Struct DeclareAffidavit

Source
pub(crate) struct DeclareAffidavit<T: Config> {
    pub by: T::Public,
    pub at: BlockNumberFor<T>,
}
Expand description

Operational context for affidavit declaration and key rotation.

This type represents the contextual information required to declare an affidavit using the active affidavit key and rotate it to the next key during the routine lifecycle.

Declaration is a sequential, retry-driven routine that executes as part of the looped offchain workflow. It is entered only after the initialization phase guarantees that a active-tagged affidavit key-pair is available, and after the election phase has either completed successfully or been safely skipped due to unmet constraints.

§Notes

  • This is not a transaction payload.
  • This type is never submitted on-chain.
  • It is used internally during:
    • next affidavit key resolution
    • declaration payload composition (including next public key for rotation)
    • payload signing using the active affidavit key-pair
    • submission of the declare-affidavit extrinsic

§Dependency: InitAffidavitKey and optimistic TryElection

This routine has a hard dependency on the initialization phase and a soft (optimistic) dependency on the election phase.

It requires that:

  • a active-tagged affidavit key exists in offchain storage and the its key-pair in local keystore (guaranteed by InitAffidavitKey), and
  • election has either completed successfully or has been safely skipped due to unmet constraints.

Election may execute before declaration as part of the global retry loop, but its outcome does not directly gate declaration correctness. However, failures during election invalidate system invariants and therefore redirect control back to InitAffidavitKey for repair and re-validation before declaration is retried.

§Fork Awareness

  • The at field captures the block number at which the declaration process begins.
  • When executed via offchain workers, this context must tolerate forks, re-orgs, and speculative execution.
  • Implementors must ensure idempotency and re-entrancy safety.

§Declaration Flow

The routine fetches the active-tagged affidavit key-pair, resolves the next affidavit key (mirroring the affidavit-key-initialization logic), verifies the declaration window and eligibility, composes the declaration payload along with the next affidavit public key, signs it with the active affidavit key-pair, and submits the declaration transaction to rotate the active affidavit key to next affidavit key.

Failures or inconsistencies re-enter the initialization phase to re-validate offchain storage and keystore invariants.

loop {
    // Ensure active-tagged affidavit key-pair is available
    InitAffidavitKey::ensure_active_affidavit_key();

    // Fetch affidavit key pair (offchain storage reference + keystore-pair)
    let key_pair = fetch_affidavit_key_pair();
    // Attempt election optimistically; failure requires repair + retry
    if TryElection::attempt_election_if_applicable().is_err() {
        continue; // re-enter initialization phase
    }

    // Resolve next affidavit key using the offchain-storage references +
    // keystore pair consistency guarantees as InitAffidavitKey
    if !offchain_storage.has_next_affidavit_key()
        || !keystore.has_next_affidavit_key()
    {
        keystore.create_or_repair_next_affidavit_key();
        offchain_storage.ensure_next_affidavit_key_reference();
        continue; // retry until next key reaches consistency
    }

    let next_key_to_rotate = fetch_next_affidavit_key();

    if !within_affidavit_window() || !eligible_to_declare() {
        continue; // retry via initialization phase
    }

    let payload = compose_declare_affidavit_payload(next_key_to_rotate);

    match sign_payload_with(key_pair)
        .and_then(|payload| submit_declare_affidavit_extrinsic(payload)) {
        Ok(_) => break,     // declaration + rotation completed
        Err(_) => continue, // retry via initialization phase
    }
}

§Guarantee

This routine declares the affidavit and rotates the active key only when:

  • a active-tagged affidavit key-pair is available,
  • the next affidavit key is initiated and present in the local keystore,
  • declaration window and eligibility constraints are satisfied,
  • and the declaration transaction is successfully submitted.

In all other cases, the routine retries by re-entering the affidavit key initialization phase to repair and re-validate offchain storage and keystore consistency.

All behavior is supplied by trait implementations operating on this type.

§FlowChart

Fields§

§by: T::Public

Raw application public key identifying the affidavit key-pair in the local keystore.

§at: BlockNumberFor<T>

Block number at which the affidavit declaration process started.

Used exclusively for logging and diagnostic purposes.

Trait Implementations§

Source§

impl<T: Clone + Config> Clone for DeclareAffidavit<T>
where T::Public: Clone,

Source§

fn clone(&self) -> DeclareAffidavit<T>

Returns a duplicate of the value. Read more
1.0.0 · Source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
Source§

impl<T> Debug for DeclareAffidavit<T>
where T: Debug + Config,

Source§

fn fmt(&self, fmt: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
Source§

impl<T: Config> Decode for DeclareAffidavit<T>
where T::Public: Decode, BlockNumberFor<T>: Decode,

Source§

fn decode<__CodecInputEdqy: Input>( __codec_input_edqy: &mut __CodecInputEdqy, ) -> Result<Self, Error>

Attempt to deserialise the value from input.
§

fn decode_into<I>( input: &mut I, dst: &mut MaybeUninit<Self>, ) -> Result<DecodeFinished, Error>
where I: Input,

Attempt to deserialize the value from input into a pre-allocated piece of memory. Read more
§

fn skip<I>(input: &mut I) -> Result<(), Error>
where I: Input,

Attempt to skip the encoded value from input. Read more
§

fn encoded_fixed_size() -> Option<usize>

Returns the fixed encoded size of the type. Read more
Source§

impl<T: Config> Encode for DeclareAffidavit<T>
where T::Public: Encode, BlockNumberFor<T>: Encode,

Source§

fn size_hint(&self) -> usize

If possible give a hint of expected size of the encoding. Read more
Source§

fn encode_to<__CodecOutputEdqy: Output + ?Sized>( &self, __codec_dest_edqy: &mut __CodecOutputEdqy, )

Convert self to a slice and append it to the destination.
§

fn encode(&self) -> Vec<u8>

Convert self to an owned vector.
§

fn using_encoded<R, F>(&self, f: F) -> R
where F: FnOnce(&[u8]) -> R,

Convert self to a slice and then invoke the given closure with it.
§

fn encoded_size(&self) -> usize

Calculates the encoded size. Read more
Source§

impl<T: Config> FinalizedOffchainStorageError<T, <T as Config>::AccountId> for DeclareAffidavit<T>

Finality-specific invariant errors for the next affidavit key.

These errors are emitted when semantic inconsistencies are detected between fork-aware and persistent storage layers.

Such conditions indicate partial or invalid state, and the storage layer automatically performs cleanup before returning these errors.

Source§

fn hanging_hash() -> Self::Error

Emitted when a speculative fork-aware hash exists without a corresponding persistent ledger entry.

Source§

fn hanging_value() -> Self::Error

Emitted when persistent storage contains no value corresponding to an existing speculative (fork-aware) hash.

Source§

type Error = Error<T>

Concrete error type chosen by the caller. Read more
Source§

impl<T: Config> FinalizedPolicy<T> for DeclareAffidavit<T>

Finality evaluation policy for the next affidavit key.

This implementation reuses the finality parameters defined by InitAffidavitKey, ensuring that both the active and next affidavit keys are evaluated under identical confidence guarantees.

§Design Rationale

Every routine that uses Finalized storage:

  • must define exactly one finality policy, and
  • that policy is scoped to the routine, not to the storage backend.

Since the next affidavit key participates in the same operational lifecycle as the active affidavit key (generation -> observation -> rotation), it is intentionally governed by the same time- and observation-based confidence thresholds.

§Invariants
  • Finalized storage is strictly constrained:
    • one logical value per routine,
    • one finality policy per value.
  • Unlike ForkAware or Persistent storage backends, Finalized does not allow multiple independent values or heterogeneous policies.

Reusing the policy from InitAffidavitKey preserves these invariants while avoiding duplicated configuration and potential divergence.

Source§

fn finality_after() -> <T as Config>::Moment

Wall-clock delay required before confidence evaluation begins.

Source§

fn finality_ticks() -> BlockNumberFor<T>

Number of block-scoped observations required to reach strong confidence.

Source§

impl<T: Config> MaxEncodedLen for DeclareAffidavit<T>
where T::Public: MaxEncodedLen, BlockNumberFor<T>: MaxEncodedLen,

Source§

fn max_encoded_len() -> usize

Upper bound, in bytes, of the maximum encoded size of this item.
Source§

impl<T: Config> OffchainStorageError<ForkAware<T, ValueHash, DeclareAffidavit<T>, Pallet<T>>> for DeclareAffidavit<T>

Error policy for fork-aware speculative storage of the next affidavit key.

This implementation defines how storage-layer failures originating from fork-aware offchain storage are surfaced as routine-specific DispatchError values.

These errors relate exclusively to the speculative identity (ValueHash) used to track the next affidavit key across forks.

Any failure reported here:

  • is logged exactly once by the storage layer,
  • and returned unchanged to the caller.
Source§

fn decode_failed() -> Self::Error

Returned when decoding the speculative hash fails.

Indicates corrupted or unexpected fork-local storage state.

Source§

fn concurrent_mutation() -> Self::Error

Returned when a concurrent mutation of the speculative hash is detected.

Indicates overlapping OCW executions or race conditions.

Source§

type Error = Error<T>

Caller-defined error type used for storage failures. Read more
Source§

impl<T: Config> OffchainStorageError<Persistent<T, Ledger<T, <T as Config>::AccountId>, DeclareAffidavit<T>>> for DeclareAffidavit<T>

Error policy for persistent finalized storage of the next affidavit key.

This implementation defines error signaling for failures that occur while interacting with the persistent observation ledger backing the Finalized storage model.

These errors concern the finalized value and its observation history, not speculative fork-local state.

Source§

fn decode_failed() -> Self::Error

Returned when decoding the persistent ledger entry fails.

Indicates corrupted or incompatible persisted offchain data.

Source§

fn concurrent_mutation() -> Self::Error

Returned when a concurrent mutation of the persistent ledger is detected.

Indicates contention between multiple OCW executions.

Source§

type Error = Error<T>

Caller-defined error type used for storage failures. Read more
Source§

impl<T: PartialEq + Config> PartialEq for DeclareAffidavit<T>
where T::Public: PartialEq,

Source§

fn eq(&self, other: &DeclareAffidavit<T>) -> bool

Tests for self and other values to be equal, and is used by ==.
1.0.0 · Source§

fn ne(&self, other: &Rhs) -> bool

Tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
Source§

impl<T: Config> RoutineOf<<T as SigningTypes>::Public, <<<T as Config>::Block as HeaderProvider>::HeaderT as Header>::Number> for DeclareAffidavit<T>

Declares the authorization requirements for the DeclareAffidavit routine.

This implementation specifies who is permitted to execute the routine at a given point in time.

The routine is restricted to the node’s active affidavit key. This ensures that affidavit declarations are signed only by the currently designated, rotated operational key, rather than by long-term authority or stash keys.

The returned T::Public value represents the concrete public key that must be used to sign the affidavit payload at the given block number.

Source§

fn who(at: &BlockNumberFor<T>) -> Result<T::Public, Self::Logger>

Determines which public key is authorized to execute this routine.

§Why this check exists

Affidavit declarations are security-sensitive operations. To reduce the blast radius of key compromise and to support regular key rotation, only the currently active affidavit key is permitted to authorize this routine.

The active affidavit key:

  • is stored and ensured by Finalized offchain storage,
  • is expected to have a corresponding key pair in the node’s keystore,
  • and must be explicitly initialized before this routine can run.
§Failure semantics
  • Any storage inconsistency is treated as a hard error, since it indicates corrupted or unexpected node state.
  • If no active affidavit key is configured, the caller is considered misconfigured and execution is refused.
  • If the active affidavit key exists but the corresponding key pair is missing from the keystore, execution is refused.
Source§

impl<T: Config> Routines<<<<T as Config>::Block as HeaderProvider>::HeaderT as Header>::Number> for DeclareAffidavit<T>

Offchain routine responsible for affidavit declaration and preparing key rotation for the next election cycle.

§What an affidavit represents

Declaring an affidavit signals that an author:

  • is ready to participate in the upcoming election, and
  • satisfies all protocol-defined requirements (e.g. backing, support).

An affidavit:

  • is submitted via an unsigned extrinsic,
  • is allowed only within a bounded affidavit window, and
  • is restricted to valid authors holding the correct operational role.
§Responsibilities of this routine

This OCW routine performs the offchain coordination required to:

  1. Verify that affidavit submission is currently permitted.
  2. Ensure a next affidavit key exists and is finalized.
  3. Submit the declare extrinsic using the active affidavit key.
  4. Attach the next affidavit key for rotation into the upcoming session.
§Key separation and security
  • Long-term authority / stash keys are never used here.
  • All signing is performed using ephemeral affidavit keys managed via application crypto and rotated regularly.
  • This minimizes the blast radius of key compromise and enables strict lifecycle enforcement.
§Execution model

This routine is designed to be optimistic and non-blocking:

  • It may be executed before the node has fully completed validation via validate extrinsic.
  • Runtime-side checks ultimately decide whether the extrinsic succeeds.
  • Failures are logged and retried automatically in later OCW executions.

This makes the routine safe to run repeatedly without risking inconsistent on-chain state.

Source§

fn can_run(&self) -> Result<(), Self::Logger>

Determines whether the affidavit declaration routine may proceed.

§Semantics
  • Ensures that a next affidavit key exists in finalized offchain storage, else initiates and finalizes one.
  • Verifies that the current affidavit key is eligible to submit an affidavit in the runtime.
§Key handling
  • The active affidavit key (self.by) must already exist in the node’s keystore.
  • Author primary keys are never consulted.
§Optimistic execution

This function may be called before the author has successfully executed the on-chain validate.

That is safe because:

  • Runtime-side checks enforce correctness.
  • This routine merely prepares and submits the transaction.

If the author has not yet validated their affidavit key on-chain, the submission will be rejected harmlessly.

Source§

fn run_service(&self) -> Result<(), Self::Logger>

Submits the declare extrinsic.

§Preconditions
  • The active affidavit key is authorized and present in the keystore.
  • The next affidavit key exists and has reached sufficient finality.
§Behavior
  • Signs the affidavit payload using the current affidavit key.
  • Includes the next affidavit key for rotation.
  • Submits the extrinsic to the transaction pool.
§Important notes
  • This routine does not apply any on-chain state changes itself.
  • It only submits a transaction; actual effects occur later during block execution.
  • Any failure is logged and retried in future OCW runs.
Source§

fn on_ran_service(&self)

Logs a info message on a successful DeclareAffidavit routine.

Source§

impl<T> TypeInfo for DeclareAffidavit<T>
where T::Public: TypeInfo + 'static, BlockNumberFor<T>: TypeInfo + 'static, T: Config + 'static,

Source§

type Identity = DeclareAffidavit<T>

The type identifying for which type info is provided. Read more
Source§

fn type_info() -> Type

Returns the static type identifier for Self.
Source§

impl<T: Config> EncodeLike for DeclareAffidavit<T>
where T::Public: Encode, BlockNumberFor<T>: Encode,

Source§

impl<T: Eq + Config> Eq for DeclareAffidavit<T>
where T::Public: Eq,

Source§

impl<T: Config> StructuralPartialEq for DeclareAffidavit<T>

Auto Trait Implementations§

§

impl<T> Freeze for DeclareAffidavit<T>
where <T as SigningTypes>::Public: Freeze, <<<T as Config>::Block as Block>::Header as Header>::Number: Freeze,

§

impl<T> RefUnwindSafe for DeclareAffidavit<T>
where <T as SigningTypes>::Public: RefUnwindSafe, <<<T as Config>::Block as Block>::Header as Header>::Number: RefUnwindSafe,

§

impl<T> Send for DeclareAffidavit<T>
where <T as SigningTypes>::Public: Send,

§

impl<T> Sync for DeclareAffidavit<T>
where <T as SigningTypes>::Public: Sync,

§

impl<T> Unpin for DeclareAffidavit<T>
where <T as SigningTypes>::Public: Unpin, <<<T as Config>::Block as Block>::Header as Header>::Number: Unpin,

§

impl<T> UnwindSafe for DeclareAffidavit<T>
where <T as SigningTypes>::Public: UnwindSafe, <<<T as Config>::Block as Block>::Header as Header>::Number: UnwindSafe,

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
§

impl<T> CheckedConversion for T

§

fn checked_from<T>(t: T) -> Option<Self>
where Self: TryFrom<T>,

Convert from a value of T into an equivalent instance of Option<Self>. Read more
§

fn checked_into<T>(self) -> Option<T>
where Self: TryInto<T>,

Consume self to return Some equivalent value of Option<T>. Read more
Source§

impl<T> CloneToUninit for T
where T: Clone,

Source§

unsafe fn clone_to_uninit(&self, dest: *mut u8)

🔬This is a nightly-only experimental API. (clone_to_uninit)
Performs copy-assignment from self to dest. Read more
§

impl<T> DecodeAll for T
where T: Decode,

§

fn decode_all(input: &mut &[u8]) -> Result<T, Error>

Decode Self and consume all of the given input data. Read more
§

impl<T> DecodeLimit for T
where T: Decode,

§

fn decode_all_with_depth_limit( limit: u32, input: &mut &[u8], ) -> Result<T, Error>

Decode Self and consume all of the given input data. Read more
§

fn decode_with_depth_limit<I>(limit: u32, input: &mut I) -> Result<T, Error>
where I: Input,

Decode Self with the given maximum recursion depth and advance input by the number of bytes consumed. Read more
Source§

impl<T> DynClone for T
where T: Clone,

§

impl<Q, K> Equivalent<K> for Q
where Q: Eq + ?Sized, K: Borrow<Q> + ?Sized,

§

fn equivalent(&self, key: &K) -> bool

Checks if this value is equivalent to the given key. Read more
§

impl<Q, K> Equivalent<K> for Q
where Q: Eq + ?Sized, K: Borrow<Q> + ?Sized,

§

fn equivalent(&self, key: &K) -> bool

Checks if this value is equivalent to the given key. Read more
Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

§

impl<T> Hashable for T
where T: Codec,

§

fn blake2_128(&self) -> [u8; 16]

§

fn blake2_256(&self) -> [u8; 32]

§

fn blake2_128_concat(&self) -> Vec<u8>

§

fn twox_128(&self) -> [u8; 16]

§

fn twox_256(&self) -> [u8; 32]

§

fn twox_64_concat(&self) -> Vec<u8>

§

fn identity(&self) -> Vec<u8>

§

impl<T> Instrument for T

§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided [Span], returning an Instrumented wrapper. Read more
§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Source§

impl<T> IntoEither for T

Source§

fn into_either(self, into_left: bool) -> Either<Self, Self>

Converts self into a Left variant of Either<Self, Self> if into_left is true. Converts self into a Right variant of Either<Self, Self> otherwise. Read more
Source§

fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
where F: FnOnce(&Self) -> bool,

Converts self into a Left variant of Either<Self, Self> if into_left(&self) returns true. Converts self into a Right variant of Either<Self, Self> otherwise. Read more
§

impl<T, U> IntoKey<U> for T
where U: FromKey<T>,

§

fn into_key(self) -> U

Source§

impl<T, U, Tag> IntoTag<U, Tag> for T
where U: FromTag<T, Tag>, Tag: DiscriminantTag,

Source§

fn into_tag(self) -> U

§

impl<Src, Dest> IntoTuple<Dest> for Src
where Dest: FromTuple<Src>,

§

fn into_tuple(self) -> Dest

§

impl<T> IsType<T> for T

§

fn from_ref(t: &T) -> &T

Cast reference.
§

fn into_ref(&self) -> &T

Cast reference.
§

fn from_mut(t: &mut T) -> &mut T

Cast mutable reference.
§

fn into_mut(&mut self) -> &mut T

Cast mutable reference.
§

impl<T, Outer> IsWrappedBy<Outer> for T
where Outer: AsRef<T> + AsMut<T> + From<T>, T: From<Outer>,

§

fn from_ref(outer: &Outer) -> &T

Get a reference to the inner from the outer.

§

fn from_mut(outer: &mut Outer) -> &mut T

Get a mutable reference to the inner from the outer.

§

impl<T> KeyedVec for T
where T: Codec,

§

fn to_keyed_vec(&self, prepend_key: &[u8]) -> Vec<u8>

Return an encoding of Self prepended by given slice.
Source§

impl<T, Time> Logging<Time> for T
where Time: Time,

Source§

const FALLBACK_TARGET: &'static str = "routine"

Default logging target if none is provided.

Most routines, especially offchain workers or background tasks, use this target for simplicity.

It allows a consistent place to look for routine logs without requiring every call to specify a target.

Note: This target is only a conveninence and may be somewhat vague. To ensure errors can still be traced accurately, the logged messages should include additional metadata (e.g., module name, error index, or contextual info) so that the source of the error can be identified even if the target is generic.

Source§

type Logger = DispatchError

The type taken and returned for logging.

We simply return the same [DispatchError] that was logged, so logging does not change control flow or error propagation.

DispatchError is used because in Substrate it encompasses all runtime errors - including module errors, token errors, arithmetic issues, and transactional boundaries - making it the universal substrate-side error representation.

Source§

type Level = LogLevel

The log level type.

We use the LogLevel enum to standardize severity levels (Info, Warn, Error, Debug) across all routine logs.

Source§

fn log( level: <T as Logging<Time>>::Level, err: &<T as Logging<Time>>::Logger, timestamp: Time, target: Option<&str>, fmt: Option<fn(Time, &<T as Logging<Time>>::Level, &str, &str) -> String>, ) -> <T as Logging<Time>>::Logger

Core logging function that all helpers delegate to. Read more
Source§

fn info( err: &Self::Logger, timestamp: Timestamp, target: Option<&str>, fmt: Option<fn(Timestamp, &Self::Level, &str, &str) -> String>, ) -> Self::Logger
where Self: Sized,

Logs an info-level message. Read more
Source§

fn warn( err: &Self::Logger, timestamp: Timestamp, target: Option<&str>, fmt: Option<fn(Timestamp, &Self::Level, &str, &str) -> String>, ) -> Self::Logger
where Self: Sized,

Logs a warning-level message. Read more
Source§

fn error( err: &Self::Logger, timestamp: Timestamp, target: Option<&str>, fmt: Option<fn(Timestamp, &Self::Level, &str, &str) -> String>, ) -> Self::Logger
where Self: Sized,

Logs an error-level message. Read more
Source§

fn debug( err: &Self::Logger, timestamp: Timestamp, target: Option<&str>, fmt: Option<fn(Timestamp, &Self::Level, &str, &str) -> String>, ) -> Self::Logger
where Self: Sized,

Logs a debug-level message. Read more
Source§

impl<T> Same for T

Source§

type Output = T

Should always be Self
§

impl<T> SaturatedConversion for T

§

fn saturated_from<T>(t: T) -> Self
where Self: UniqueSaturatedFrom<T>,

Convert from a value of T into an equivalent instance of Self. Read more
§

fn saturated_into<T>(self) -> T
where Self: UniqueSaturatedInto<T>,

Consume self to return an equivalent value of T. Read more
Source§

impl<T> ToOwned for T
where T: Clone,

Source§

type Owned = T

The resulting type after obtaining ownership.
Source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
Source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
§

impl<T, U> TryIntoKey<U> for T
where U: TryFromKey<T>,

§

type Error = <U as TryFromKey<T>>::Error

§

fn try_into_key(self) -> Result<U, <U as TryFromKey<T>>::Error>

§

impl<S, T> UncheckedInto<T> for S
where T: UncheckedFrom<S>,

§

fn unchecked_into(self) -> T

The counterpart to unchecked_from.
§

impl<T, S> UniqueSaturatedInto<T> for S
where T: Bounded, S: TryInto<T>,

§

fn unique_saturated_into(self) -> T

Consume self to return an equivalent value of T.
§

impl<V, T> VZip<V> for T
where V: MultiLane<T>,

§

fn vzip(self) -> V

§

impl<T> WithSubscriber for T

§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a [WithDispatch] wrapper. Read more
§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a [WithDispatch] wrapper. Read more
§

impl<S> Codec for S
where S: Decode + Encode,

Source§

impl<Provider, Discriminant, T> DelegateVirtualDynBound<Provider, Discriminant> for T
where Provider: VirtualDynBound<Discriminant>, Discriminant: DiscriminantTag,

Source§

impl<Provider, Discriminant, T> DelegateVirtualStaticBound<Provider, Discriminant> for T
where Provider: VirtualStaticBound<Discriminant>, Discriminant: DiscriminantTag,

Source§

impl<T> Elastic for T
where T: RuntimeType + MaxEncodedLen,

§

impl<T> EncodeLike<&&T> for T
where T: Encode,

§

impl<T> EncodeLike<&T> for T
where T: Encode,

§

impl<T> EncodeLike<&mut T> for T
where T: Encode,

§

impl<T> EncodeLike<Arc<T>> for T
where T: Encode,

§

impl<T> EncodeLike<Box<T>> for T
where T: Encode,

§

impl<T> EncodeLike<Cow<'_, T>> for T
where T: ToOwned + Encode,

§

impl<T> EncodeLike<Rc<T>> for T
where T: Encode,

§

impl<S> FullCodec for S
where S: Decode + FullEncode,

§

impl<S> FullEncode for S
where S: Encode + EncodeLike,

§

impl<T> JsonSchemaMaybe for T

§

impl<T> MaybeDebug for T
where T: Debug,

§

impl<T> MaybeRefUnwindSafe for T
where T: RefUnwindSafe,

§

impl<T> Member for T
where T: Send + Sync + Debug + Eq + PartialEq + Clone + 'static,

Source§

impl<T> MetaAware for T
where T: TypeInfo + Debug,

Source§

impl<T> Portable for T
where T: Encode + Decode + Clone,

Source§

impl<T> Probe for T
where T: Encode + Debug + ?Sized,

Source§

impl<T> RuntimeEnum for T
where T: FullCodec + TypeInfo + Debug,

Source§

impl<T> RuntimeType for T
where T: Portable + MetaAware + Eq,

§

impl<T> StaticTypeInfo for T
where T: TypeInfo + 'static,

Source§

impl<T> Storable for T
where T: RuntimeType + 'static + EncodeLike,