Struct RotateAffidavitKey

Source
pub(crate) struct RotateAffidavitKey<T: Config> {
    pub by: T::Public,
    pub at: BlockNumberFor<T>,
}
Expand description

Operational context for affidavit key rotation.

This type represents the contextual information required to observe and commence rotation of the affidavit key, promoting the previously prepared next key to become the active affidavit key once the declaration effects are finalized.

Rotation is a sequential, retry-driven routine that executes as part of the looped offchain workflow. It is entered only after the declaration phase has submitted the declare-affidavit transaction successfully.

§Notes

  • This is not a transaction payload.
  • This type is never submitted on-chain.
  • It is used internally during:
    • observation of finalized declaration effects
    • validation of next-key availability
    • promotion of the next affidavit key to active
    • reset of inconsistent key state when rotation cannot proceed

§Dependency: InitAffidavitKey, TryElection, and DeclareAffidavit

This routine depends on the prior initialization, election, and declaration phases. It assumes that:

  • a active-tagged affidavit key-pair exists (guaranteed by InitAffidavitKey),
  • election has either completed or been safely skipped (handled by TryElection),
  • a declare-affidavit transaction has been submitted (by DeclareAffidavit).
  • and a next-tagged affidavit key-pair exists,

Whenever these invariants are violated (e.g. missing affidavit keys, eligibility failure, or window violations), control is redirected to InitAffidavitKey to repair and re-validate storage and keystore consistency before retrying rotation observation.

§Fork Awareness

  • The at field captures the block number at which rotation observation begins.
  • When executed via offchain workers, this context must tolerate forks, re-orgs, and speculative execution.
  • Implementors must ensure idempotency and re-entrancy safety.

§Rotation Flow

The routine verifies that the next affidavit key is referenced in offchain storage and locally available as pair in keystore, then determines whether rotation is currently eligible. If so, the next key is promoted to active and the previous state is cleaned up. If rotation cannot occur within the allowed session window, both active and next keys are reset to recover from inconsistent or stale state.

Failures or inconsistencies at any stage re-enter the initialization phase to re-validate offchain storage and keystore invariants.

loop {
    // --- Initialization Phase ---
    if !offchain_storage.has_active_affidavit_key()
        || !keystore.has_active_affidavit_key()
    {
        keystore.create_or_repair_active_key();
        offchain_storage.ensure_active_key_reference();
        continue;
    }

    // --- Election Phase (optimistic) ---
    if election_constraints_satisfied() {
        if submit_elect_authors_extrinsic().is_err() {
            continue; // repair + retry via initialization
        }
    }

    // --- Declaration Phase ---
    if !offchain_storage.has_next_affidavit_key()
        || !keystore.has_next_affidavit_key()
    {
        match keystore.create_or_repair_next_key() {
            Ok(_) => {
                offchain_storage.ensure_next_key_reference();
                continue;
            }
            Err(_) => continue, // fallback to initialization repair loop
        }
    }

    if !affidavit_constraints_satisfied() {
        continue; // retry via initialization phase
    }

    if submit_declare_affidavit_extrinsic().is_err() {
        continue; // declaration failed -> repair + retry
    }

    // --- Rotation Observation Phase ---
    if !offchain_storage.has_next_affidavit_key()
        || !keystore.has_next_affidavit_key()
    {
        continue;
    }

    if eligible_to_rotate() {
        promote_next_key_to_active();
        remove_next_key();
        break; // rotation completed
    }

    if within_current_session_window() {
        continue; // wait until rotation becomes eligible
                  // indicates declaration effects are not finalized
    }

    // Window expired -> reset inconsistent state
    remove_active_and_next_affidavit_keys();
    break;
}

§Guarantee

The rotation phase has exactly three exit outcomes:

  1. Rotation Success:

    • if the next affidavit key is finalized and present in the keystore, and
    • rotation eligibility constraints are satisfied, then the next key is promoted to become the active affidavit key.
  2. Deferred Rotation (Same Session):

    • if the next affidavit key is finalized but not yet eligible to rotate, and
    • the current session window in which the affidavit was declared is still active, the routine keeps retrying until eligibility is satisfied and rotation succeeds.
  3. Reset & Repair (Session Elapsed):

    • if rotation is still ineligible and the declaring session window has elapsed, both active and next affidavit keys are removed, signaling that the declaration phase effectively failed to converge. The global loop then re-enters the initialization phase to repair and re-establish a consistent state.
loop {

    if eligible_to_rotate() {
        promote_next_key_to_active();
        remove_next_affidavit_key();
        break;
    }
    if within_declaring_session_window() {
        continue;
        // keep retrying until eligibility becomes true
    } else {
        remove_active_and_next_affidavit_keys();
        break;
        // signal reset; initialization phase will repair state
    }
}

All behavior is supplied by trait implementations operating on this type.

§Timelines & Window Semantics

The global retry loop operates over session-scoped time windows that determine when election, declaration, and rotation are allowed.

Timeline within a single session:

|--------------------- Session N ---------------------|
       |--------- Affidavit Window ---------|
                |----- Election Window -----|

Session Start
    |- Affidavit window opens
         |- Election window opens (nested inside affidavit window)

Election window closes
    |- Election no longer allowed

Affidavit window closes
    |- Declaration and rotation eligibility must already be satisfied

Session ends -> Session N+1 begins
    |- Global loop continues with fresh window constraints

Properties:

  • The election window is strictly nested within the affidavit window.
  • When the affidavit window ends, the election window has already ended.
  • Rotation eligibility is evaluated relative to the session in which the affidavit was declared.
  • If rotation has not converged before the session window elapses, the routine resets keys and relies on the next session’s loop iteration to re-initialize and re-attempt the full lifecycle.

§FlowChart

Fields§

§by: T::Public

Public key that is intended to become the new active affidavit key.

§at: BlockNumberFor<T>

Block number at which key rotation is initiated.

Trait Implementations§

Source§

impl<T: Clone + Config> Clone for RotateAffidavitKey<T>
where T::Public: Clone,

Source§

fn clone(&self) -> RotateAffidavitKey<T>

Returns a duplicate of the value. Read more
1.0.0 · Source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
Source§

impl<T> Debug for RotateAffidavitKey<T>
where T: Debug + Config,

Source§

fn fmt(&self, fmt: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
Source§

impl<T: Config> Decode for RotateAffidavitKey<T>
where T::Public: Decode, BlockNumberFor<T>: Decode,

Source§

fn decode<__CodecInputEdqy: Input>( __codec_input_edqy: &mut __CodecInputEdqy, ) -> Result<Self, Error>

Attempt to deserialise the value from input.
§

fn decode_into<I>( input: &mut I, dst: &mut MaybeUninit<Self>, ) -> Result<DecodeFinished, Error>
where I: Input,

Attempt to deserialize the value from input into a pre-allocated piece of memory. Read more
§

fn skip<I>(input: &mut I) -> Result<(), Error>
where I: Input,

Attempt to skip the encoded value from input. Read more
§

fn encoded_fixed_size() -> Option<usize>

Returns the fixed encoded size of the type. Read more
Source§

impl<T: Config> Encode for RotateAffidavitKey<T>
where T::Public: Encode, BlockNumberFor<T>: Encode,

Source§

fn size_hint(&self) -> usize

If possible give a hint of expected size of the encoding. Read more
Source§

fn encode_to<__CodecOutputEdqy: Output + ?Sized>( &self, __codec_dest_edqy: &mut __CodecOutputEdqy, )

Convert self to a slice and append it to the destination.
§

fn encode(&self) -> Vec<u8>

Convert self to an owned vector.
§

fn using_encoded<R, F>(&self, f: F) -> R
where F: FnOnce(&[u8]) -> R,

Convert self to a slice and then invoke the given closure with it.
§

fn encoded_size(&self) -> usize

Calculates the encoded size. Read more
Source§

impl<T: Config> MaxEncodedLen for RotateAffidavitKey<T>
where T::Public: MaxEncodedLen, BlockNumberFor<T>: MaxEncodedLen,

Source§

fn max_encoded_len() -> usize

Upper bound, in bytes, of the maximum encoded size of this item.
Source§

impl<T: PartialEq + Config> PartialEq for RotateAffidavitKey<T>
where T::Public: PartialEq,

Source§

fn eq(&self, other: &RotateAffidavitKey<T>) -> bool

Tests for self and other values to be equal, and is used by ==.
1.0.0 · Source§

fn ne(&self, other: &Rhs) -> bool

Tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
Source§

impl<T: Config> RoutineOf<<T as SigningTypes>::Public, <<<T as Config>::Block as HeaderProvider>::HeaderT as Header>::Number> for RotateAffidavitKey<T>

Authorization layer for affidavit key rotation.

Resolves the finalized next affidavit key prepared by DeclareAffidavit and ensures it is locally usable for signing.

This enforces that rotation is performed only with a key that:

  • has reached finality, and
  • exists in the node’s keystore.
Source§

fn who(at: &BlockNumberFor<T>) -> Result<T::Public, Self::Logger>

Determines the next affidavit public key authorized to finalize key rotation.

§Semantics
  • Resolves the next affidavit key previously prepared and finalized by the DeclareAffidavit routine.
  • Requires the key to be in a Confidence::Safe state, ensuring it has survived fork re-orgs and met finality requirements.
§Lifecycle position

Reaching this routine implies:

  • The declare extrinsic has already been submitted, and
  • The node is now waiting to observe whether that transaction has been accepted and reflected in runtime storage.

This routine therefore does not generate or mutate keys. It only:

  • re-reads the finalized next affidavit key, and
  • verifies that the corresponding key pair still exists in the local keystore.
§Failure semantics
  • Missing or non-finalized next affidavit key is treated as a hard stop.
  • Storage inconsistencies indicate OCW coordination failure and halt execution.
  • If the key exists in storage but not in the keystore, the node is considered misconfigured.
Source§

impl<T: Config> Routines<<<<T as Config>::Block as HeaderProvider>::HeaderT as Header>::Number> for RotateAffidavitKey<T>

Offchain routine responsible for finalizing affidavit key rotation.

Completes the lifecycle by promoting the finalized next affidavit key to active status once the runtime reflects successful affidavit submission.

This routine:

  • waits for on-chain confirmation of the rotated key,
  • performs a safe transition from next -> active key,
  • resets state on failure to avoid inconsistent lifecycle progression.

Designed to be idempotent and driven by repeated OCW execution.

Source§

fn can_run(&self) -> Result<(), Self::Logger>

Determines whether affidavit key rotation may be finalized.

§Semantics
  • Checks whether the next affidavit key has been successfully registered in runtime storage for the session after next (current_session + 2) (for which next election will be conducted).
  • Presence of this key in AffidavitKeys is treated as confirmation that the declare extrinsic was accepted.
§Waiting behavior
  • If the key is not yet visible, the routine waits passively.
  • While the affidavit window is still open, this is logged as an informational “awaiting status” condition.
§Failure and recovery

If the affidavit window has closed and:

  • the next affidavit key is still not registered, then
  • the system assumes the affidavit transaction failed or was dropped.

In that case:

  • All affidavit-related offchain state is cleared.
  • Active validation is considered stopped.
  • The node must restart the lifecycle via validate extrinsic in a later block.

This aggressive reset prevents the OCW from getting stuck in a half-rotated or inconsistent state.

Source§

fn run_service(&self) -> Result<(), Self::Logger>

Finalizes affidavit key rotation after successful affidavit acceptance.

§Behavior

Once the runtime reflects the rotated affidavit key:

  1. The next affidavit key is removed from finalized offchain storage.
  2. The active affidavit key is updated to the rotated key.

This completes the affidavit lifecycle for the current session and enables subsequent OCW executions to:

  • attempt elections via TryElection, and
  • later begin a new affidavit cycle.
§Guarantees
  • Rotation is performed exactly once per successful affidavit.
  • Any storage failure is treated as a coordination halt.
Source§

fn on_ran_service(&self)

Logs a info message on a successful RotateAffidavitKey routine.

Source§

impl<T> TypeInfo for RotateAffidavitKey<T>
where T::Public: TypeInfo + 'static, BlockNumberFor<T>: TypeInfo + 'static, T: Config + 'static,

Source§

type Identity = RotateAffidavitKey<T>

The type identifying for which type info is provided. Read more
Source§

fn type_info() -> Type

Returns the static type identifier for Self.
Source§

impl<T: Config> EncodeLike for RotateAffidavitKey<T>
where T::Public: Encode, BlockNumberFor<T>: Encode,

Source§

impl<T: Eq + Config> Eq for RotateAffidavitKey<T>
where T::Public: Eq,

Source§

impl<T: Config> StructuralPartialEq for RotateAffidavitKey<T>

Auto Trait Implementations§

§

impl<T> Freeze for RotateAffidavitKey<T>
where <T as SigningTypes>::Public: Freeze, <<<T as Config>::Block as Block>::Header as Header>::Number: Freeze,

§

impl<T> RefUnwindSafe for RotateAffidavitKey<T>
where <T as SigningTypes>::Public: RefUnwindSafe, <<<T as Config>::Block as Block>::Header as Header>::Number: RefUnwindSafe,

§

impl<T> Send for RotateAffidavitKey<T>
where <T as SigningTypes>::Public: Send,

§

impl<T> Sync for RotateAffidavitKey<T>
where <T as SigningTypes>::Public: Sync,

§

impl<T> Unpin for RotateAffidavitKey<T>
where <T as SigningTypes>::Public: Unpin, <<<T as Config>::Block as Block>::Header as Header>::Number: Unpin,

§

impl<T> UnwindSafe for RotateAffidavitKey<T>
where <T as SigningTypes>::Public: UnwindSafe, <<<T as Config>::Block as Block>::Header as Header>::Number: UnwindSafe,

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
§

impl<T> CheckedConversion for T

§

fn checked_from<T>(t: T) -> Option<Self>
where Self: TryFrom<T>,

Convert from a value of T into an equivalent instance of Option<Self>. Read more
§

fn checked_into<T>(self) -> Option<T>
where Self: TryInto<T>,

Consume self to return Some equivalent value of Option<T>. Read more
Source§

impl<T> CloneToUninit for T
where T: Clone,

Source§

unsafe fn clone_to_uninit(&self, dest: *mut u8)

🔬This is a nightly-only experimental API. (clone_to_uninit)
Performs copy-assignment from self to dest. Read more
§

impl<T> DecodeAll for T
where T: Decode,

§

fn decode_all(input: &mut &[u8]) -> Result<T, Error>

Decode Self and consume all of the given input data. Read more
§

impl<T> DecodeLimit for T
where T: Decode,

§

fn decode_all_with_depth_limit( limit: u32, input: &mut &[u8], ) -> Result<T, Error>

Decode Self and consume all of the given input data. Read more
§

fn decode_with_depth_limit<I>(limit: u32, input: &mut I) -> Result<T, Error>
where I: Input,

Decode Self with the given maximum recursion depth and advance input by the number of bytes consumed. Read more
Source§

impl<T> DynClone for T
where T: Clone,

§

impl<Q, K> Equivalent<K> for Q
where Q: Eq + ?Sized, K: Borrow<Q> + ?Sized,

§

fn equivalent(&self, key: &K) -> bool

Checks if this value is equivalent to the given key. Read more
§

impl<Q, K> Equivalent<K> for Q
where Q: Eq + ?Sized, K: Borrow<Q> + ?Sized,

§

fn equivalent(&self, key: &K) -> bool

Checks if this value is equivalent to the given key. Read more
Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

§

impl<T> Hashable for T
where T: Codec,

§

fn blake2_128(&self) -> [u8; 16]

§

fn blake2_256(&self) -> [u8; 32]

§

fn blake2_128_concat(&self) -> Vec<u8>

§

fn twox_128(&self) -> [u8; 16]

§

fn twox_256(&self) -> [u8; 32]

§

fn twox_64_concat(&self) -> Vec<u8>

§

fn identity(&self) -> Vec<u8>

§

impl<T> Instrument for T

§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided [Span], returning an Instrumented wrapper. Read more
§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Source§

impl<T> IntoEither for T

Source§

fn into_either(self, into_left: bool) -> Either<Self, Self>

Converts self into a Left variant of Either<Self, Self> if into_left is true. Converts self into a Right variant of Either<Self, Self> otherwise. Read more
Source§

fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
where F: FnOnce(&Self) -> bool,

Converts self into a Left variant of Either<Self, Self> if into_left(&self) returns true. Converts self into a Right variant of Either<Self, Self> otherwise. Read more
§

impl<T, U> IntoKey<U> for T
where U: FromKey<T>,

§

fn into_key(self) -> U

Source§

impl<T, U, Tag> IntoTag<U, Tag> for T
where U: FromTag<T, Tag>, Tag: DiscriminantTag,

Source§

fn into_tag(self) -> U

§

impl<Src, Dest> IntoTuple<Dest> for Src
where Dest: FromTuple<Src>,

§

fn into_tuple(self) -> Dest

§

impl<T> IsType<T> for T

§

fn from_ref(t: &T) -> &T

Cast reference.
§

fn into_ref(&self) -> &T

Cast reference.
§

fn from_mut(t: &mut T) -> &mut T

Cast mutable reference.
§

fn into_mut(&mut self) -> &mut T

Cast mutable reference.
§

impl<T, Outer> IsWrappedBy<Outer> for T
where Outer: AsRef<T> + AsMut<T> + From<T>, T: From<Outer>,

§

fn from_ref(outer: &Outer) -> &T

Get a reference to the inner from the outer.

§

fn from_mut(outer: &mut Outer) -> &mut T

Get a mutable reference to the inner from the outer.

§

impl<T> KeyedVec for T
where T: Codec,

§

fn to_keyed_vec(&self, prepend_key: &[u8]) -> Vec<u8>

Return an encoding of Self prepended by given slice.
Source§

impl<T, Time> Logging<Time> for T
where Time: Time,

Source§

const FALLBACK_TARGET: &'static str = "routine"

Default logging target if none is provided.

Most routines, especially offchain workers or background tasks, use this target for simplicity.

It allows a consistent place to look for routine logs without requiring every call to specify a target.

Note: This target is only a conveninence and may be somewhat vague. To ensure errors can still be traced accurately, the logged messages should include additional metadata (e.g., module name, error index, or contextual info) so that the source of the error can be identified even if the target is generic.

Source§

type Logger = DispatchError

The type taken and returned for logging.

We simply return the same [DispatchError] that was logged, so logging does not change control flow or error propagation.

DispatchError is used because in Substrate it encompasses all runtime errors - including module errors, token errors, arithmetic issues, and transactional boundaries - making it the universal substrate-side error representation.

Source§

type Level = LogLevel

The log level type.

We use the LogLevel enum to standardize severity levels (Info, Warn, Error, Debug) across all routine logs.

Source§

fn log( level: <T as Logging<Time>>::Level, err: &<T as Logging<Time>>::Logger, timestamp: Time, target: Option<&str>, fmt: Option<fn(Time, &<T as Logging<Time>>::Level, &str, &str) -> String>, ) -> <T as Logging<Time>>::Logger

Core logging function that all helpers delegate to. Read more
Source§

fn info( err: &Self::Logger, timestamp: Timestamp, target: Option<&str>, fmt: Option<fn(Timestamp, &Self::Level, &str, &str) -> String>, ) -> Self::Logger
where Self: Sized,

Logs an info-level message. Read more
Source§

fn warn( err: &Self::Logger, timestamp: Timestamp, target: Option<&str>, fmt: Option<fn(Timestamp, &Self::Level, &str, &str) -> String>, ) -> Self::Logger
where Self: Sized,

Logs a warning-level message. Read more
Source§

fn error( err: &Self::Logger, timestamp: Timestamp, target: Option<&str>, fmt: Option<fn(Timestamp, &Self::Level, &str, &str) -> String>, ) -> Self::Logger
where Self: Sized,

Logs an error-level message. Read more
Source§

fn debug( err: &Self::Logger, timestamp: Timestamp, target: Option<&str>, fmt: Option<fn(Timestamp, &Self::Level, &str, &str) -> String>, ) -> Self::Logger
where Self: Sized,

Logs a debug-level message. Read more
Source§

impl<T> Same for T

Source§

type Output = T

Should always be Self
§

impl<T> SaturatedConversion for T

§

fn saturated_from<T>(t: T) -> Self
where Self: UniqueSaturatedFrom<T>,

Convert from a value of T into an equivalent instance of Self. Read more
§

fn saturated_into<T>(self) -> T
where Self: UniqueSaturatedInto<T>,

Consume self to return an equivalent value of T. Read more
Source§

impl<T> ToOwned for T
where T: Clone,

Source§

type Owned = T

The resulting type after obtaining ownership.
Source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
Source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
§

impl<T, U> TryIntoKey<U> for T
where U: TryFromKey<T>,

§

type Error = <U as TryFromKey<T>>::Error

§

fn try_into_key(self) -> Result<U, <U as TryFromKey<T>>::Error>

§

impl<S, T> UncheckedInto<T> for S
where T: UncheckedFrom<S>,

§

fn unchecked_into(self) -> T

The counterpart to unchecked_from.
§

impl<T, S> UniqueSaturatedInto<T> for S
where T: Bounded, S: TryInto<T>,

§

fn unique_saturated_into(self) -> T

Consume self to return an equivalent value of T.
§

impl<V, T> VZip<V> for T
where V: MultiLane<T>,

§

fn vzip(self) -> V

§

impl<T> WithSubscriber for T

§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a [WithDispatch] wrapper. Read more
§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a [WithDispatch] wrapper. Read more
§

impl<S> Codec for S
where S: Decode + Encode,

Source§

impl<Provider, Discriminant, T> DelegateVirtualDynBound<Provider, Discriminant> for T
where Provider: VirtualDynBound<Discriminant>, Discriminant: DiscriminantTag,

Source§

impl<Provider, Discriminant, T> DelegateVirtualStaticBound<Provider, Discriminant> for T
where Provider: VirtualStaticBound<Discriminant>, Discriminant: DiscriminantTag,

Source§

impl<T> Elastic for T
where T: RuntimeType + MaxEncodedLen,

§

impl<T> EncodeLike<&&T> for T
where T: Encode,

§

impl<T> EncodeLike<&T> for T
where T: Encode,

§

impl<T> EncodeLike<&mut T> for T
where T: Encode,

§

impl<T> EncodeLike<Arc<T>> for T
where T: Encode,

§

impl<T> EncodeLike<Box<T>> for T
where T: Encode,

§

impl<T> EncodeLike<Cow<'_, T>> for T
where T: ToOwned + Encode,

§

impl<T> EncodeLike<Rc<T>> for T
where T: Encode,

§

impl<S> FullCodec for S
where S: Decode + FullEncode,

§

impl<S> FullEncode for S
where S: Encode + EncodeLike,

§

impl<T> JsonSchemaMaybe for T

§

impl<T> MaybeDebug for T
where T: Debug,

§

impl<T> MaybeRefUnwindSafe for T
where T: RefUnwindSafe,

§

impl<T> Member for T
where T: Send + Sync + Debug + Eq + PartialEq + Clone + 'static,

Source§

impl<T> MetaAware for T
where T: TypeInfo + Debug,

Source§

impl<T> Portable for T
where T: Encode + Decode + Clone,

Source§

impl<T> Probe for T
where T: Encode + Debug + ?Sized,

Source§

impl<T> RuntimeEnum for T
where T: FullCodec + TypeInfo + Debug,

Source§

impl<T> RuntimeType for T
where T: Portable + MetaAware + Eq,

§

impl<T> StaticTypeInfo for T
where T: TypeInfo + 'static,

Source§

impl<T> Storable for T
where T: RuntimeType + 'static + EncodeLike,