pub enum CommandBody<'a> {
Show 32 variants Capability, Noop, Logout, StartTLS, Authenticate { mechanism: AuthMechanism<'a>, initial_response: Option<Secret<Cow<'a, [u8]>>>, }, Login { username: AString<'a>, password: Secret<AString<'a>>, }, Select { mailbox: Mailbox<'a>, }, Unselect, Examine { mailbox: Mailbox<'a>, }, Create { mailbox: Mailbox<'a>, }, Delete { mailbox: Mailbox<'a>, }, Rename { from: Mailbox<'a>, to: Mailbox<'a>, }, Subscribe { mailbox: Mailbox<'a>, }, Unsubscribe { mailbox: Mailbox<'a>, }, List { reference: Mailbox<'a>, mailbox_wildcard: ListMailbox<'a>, }, Lsub { reference: Mailbox<'a>, mailbox_wildcard: ListMailbox<'a>, }, Status { mailbox: Mailbox<'a>, item_names: Cow<'a, [StatusDataItemName]>, }, Append { mailbox: Mailbox<'a>, flags: Vec<Flag<'a>>, date: Option<DateTime>, message: Literal<'a>, }, Check, Close, Expunge, Search { charset: Option<Charset<'a>>, criteria: SearchKey<'a>, uid: bool, }, Fetch { sequence_set: SequenceSet, macro_or_item_names: MacroOrMessageDataItemNames<'a>, uid: bool, }, Store { sequence_set: SequenceSet, kind: StoreType, response: StoreResponse, flags: Vec<Flag<'a>>, uid: bool, }, Copy { sequence_set: SequenceSet, mailbox: Mailbox<'a>, uid: bool, }, Idle, Enable { capabilities: NonEmptyVec<CapabilityEnable<'a>>, }, Compress { algorithm: CompressionAlgorithm, }, GetQuota { root: AString<'a>, }, GetQuotaRoot { mailbox: Mailbox<'a>, }, SetQuota { root: AString<'a>, quotas: Vec<QuotaSet<'a>>, }, Move { sequence_set: SequenceSet, mailbox: Mailbox<'a>, uid: bool, },
}

Variants§

§

Capability

6.1.1. CAPABILITY Command
  • Arguments: none
  • Responses: REQUIRED untagged response: CAPABILITY
  • Result:
    • OK - capability completed
    • BAD - command unknown or arguments invalid

The CAPABILITY command requests a listing of capabilities that the server supports. The server MUST send a single untagged CAPABILITY response with “IMAP4rev1” as one of the listed capabilities before the (tagged) OK response.

A capability name which begins with “AUTH=” indicates that the server supports that particular authentication mechanism. All such names are, by definition, part of this specification. For example, the authorization capability for an experimental “blurdybloop” authenticator would be “AUTH=XBLURDYBLOOP” and not “XAUTH=BLURDYBLOOP” or “XAUTH=XBLURDYBLOOP”.

Other capability names refer to extensions, revisions, or amendments to this specification. See the documentation of the CAPABILITY response for additional information. No capabilities, beyond the base IMAP4rev1 set defined in this specification, are enabled without explicit client action to invoke the capability.

Client and server implementations MUST implement the STARTTLS, LOGINDISABLED, and AUTH=PLAIN (described in [IMAP-TLS]) capabilities. See the Security Considerations section for important information.

See the section entitled “Client Commands - Experimental/Expansion” for information about the form of site or implementation-specific capabilities.

§

Noop

6.1.2. NOOP Command
  • Arguments: none
  • Responses: no specific responses for this command (but see below)
  • Result:
    • OK - noop completed
    • BAD - command unknown or arguments invalid

The NOOP command always succeeds. It does nothing.

Since any command can return a status update as untagged data, the NOOP command can be used as a periodic poll for new messages or message status updates during a period of inactivity (this is the preferred method to do this). The NOOP command can also be used to reset any inactivity autologout timer on the server.

§

Logout

6.1.3. LOGOUT Command
  • Arguments: none
  • Responses: REQUIRED untagged response: BYE
  • Result:
    • OK - logout completed
    • BAD - command unknown or arguments invalid

The LOGOUT command informs the server that the client is done with the connection. The server MUST send a BYE untagged response before the (tagged) OK response, and then close the network connection.

§

StartTLS

Available on crate feature starttls only.
6.2.1. STARTTLS Command
  • Arguments: none
  • Responses: no specific response for this command
  • Result:
    • OK - starttls completed, begin TLS negotiation
    • BAD - command unknown or arguments invalid

A [TLS] negotiation begins immediately after the CRLF at the end of the tagged OK response from the server. Once a client issues a STARTTLS command, it MUST NOT issue further commands until a server response is seen and the [TLS] negotiation is complete.

The server remains in the non-authenticated state, even if client credentials are supplied during the [TLS] negotiation. This does not preclude an authentication mechanism such as EXTERNAL (defined in [SASL]) from using client identity determined by the [TLS] negotiation.

Once [TLS] has been started, the client MUST discard cached information about server capabilities and SHOULD re-issue the CAPABILITY command. This is necessary to protect against man-in- the-middle attacks which alter the capabilities list prior to STARTTLS. The server MAY advertise different capabilities after STARTTLS.

§

Authenticate

Fields

§mechanism: AuthMechanism<'a>
§initial_response: Option<Secret<Cow<'a, [u8]>>>
Available on crate feature ext_sasl_ir only.

Already base64-decoded

6.2.2. AUTHENTICATE Command
  • Arguments: authentication mechanism name
  • Responses: continuation data can be requested
  • Result:
    • OK - authenticate completed, now in authenticated state
    • NO - authenticate failure: unsupported authentication mechanism, credentials rejected
    • BAD - command unknown or arguments invalid, authentication exchange cancelled

The AUTHENTICATE command indicates a [SASL] authentication mechanism to the server. If the server supports the requested authentication mechanism, it performs an authentication protocol exchange to authenticate and identify the client. It MAY also negotiate an OPTIONAL security layer for subsequent protocol interactions. If the requested authentication mechanism is not supported, the server SHOULD reject the AUTHENTICATE command by sending a tagged NO response.

The AUTHENTICATE command does not support the optional “initial response” feature of [SASL]. Section 5.1 of [SASL] specifies how to handle an authentication mechanism which uses an initial response.

The service name specified by this protocol’s profile of [SASL] is “imap”.

The authentication protocol exchange consists of a series of server challenges and client responses that are specific to the authentication mechanism. A server challenge consists of a command continuation request response with the “+” token followed by a BASE64 encoded string. The client response consists of a single line consisting of a BASE64 encoded string. If the client wishes to cancel an authentication exchange, it issues a line consisting of a single “*”. If the server receives such a response, it MUST reject the AUTHENTICATE command by sending a tagged BAD response.

If a security layer is negotiated through the [SASL] authentication exchange, it takes effect immediately following the CRLF that concludes the authentication exchange for the client, and the CRLF of the tagged OK response for the server.

While client and server implementations MUST implement the AUTHENTICATE command itself, it is not required to implement any authentication mechanisms other than the PLAIN mechanism described in [IMAP-TLS]. Also, an authentication mechanism is not required to support any security layers.

Note: a server implementation MUST implement a configuration in which it does NOT permit any plaintext password mechanisms, unless either the STARTTLS command has been negotiated or some other mechanism that protects the session from password snooping has been provided. Server sites SHOULD NOT use any configuration which permits a plaintext password mechanism without such a protection mechanism against password snooping. Client and server implementations SHOULD implement additional [SASL] mechanisms that do not use plaintext passwords, such the GSSAPI mechanism described in [SASL] and/or the [DIGEST-MD5] mechanism.

Servers and clients can support multiple authentication mechanisms. The server SHOULD list its supported authentication mechanisms in the response to the CAPABILITY command so that the client knows which authentication mechanisms to use.

A server MAY include a CAPABILITY response code in the tagged OK response of a successful AUTHENTICATE command in order to send capabilities automatically. It is unnecessary for a client to send a separate CAPABILITY command if it recognizes these automatic capabilities. This should only be done if a security layer was not negotiated by the AUTHENTICATE command, because the tagged OK response as part of an AUTHENTICATE command is not protected by encryption/integrity checking. [SASL] requires the client to re-issue a CAPABILITY command in this case.

If an AUTHENTICATE command fails with a NO response, the client MAY try another authentication mechanism by issuing another AUTHENTICATE command. It MAY also attempt to authenticate by using the LOGIN command (see section 6.2.3 for more detail). In other words, the client MAY request authentication types in decreasing order of preference, with the LOGIN command as a last resort.

The authorization identity passed from the client to the server during the authentication exchange is interpreted by the server as the user name whose privileges the client is requesting.

§

Login

Fields

§username: AString<'a>
§password: Secret<AString<'a>>
6.2.3. LOGIN Command
  • Arguments:
    • user name
    • password
  • Responses: no specific responses for this command
  • Result:
    • OK - login completed, now in authenticated state
    • NO - login failure: user name or password rejected
    • BAD - command unknown or arguments invalid

The LOGIN command identifies the client to the server and carries the plaintext password authenticating this user.

A server MAY include a CAPABILITY response code in the tagged OK response to a successful LOGIN command in order to send capabilities automatically. It is unnecessary for a client to send a separate CAPABILITY command if it recognizes these automatic capabilities.

Note: Use of the LOGIN command over an insecure network (such as the Internet) is a security risk, because anyone monitoring network traffic can obtain plaintext passwords. The LOGIN command SHOULD NOT be used except as a last resort, and it is recommended that client implementations have a means to disable any automatic use of the LOGIN command.

Unless either the STARTTLS command has been negotiated or some other mechanism that protects the session from password snooping has been provided, a server implementation MUST implement a configuration in which it advertises the LOGINDISABLED capability and does NOT permit the LOGIN command. Server sites SHOULD NOT use any configuration which permits the LOGIN command without such a protection mechanism against password snooping. A client implementation MUST NOT send a LOGIN command if the LOGINDISABLED capability is advertised.

§

Select

Fields

§mailbox: Mailbox<'a>
6.3.1. SELECT Command
  • Arguments: mailbox name
  • Responses:
    • REQUIRED untagged responses: FLAGS, EXISTS, RECENT
    • REQUIRED OK untagged responses: UNSEEN, PERMANENTFLAGS, UIDNEXT, UIDVALIDITY
  • Result:
    • OK - select completed, now in selected state
    • NO - select failure, now in authenticated state: no such mailbox, can’t access mailbox
    • BAD - command unknown or arguments invalid

The SELECT command selects a mailbox so that messages in the mailbox can be accessed. Before returning an OK to the client, the server MUST send the following untagged data to the client. Note that earlier versions of this protocol only required the FLAGS, EXISTS, and RECENT untagged data; consequently, client implementations SHOULD implement default behavior for missing data as discussed with the individual item.

FLAGS Defined flags in the mailbox. See the description of the FLAGS response for more detail.

<n> EXISTS The number of messages in the mailbox. See the description of the EXISTS response for more detail.

<n> RECENT The number of messages with the \Recent flag set. See the description of the RECENT response for more detail.

OK [UNSEEN <n>] The message sequence number of the first unseen message in the mailbox. If this is missing, the client can not make any assumptions about the first unseen message in the mailbox, and needs to issue a SEARCH command if it wants to find it.

OK [PERMANENTFLAGS (<list of flags>)] A list of message flags that the client can change permanently. If this is missing, the client should assume that all flags can be changed permanently.

OK [UIDNEXT <n>] The next unique identifier value. Refer to section 2.3.1.1 for more information. If this is missing, the client can not make any assumptions about the next unique identifier value.

OK [UIDVALIDITY <n>] The unique identifier validity value. Refer to section 2.3.1.1 for more information. If this is missing, the server does not support unique identifiers.

Only one mailbox can be selected at a time in a connection; simultaneous access to multiple mailboxes requires multiple connections. The SELECT command automatically deselects any currently selected mailbox before attempting the new selection. Consequently, if a mailbox is selected and a SELECT command that fails is attempted, no mailbox is selected.

If the client is permitted to modify the mailbox, the server SHOULD prefix the text of the tagged OK response with the “[READ-WRITE]” response code.

If the client is not permitted to modify the mailbox but is permitted read access, the mailbox is selected as read-only, and the server MUST prefix the text of the tagged OK response to SELECT with the “[READ-ONLY]” response code. Read-only access through SELECT differs from the EXAMINE command in that certain read-only mailboxes MAY permit the change of permanent state on a per-user (as opposed to global) basis. Netnews messages marked in a server-based .newsrc file are an example of such per-user permanent state that can be modified with read-only mailboxes.

§

Unselect

Available on crate feature ext_unselect only.
§

Examine

Fields

§mailbox: Mailbox<'a>

6.3.2. EXAMINE Command

Arguments: mailbox name Responses: REQUIRED untagged responses: FLAGS, EXISTS, RECENT REQUIRED OK untagged responses: UNSEEN, PERMANENTFLAGS, UIDNEXT, UIDVALIDITY Result: OK - examine completed, now in selected state NO - examine failure, now in authenticated state: no such mailbox, can’t access mailbox BAD - command unknown or arguments invalid

The EXAMINE command is identical to SELECT and returns the same output; however, the selected mailbox is identified as read-only. No changes to the permanent state of the mailbox, including per-user state, are permitted; in particular, EXAMINE MUST NOT cause messages to lose the \Recent flag.

The text of the tagged OK response to the EXAMINE command MUST begin with the “[READ-ONLY]” response code.

§

Create

Fields

§mailbox: Mailbox<'a>
6.3.3. CREATE Command
  • Arguments: mailbox name
  • Responses: no specific responses for this command
  • Result:
    • OK - create completed
    • NO - create failure: can’t create mailbox with that name
    • BAD - command unknown or arguments invalid

The CREATE command creates a mailbox with the given name. An OK response is returned only if a new mailbox with that name has been created. It is an error to attempt to create INBOX or a mailbox with a name that refers to an extant mailbox. Any error in creation will return a tagged NO response.

If the mailbox name is suffixed with the server’s hierarchy separator character (as returned from the server by a LIST command), this is a declaration that the client intends to create mailbox names under this name in the hierarchy. Server implementations that do not require this declaration MUST ignore the declaration. In any case, the name created is without the trailing hierarchy delimiter.

If the server’s hierarchy separator character appears elsewhere in the name, the server SHOULD create any superior hierarchical names that are needed for the CREATE command to be successfully completed. In other words, an attempt to create “foo/bar/zap” on a server in which “/” is the hierarchy separator character SHOULD create foo/ and foo/bar/ if they do not already exist.

If a new mailbox is created with the same name as a mailbox which was deleted, its unique identifiers MUST be greater than any unique identifiers used in the previous incarnation of the mailbox UNLESS the new incarnation has a different unique identifier validity value. See the description of the UID command for more detail.

Note: The interpretation of this example depends on whether “/” was returned as the hierarchy separator from LIST. If “/” is the hierarchy separator, a new level of hierarchy named “owatagusiam” with a member called “blurdybloop” is created. Otherwise, two mailboxes at the same hierarchy level are created.

§

Delete

Fields

§mailbox: Mailbox<'a>

6.3.4. DELETE Command

Arguments: mailbox name Responses: no specific responses for this command Result: OK - delete completed NO - delete failure: can’t delete mailbox with that name BAD - command unknown or arguments invalid

The DELETE command permanently removes the mailbox with the given name. A tagged OK response is returned only if the mailbox has been deleted. It is an error to attempt to delete INBOX or a mailbox name that does not exist.

The DELETE command MUST NOT remove inferior hierarchical names. For example, if a mailbox “foo” has an inferior “foo.bar” (assuming “.” is the hierarchy delimiter character), removing “foo” MUST NOT remove “foo.bar”. It is an error to attempt to delete a name that has inferior hierarchical names and also has the \Noselect mailbox name attribute (see the description of the LIST response for more details).

It is permitted to delete a name that has inferior hierarchical names and does not have the \Noselect mailbox name attribute. In this case, all messages in that mailbox are removed, and the name will acquire the \Noselect mailbox name attribute.

The value of the highest-used unique identifier of the deleted mailbox MUST be preserved so that a new mailbox created with the same name will not reuse the identifiers of the former incarnation, UNLESS the new incarnation has a different unique identifier validity value. See the description of the UID command for more detail.

§

Rename

Fields

§from: Mailbox<'a>
§to: Mailbox<'a>

6.3.5. RENAME Command

Arguments: existing mailbox name new mailbox name Responses: no specific responses for this command Result: OK - rename completed NO - rename failure: can’t rename mailbox with that name, can’t rename to mailbox with that name BAD - command unknown or arguments invalid

The RENAME command changes the name of a mailbox. A tagged OK response is returned only if the mailbox has been renamed. It is an error to attempt to rename from a mailbox name that does not exist or to a mailbox name that already exists. Any error in renaming will return a tagged NO response.

If the name has inferior hierarchical names, then the inferior hierarchical names MUST also be renamed. For example, a rename of “foo” to “zap” will rename “foo/bar” (assuming “/” is the hierarchy delimiter character) to “zap/bar”.

If the server’s hierarchy separator character appears in the name, the server SHOULD create any superior hierarchical names that are needed for the RENAME command to complete successfully. In other words, an attempt to rename “foo/bar/zap” to baz/rag/zowie on a server in which “/” is the hierarchy separator character SHOULD create baz/ and baz/rag/ if they do not already exist.

The value of the highest-used unique identifier of the old mailbox name MUST be preserved so that a new mailbox created with the same name will not reuse the identifiers of the former incarnation, UNLESS the new incarnation has a different unique identifier validity value. See the description of the UID command for more detail.

Renaming INBOX is permitted, and has special behavior. It moves all messages in INBOX to a new mailbox with the given name, leaving INBOX empty. If the server implementation supports inferior hierarchical names of INBOX, these are unaffected by a rename of INBOX.

§

Subscribe

Fields

§mailbox: Mailbox<'a>
6.3.6. SUBSCRIBE Command
  • Arguments: mailbox
  • Responses: no specific responses for this command
  • Result:
    • OK - subscribe completed
    • NO - subscribe failure: can’t subscribe to that name
    • BAD - command unknown or arguments invalid

The SUBSCRIBE command adds the specified mailbox name to the server’s set of “active” or “subscribed” mailboxes as returned by the LSUB command. This command returns a tagged OK response only if the subscription is successful.

A server MAY validate the mailbox argument to SUBSCRIBE to verify that it exists. However, it MUST NOT unilaterally remove an existing mailbox name from the subscription list even if a mailbox by that name no longer exists.

Note: This requirement is because a server site can choose to routinely remove a mailbox with a well-known name (e.g., “system-alerts”) after its contents expire, with the intention of recreating it when new contents are appropriate.

§

Unsubscribe

Fields

§mailbox: Mailbox<'a>

6.3.7. UNSUBSCRIBE Command

Arguments: mailbox name Responses: no specific responses for this command Result: OK - unsubscribe completed NO - unsubscribe failure: can’t unsubscribe that name BAD - command unknown or arguments invalid

The UNSUBSCRIBE command removes the specified mailbox name from the server’s set of “active” or “subscribed” mailboxes as returned by the LSUB command. This command returns a tagged OK response only if the unsubscription is successful.

§

List

Fields

§reference: Mailbox<'a>
§mailbox_wildcard: ListMailbox<'a>
6.3.8. LIST Command
  • Arguments:
    • reference name
    • mailbox name with possible wildcards
  • Responses: untagged responses: LIST
  • Result:
    • OK - list completed
    • NO - list failure: can’t list that reference or name
    • BAD - command unknown or arguments invalid

The LIST command returns a subset of names from the complete set of all names available to the client. Zero or more untagged LIST replies are returned, containing the name attributes, hierarchy delimiter, and name; see the description of the LIST reply for more detail.

The LIST command SHOULD return its data quickly, without undue delay. For example, it SHOULD NOT go to excess trouble to calculate the \Marked or \Unmarked status or perform other processing; if each name requires 1 second of processing, then a list of 1200 names would take 20 minutes!

An empty (“” string) reference name argument indicates that the mailbox name is interpreted as by SELECT. The returned mailbox names MUST match the supplied mailbox name pattern. A non-empty reference name argument is the name of a mailbox or a level of mailbox hierarchy, and indicates the context in which the mailbox name is interpreted.

An empty (“” string) mailbox name argument is a special request to return the hierarchy delimiter and the root name of the name given in the reference. The value returned as the root MAY be the empty string if the reference is non-rooted or is an empty string. In all cases, a hierarchy delimiter (or NIL if there is no hierarchy) is returned. This permits a client to get the hierarchy delimiter (or find out that the mailbox names are flat) even when no mailboxes by that name currently exist.

The reference and mailbox name arguments are interpreted into a canonical form that represents an unambiguous left-to-right hierarchy. The returned mailbox names will be in the interpreted form.

Note: The interpretation of the reference argument is implementation-defined. It depends upon whether the server implementation has a concept of the “current working directory” and leading “break out characters”, which override the current working directory.

For example, on a server which exports a UNIX or NT filesystem, the reference argument contains the current working directory, and the mailbox name argument would contain the name as interpreted in the current working directory.

If a server implementation has no concept of break out characters, the canonical form is normally the reference name appended with the mailbox name. Note that if the server implements the namespace convention (section 5.1.2), “#” is a break out character and must be treated as such.

If the reference argument is not a level of mailbox hierarchy (that is, it is a \NoInferiors name), and/or the reference argument does not end with the hierarchy delimiter, it is implementation-dependent how this is interpreted. For example, a reference of “foo/bar” and mailbox name of “rag/baz” could be interpreted as “foo/bar/rag/baz”, “foo/barrag/baz”, or “foo/rag/baz”. A client SHOULD NOT use such a reference argument except at the explicit request of the user. A hierarchical browser MUST NOT make any assumptions about server interpretation of the reference unless the reference is a level of mailbox hierarchy AND ends with the hierarchy delimiter.

Any part of the reference argument that is included in the interpreted form SHOULD prefix the interpreted form. It SHOULD also be in the same form as the reference name argument. This rule permits the client to determine if the returned mailbox name is in the context of the reference argument, or if something about the mailbox argument overrode the reference argument. Without this rule, the client would have to have knowledge of the server’s naming semantics including what characters are “breakouts” that override a naming context.

For example, here are some examples of how references and mailbox names might be interpreted on a UNIX-based server:

Reference     Mailbox Name  Interpretation
------------  ------------  --------------
~smith/Mail/  foo.*         ~smith/Mail/foo.*
archive/      %             archive/%
#news.        comp.mail.*   #news.comp.mail.*
~smith/Mail/  /usr/doc/foo  /usr/doc/foo
archive/      ~fred/Mail/*  ~fred/Mail/*

The first three examples demonstrate interpretations in the context of the reference argument. Note that “~smith/Mail” SHOULD NOT be transformed into something like “/u2/users/smith/Mail”, or it would be impossible for the client to determine that the interpretation was in the context of the reference.

The character “” is a wildcard, and matches zero or more characters at this position. The character “%” is similar to “”, but it does not match a hierarchy delimiter. If the “%” wildcard is the last character of a mailbox name argument, matching levels of hierarchy are also returned. If these levels of hierarchy are not also selectable mailboxes, they are returned with the \Noselect mailbox name attribute (see the description of the LIST response for more details).

Server implementations are permitted to “hide” otherwise accessible mailboxes from the wildcard characters, by preventing certain characters or names from matching a wildcard in certain situations. For example, a UNIX-based server might restrict the interpretation of “*” so that an initial “/” character does not match.

The special name INBOX is included in the output from LIST, if INBOX is supported by this server for this user and if the uppercase string “INBOX” matches the interpreted reference and mailbox name arguments with wildcards as described above. The criteria for omitting INBOX is whether SELECT INBOX will return failure; it is not relevant whether the user’s real INBOX resides on this or some other server.

§

Lsub

Fields

§reference: Mailbox<'a>
§mailbox_wildcard: ListMailbox<'a>
6.3.9. LSUB Command
  • Arguments:
    • reference name
    • mailbox name with possible wildcards
  • Responses: untagged responses: LSUB
  • Result:
    • OK - lsub completed
    • NO - lsub failure: can’t list that reference or name
    • BAD - command unknown or arguments invalid

The LSUB command returns a subset of names from the set of names that the user has declared as being “active” or “subscribed”. Zero or more untagged LSUB replies are returned. The arguments to LSUB are in the same form as those for LIST.

The returned untagged LSUB response MAY contain different mailbox flags from a LIST untagged response. If this should happen, the flags in the untagged LIST are considered more authoritative.

A special situation occurs when using LSUB with the % wildcard. Consider what happens if “foo/bar” (with a hierarchy delimiter of “/”) is subscribed but “foo” is not. A “%” wildcard to LSUB must return foo, not foo/bar, in the LSUB response, and it MUST be flagged with the \Noselect attribute.

The server MUST NOT unilaterally remove an existing mailbox name from the subscription list even if a mailbox by that name no longer exists.

§

Status

Fields

§mailbox: Mailbox<'a>
§item_names: Cow<'a, [StatusDataItemName]>
6.3.10. STATUS Command
  • Arguments:
    • mailbox name
    • status data item names
  • Responses: untagged responses: STATUS
  • Result:
    • OK - status completed
    • NO - status failure: no status for that name
    • BAD - command unknown or arguments invalid

The STATUS command requests the status of the indicated mailbox. It does not change the currently selected mailbox, nor does it affect the state of any messages in the queried mailbox (in particular, STATUS MUST NOT cause messages to lose the \Recent flag).

The STATUS command provides an alternative to opening a second IMAP4rev1 connection and doing an EXAMINE command on a mailbox to query that mailbox’s status without deselecting the current mailbox in the first IMAP4rev1 connection.

Unlike the LIST command, the STATUS command is not guaranteed to be fast in its response. Under certain circumstances, it can be quite slow. In some implementations, the server is obliged to open the mailbox read-only internally to obtain certain status information. Also unlike the LIST command, the STATUS command does not accept wildcards.

Note: The STATUS command is intended to access the status of mailboxes other than the currently selected mailbox. Because the STATUS command can cause the mailbox to be opened internally, and because this information is available by other means on the selected mailbox, the STATUS command SHOULD NOT be used on the currently selected mailbox.

The STATUS command MUST NOT be used as a “check for new messages in the selected mailbox” operation (refer to sections 7, 7.3.1, and 7.3.2 for more information about the proper method for new message checking).

Because the STATUS command is not guaranteed to be fast in its results, clients SHOULD NOT expect to be able to issue many consecutive STATUS commands and obtain reasonable performance.

§

Append

Fields

§mailbox: Mailbox<'a>
§flags: Vec<Flag<'a>>
§message: Literal<'a>

6.3.11. APPEND Command

Arguments: mailbox name OPTIONAL flag parenthesized list OPTIONAL date/time string message literal Responses: no specific responses for this command Result: OK - append completed NO - append error: can’t append to that mailbox, error in flags or date/time or message text BAD - command unknown or arguments invalid

The APPEND command appends the literal argument as a new message to the end of the specified destination mailbox. This argument SHOULD be in the format of an [RFC-2822] message. 8-bit characters are permitted in the message. A server implementation that is unable to preserve 8-bit data properly MUST be able to reversibly convert 8-bit APPEND data to 7-bit using a [MIME-IMB] content transfer encoding.

Note: There MAY be exceptions, e.g., draft messages, in which required [RFC-2822] header lines are omitted in the message literal argument to APPEND. The full implications of doing so MUST be understood and carefully weighed.

If a flag parenthesized list is specified, the flags SHOULD be set in the resulting message; otherwise, the flag list of the resulting message is set to empty by default. In either case, the Recent flag is also set.

If a date-time is specified, the internal date SHOULD be set in the resulting message; otherwise, the internal date of the resulting message is set to the current date and time by default.

If the append is unsuccessful for any reason, the mailbox MUST be restored to its state before the APPEND attempt; no partial appending is permitted.

If the destination mailbox does not exist, a server MUST return an error, and MUST NOT automatically create the mailbox. Unless it is certain that the destination mailbox can not be created, the server MUST send the response code “[TRYCREATE]” as the prefix of the text of the tagged NO response. This gives a hint to the client that it can attempt a CREATE command and retry the APPEND if the CREATE is successful.

If the mailbox is currently selected, the normal new message actions SHOULD occur. Specifically, the server SHOULD notify the client immediately via an untagged EXISTS response. If the server does not do so, the client MAY issue a NOOP command (or failing that, a CHECK command) after one or more APPEND commands.

Note: The APPEND command is not used for message delivery, because it does not provide a mechanism to transfer [SMTP] envelope information.

§

Check

6.4.1. CHECK Command
  • Arguments: none
  • Responses: no specific responses for this command
  • Result:
    • OK - check completed
    • BAD - command unknown or arguments invalid

The CHECK command requests a checkpoint of the currently selected mailbox. A checkpoint refers to any implementation-dependent housekeeping associated with the mailbox (e.g., resolving the server’s in-memory state of the mailbox with the state on its disk) that is not normally executed as part of each command. A checkpoint MAY take a non-instantaneous amount of real time to complete. If a server implementation has no such housekeeping considerations, CHECK is equivalent to NOOP.

There is no guarantee that an EXISTS untagged response will happen as a result of CHECK. NOOP, not CHECK, SHOULD be used for new message polling.

§

Close

6.4.2. CLOSE Command
  • Arguments: none

  • Responses: no specific responses for this command

  • Result:

    • OK - close completed, now in authenticated state
    • BAD - command unknown or arguments invalid

    The CLOSE command permanently removes all messages that have the \Deleted flag set from the currently selected mailbox, and returns to the authenticated state from the selected state. No untagged EXPUNGE responses are sent.

    No messages are removed, and no error is given, if the mailbox is selected by an EXAMINE command or is otherwise selected read-only.

    Even if a mailbox is selected, a SELECT, EXAMINE, or LOGOUT command MAY be issued without previously issuing a CLOSE command. The SELECT, EXAMINE, and LOGOUT commands implicitly close the currently selected mailbox without doing an expunge. However, when many messages are deleted, a CLOSE-LOGOUT or CLOSE-SELECT sequence is considerably faster than an EXPUNGE-LOGOUT or EXPUNGE-SELECT because no untagged EXPUNGE responses (which the client would probably ignore) are sent.

§

Expunge

6.4.3. EXPUNGE Command

Arguments: none Responses: untagged responses: EXPUNGE Result: OK - expunge completed NO - expunge failure: can’t expunge (e.g., permission denied) BAD - command unknown or arguments invalid

The EXPUNGE command permanently removes all messages that have the \Deleted flag set from the currently selected mailbox. Before returning an OK to the client, an untagged EXPUNGE response is sent for each message that is removed.

Note: In this example, messages 3, 4, 7, and 11 had the \Deleted flag set. See the description of the EXPUNGE response for further explanation.

§

Search

Fields

§charset: Option<Charset<'a>>
§criteria: SearchKey<'a>
§uid: bool
6.4.4. SEARCH Command
  • Arguments:
    • OPTIONAL [CHARSET] specification
    • searching criteria (one or more)
  • Responses: REQUIRED untagged response: SEARCH
  • Result:
    • OK - search completed
    • NO - search error: can’t search that [CHARSET] or criteria
    • BAD - command unknown or arguments invalid

The SEARCH command searches the mailbox for messages that match the given searching criteria. Searching criteria consist of one or more search keys. The untagged SEARCH response from the server contains a listing of message sequence numbers corresponding to those messages that match the searching criteria.

When multiple keys are specified, the result is the intersection (AND function) of all the messages that match those keys. For example, the criteria DELETED FROM “SMITH” SINCE 1-Feb-1994 refers to all deleted messages from Smith that were placed in the mailbox since February 1, 1994. A search key can also be a parenthesized list of one or more search keys (e.g., for use with the OR and NOT keys).

Server implementations MAY exclude [MIME-IMB] body parts with terminal content media types other than TEXT and MESSAGE from consideration in SEARCH matching.

The OPTIONAL [CHARSET] specification consists of the word “CHARSET” followed by a registered [CHARSET]. It indicates the [CHARSET] of the strings that appear in the search criteria. [MIME-IMB] content transfer encodings, and [MIME-HDRS] strings in [RFC-2822]/[MIME-IMB] headers, MUST be decoded before comparing text in a [CHARSET] other than US-ASCII. US-ASCII MUST be supported; other [CHARSET]s MAY be supported.

If the server does not support the specified [CHARSET], it MUST return a tagged NO response (not a BAD). This response SHOULD contain the BADCHARSET response code, which MAY list the [CHARSET]s supported by the server.

In all search keys that use strings, a message matches the key if the string is a substring of the field. The matching is case-insensitive.

See SearchKey enum.

Note: Since this document is restricted to 7-bit ASCII text, it is not possible to show actual UTF-8 data. The “XXXXXX” is a placeholder for what would be 6 octets of 8-bit data in an actual transaction.

§

Fetch

Fields

§sequence_set: SequenceSet
§macro_or_item_names: MacroOrMessageDataItemNames<'a>
§uid: bool
6.4.5. FETCH Command
  • Arguments:
    • sequence set
    • message data item names or macro
  • Responses: untagged responses: FETCH
  • Result:
    • OK - fetch completed
    • NO - fetch error: can’t fetch that data
    • BAD - command unknown or arguments invalid

The FETCH command retrieves data associated with a message in the mailbox. The data items to be fetched can be either a single atom or a parenthesized list.

Most data items, identified in the formal syntax under the msg-att-static rule, are static and MUST NOT change for any particular message. Other data items, identified in the formal syntax under the msg-att-dynamic rule, MAY change, either as a result of a STORE command or due to external events.

For example, if a client receives an ENVELOPE for a message when it already knows the envelope, it can safely ignore the newly transmitted envelope.

§

Store

Fields

§sequence_set: SequenceSet
§response: StoreResponse
§flags: Vec<Flag<'a>>
§uid: bool
6.4.6. STORE Command
  • Arguments:
    • sequence set
    • message data item name
    • value for message data item
  • Responses: untagged responses: FETCH
  • Result:
    • OK - store completed
    • NO - store error: can’t store that data
    • BAD - command unknown or arguments invalid

The STORE command alters data associated with a message in the mailbox. Normally, STORE will return the updated value of the data with an untagged FETCH response. A suffix of “.SILENT” in the data item name prevents the untagged FETCH, and the server SHOULD assume that the client has determined the updated value itself or does not care about the updated value.

Note: Regardless of whether or not the “.SILENT” suffix was used, the server SHOULD send an untagged FETCH response if a change to a message’s flags from an external source is observed. The intent is that the status of the flags is determinate without a race condition.

The currently defined data items that can be stored are:

FLAGS <flag list> Replace the flags for the message (other than \Recent) with the argument. The new value of the flags is returned as if a FETCH of those flags was done.

FLAGS.SILENT <flag list> Equivalent to FLAGS, but without returning a new value.

+FLAGS <flag list> Add the argument to the flags for the message. The new value of the flags is returned as if a FETCH of those flags was done.

+FLAGS.SILENT <flag list> Equivalent to +FLAGS, but without returning a new value.

-FLAGS <flag list> Remove the argument from the flags for the message. The new value of the flags is returned as if a FETCH of those flags was done.

-FLAGS.SILENT <flag list> Equivalent to -FLAGS, but without returning a new value.

§

Copy

Fields

§sequence_set: SequenceSet
§mailbox: Mailbox<'a>
§uid: bool

6.4.7. COPY Command

Arguments: sequence set mailbox name Responses: no specific responses for this command Result: OK - copy completed NO - copy error: can’t copy those messages or to that name BAD - command unknown or arguments invalid

The COPY command copies the specified message(s) to the end of the specified destination mailbox. The flags and internal date of the message(s) SHOULD be preserved, and the Recent flag SHOULD be set, in the copy.

If the destination mailbox does not exist, a server SHOULD return an error. It SHOULD NOT automatically create the mailbox. Unless it is certain that the destination mailbox can not be created, the server MUST send the response code “[TRYCREATE]” as the prefix of the text of the tagged NO response. This gives a hint to the client that it can attempt a CREATE command and retry the COPY if the CREATE is successful.

If the COPY command is unsuccessful for any reason, server implementations MUST restore the destination mailbox to its state before the COPY attempt.

§

Idle

Available on crate feature ext_idle only.

The UID mechanism was inlined into copy, fetch, store, and search. as an additional parameter.

6.4.8. UID Command
  • Arguments:
    • command name
    • command arguments
  • Responses: untagged responses: FETCH, SEARCH
  • Result:
    • OK - UID command completed
    • NO - UID command error
    • BAD - command unknown or arguments invalid

The UID command has two forms. In the first form, it takes as its arguments a COPY, FETCH, or STORE command with arguments appropriate for the associated command. However, the numbers in the sequence set argument are unique identifiers instead of message sequence numbers. Sequence set ranges are permitted, but there is no guarantee that unique identifiers will be contiguous.

A non-existent unique identifier is ignored without any error message generated. Thus, it is possible for a UID FETCH command to return an OK without any data or a UID COPY or UID STORE to return an OK without performing any operations.

In the second form, the UID command takes a SEARCH command with SEARCH command arguments. The interpretation of the arguments is the same as with SEARCH; however, the numbers returned in a SEARCH response for a UID SEARCH command are unique identifiers instead of message sequence numbers. For example, the command UID SEARCH 1:100 UID 443:557 returns the unique identifiers corresponding to the intersection of two sequence sets, the message sequence number range 1:100 and the UID range 443:557.

Note: in the above example, the UID range 443:557 appears. The same comment about a non-existent unique identifier being ignored without any error message also applies here. Hence, even if neither UID 443 or 557 exist, this range is valid and would include an existing UID 495.

Also note that a UID range of 559:* always includes the UID of the last message in the mailbox, even if 559 is higher than any assigned UID value. This is because the contents of a range are independent of the order of the range endpoints. Thus, any UID range with * as one of the endpoints indicates at least one message (the message with the highest numbered UID), unless the mailbox is empty.

The number after the “*” in an untagged FETCH response is always a message sequence number, not a unique identifier, even for a UID command response. However, server implementations MUST implicitly include the UID message data item as part of any FETCH response caused by a UID command, regardless of whether a UID was specified as a message data item to the FETCH.

Note: The rule about including the UID message data item as part of a FETCH response primarily applies to the UID FETCH and UID STORE commands, including a UID FETCH command that does not include UID as a message data item. Although it is unlikely that the other UID commands will cause an untagged FETCH, this rule applies to these commands as well.

§

Enable

Fields

§capabilities: NonEmptyVec<CapabilityEnable<'a>>
Available on crate feature ext_enable only.
§

Compress

Fields

Available on crate feature ext_compress only.
§

GetQuota

Fields

§root: AString<'a>

Name of quota root.

Available on crate feature ext_quota only.

Takes the name of a quota root and returns the quota root’s resource usage and limits in an untagged QUOTA response.

Arguments:

  • quota root

Responses:

  • REQUIRED untagged responses: QUOTA

Result:

  • OK - getquota completed
  • NO - getquota error: no such quota root, permission denied
  • BAD - command unknown or arguments invalid

Example (IMAP)

S: * CAPABILITY [...] QUOTA QUOTA=RES-STORAGE [...]
[...]
C: G0001 GETQUOTA "!partition/sda4"
S: * QUOTA "!partition/sda4" (STORAGE 104 10923847)
S: G0001 OK Getquota complete
§

GetQuotaRoot

Fields

§mailbox: Mailbox<'a>

Name of mailbox.

Available on crate feature ext_quota only.

Takes a mailbox name and returns the list of quota roots for the mailbox in an untagged QUOTAROOT response. For each listed quota root, it also returns the quota root’s resource usage and limits in an untagged QUOTA response.

Arguments:

  • mailbox name

Responses:

  • REQUIRED untagged responses: QUOTAROOT, QUOTA

Result:

  • OK - getquotaroot completed
  • NO - getquotaroot error: permission denied
  • BAD - command unknown or arguments invalid

Note that the mailbox name parameter doesn’t have to reference an existing mailbox. This can be handy in order to determine which quota root would apply to a mailbox when it gets created

Example (IMAP)

S: * CAPABILITY [...] QUOTA QUOTA=RES-STORAGE QUOTA=RES-MESSAGE
[...]
C: G0002 GETQUOTAROOT INBOX
S: * QUOTAROOT INBOX "#user/alice" "!partition/sda4"
S: * QUOTA "#user/alice" (MESSAGE 42 1000)
S: * QUOTA "!partition/sda4" (STORAGE 104 10923847)
S: G0002 OK Getquotaroot complete
§

SetQuota

Fields

§root: AString<'a>

Name of quota root.

§quotas: Vec<QuotaSet<'a>>

List of resource limits.

Available on crate feature ext_quota only.

Changes the mailbox quota root resource limits to the specified limits.

Arguments:

  • quota root list of resource limits

Responses:

  • untagged responses: QUOTA

Result:

  • OK - setquota completed
  • NO - setquota error: can’t set that data
  • BAD - command unknown or arguments invalid

Note: requires the server to advertise the “QUOTASET” capability.

Example (IMAP)

S: * CAPABILITY [...] QUOTA QUOTASET QUOTA=RES-STORAGE QUOTA=RES-
MESSAGE [...]
[...]
C: S0000 GETQUOTA "#user/alice"
S: * QUOTA "#user/alice" (STORAGE 54 111 MESSAGE 42 1000)
S: S0000 OK Getquota completed
C: S0001 SETQUOTA "#user/alice" (STORAGE 510)
S: * QUOTA "#user/alice" (STORAGE 58 512)
// The server has rounded the STORAGE quota limit requested to
the nearest 512 blocks of 1024 octets; otherwise, another client
has performed a near-simultaneous SETQUOTA using a limit of 512.
S: S0001 OK Rounded quota
C: S0002 SETQUOTA "!partition/sda4" (STORAGE 99999999)
S: * QUOTA "!partition/sda4" (STORAGE 104 10923847)
// The server has not changed the quota, since this is a
filesystem limit, and it cannot be changed. The QUOTA
response here is entirely optional.
S: S0002 NO Cannot change system limit
§

Move

Fields

§sequence_set: SequenceSet
§mailbox: Mailbox<'a>
§uid: bool
Available on crate feature ext_move only.

Implementations§

source§

impl<'a> CommandBody<'a>

source

pub fn tag<T>(self, tag: T) -> Result<Command<'a>, T::Error>where T: TryInto<Tag<'a>>,

source

pub fn authenticate(mechanism: AuthMechanism<'a>) -> Self

source

pub fn authenticate_with_ir<I>( mechanism: AuthMechanism<'a>, initial_response: I ) -> Selfwhere I: Into<Cow<'a, [u8]>>,

Available on crate feature ext_sasl_ir only.
source

pub fn login<U, P>( username: U, password: P ) -> Result<Self, LoginError<U::Error, P::Error>>where U: TryInto<AString<'a>>, P: TryInto<AString<'a>>,

source

pub fn select<M>(mailbox: M) -> Result<Self, M::Error>where M: TryInto<Mailbox<'a>>,

source

pub fn examine<M>(mailbox: M) -> Result<Self, M::Error>where M: TryInto<Mailbox<'a>>,

source

pub fn create<M>(mailbox: M) -> Result<Self, M::Error>where M: TryInto<Mailbox<'a>>,

source

pub fn delete<M>(mailbox: M) -> Result<Self, M::Error>where M: TryInto<Mailbox<'a>>,

source

pub fn rename<F, T>( mailbox: F, new_mailbox: T ) -> Result<Self, RenameError<F::Error, T::Error>>where F: TryInto<Mailbox<'a>>, T: TryInto<Mailbox<'a>>,

source

pub fn subscribe<M>(mailbox: M) -> Result<Self, M::Error>where M: TryInto<Mailbox<'a>>,

source

pub fn unsubscribe<M>(mailbox: M) -> Result<Self, M::Error>where M: TryInto<Mailbox<'a>>,

source

pub fn list<A, B>( reference: A, mailbox_wildcard: B ) -> Result<Self, ListError<A::Error, B::Error>>where A: TryInto<Mailbox<'a>>, B: TryInto<ListMailbox<'a>>,

source

pub fn lsub<A, B>( reference: A, mailbox_wildcard: B ) -> Result<Self, ListError<A::Error, B::Error>>where A: TryInto<Mailbox<'a>>, B: TryInto<ListMailbox<'a>>,

source

pub fn status<M, I>(mailbox: M, item_names: I) -> Result<Self, M::Error>where M: TryInto<Mailbox<'a>>, I: Into<Cow<'a, [StatusDataItemName]>>,

source

pub fn append<M, D>( mailbox: M, flags: Vec<Flag<'a>>, date: Option<DateTime>, message: D ) -> Result<Self, AppendError<M::Error, D::Error>>where M: TryInto<Mailbox<'a>>, D: TryInto<Literal<'a>>,

source

pub fn search( charset: Option<Charset<'a>>, criteria: SearchKey<'a>, uid: bool ) -> Self

source

pub fn fetch<S, I>( sequence_set: S, macro_or_item_names: I, uid: bool ) -> Result<Self, S::Error>where S: TryInto<SequenceSet>, I: Into<MacroOrMessageDataItemNames<'a>>,

source

pub fn store<S>( sequence_set: S, kind: StoreType, response: StoreResponse, flags: Vec<Flag<'a>>, uid: bool ) -> Result<Self, S::Error>where S: TryInto<SequenceSet>,

source

pub fn copy<S, M>( sequence_set: S, mailbox: M, uid: bool ) -> Result<Self, CopyError<S::Error, M::Error>>where S: TryInto<SequenceSet>, M: TryInto<Mailbox<'a>>,

source

pub fn name(&self) -> &'static str

source§

impl<'a> CommandBody<'a>

source

pub fn compress(algorithm: CompressionAlgorithm) -> Self

Available on crate features ext_* and ext_compress only.
source§

impl<'a> CommandBody<'a>

source

pub fn enable<C>(capabilities: C) -> Result<Self, C::Error>where C: TryInto<NonEmptyVec<CapabilityEnable<'a>>>,

Available on crate features ext_* and ext_enable only.
source§

impl<'a> CommandBody<'a>

source

pub fn move<S, M>( sequence_set: S, mailbox: M, uid: bool ) -> Result<Self, MoveError<S::Error, M::Error>>where S: TryInto<SequenceSet>, M: TryInto<Mailbox<'a>>,

Available on crate features ext_* and ext_move only.
source§

impl<'a> CommandBody<'a>

source

pub fn get_quota<A>(root: A) -> Result<Self, A::Error>where A: TryInto<AString<'a>>,

Available on crate features ext_* and ext_quota only.
source

pub fn get_quota_root<M>(mailbox: M) -> Result<Self, M::Error>where M: TryInto<Mailbox<'a>>,

Available on crate features ext_* and ext_quota only.
source

pub fn set_quota<R, S>( root: R, quotas: S ) -> Result<Self, SetQuotaError<R::Error, S::Error>>where R: TryInto<AString<'a>>, S: TryInto<Vec<QuotaSet<'a>>>,

Available on crate features ext_* and ext_quota only.
source§

impl CommandBody<'_>

source

pub fn unselect() -> Self

Available on crate features ext_* and ext_unselect only.

Trait Implementations§

source§

impl<'a, 'arbitrary: 'a> Arbitrary<'arbitrary> for CommandBody<'a>

source§

fn arbitrary(u: &mut Unstructured<'arbitrary>) -> Result<Self>

Generate an arbitrary value of Self from the given unstructured data. Read more
source§

fn arbitrary_take_rest(u: Unstructured<'arbitrary>) -> Result<Self>

Generate an arbitrary value of Self from the entirety of the given unstructured data. Read more
source§

fn size_hint(depth: usize) -> (usize, Option<usize>)

Get a size hint for how many bytes out of an Unstructured this type needs to construct itself. Read more
source§

impl<'a> Clone for CommandBody<'a>

source§

fn clone(&self) -> CommandBody<'a>

Returns a copy of the value. Read more
1.0.0 · source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
source§

impl<'a> Debug for CommandBody<'a>

source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
source§

impl<'de, 'a> Deserialize<'de> for CommandBody<'a>

source§

fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where __D: Deserializer<'de>,

Deserialize this value from the given Serde deserializer. Read more
source§

impl<'a> Hash for CommandBody<'a>

source§

fn hash<__H: Hasher>(&self, state: &mut __H)

Feeds this value into the given Hasher. Read more
1.3.0 · source§

fn hash_slice<H>(data: &[Self], state: &mut H)where H: Hasher, Self: Sized,

Feeds a slice of this type into the given Hasher. Read more
source§

impl<'a> IntoBoundedStatic for CommandBody<'a>

§

type Static = CommandBody<'static>

The target type is bounded by the 'static lifetime.
source§

fn into_static(self) -> Self::Static

Convert an owned T into an owned T such that T: 'static.
source§

impl<'a> PartialEq<CommandBody<'a>> for CommandBody<'a>

source§

fn eq(&self, other: &CommandBody<'a>) -> bool

This method tests for self and other values to be equal, and is used by ==.
1.0.0 · source§

fn ne(&self, other: &Rhs) -> bool

This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
source§

impl<'a> Serialize for CommandBody<'a>

source§

fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error>where __S: Serializer,

Serialize this value into the given Serde serializer. Read more
source§

impl<'a> ToBoundedStatic for CommandBody<'a>

§

type Static = CommandBody<'static>

The target type is bounded by the 'static lifetime.
source§

fn to_static(&self) -> Self::Static

Convert an &T to an owned T such that T: 'static.
source§

impl<'a> Eq for CommandBody<'a>

source§

impl<'a> StructuralEq for CommandBody<'a>

source§

impl<'a> StructuralPartialEq for CommandBody<'a>

Auto Trait Implementations§

§

impl<'a> RefUnwindSafe for CommandBody<'a>

§

impl<'a> Send for CommandBody<'a>

§

impl<'a> Sync for CommandBody<'a>

§

impl<'a> Unpin for CommandBody<'a>

§

impl<'a> UnwindSafe for CommandBody<'a>

Blanket Implementations§

source§

impl<T> Any for Twhere T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
source§

impl<T> Borrow<T> for Twhere T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for Twhere T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

source§

impl<T, U> Into<U> for Twhere U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<T> ToOwned for Twhere T: Clone,

§

type Owned = T

The resulting type after obtaining ownership.
source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
source§

impl<T, U> TryFrom<U> for Twhere U: Into<T>,

§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for Twhere U: TryFrom<T>,

§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
source§

impl<T> DeserializeOwned for Twhere T: for<'de> Deserialize<'de>,