Skip to content
This repository was archived by the owner on Nov 15, 2023. It is now read-only.
Closed
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
75 commits
Select commit Hold shift + click to select a range
18c7d88
adding boilerplate for adding bls crypto
drskalman Dec 9, 2021
b86768c
First scratches to add bls crypto to primities/core and beefy.
drskalman Dec 10, 2021
fd75c93
suggested solution during BEEFY meeting for making BEEFY BLS compatible
drskalman Feb 15, 2022
322ad00
Merge remote-tracking branch 'origin/master' into skalman-bls-beefy
drskalman Feb 15, 2022
f7fca6d
- fix dependencies on arkwork and bls library.
drskalman Mar 10, 2022
5e8f2ea
to discuss HKDK with Al
drskalman May 9, 2022
2912fa1
resolve compilation errors for primitives/core/src/bls.rs
drskalman May 26, 2022
86b1e3a
resolve bls test compilation error, 6 tests still failing
drskalman May 31, 2022
2b59fa0
- change dependancy patches to repos available on github.
drskalman Jun 1, 2022
b602e7a
Merge branch 'master' of https://github.com/paritytech/substrate into…
drskalman Jun 1, 2022
68fd3a2
overwrite Cargo.lock from upstream and cargo-update to reslove Cargo.…
drskalman Jun 1, 2022
59d665e
add `bls_generate_new` and `bls_public_keys` to CryptoStore
drskalman Jun 14, 2022
857f85e
- implement host api `bls_public_keys, bls_generate, bls_sign,
drskalman Jun 14, 2022
a1ed112
- Adapt `primitives/beefy/src/commitment.rs and witness.rs` to have
drskalman Jun 28, 2022
b936150
implement TestNOPAggregatableSignature for Merkle based commitment.
drskalman Jul 4, 2022
1df925c
adapt an pass test for merkle root aggregator
drskalman Jul 5, 2022
28596f2
rust-fmtize
drskalman Jul 5, 2022
577cc68
add test for commitment containing aggregated bls signature.
drskalman Jul 7, 2022
0f53f28
make different traits for keystore for ecdsa-only and ecdsa-bls beefy…
drskalman Jul 18, 2022
fed0bbc
reverse the idea of validator aggregating received bls signature
drskalman Jul 21, 2022
7de89ae
make beefy primitve test compile and pass
drskalman Jul 23, 2022
5379e62
implement `should_convert_dually_signed_commitment_to_witness` test
drskalman Jul 25, 2022
7bdb082
Merge branch 'skalman-bls-beefy' into skalman-bls-beefy-client
drskalman Jul 25, 2022
1661c19
separate impl for ECDSA and BLS keystore
drskalman Aug 5, 2022
6a1c26f
Merge branch 'skalman-bls-beefy-client' of https://github.com/drskalm…
drskalman Aug 11, 2022
ab682ce
add bls support to LocalKeyStore
drskalman Aug 16, 2022
231a38e
implement `BeefyBLSKeystore` and `BeefyBLSnECDSAKeystore`
drskalman Aug 16, 2022
1847516
Make BeefyKeyStore generic for Beefy Worker
drskalman Aug 24, 2022
cc3a9d6
add BeefyKeystore generic type to GossipValidator so it can turn
drskalman Aug 30, 2022
e0d8740
adapt BEEFY GossipValidator to a generic Keystore
drskalman Sep 1, 2022
ea40ab9
- resolve errors in ECDSAnBLSKeystore implementation.
drskalman Sep 9, 2022
9349cac
clone keys on the fly while iterating.
drskalman Sep 12, 2022
787f80d
- rename `beefy::crypto` to `beefy:ecdsa_crypto`.
drskalman Sep 16, 2022
ab1c2f3
Merge branch 'skalman-bls-beefy' into skalman-bls-beefy-client
drskalman Sep 16, 2022
f48c8eb
- Make `BeefyApi` trait to distinguish between AuthorityId and PublicKey
drskalman Sep 19, 2022
d7044f8
share changes to beefy client to find solution to authority id problem
drskalman Sep 21, 2022
524debf
adapt Beefy Worker, GossipValidator and Round to Generic AuthId and T…
drskalman Sep 22, 2022
c8db18f
- Resolve conflict between Public and AuthId
drskalman Sep 24, 2022
95f6845
Merge branch 'master' into skalman-beefy-authority-id-adventures
drskalman Sep 26, 2022
50b2f9b
- updated tests to new bls library changes.
drskalman Oct 17, 2022
4c905a8
Merge branch 'master' into skalman-beefy-authority-id-adventures
drskalman Oct 18, 2022
5c89709
make all new Network and Communication objects depends on `AuthId` a…
drskalman Oct 18, 2022
782734d
- do not depend on rand default features (std).
drskalman Oct 26, 2022
2b9cc3c
minor changes and remove patching parity common.
drskalman Oct 27, 2022
8ebb239
move bls-like branch specification from patch to dep due to the cargo
drskalman Oct 29, 2022
a147238
- make all beefy tests generic over AuthityId, Signature and Keystore.
drskalman Oct 31, 2022
6cdc680
make `create_worker` generic on Keystore
drskalman Nov 4, 2022
95e283a
make Keyring generic over key type - down to 97 errors
drskalman Nov 25, 2022
d93fca0
implement keyring enum instead of wrapping it in a struct
drskalman Dec 8, 2022
accfaf7
- Re-apply BeefyVerify changes.
drskalman Dec 8, 2022
61d5168
First step in implementing Pair trait for ECDSAnBLS crypto
drskalman Dec 11, 2022
b03a4ce
- introduce `SimpleKeyPair` to make `Keyring` generic over key pair type
drskalman Dec 16, 2022
015e2a9
fix over hashing for bls_sign in the keystore
drskalman Dec 16, 2022
5022b7e
beefy `public_keys_works` test fails because the keystore forgets the…
drskalman Dec 19, 2022
2add57c
make testing infrastructure in `client/beefy/src/tests.rs` generic ov…
drskalman Jan 11, 2023
670c0cf
implement `beefy_finalizing_blocks_using_ecdsa_signature` though it o…
drskalman Jan 16, 2023
c6acac6
- implement beefy_finalizing_blocks_using_ecdsa_n_bls_signature
drskalman Jan 17, 2023
789a5a8
- making `new_finality_proof`,`lagging_validators`,`correct_beefy_pay…
drskalman Jan 17, 2023
1165d7c
make `voter_initialization`, `on_demand_beefy_justification_sync` gen…
drskalman Jan 17, 2023
1aaf6be
- Re-active tests and make helpers in beefy/worker.rs to crypto
drskalman Jan 18, 2023
59f10a4
implement keystore_vs_validator_set test for ecdsa and ecdsa_n_bls pa…
drskalman Jan 18, 2023
84a9902
depends on arkworks 0.4.0
drskalman Jan 25, 2023
744fe42
- use `store.authority_id` istead of key.contains in `keystore::publi…
drskalman Jan 29, 2023
6eaa95d
make beefy justification tests generic over keytype
drskalman Jan 30, 2023
18d5a59
- make rounds tests generic over key type
drskalman Jan 30, 2023
a010852
Merge branch 'master' into skalman-beefy-authority-id-adventures
drskalman Jan 31, 2023
d323ca7
make beefy client build after merging with master.
drskalman Feb 2, 2023
e53c9c8
adapt old test to new tokio style. new tests has been commented out.
drskalman Feb 3, 2023
d0c790a
new beefy tests in worker and tests adapted to generic key model
drskalman Feb 3, 2023
e08387f
- specify `AuthId` and `TSignature` when calling `load_persitent` oth…
drskalman Feb 4, 2023
3be0a82
get rid of redundant imports and fix all warnings.
drskalman Feb 4, 2023
42c894b
cargo fmt beefy primitives
drskalman Feb 4, 2023
469aadb
cargo fmt beefy client, keystore client and primitives, primitives
drskalman Feb 4, 2023
73657c5
Add `AuthoritySetCommitment` field to `BeefyAuthoritySet` needed by A…
drskalman Feb 24, 2023
096f94d
- depend on default branch of bls-like and apk-proofs.
drskalman Mar 13, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
get rid of redundant imports and fix all warnings.
  • Loading branch information
drskalman committed Feb 4, 2023
commit 3be0a828706782d488343143b289bc6efbd0eb5f
6 changes: 3 additions & 3 deletions client/beefy/src/aux_schema.rs
Original file line number Diff line number Diff line change
Expand Up @@ -81,11 +81,11 @@ pub(crate) mod tests {
use crate::tests::{BeefyTestNet, BeefyAuthIdMaker};
use sc_network_test::TestNetFactory;

use crate::keystore::{BeefyKeystore, BeefyECDSAKeystore, BeefyBLSnECDSAKeystore, tests::{SimpleKeyPair}};
use crate::keystore::{BeefyKeystore, BeefyECDSAKeystore, BeefyBLSnECDSAKeystore};

use beefy_primitives::{
ecdsa_crypto::{AuthorityId, Public as ECDSAPublic, Signature as ECDSASignature, self, Pair as ECDSAKeyPair},
bls_crypto::{Public as BLSPublic, Signature as BLSSignature, self},
ecdsa_crypto::{Public as ECDSAPublic, Signature as ECDSASignature},
bls_crypto::{Public as BLSPublic, Signature as BLSSignature},
};


Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,9 +18,9 @@

//! Generating request logic for request/response protocol for syncing BEEFY justifications.
use std::{fmt::Debug, marker::PhantomData};
use codec::{Codec, Decode, Encode};
use codec::{Decode, Encode};

use beefy_primitives::{BeefyApi, ValidatorSet};
use beefy_primitives::{ValidatorSet};
use futures::channel::{oneshot, oneshot::Canceled};
use log::{debug, warn};
use parking_lot::Mutex;
Expand All @@ -29,7 +29,6 @@ use sc_network_common::{
request_responses::{IfDisconnected, RequestFailure},
service::NetworkRequest,
};
use sp_api::ProvideRuntimeApi;
use sp_runtime::traits::{Block, NumberFor};
use std::{collections::VecDeque, result::Result, sync::Arc};

Expand Down
2 changes: 1 addition & 1 deletion client/beefy/src/import.rs
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
// along with this program. If not, see <https://www.gnu.org/licenses/>.

use std::{fmt::Debug, marker::PhantomData};
use codec::{Codec, Decode, Encode};
use codec::{Decode, Encode};

use beefy_primitives::{BeefyApi, BEEFY_ENGINE_ID};
use log::debug;
Expand Down
6 changes: 3 additions & 3 deletions client/beefy/src/justification.rs
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ fn verify_with_validator_set<Block: BlockT, AuthId: Encode + Decode + Debug + Cl
#[cfg(test)]
pub(crate) mod tests {
use beefy_primitives::{
known_payloads, Commitment, Payload, SignedCommitment, VersionedFinalityProof, ecdsa_crypto::{self, Public as ECDSAPublic, Signature as ECDSASignature, Pair as ECDSAKeyPair},
known_payloads, Commitment, Payload, SignedCommitment, VersionedFinalityProof, ecdsa_crypto::{Public as ECDSAPublic, Signature as ECDSASignature, Pair as ECDSAKeyPair},
bls_crypto::{Public as BLSPublic, Signature as BLSSignature},
};
use substrate_test_runtime_client::runtime::Block;
Expand Down Expand Up @@ -181,7 +181,7 @@ pub(crate) mod tests {

#[test]
fn should_verify_with_validator_set_with_ecdsa_keys() {
should_verify_with_validator_set::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>();
should_verify_with_validator_set::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>();
}

#[test]
Expand Down Expand Up @@ -214,7 +214,7 @@ pub(crate) mod tests {

#[test]
fn should_decode_and_verify_finality_proof_with_ecdsa_keys() {
should_decode_and_verify_finality_proof::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>();
should_decode_and_verify_finality_proof::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>();
}

#[test]
Expand Down
11 changes: 3 additions & 8 deletions client/beefy/src/keystore.rs
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ use sp_application_crypto::RuntimeAppPublic;
use sp_core::keccak_256;
use sp_keystore::{SyncCryptoStore, SyncCryptoStorePtr};
use sp_runtime::traits::Keccak256;
use sp_application_crypto::Pair;

use log::warn;

Expand All @@ -35,8 +36,6 @@ use core::fmt::Debug;

use crate::{error, LOG_TARGET};

use sp_core::bls::Pair as BLSPair;
use sp_application_crypto::Pair as app_crypto_Pair;
/// A BEEFY specific keystore implemented as a `Newtype`. This is basically a
/// wrapper around [`sp_keystore::SyncCryptoStore`] and allows to customize
/// common cryptographic functionality.
Expand Down Expand Up @@ -288,8 +287,6 @@ impl BeefyKeystore<(ECDSAPublic,BLSPublic), (ECDSASignature,BLSSignature)> for B
}

fn public_keys(&self) -> Result<Vec<Self::Public>, error::Error> {
let store = self.0.clone().ok_or_else(|| error::Error::Keystore("no Keystore".into()))?;

let bls_n_ecdsa = self.both();
let pk : Vec<Self::Public> = bls_n_ecdsa.0.public_keys()?.into_iter().zip(bls_n_ecdsa.1.public_keys()?.into_iter()).collect();

Expand Down Expand Up @@ -336,17 +333,15 @@ pub mod tests {
use std::sync::Arc;

use sc_keystore::LocalKeystore;
use sp_core::{ecdsa, bls, keccak_256, Pair, crypto::{SecretStringError}};
use sp_keystore::{SyncCryptoStore, SyncCryptoStorePtr, CryptoStore};
use sp_core::{ecdsa, keccak_256, Pair, crypto::{SecretStringError}};
use sp_keystore::{SyncCryptoStore, SyncCryptoStorePtr,};
use sp_application_crypto::Wraps;

use beefy_primitives::{ecdsa_crypto, bls_crypto, KEY_TYPE};
use sp_runtime::testing::TestSignature;

use super::{BeefyKeystore, BeefyECDSAKeystore, BeefyBLSnECDSAKeystore, ECDSAPublic, ECDSASignature, BLSPublic, BLSSignature};
use codec::{Decode, Encode};
use core::fmt::Debug;
use std::marker::PhantomData;

use crate::error::Error;

Expand Down
5 changes: 2 additions & 3 deletions client/beefy/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
// along with this program. If not, see <https://www.gnu.org/licenses/>.

use core::fmt::Debug;
use codec::{Codec, Decode, Encode};
use codec::{Decode, Encode};

use crate::{
communication::{
Expand All @@ -36,7 +36,7 @@ use crate::{
worker::PersistedState,
};
use beefy_primitives::{
ecdsa_crypto::AuthorityId, BeefyApi, MmrRootHash, PayloadProvider, ValidatorSet, BEEFY_ENGINE_ID,
BeefyApi, MmrRootHash, PayloadProvider, ValidatorSet, BEEFY_ENGINE_ID,
GENESIS_AUTHORITY_SET_ID,
};
use futures::{stream::Fuse, StreamExt};
Expand All @@ -53,7 +53,6 @@ use sp_blockchain::{
Backend as BlockchainBackend, Error as ClientError, HeaderBackend, Result as ClientResult,
};
use sp_consensus::{Error as ConsensusError, SyncOracle};
use sp_keystore::SyncCryptoStorePtr;
use sp_mmr_primitives::MmrApi;
use sp_runtime::{
generic::BlockId,
Expand Down
8 changes: 4 additions & 4 deletions client/beefy/src/round.rs
Original file line number Diff line number Diff line change
Expand Up @@ -17,8 +17,8 @@
// along with this program. If not, see <https://www.gnu.org/licenses/>.

use std::{
collections::{BTreeMap, HashMap},
hash::Hash, marker::PhantomData,
collections::{BTreeMap},
hash::Hash,
};

use core::fmt::Debug;
Expand Down Expand Up @@ -190,13 +190,13 @@ mod tests {


use beefy_primitives::{
ecdsa_crypto::{self, Public as ECDSAPublic, Signature as ECDSASignature, Pair as ECDSAKeyPair},
ecdsa_crypto::{self, Public as ECDSAPublic, Signature as ECDSASignature,},
bls_crypto::{Public as BLSPublic, Signature as BLSSignature},
ValidatorSet};
use codec::{Decode, Encode};

use super::{threshold, Block as BlockT, Hash, RoundTracker, Rounds};
use crate::{keystore::{ BeefyECDSAKeystore, BeefyBLSnECDSAKeystore, tests::{Keyring, GenericKeyring, SimpleKeyPair, ECDSAnBLSPair}}, tests::BeefyAuthIdMaker,};
use crate::{keystore::{ tests::{Keyring, GenericKeyring, SimpleKeyPair, ECDSAnBLSPair}}};


impl<P, B, AuthId, TSignature> Rounds<P, B, AuthId, TSignature>
Expand Down
38 changes: 19 additions & 19 deletions client/beefy/src/tests.rs
Original file line number Diff line number Diff line change
Expand Up @@ -33,12 +33,12 @@ use crate::{
PersistedState,
};
use beefy_primitives::{
ecdsa_crypto::{AuthorityId, Public as ECDSAPublic, Signature as ECDSASignature, self, Pair as ECDSAKeyPair},
bls_crypto::{Public as BLSPublic, Signature as BLSSignature, self},
ecdsa_crypto::{AuthorityId as ECDSAAuthorityId, Public as ECDSAPublic, Signature as ECDSASignature, Pair as ECDSAKeyPair},
bls_crypto::{AuthorityId as BLSAuthorityId, Public as BLSPublic, Signature as BLSSignature},
known_payloads,
mmr::MmrRootProvider,
BeefyApi, Commitment, ConsensusLog, MmrRootHash, Payload, SignedCommitment, ValidatorSet,
VersionedFinalityProof, BEEFY_ENGINE_ID, KEY_TYPE as BeefyKeyType,
VersionedFinalityProof, BEEFY_ENGINE_ID,
};
use futures::{future, stream::FuturesUnordered, Future, StreamExt};
use parking_lot::Mutex;
Expand All @@ -58,7 +58,7 @@ use serde::{Deserialize, Serialize};
use sp_api::{ApiRef, ProvideRuntimeApi};
use sp_consensus::BlockOrigin;
use sp_core::H256;
use sp_keystore::{testing::KeyStore as TestKeystore, SyncCryptoStore, SyncCryptoStorePtr};
use sp_keystore::{SyncCryptoStorePtr};
use sp_mmr_primitives::{EncodableOpaqueLeaf, Error as MmrError, MmrApi, Proof};
use sp_runtime::{
codec::{Encode, Decode},
Expand Down Expand Up @@ -336,7 +336,7 @@ create_test_api!(
fn add_mmr_digest(header: &mut Header, mmr_hash: MmrRootHash) {
header.digest_mut().push(DigestItem::Consensus(
BEEFY_ENGINE_ID,
ConsensusLog::<AuthorityId>::MmrRoot(mmr_hash).encode(),
ConsensusLog::<ECDSAAuthorityId>::MmrRoot(mmr_hash).encode(),
));
}

Expand All @@ -354,15 +354,15 @@ pub(crate) trait BeefyAuthIdMaker : Clone + Encode + Decode + Debug + Ord + Sync
fn make_beefy_ids(keys: &[Keyring]) -> Vec<Self>;
}

impl BeefyAuthIdMaker for ecdsa_crypto::AuthorityId
impl BeefyAuthIdMaker for ECDSAAuthorityId
{
fn make_beefy_ids(keys: &[Keyring]) -> Vec<Self> {
keys.iter().map(|&key| <Keyring as GenericKeyring<ecdsa_crypto::Pair>>::public(key).into()).collect()
keys.iter().map(|&key| <Keyring as GenericKeyring<ECDSAKeyPair>>::public(key).into()).collect()

}
}

impl BeefyAuthIdMaker for (ecdsa_crypto::AuthorityId, bls_crypto::AuthorityId)
impl BeefyAuthIdMaker for (ECDSAAuthorityId, BLSAuthorityId)
{
fn make_beefy_ids(keys: &[Keyring]) -> Vec<Self> {
keys.iter().map(|&key| <Keyring as GenericKeyring<ECDSAnBLSPair>>::public(key).into()).collect()
Expand Down Expand Up @@ -668,7 +668,7 @@ where TKeyPair : SimpleKeyPair + SimpleKeyPair<Public = AuthId> + 'static,

#[tokio::test]
async fn beefy_finalizing_blocks_using_ecdsa_signature() {
beefy_finalizing_blocks::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
beefy_finalizing_blocks::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
}

#[tokio::test]
Expand Down Expand Up @@ -758,12 +758,12 @@ where TKeyPair : SimpleKeyPair + SimpleKeyPair<Public = AuthId> + 'static,

#[tokio::test]
async fn lagging_validators_with_ecdsa_crypto() {
beefy_finalizing_blocks::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
lagging_validators::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
}

#[tokio::test]
async fn lagging_validators_with_ecdsa_n_bls_crypto() {
beefy_finalizing_blocks::<ECDSAnBLSPair, (ECDSAPublic,BLSPublic), (ECDSASignature,BLSSignature), BeefyBLSnECDSAKeystore>().await;
lagging_validators::<ECDSAnBLSPair, (ECDSAPublic,BLSPublic), (ECDSASignature,BLSSignature), BeefyBLSnECDSAKeystore>().await;
}

async fn correct_beefy_payload<TKeyPair, AuthId, TSignature, TBeefyKeystore>()
Expand Down Expand Up @@ -829,7 +829,7 @@ where TKeyPair : SimpleKeyPair + SimpleKeyPair<Public = AuthId> + 'static,

#[tokio::test]
async fn correct_beefy_payload_with_ecdsa_signature() {
correct_beefy_payload::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
correct_beefy_payload::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
}

#[tokio::test]
Expand All @@ -843,7 +843,7 @@ where TKeyPair : SimpleKeyPair + SimpleKeyPair<Public = AuthId, Signature = TSig
AuthId: Clone + Encode + Decode + Debug + Ord + Sync + Send + BeefyAuthIdMaker + std::hash::Hash + 'static,
TSignature: Encode + Decode + Debug + Clone + Sync + Send + std::cmp::PartialEq + 'static,
{
use futures::{future::poll_fn, task::Poll};
use futures::{future::poll_fn};
use sc_block_builder::BlockBuilderProvider;
use sc_client_api::BlockBackend;

Expand Down Expand Up @@ -990,7 +990,7 @@ where TKeyPair : SimpleKeyPair + SimpleKeyPair<Public = AuthId, Signature = TSig

#[tokio::test]
async fn beefy_importing_blocks_with_ecdsa_signature() {
beefy_importing_blocks::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
beefy_importing_blocks::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
}

#[tokio::test]
Expand Down Expand Up @@ -1037,7 +1037,7 @@ where TKeyPair : SimpleKeyPair + SimpleKeyPair<Public = AuthId, Signature = TSig

#[tokio::test]
async fn voter_initialization_with_ecdsa_crypto() {
voter_initialization::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
voter_initialization::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
}

#[tokio::test]
Expand Down Expand Up @@ -1129,7 +1129,7 @@ where TKeyPair : SimpleKeyPair + SimpleKeyPair<Public = AuthId, Signature = TSig

#[tokio::test]
async fn on_demand_beefy_justification_sync_with_ecdsa_signature() {
on_demand_beefy_justification_sync::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
on_demand_beefy_justification_sync::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
}

#[tokio::test]
Expand Down Expand Up @@ -1188,7 +1188,7 @@ where TKeyPair : SimpleKeyPair + SimpleKeyPair<Public = AuthId, Signature = TSig

#[tokio::test]
async fn should_initialize_voter_at_genesis_with_ecdsa_signature() {
should_initialize_voter_at_genesis::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
should_initialize_voter_at_genesis::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
}

#[tokio::test]
Expand Down Expand Up @@ -1260,7 +1260,7 @@ where TKeyPair : SimpleKeyPair + SimpleKeyPair<Public = AuthId, Signature = TSig

#[tokio::test]
async fn should_initialize_voter_when_last_final_is_session_boundary_with_ecdsa_signature() {
should_initialize_voter_when_last_final_is_session_boundary::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
should_initialize_voter_when_last_final_is_session_boundary::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
}

#[tokio::test]
Expand Down Expand Up @@ -1331,7 +1331,7 @@ where TKeyPair : SimpleKeyPair + SimpleKeyPair<Public = AuthId, Signature = TSig

#[tokio::test]
async fn should_initialize_voter_at_latest_finalized_with_ecdsa_signature() {
should_initialize_voter_at_latest_finalized::<ecdsa_crypto::Pair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
should_initialize_voter_at_latest_finalized::<ECDSAKeyPair, ECDSAPublic, ECDSASignature, BeefyECDSAKeystore>().await;
}

#[tokio::test]
Expand Down
Loading