@argonprotocol/mainchain 0.0.7 → 0.0.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/index.d.ts +4 -1
- package/lib/cjs/index.js +9 -1
- package/lib/cjs/index.js.map +1 -1
- package/lib/cjs/interfaces/augment-api-consts.d.ts +0 -8
- package/lib/cjs/interfaces/augment-api-errors.d.ts +1 -23
- package/lib/cjs/interfaces/augment-api-events.d.ts +7 -27
- package/lib/cjs/interfaces/augment-api-query.d.ts +3 -59
- package/lib/cjs/interfaces/augment-api-tx.d.ts +8 -45
- package/lib/cjs/interfaces/augment-types.d.ts +63 -4
- package/lib/cjs/interfaces/lookup.d.ts +191 -257
- package/lib/cjs/interfaces/lookup.js +195 -261
- package/lib/cjs/interfaces/lookup.js.map +1 -1
- package/lib/cjs/interfaces/registry.d.ts +1 -9
- package/lib/cjs/interfaces/types-lookup.d.ts +185 -237
- package/lib/esm/index.d.ts +4 -1
- package/lib/esm/index.js +6 -1
- package/lib/esm/index.js.map +1 -1
- package/lib/esm/interfaces/augment-api-consts.d.ts +0 -8
- package/lib/esm/interfaces/augment-api-errors.d.ts +1 -23
- package/lib/esm/interfaces/augment-api-events.d.ts +7 -27
- package/lib/esm/interfaces/augment-api-query.d.ts +3 -59
- package/lib/esm/interfaces/augment-api-tx.d.ts +8 -45
- package/lib/esm/interfaces/augment-types.d.ts +63 -4
- package/lib/esm/interfaces/lookup.d.ts +191 -257
- package/lib/esm/interfaces/lookup.js +195 -261
- package/lib/esm/interfaces/lookup.js.map +1 -1
- package/lib/esm/interfaces/registry.d.ts +1 -9
- package/lib/esm/interfaces/types-lookup.d.ts +185 -237
- package/lib/tsconfig-cjs.tsbuildinfo +1 -1
- package/lib/tsconfig-types.tsbuildinfo +1 -1
- package/lib/tsconfig.tsbuildinfo +1 -1
- package/lib/types/index.d.ts +4 -1
- package/lib/types/interfaces/augment-api-consts.d.ts +0 -8
- package/lib/types/interfaces/augment-api-errors.d.ts +1 -23
- package/lib/types/interfaces/augment-api-events.d.ts +7 -27
- package/lib/types/interfaces/augment-api-query.d.ts +3 -59
- package/lib/types/interfaces/augment-api-tx.d.ts +8 -45
- package/lib/types/interfaces/augment-types.d.ts +63 -4
- package/lib/types/interfaces/lookup.d.ts +191 -257
- package/lib/types/interfaces/registry.d.ts +1 -9
- package/lib/types/interfaces/types-lookup.d.ts +185 -237
- package/package.json +5 -5
package/lib/cjs/index.d.ts
CHANGED
|
@@ -3,12 +3,15 @@ import "./interfaces/augment-types.js";
|
|
|
3
3
|
import "./interfaces/types-lookup.js";
|
|
4
4
|
import { KeyringPair } from "@polkadot/keyring/types";
|
|
5
5
|
import { ApiPromise, Keyring } from '@polkadot/api';
|
|
6
|
+
import { mnemonicGenerate, decodeAddress } from '@polkadot/util-crypto';
|
|
6
7
|
import { EventRecord } from "@polkadot/types/interfaces/system";
|
|
7
8
|
import { InterfaceTypes } from '@polkadot/types/types/registry';
|
|
8
|
-
|
|
9
|
+
import { KeypairType } from "@polkadot/util-crypto/types";
|
|
10
|
+
export { Keyring, KeyringPair, KeypairType, mnemonicGenerate, decodeAddress };
|
|
9
11
|
export * from "@polkadot/types";
|
|
10
12
|
export * from '@polkadot/types/lookup';
|
|
11
13
|
export { InterfaceTypes as interfaces };
|
|
12
14
|
export type ArgonClient = ApiPromise;
|
|
15
|
+
export declare function waitForLoad(): Promise<void>;
|
|
13
16
|
export declare function getClient(host: string): Promise<ArgonClient>;
|
|
14
17
|
export declare function checkForExtrinsicSuccess(events: EventRecord[], client: ArgonClient): Promise<void>;
|
package/lib/cjs/index.js
CHANGED
|
@@ -1,14 +1,22 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.checkForExtrinsicSuccess = exports.getClient = exports.Keyring = void 0;
|
|
3
|
+
exports.checkForExtrinsicSuccess = exports.getClient = exports.waitForLoad = exports.decodeAddress = exports.mnemonicGenerate = exports.Keyring = void 0;
|
|
4
4
|
const tslib_1 = require("tslib");
|
|
5
5
|
require("./interfaces/augment-api.js");
|
|
6
6
|
require("./interfaces/augment-types.js");
|
|
7
7
|
require("./interfaces/types-lookup.js");
|
|
8
8
|
const api_1 = require("@polkadot/api");
|
|
9
9
|
Object.defineProperty(exports, "Keyring", { enumerable: true, get: function () { return api_1.Keyring; } });
|
|
10
|
+
const util_crypto_1 = require("@polkadot/util-crypto");
|
|
11
|
+
Object.defineProperty(exports, "mnemonicGenerate", { enumerable: true, get: function () { return util_crypto_1.mnemonicGenerate; } });
|
|
12
|
+
Object.defineProperty(exports, "decodeAddress", { enumerable: true, get: function () { return util_crypto_1.decodeAddress; } });
|
|
13
|
+
const util_crypto_2 = require("@polkadot/util-crypto");
|
|
10
14
|
tslib_1.__exportStar(require("@polkadot/types"), exports);
|
|
11
15
|
tslib_1.__exportStar(require("@polkadot/types/lookup"), exports);
|
|
16
|
+
async function waitForLoad() {
|
|
17
|
+
await (0, util_crypto_2.cryptoWaitReady)();
|
|
18
|
+
}
|
|
19
|
+
exports.waitForLoad = waitForLoad;
|
|
12
20
|
async function getClient(host) {
|
|
13
21
|
const provider = new api_1.WsProvider(host);
|
|
14
22
|
return await api_1.ApiPromise.create({ provider, noInitWarn: true });
|
package/lib/cjs/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;;AAAA,uCAAqC;AACrC,yCAAuC;AACvC,wCAAsC;AAEtC,uCAA8D;
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;;AAAA,uCAAqC;AACrC,yCAAuC;AACvC,wCAAsC;AAEtC,uCAA8D;AAOtD,wFAPY,aAAO,OAOZ;AANf,uDAAsE;AAM3B,iGANnC,8BAAgB,OAMmC;AAAE,8FANnC,2BAAa,OAMmC;AAF1E,uDAAsD;AAItD,0DAAgC;AAChC,iEAAuC;AAKhC,KAAK,UAAU,WAAW;IAC7B,MAAM,IAAA,6BAAe,GAAE,CAAC;AAC5B,CAAC;AAFD,kCAEC;AAEM,KAAK,UAAU,SAAS,CAAC,IAAY;IACxC,MAAM,QAAQ,GAAG,IAAI,gBAAU,CAAC,IAAI,CAAC,CAAC;IACtC,OAAO,MAAM,gBAAU,CAAC,MAAM,CAAC,EAAC,QAAQ,EAAE,UAAU,EAAE,IAAI,EAAC,CAAC,CAAC;AACjE,CAAC;AAHD,8BAGC;AAED,SAAgB,wBAAwB,CAAC,MAAqB,EAAE,MAAmB;IAC/E,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;QACnC,KAAK,MAAM,EAAC,KAAK,EAAC,IAAI,MAAM,EAAE,CAAC;YAC3B,IAAI,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,gBAAgB,CAAC,EAAE,CAAC,KAAK,CAAC,EAAE,CAAC;gBAClD,OAAO,EAAE,CAAC;YACd,CAAC;iBAAM,IAAI,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,eAAe,CAAC,EAAE,CAAC,KAAK,CAAC,EAAE,CAAC;gBACxD,kCAAkC;gBAClC,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,IAAI,CAAC;gBACnC,IAAI,SAAS,GAAG,aAAa,CAAC,QAAQ,EAAE,CAAC;gBAEzC,IAAI,aAAa,CAAC,QAAQ,EAAE,CAAC;oBACzB,MAAM,OAAO,GAAG,MAAM,CAAC,QAAQ,CAAC,aAAa,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC;oBACtE,SAAS,GAAG,GAAG,OAAO,CAAC,OAAO,IAAI,OAAO,CAAC,IAAI,EAAE,CAAC;gBACrD,CAAC;gBAED,MAAM,CAAC,IAAI,KAAK,CAAC,GAAG,KAAK,CAAC,OAAO,IAAI,KAAK,CAAC,MAAM,wBAAwB,SAAS,EAAE,CAAC,CAAC,CAAC;YAC3F,CAAC;QACL,CAAC;IACL,CAAC,CAAC,CAAC;AACP,CAAC;AAnBD,4DAmBC"}
|
|
@@ -158,14 +158,6 @@ declare module '@polkadot/api-base/types/consts' {
|
|
|
158
158
|
* The max percent swing for the ownership bond amount per slot (from the last percent
|
|
159
159
|
**/
|
|
160
160
|
ownershipPercentAdjustmentDamper: u128 & AugmentedConst<ApiType>;
|
|
161
|
-
/**
|
|
162
|
-
* The number of session rotations per slot (one will align with the start of the session)
|
|
163
|
-
**/
|
|
164
|
-
sessionRotationsPerMiningWindow: u32 & AugmentedConst<ApiType>;
|
|
165
|
-
/**
|
|
166
|
-
* How many session indexes to keep session history
|
|
167
|
-
**/
|
|
168
|
-
sessionWindowsToKeepInHistory: u32 & AugmentedConst<ApiType>;
|
|
169
161
|
/**
|
|
170
162
|
* The target number of bids per slot. This will adjust the ownership bond amount up or
|
|
171
163
|
* down to ensure mining slots are filled.
|
|
@@ -273,7 +273,7 @@ declare module '@polkadot/api-base/types/errors' {
|
|
|
273
273
|
**/
|
|
274
274
|
NotebookIncludesExpiredLocalchainTransfer: AugmentedError<ApiType>;
|
|
275
275
|
};
|
|
276
|
-
|
|
276
|
+
domains: {
|
|
277
277
|
/**
|
|
278
278
|
* Error decoding account from notary
|
|
279
279
|
**/
|
|
@@ -606,28 +606,6 @@ declare module '@polkadot/api-base/types/errors' {
|
|
|
606
606
|
**/
|
|
607
607
|
Unproxyable: AugmentedError<ApiType>;
|
|
608
608
|
};
|
|
609
|
-
session: {
|
|
610
|
-
/**
|
|
611
|
-
* Registered duplicate key.
|
|
612
|
-
**/
|
|
613
|
-
DuplicatedKey: AugmentedError<ApiType>;
|
|
614
|
-
/**
|
|
615
|
-
* Invalid ownership proof.
|
|
616
|
-
**/
|
|
617
|
-
InvalidProof: AugmentedError<ApiType>;
|
|
618
|
-
/**
|
|
619
|
-
* Key setting account is not live, so it's impossible to associate keys.
|
|
620
|
-
**/
|
|
621
|
-
NoAccount: AugmentedError<ApiType>;
|
|
622
|
-
/**
|
|
623
|
-
* No associated validator ID for account.
|
|
624
|
-
**/
|
|
625
|
-
NoAssociatedValidatorId: AugmentedError<ApiType>;
|
|
626
|
-
/**
|
|
627
|
-
* No keys are associated with this account.
|
|
628
|
-
**/
|
|
629
|
-
NoKeys: AugmentedError<ApiType>;
|
|
630
|
-
};
|
|
631
609
|
sudo: {
|
|
632
610
|
/**
|
|
633
611
|
* Sender must be the Sudo account.
|
|
@@ -352,22 +352,22 @@ declare module '@polkadot/api-base/types/events' {
|
|
|
352
352
|
error: SpRuntimeDispatchError;
|
|
353
353
|
}>;
|
|
354
354
|
};
|
|
355
|
-
|
|
355
|
+
domains: {
|
|
356
356
|
/**
|
|
357
|
-
* A
|
|
357
|
+
* A domain was expired
|
|
358
358
|
**/
|
|
359
359
|
DomainExpired: AugmentedEvent<ApiType, [domainHash: H256], {
|
|
360
360
|
domainHash: H256;
|
|
361
361
|
}>;
|
|
362
362
|
/**
|
|
363
|
-
* A
|
|
363
|
+
* A domain was registered
|
|
364
364
|
**/
|
|
365
365
|
DomainRegistered: AugmentedEvent<ApiType, [domainHash: H256, registration: PalletDomainsDomainRegistration], {
|
|
366
366
|
domainHash: H256;
|
|
367
367
|
registration: PalletDomainsDomainRegistration;
|
|
368
368
|
}>;
|
|
369
369
|
/**
|
|
370
|
-
* A
|
|
370
|
+
* A domain registration was canceled due to a conflicting registration in the same
|
|
371
371
|
* tick
|
|
372
372
|
**/
|
|
373
373
|
DomainRegistrationCanceled: AugmentedEvent<ApiType, [domainHash: H256, registration: PalletDomainsDomainRegistration], {
|
|
@@ -375,7 +375,7 @@ declare module '@polkadot/api-base/types/events' {
|
|
|
375
375
|
registration: PalletDomainsDomainRegistration;
|
|
376
376
|
}>;
|
|
377
377
|
/**
|
|
378
|
-
* A
|
|
378
|
+
* A domain registration failed due to an error
|
|
379
379
|
**/
|
|
380
380
|
DomainRegistrationError: AugmentedEvent<ApiType, [domainHash: H256, accountId: AccountId32, error: SpRuntimeDispatchError], {
|
|
381
381
|
domainHash: H256;
|
|
@@ -383,13 +383,13 @@ declare module '@polkadot/api-base/types/events' {
|
|
|
383
383
|
error: SpRuntimeDispatchError;
|
|
384
384
|
}>;
|
|
385
385
|
/**
|
|
386
|
-
* A
|
|
386
|
+
* A domain was registered
|
|
387
387
|
**/
|
|
388
388
|
DomainRenewed: AugmentedEvent<ApiType, [domainHash: H256], {
|
|
389
389
|
domainHash: H256;
|
|
390
390
|
}>;
|
|
391
391
|
/**
|
|
392
|
-
* A
|
|
392
|
+
* A domain zone record was updated
|
|
393
393
|
**/
|
|
394
394
|
ZoneRecordUpdated: AugmentedEvent<ApiType, [domainHash: H256, zoneRecord: ArgonPrimitivesDomainZoneRecord], {
|
|
395
395
|
domainHash: H256;
|
|
@@ -541,17 +541,6 @@ declare module '@polkadot/api-base/types/events' {
|
|
|
541
541
|
notebookNumber: u32;
|
|
542
542
|
}>;
|
|
543
543
|
};
|
|
544
|
-
offences: {
|
|
545
|
-
/**
|
|
546
|
-
* There is an offence reported of the given `kind` happened at the `session_index` and
|
|
547
|
-
* (kind-specific) time slot. This event is not deposited for duplicate slashes.
|
|
548
|
-
* \[kind, timeslot\].
|
|
549
|
-
**/
|
|
550
|
-
Offence: AugmentedEvent<ApiType, [kind: U8aFixed, timeslot: Bytes], {
|
|
551
|
-
kind: U8aFixed;
|
|
552
|
-
timeslot: Bytes;
|
|
553
|
-
}>;
|
|
554
|
-
};
|
|
555
544
|
ownership: {
|
|
556
545
|
/**
|
|
557
546
|
* A balance was set by root.
|
|
@@ -763,15 +752,6 @@ declare module '@polkadot/api-base/types/events' {
|
|
|
763
752
|
disambiguationIndex: u16;
|
|
764
753
|
}>;
|
|
765
754
|
};
|
|
766
|
-
session: {
|
|
767
|
-
/**
|
|
768
|
-
* New session has happened. Note that the argument is the session index, not the
|
|
769
|
-
* block number as the type might suggest.
|
|
770
|
-
**/
|
|
771
|
-
NewSession: AugmentedEvent<ApiType, [sessionIndex: u32], {
|
|
772
|
-
sessionIndex: u32;
|
|
773
|
-
}>;
|
|
774
|
-
};
|
|
775
755
|
sudo: {
|
|
776
756
|
/**
|
|
777
757
|
* The sudo key has been updated.
|
|
@@ -3,7 +3,7 @@ import type { ApiTypes, AugmentedQuery, QueryableStorageEntry } from '@polkadot/
|
|
|
3
3
|
import type { BTreeMap, Bytes, Null, Option, U256, U8aFixed, Vec, bool, u128, u16, u32, u64 } from '@polkadot/types-codec';
|
|
4
4
|
import type { AnyNumber, ITuple } from '@polkadot/types-codec/types';
|
|
5
5
|
import type { AccountId32, H256 } from '@polkadot/types/interfaces/runtime';
|
|
6
|
-
import type {
|
|
6
|
+
import type { ArgonNotaryAuditErrorVerifyError, ArgonPrimitivesBalanceChangeAccountOrigin, ArgonPrimitivesBitcoinBitcoinBlock, ArgonPrimitivesBitcoinBitcoinNetwork, ArgonPrimitivesBitcoinBitcoinXPub, ArgonPrimitivesBitcoinUtxoRef, ArgonPrimitivesBitcoinUtxoValue, ArgonPrimitivesBlockSealBlockPayout, ArgonPrimitivesBlockSealMiningRegistration, ArgonPrimitivesBlockSealMiningSlotConfig, ArgonPrimitivesBond, ArgonPrimitivesBondVault, ArgonPrimitivesDigestsBlockVoteDigest, ArgonPrimitivesDigestsNotebookDigest, ArgonPrimitivesDigestsParentVotingKeyDigest, ArgonPrimitivesDomainZoneRecord, ArgonPrimitivesInherentsBlockSealInherent, ArgonPrimitivesNotaryNotaryMeta, ArgonPrimitivesNotaryNotaryNotebookKeyDetails, ArgonPrimitivesNotaryNotaryNotebookVoteDigestDetails, ArgonPrimitivesNotaryNotaryRecord, ArgonPrimitivesProvidersBlockSealerInfo, ArgonPrimitivesTickTicker, FrameSupportDispatchPerDispatchClassWeight, FrameSupportTokensMiscIdAmountRuntimeFreezeReason, FrameSupportTokensMiscIdAmountRuntimeHoldReason, FrameSystemAccountInfo, FrameSystemCodeUpgradeAuthorization, FrameSystemEventRecord, FrameSystemLastRuntimeUpgradeInfo, FrameSystemPhase, PalletBalancesAccountData, PalletBalancesBalanceLock, PalletBalancesReserveData, PalletBondUtxoCosignRequest, PalletBondUtxoState, PalletChainTransferQueuedTransferOut, PalletDomainsDomainRegistration, PalletGrandpaStoredPendingChange, PalletGrandpaStoredState, PalletMultisigMultisig, PalletPriceIndexPriceIndex, PalletProxyAnnouncement, PalletProxyProxyDefinition, PalletTransactionPaymentReleases, SpConsensusGrandpaAppPublic, SpRuntimeDigest } from '@polkadot/types/lookup';
|
|
7
7
|
import type { Observable } from '@polkadot/types/types';
|
|
8
8
|
export type __AugmentedQuery<ApiType extends ApiTypes> = AugmentedQuery<ApiType, () => unknown>;
|
|
9
9
|
export type __QueryableStorageEntry<ApiType extends ApiTypes> = QueryableStorageEntry<ApiType>;
|
|
@@ -206,7 +206,7 @@ declare module '@polkadot/api-base/types/storage' {
|
|
|
206
206
|
pendingTransfersOut: AugmentedQuery<ApiType, (arg: u32 | AnyNumber | Uint8Array) => Observable<Option<PalletChainTransferQueuedTransferOut>>, [u32]>;
|
|
207
207
|
transfersUsedInBlockNotebooks: AugmentedQuery<ApiType, (arg: u32 | AnyNumber | Uint8Array) => Observable<Vec<ITuple<[AccountId32, u32]>>>, [u32]>;
|
|
208
208
|
};
|
|
209
|
-
|
|
209
|
+
domains: {
|
|
210
210
|
expiringDomainsByBlock: AugmentedQuery<ApiType, (arg: u32 | AnyNumber | Uint8Array) => Observable<Vec<H256>>, [u32]>;
|
|
211
211
|
registeredDomains: AugmentedQuery<ApiType, (arg: H256 | string | Uint8Array) => Observable<Option<PalletDomainsDomainRegistration>>, [H256]>;
|
|
212
212
|
zoneRecordsByDomain: AugmentedQuery<ApiType, (arg: H256 | string | Uint8Array) => Observable<Option<ArgonPrimitivesDomainZoneRecord>>, [H256]>;
|
|
@@ -251,16 +251,6 @@ declare module '@polkadot/api-base/types/storage' {
|
|
|
251
251
|
**/
|
|
252
252
|
state: AugmentedQuery<ApiType, () => Observable<PalletGrandpaStoredState>, []>;
|
|
253
253
|
};
|
|
254
|
-
historical: {
|
|
255
|
-
/**
|
|
256
|
-
* Mapping from historical session indices to session-data root hash and validator count.
|
|
257
|
-
**/
|
|
258
|
-
historicalSessions: AugmentedQuery<ApiType, (arg: u32 | AnyNumber | Uint8Array) => Observable<Option<ITuple<[H256, u32]>>>, [u32]>;
|
|
259
|
-
/**
|
|
260
|
-
* The range of historical sessions we store. [first, last)
|
|
261
|
-
**/
|
|
262
|
-
storedRange: AugmentedQuery<ApiType, () => Observable<Option<ITuple<[u32, u32]>>>, []>;
|
|
263
|
-
};
|
|
264
254
|
miningSlot: {
|
|
265
255
|
/**
|
|
266
256
|
* Lookup by account id to the corresponding index in ActiveMinersByIndex and Authorities
|
|
@@ -275,7 +265,7 @@ declare module '@polkadot/api-base/types/storage' {
|
|
|
275
265
|
* Authorities are the session keys that are actively participating in the network.
|
|
276
266
|
* The tuple is the authority, and the blake2 256 hash of the authority used for xor lookups
|
|
277
267
|
**/
|
|
278
|
-
|
|
268
|
+
authorityHashByIndex: AugmentedQuery<ApiType, () => Observable<BTreeMap<u32, U256>>, []>;
|
|
279
269
|
/**
|
|
280
270
|
* The number of bids per slot for the last 10 slots (newest first)
|
|
281
271
|
**/
|
|
@@ -366,16 +356,6 @@ declare module '@polkadot/api-base/types/storage' {
|
|
|
366
356
|
**/
|
|
367
357
|
tempNotebookDigest: AugmentedQuery<ApiType, () => Observable<Option<ArgonPrimitivesDigestsNotebookDigest>>, []>;
|
|
368
358
|
};
|
|
369
|
-
offences: {
|
|
370
|
-
/**
|
|
371
|
-
* A vector of reports of the same kind that happened at the same time slot.
|
|
372
|
-
**/
|
|
373
|
-
concurrentReportsIndex: AugmentedQuery<ApiType, (arg1: U8aFixed | string | Uint8Array, arg2: Bytes | string | Uint8Array) => Observable<Vec<H256>>, [U8aFixed, Bytes]>;
|
|
374
|
-
/**
|
|
375
|
-
* The primary structure that holds all offence records keyed by report identifiers.
|
|
376
|
-
**/
|
|
377
|
-
reports: AugmentedQuery<ApiType, (arg: H256 | string | Uint8Array) => Observable<Option<SpStakingOffenceOffenceDetails>>, [H256]>;
|
|
378
|
-
};
|
|
379
359
|
ownership: {
|
|
380
360
|
/**
|
|
381
361
|
* The Balances pallet example of storing the balance of an account.
|
|
@@ -455,42 +435,6 @@ declare module '@polkadot/api-base/types/storage' {
|
|
|
455
435
|
**/
|
|
456
436
|
proxies: AugmentedQuery<ApiType, (arg: AccountId32 | string | Uint8Array) => Observable<ITuple<[Vec<PalletProxyProxyDefinition>, u128]>>, [AccountId32]>;
|
|
457
437
|
};
|
|
458
|
-
session: {
|
|
459
|
-
/**
|
|
460
|
-
* Current index of the session.
|
|
461
|
-
**/
|
|
462
|
-
currentIndex: AugmentedQuery<ApiType, () => Observable<u32>, []>;
|
|
463
|
-
/**
|
|
464
|
-
* Indices of disabled validators.
|
|
465
|
-
*
|
|
466
|
-
* The vec is always kept sorted so that we can find whether a given validator is
|
|
467
|
-
* disabled using binary search. It gets cleared when `on_session_ending` returns
|
|
468
|
-
* a new set of identities.
|
|
469
|
-
**/
|
|
470
|
-
disabledValidators: AugmentedQuery<ApiType, () => Observable<Vec<u32>>, []>;
|
|
471
|
-
/**
|
|
472
|
-
* The owner of a key. The key is the `KeyTypeId` + the encoded key.
|
|
473
|
-
**/
|
|
474
|
-
keyOwner: AugmentedQuery<ApiType, (arg: ITuple<[SpCoreCryptoKeyTypeId, Bytes]> | [SpCoreCryptoKeyTypeId | string | Uint8Array, Bytes | string | Uint8Array]) => Observable<Option<AccountId32>>, [ITuple<[SpCoreCryptoKeyTypeId, Bytes]>]>;
|
|
475
|
-
/**
|
|
476
|
-
* The next session keys for a validator.
|
|
477
|
-
**/
|
|
478
|
-
nextKeys: AugmentedQuery<ApiType, (arg: AccountId32 | string | Uint8Array) => Observable<Option<ArgonNodeRuntimeOpaqueSessionKeys>>, [AccountId32]>;
|
|
479
|
-
/**
|
|
480
|
-
* True if the underlying economic identities or weighting behind the validators
|
|
481
|
-
* has changed in the queued validator set.
|
|
482
|
-
**/
|
|
483
|
-
queuedChanged: AugmentedQuery<ApiType, () => Observable<bool>, []>;
|
|
484
|
-
/**
|
|
485
|
-
* The queued keys for the next session. When the next session begins, these keys
|
|
486
|
-
* will be used to determine the validator's session keys.
|
|
487
|
-
**/
|
|
488
|
-
queuedKeys: AugmentedQuery<ApiType, () => Observable<Vec<ITuple<[AccountId32, ArgonNodeRuntimeOpaqueSessionKeys]>>>, []>;
|
|
489
|
-
/**
|
|
490
|
-
* The current set of validators.
|
|
491
|
-
**/
|
|
492
|
-
validators: AugmentedQuery<ApiType, () => Observable<Vec<AccountId32>>, []>;
|
|
493
|
-
};
|
|
494
438
|
sudo: {
|
|
495
439
|
/**
|
|
496
440
|
* The `AccountId` of the sudo key.
|
|
@@ -3,7 +3,7 @@ import type { ApiTypes, AugmentedSubmittable, SubmittableExtrinsic, SubmittableE
|
|
|
3
3
|
import type { Bytes, Compact, Option, U8aFixed, Vec, bool, u128, u16, u32, u64 } from '@polkadot/types-codec';
|
|
4
4
|
import type { AnyNumber, IMethod, ITuple } from '@polkadot/types-codec/types';
|
|
5
5
|
import type { AccountId32, Call, H256, MultiAddress } from '@polkadot/types/interfaces/runtime';
|
|
6
|
-
import type { ArgonNodeRuntimeOpaqueSessionKeys, ArgonNodeRuntimeOriginCaller, ArgonNodeRuntimeProxyType, ArgonPrimitivesBitcoinCompressedBitcoinPubkey, ArgonPrimitivesBitcoinH256Le, ArgonPrimitivesBitcoinOpaqueBitcoinXpub, ArgonPrimitivesBlockSealRewardDestination, ArgonPrimitivesBondVaultTerms, ArgonPrimitivesDomainZoneRecord, ArgonPrimitivesInherentsBitcoinUtxoSync, ArgonPrimitivesInherentsBlockSealInherent, ArgonPrimitivesNotaryNotaryMeta, ArgonPrimitivesNotebookSignedNotebookHeader, PalletBalancesAdjustmentDirection, PalletMiningSlotMiningSlotBid, PalletMultisigTimepoint, PalletPriceIndexPriceIndex, PalletVaultsVaultConfig, SpConsensusGrandpaEquivocationProof,
|
|
6
|
+
import type { ArgonNodeRuntimeOpaqueSessionKeys, ArgonNodeRuntimeOriginCaller, ArgonNodeRuntimeProxyType, ArgonPrimitivesBitcoinCompressedBitcoinPubkey, ArgonPrimitivesBitcoinH256Le, ArgonPrimitivesBitcoinOpaqueBitcoinXpub, ArgonPrimitivesBlockSealRewardDestination, ArgonPrimitivesBondVaultTerms, ArgonPrimitivesDomainZoneRecord, ArgonPrimitivesInherentsBitcoinUtxoSync, ArgonPrimitivesInherentsBlockSealInherent, ArgonPrimitivesNotaryNotaryMeta, ArgonPrimitivesNotebookSignedNotebookHeader, PalletBalancesAdjustmentDirection, PalletMiningSlotMiningSlotBid, PalletMultisigTimepoint, PalletPriceIndexPriceIndex, PalletVaultsVaultConfig, SpConsensusGrandpaEquivocationProof, SpCoreVoid, SpWeightsWeightV2Weight } from '@polkadot/types/lookup';
|
|
7
7
|
export type __AugmentedSubmittable = AugmentedSubmittable<() => unknown>;
|
|
8
8
|
export type __SubmittableExtrinsic<ApiType extends ApiTypes> = SubmittableExtrinsic<ApiType>;
|
|
9
9
|
export type __SubmittableExtrinsicFunction<ApiType extends ApiTypes> = SubmittableExtrinsicFunction<ApiType>;
|
|
@@ -232,7 +232,7 @@ declare module '@polkadot/api-base/types/submittable' {
|
|
|
232
232
|
chainTransfer: {
|
|
233
233
|
sendToLocalchain: AugmentedSubmittable<(amount: Compact<u128> | AnyNumber | Uint8Array, notaryId: u32 | AnyNumber | Uint8Array) => SubmittableExtrinsic<ApiType>, [Compact<u128>, u32]>;
|
|
234
234
|
};
|
|
235
|
-
|
|
235
|
+
domains: {
|
|
236
236
|
setZoneRecord: AugmentedSubmittable<(domainHash: H256 | string | Uint8Array, zoneRecord: ArgonPrimitivesDomainZoneRecord | {
|
|
237
237
|
paymentAccount?: any;
|
|
238
238
|
notaryId?: any;
|
|
@@ -264,11 +264,7 @@ declare module '@polkadot/api-base/types/submittable' {
|
|
|
264
264
|
reportEquivocation: AugmentedSubmittable<(equivocationProof: SpConsensusGrandpaEquivocationProof | {
|
|
265
265
|
setId?: any;
|
|
266
266
|
equivocation?: any;
|
|
267
|
-
} | string | Uint8Array, keyOwnerProof:
|
|
268
|
-
session?: any;
|
|
269
|
-
trieNodes?: any;
|
|
270
|
-
validatorCount?: any;
|
|
271
|
-
} | string | Uint8Array) => SubmittableExtrinsic<ApiType>, [SpConsensusGrandpaEquivocationProof, SpSessionMembershipProof]>;
|
|
267
|
+
} | string | Uint8Array, keyOwnerProof: SpCoreVoid | null) => SubmittableExtrinsic<ApiType>, [SpConsensusGrandpaEquivocationProof, SpCoreVoid]>;
|
|
272
268
|
/**
|
|
273
269
|
* Report voter equivocation/misbehavior. This method will verify the
|
|
274
270
|
* equivocation proof and validate the given key ownership proof
|
|
@@ -283,11 +279,7 @@ declare module '@polkadot/api-base/types/submittable' {
|
|
|
283
279
|
reportEquivocationUnsigned: AugmentedSubmittable<(equivocationProof: SpConsensusGrandpaEquivocationProof | {
|
|
284
280
|
setId?: any;
|
|
285
281
|
equivocation?: any;
|
|
286
|
-
} | string | Uint8Array, keyOwnerProof:
|
|
287
|
-
session?: any;
|
|
288
|
-
trieNodes?: any;
|
|
289
|
-
validatorCount?: any;
|
|
290
|
-
} | string | Uint8Array) => SubmittableExtrinsic<ApiType>, [SpConsensusGrandpaEquivocationProof, SpSessionMembershipProof]>;
|
|
282
|
+
} | string | Uint8Array, keyOwnerProof: SpCoreVoid | null) => SubmittableExtrinsic<ApiType>, [SpConsensusGrandpaEquivocationProof, SpCoreVoid]>;
|
|
291
283
|
};
|
|
292
284
|
miningSlot: {
|
|
293
285
|
/**
|
|
@@ -326,7 +318,10 @@ declare module '@polkadot/api-base/types/submittable' {
|
|
|
326
318
|
Owner: any;
|
|
327
319
|
} | {
|
|
328
320
|
Account: any;
|
|
329
|
-
} | string | Uint8Array
|
|
321
|
+
} | string | Uint8Array, keys: ArgonNodeRuntimeOpaqueSessionKeys | {
|
|
322
|
+
grandpa?: any;
|
|
323
|
+
blockSealAuthority?: any;
|
|
324
|
+
} | string | Uint8Array) => SubmittableExtrinsic<ApiType>, [Option<PalletMiningSlotMiningSlotBid>, ArgonPrimitivesBlockSealRewardDestination, ArgonNodeRuntimeOpaqueSessionKeys]>;
|
|
330
325
|
};
|
|
331
326
|
mint: {};
|
|
332
327
|
multisig: {
|
|
@@ -889,38 +884,6 @@ declare module '@polkadot/api-base/types/submittable' {
|
|
|
889
884
|
Address20: any;
|
|
890
885
|
} | string | Uint8Array, proxyType: ArgonNodeRuntimeProxyType | 'Any' | 'NonTransfer' | 'PriceIndex' | number | Uint8Array, delay: u32 | AnyNumber | Uint8Array) => SubmittableExtrinsic<ApiType>, [MultiAddress, ArgonNodeRuntimeProxyType, u32]>;
|
|
891
886
|
};
|
|
892
|
-
session: {
|
|
893
|
-
/**
|
|
894
|
-
* Removes any session key(s) of the function caller.
|
|
895
|
-
*
|
|
896
|
-
* This doesn't take effect until the next session.
|
|
897
|
-
*
|
|
898
|
-
* The dispatch origin of this function must be Signed and the account must be either be
|
|
899
|
-
* convertible to a validator ID using the chain's typical addressing system (this usually
|
|
900
|
-
* means being a controller account) or directly convertible into a validator ID (which
|
|
901
|
-
* usually means being a stash account).
|
|
902
|
-
*
|
|
903
|
-
* ## Complexity
|
|
904
|
-
* - `O(1)` in number of key types. Actual cost depends on the number of length of
|
|
905
|
-
* `T::Keys::key_ids()` which is fixed.
|
|
906
|
-
**/
|
|
907
|
-
purgeKeys: AugmentedSubmittable<() => SubmittableExtrinsic<ApiType>, []>;
|
|
908
|
-
/**
|
|
909
|
-
* Sets the session key(s) of the function caller to `keys`.
|
|
910
|
-
* Allows an account to set its session key prior to becoming a validator.
|
|
911
|
-
* This doesn't take effect until the next session.
|
|
912
|
-
*
|
|
913
|
-
* The dispatch origin of this function must be signed.
|
|
914
|
-
*
|
|
915
|
-
* ## Complexity
|
|
916
|
-
* - `O(1)`. Actual cost depends on the number of length of `T::Keys::key_ids()` which is
|
|
917
|
-
* fixed.
|
|
918
|
-
**/
|
|
919
|
-
setKeys: AugmentedSubmittable<(keys: ArgonNodeRuntimeOpaqueSessionKeys | {
|
|
920
|
-
grandpa?: any;
|
|
921
|
-
blockSealAuthority?: any;
|
|
922
|
-
} | string | Uint8Array, proof: Bytes | string | Uint8Array) => SubmittableExtrinsic<ApiType>, [ArgonNodeRuntimeOpaqueSessionKeys, Bytes]>;
|
|
923
|
-
};
|
|
924
887
|
sudo: {
|
|
925
888
|
/**
|
|
926
889
|
* Permanently removes the sudo key.
|