feat: Rebrand Polkadot/Substrate references to PezkuwiChain

This commit systematically rebrands various references from Parity Technologies'
Polkadot/Substrate ecosystem to PezkuwiChain within the kurdistan-sdk.

Key changes include:
- Updated external repository URLs (zombienet-sdk, parity-db, parity-scale-codec, wasm-instrument) to point to pezkuwichain forks.
- Modified internal documentation and code comments to reflect PezkuwiChain naming and structure.
- Replaced direct references to  with  or specific paths within the  for XCM, Pezkuwi, and other modules.
- Cleaned up deprecated  issue and PR references in various  and  files, particularly in  and  modules.
- Adjusted image and logo URLs in documentation to point to PezkuwiChain assets.
- Removed or rephrased comments related to external Polkadot/Substrate PRs and issues.

This is a significant step towards fully customizing the SDK for the PezkuwiChain ecosystem.
This commit is contained in:
2025-12-14 00:04:10 +03:00
parent e4778b4576
commit 379cb741ed
9082 changed files with 997824 additions and 997542 deletions
@@ -34,7 +34,7 @@ use pezkuwi_node_subsystem::{
use pezkuwi_node_subsystem_util::reputation::{ReputationAggregator, REPUTATION_CHANGE_INTERVAL};
use futures::{channel::mpsc, prelude::*};
use sp_keystore::KeystorePtr;
use pezsp_keystore::KeystorePtr;
use fatality::Nested;
@@ -1096,8 +1096,8 @@ mod tests {
use super::*;
use assert_matches::assert_matches;
use pezkuwi_node_network_protocol::grid_topology::TopologyPeerInfo;
use sp_authority_discovery::AuthorityPair as AuthorityDiscoveryPair;
use sp_core::crypto::Pair as PairT;
use pezsp_authority_discovery::AuthorityPair as AuthorityDiscoveryPair;
use pezsp_core::crypto::Pair as PairT;
fn dummy_groups(group_size: usize) -> Groups {
let groups = vec![(0..(group_size as u32)).map(ValidatorIndex).collect()].into();
@@ -53,7 +53,7 @@ use pezkuwi_primitives::{
SigningContext, TransposedClaimQueue, UncheckedSignedStatement, ValidatorId, ValidatorIndex,
};
use sp_keystore::KeystorePtr;
use pezsp_keystore::KeystorePtr;
use fatality::Nested;
use futures::{
@@ -483,7 +483,7 @@ pub(crate) async fn handle_network_update<Context>(
state.unused_topologies.insert(*new_session_index, topology);
}
// TODO [https://github.com/paritytech/polkadot/issues/6194]
// TODO [https://github.com/pezkuwichain/kurdistan-sdk/issues/165]
// technically, we should account for the fact that the session topology might
// come late, and for all relay-parents with this session, send all grid peers
// any `BackedCandidateInv` messages they might need.
@@ -293,7 +293,7 @@ mod tests {
use super::*;
use pezkuwi_primitives::{Hash, SigningContext, ValidatorPair};
use sp_application_crypto::Pair as PairT;
use pezsp_application_crypto::Pair as PairT;
#[test]
fn always_provides_fresh_statements_in_order() {
@@ -1231,7 +1231,7 @@ fn delayed_reputation_changes() {
let req_protocol_names = ReqProtocolNames::new(&GENESIS_HASH, None);
let (candidate_req_receiver, req_cfg) = IncomingRequest::get_config_receiver::<
Block,
sc_network::NetworkWorker<Block, Hash>,
pezsc_network::NetworkWorker<Block, Hash>,
>(&req_protocol_names);
let mut rng = rand_chacha::ChaCha8Rng::seed_from_u64(0);
@@ -1240,7 +1240,7 @@ fn delayed_reputation_changes() {
// We can't use the test harness as we need to spawn our own subsystem with custom config.
let (context, mut virtual_overseer) =
pezkuwi_node_subsystem_test_helpers::make_subsystem_context(
sp_core::testing::TaskExecutor::new(),
pezsp_core::testing::TaskExecutor::new(),
);
let subsystem = async move {
let subsystem = crate::StatementDistributionSubsystem {
@@ -2040,7 +2040,7 @@ fn elastic_scaling_grid_statements_imported_to_backing() {
#[test]
fn advertisements_rejected_from_incorrect_peers() {
sp_tracing::try_init_simple();
pezsp_tracing::try_init_simple();
let validator_count = 6;
let group_size = 3;
let config = TestConfig {
@@ -37,11 +37,11 @@ use pezkuwi_primitives::{
GroupRotationInfo, HeadData, Header, IndexedVec, NodeFeatures, PersistedValidationData,
SessionIndex, SessionInfo, ValidatorPair, DEFAULT_SCHEDULING_LOOKAHEAD,
};
use sc_keystore::LocalKeystore;
use sc_network::ProtocolName;
use sp_application_crypto::Pair as PairT;
use sp_authority_discovery::AuthorityPair as AuthorityDiscoveryPair;
use sp_keyring::Sr25519Keyring;
use pezsc_keystore::LocalKeystore;
use pezsc_network::ProtocolName;
use pezsp_application_crypto::Pair as PairT;
use pezsp_authority_discovery::AuthorityPair as AuthorityDiscoveryPair;
use pezsp_keyring::Sr25519Keyring;
use assert_matches::assert_matches;
use codec::Encode;
@@ -93,14 +93,14 @@ struct TestState {
local: Option<TestLocalValidator>,
validators: Vec<ValidatorPair>,
session_info: SessionInfo,
req_sender: async_channel::Sender<sc_network::config::IncomingRequest>,
req_sender: async_channel::Sender<pezsc_network::config::IncomingRequest>,
node_features: NodeFeatures,
}
impl TestState {
fn from_config(
config: TestConfig,
req_sender: async_channel::Sender<sc_network::config::IncomingRequest>,
req_sender: async_channel::Sender<pezsc_network::config::IncomingRequest>,
rng: &mut impl Rng,
) -> Self {
if config.group_size == 0 {
@@ -364,9 +364,9 @@ impl TestState {
&mut self,
peer: PeerId,
request: AttestedCandidateRequest,
) -> impl Future<Output = Option<sc_network::config::OutgoingResponse>> {
) -> impl Future<Output = Option<pezsc_network::config::OutgoingResponse>> {
let (tx, rx) = futures::channel::oneshot::channel();
let req = sc_network::config::IncomingRequest {
let req = pezsc_network::config::IncomingRequest {
peer,
payload: request.encode(),
pending_response: tx,
@@ -381,7 +381,7 @@ fn test_harness<T: Future<Output = VirtualOverseer>>(
config: TestConfig,
test: impl FnOnce(TestState, VirtualOverseer) -> T,
) {
let pool = sp_core::testing::TaskExecutor::new();
let pool = pezsp_core::testing::TaskExecutor::new();
let keystore = if let LocalRole::Validator = config.local_validator {
test_helpers::mock::make_ferdie_keystore()
} else {
@@ -390,7 +390,7 @@ fn test_harness<T: Future<Output = VirtualOverseer>>(
let req_protocol_names = ReqProtocolNames::new(&GENESIS_HASH, None);
let (candidate_req_receiver, req_cfg) = IncomingRequest::get_config_receiver::<
Block,
sc_network::NetworkWorker<Block, Hash>,
pezsc_network::NetworkWorker<Block, Hash>,
>(&req_protocol_names);
let mut rng = rand_chacha::ChaCha8Rng::seed_from_u64(0);
@@ -22,7 +22,7 @@ use pezkuwi_node_network_protocol::{
request_response::v2 as request_v2, v3::BackedCandidateManifest,
};
use pezkuwi_primitives_test_helpers::{make_candidate, make_candidate_v2};
use sc_network::config::{
use pezsc_network::config::{
IncomingRequest as RawIncomingRequest, OutgoingResponse as RawOutgoingResponse,
};