sr25519Keyring;
|
||||
use pezsc_keystore::LocalKeystore;
|
||||
use pezsc_network::ProtocolName;
|
||||
use pezsp_application_crypto::Pair as PairT;
|
||||
use pezsp_authority_discovery::AuthorityPair as AuthorityDiscoveryPair;
|
||||
use pezsp_keyring::Sr25519Keyring;
|
||||
|
||||
use assert_matches::assert_matches;
|
||||
use codec::Encode;
|
||||
@@ -93,14 +93,14 @@ struct TestState {
|
||||
local: Option<TestLocalValidator>,
|
||||
validators: Vec<ValidatorPair>,
|
||||
session_info: SessionInfo,
|
||||
req_sender: async_channel::Sender<sc_network::config::IncomingRequest>,
|
||||
req_sender: async_channel::Sender<pezsc_network::config::IncomingRequest>,
|
||||
node_features: NodeFeatures,
|
||||
}
|
||||
|
||||
impl TestState {
|
||||
fn from_config(
|
||||
config: TestConfig,
|
||||
req_sender: async_channel::Sender<sc_network::config::IncomingRequest>,
|
||||
req_sender: async_channel::Sender<pezsc_network::config::IncomingRequest>,
|
||||
rng: &mut impl Rng,
|
||||
) -> Self {
|
||||
if config.group_size == 0 {
|
||||
@@ -364,9 +364,9 @@ impl TestState {
|
||||
&mut self,
|
||||
peer: PeerId,
|
||||
request: AttestedCandidateRequest,
|
||||
) -> impl Future<Output = Option<sc_network::config::OutgoingResponse>> {
|
||||
) -> impl Future<Output = Option<pezsc_network::config::OutgoingResponse>> {
|
||||
let (tx, rx) = futures::channel::oneshot::channel();
|
||||
let req = sc_network::config::IncomingRequest {
|
||||
let req = pezsc_network::config::IncomingRequest {
|
||||
peer,
|
||||
payload: request.encode(),
|
||||
pending_response: tx,
|
||||
@@ -381,7 +381,7 @@ fn test_harness<T: Future<Output = VirtualOverseer>>(
|
||||
config: TestConfig,
|
||||
test: impl FnOnce(TestState, VirtualOverseer) -> T,
|
||||
) {
|
||||
let pool = sp_core::testing::TaskExecutor::new();
|
||||
let pool = pezsp_core::testing::TaskExecutor::new();
|
||||
let keystore = if let LocalRole::Validator = config.local_validator {
|
||||
test_helpers::mock::make_ferdie_keystore()
|
||||
} else {
|
||||
@@ -390,7 +390,7 @@ fn test_harness<T: Future<Output = VirtualOverseer>>(
|
||||
let req_protocol_names = ReqProtocolNames::new(&GENESIS_HASH, None);
|
||||
let (candidate_req_receiver, req_cfg) = IncomingRequest::get_config_receiver::<
|
||||
Block,
|
||||
sc_network::NetworkWorker<Block, Hash>,
|
||||
pezsc_network::NetworkWorker<Block, Hash>,
|
||||
>(&req_protocol_names);
|
||||
let mut rng = rand_chacha::ChaCha8Rng::seed_from_u64(0);
|
||||
|
||||
|
||||
@@ -22,7 +22,7 @@ use pezkuwi_node_network_protocol::{
|
||||
request_response::v2 as request_v2, v3::BackedCandidateManifest,
|
||||
};
|
||||
use pezkuwi_primitives_test_helpers::{make_candidate, make_candidate_v2};
|
||||
use sc_network::config::{
|
||||
use pezsc_network::config::{
|
||||
IncomingRequest as RawIncomingRequest, OutgoingResponse as RawOutgoingResponse,
|
||||
};
|
||||
|
||||
|
||||
Reference in New Issue
Block a user