pub struct Client { /* private fields */ }
Expand description

§Client instance

Implementations§

source§

impl Client

source

pub fn get_other_fields(&self) -> &HashMap<String, Value>

Gets the extra fields in client

source§

impl Client

Implementation for Client Read Methods

source

pub async fn from_uri_async( registration_client_uri: &str, issuer: &Issuer, registration_access_token: Option<String>, jwks: Option<Jwks>, client_options: Option<ClientOptions>, interceptor: Option<RequestInterceptor>, fapi: Option<Fapi> ) -> Result<Self, OidcClientError>

§Creates a client from the Client Read Endpoint

Creates a Client from the Client read endpoint.

  • registration_client_uri - The client read endpoint
  • registration_access_token - The access token to be sent with the request
  • jwks - Private Jwks of the client
  • client_options - The ClientOptions
  • issuer - Issuer
  • interceptor - See RequestInterceptor docs for setting up an interceptor.
  • fapi - Fapi version.
§Example:
   let issuer = Issuer::discover_async("https://auth.example.com", None)
       .await
       .unwrap();

   let _client = Client::from_uri_async(
       "https://auth.example.com/client/id",
       &issuer,
       None,
       None,
       None,
       None,
       None,
   )
   .await
   .unwrap();
§Example: with other params
   let mut jwk = Jwk::generate_rsa_key(2048).unwrap();
   jwk.set_algorithm("PS256");

   let jwks = Jwks::from(vec![jwk]);

   let client_options = ClientOptions {
       additional_authorized_parties: Some(vec!["authParty".to_string()]),
   };

   let issuer = Issuer::discover_async("https://auth.example.com", None)
       .await
       .unwrap();

   let _client = Client::from_uri_async(
       "https://auth.example.com/client/id",
       &issuer,
       Some("token".to_string()),
       Some(jwks),
       Some(client_options),
       None,
       None,
   )
   .await
   .unwrap();
source§

impl Client

Implementations for Dynamic Client Registration

source

pub async fn register_async( issuer: &Issuer, client_metadata: ClientMetadata, register_options: Option<ClientRegistrationOptions>, interceptor: Option<RequestInterceptor>, fapi: Option<Fapi> ) -> Result<Self, OidcClientError>

§Dynamic Client Registration

Attempts a Dynamic Client Registration using the Issuer’s registration_endpoint

§Example:
   let issuer = Issuer::discover_async("https://auth.example.com", None)
       .await
       .unwrap();

   let metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       ..ClientMetadata::default()
   };
   
   let _client = Client::register_async(&issuer, metadata, None, None, None)
       .await
       .unwrap();
§Example: with other params
     let issuer = Issuer::discover_async("https://auth.example.com", None)
       .await
       .unwrap();

   let metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       ..ClientMetadata::default()
   };

   let mut jwk = Jwk::generate_rsa_key(2048).unwrap();
   jwk.set_algorithm("PS256");

   let registration_options = ClientRegistrationOptions {
       initial_access_token: Some("initial_access_token".to_string()),
       jwks: Some(Jwks::from(vec![jwk])),
       client_options: Default::default(),
   };

   let _client = Client::register_async(&issuer, metadata, Some(registration_options), None, None)
       .await
       .unwrap();
source

pub fn metadata(&self) -> ClientMetadata

§Get Client Metadata

Gets the ClientMetadata of this Client instance

source§

impl Client

Implementation for Client

source

pub fn is_fapi(&self) -> bool

Returns if the client is fapi or not

source

pub fn is_fapi1(&self) -> bool

Returns if the client is fapi 1 or not

source

pub fn is_fapi2(&self) -> bool

Returns if the client is fapi 2 or not

source

pub fn authorization_url( &self, parameters: AuthorizationParameters ) -> Result<Url, OidcClientError>

§Authorization Url

Builds an authorization url with respect to the parameters

§Example:
   let issuer_metadata = IssuerMetadata {
       issuer: "https://auth.example.com".to_string(),
       authorization_endpoint: Some("https://auth.example.com/auth".to_string()),
       ..Default::default()
   };
    
   let issuer = Issuer::new(issuer_metadata, None);
    
   let client_metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       ..Default::default()
   };
    
   let client = issuer
       .client(client_metadata, None, None, None, None)
       .unwrap();
    
   let _url = client
       .authorization_url(AuthorizationParameters::default())
       .unwrap();
source

pub fn end_session_url( &self, parameters: EndSessionParameters ) -> Result<Url, OidcClientError>

§End Session Url

Builds an endsession url with respect to the parameters

§Example:
  let issuer_metadata = IssuerMetadata {
     end_session_endpoint: Some("https://auth.example.com/end".to_string()),
     ..Default::default()
 };

 let issuer = Issuer::new(issuer_metadata, None);

 let client_metadata = ClientMetadata {
     client_id: Some("identifier".to_string()),
     ..Default::default()
 };

 let client = issuer
     .client(client_metadata, None, None, None, None)
     .unwrap();

 let _url = client
     .end_session_url(EndSessionParameters::default())
     .unwrap();
source

pub fn authorization_post( &self, parameters: AuthorizationParameters ) -> Result<String, OidcClientError>

§Authorization Post

Builds an authorization post page with respect to the parameters

§Example:
  let issuer_metadata = IssuerMetadata {
      authorization_endpoint: Some("https://auth.example.com/auth".to_string()),
      ..Default::default()
  };

  let issuer = Issuer::new(issuer_metadata, None);

  let client_metadata = ClientMetadata {
      client_id: Some("identifier".to_string()),
      ..Default::default()
  };

  let client = issuer
      .client(client_metadata, None, None, None, None)
      .unwrap();

  let _html = client
      .authorization_post(AuthorizationParameters::default())
      .unwrap();
source

pub fn grant_async<'life_self, 'async_recursion>( &'life_self mut self, body: HashMap<String, String>, extras: GrantExtras<'async_recursion>, retry: bool ) -> Pin<Box<dyn Future<Output = Result<TokenSet, OidcClientError>> + 'async_recursion>>
where 'life_self: 'async_recursion,

§Token Grant

Performs a grant at the crate::types::IssuerMetadata::token_endpoint

  • body - HashMap<String, Value> : Request body
  • extras - GrantExtras : Parameters for customizing auth request
  • retry - Will retry exactly once if true.
§Example:
  let issuer_metadata = IssuerMetadata {
      token_endpoint: Some("https://auth.example.com/token".to_string()),
      ..Default::default()
  };

  let issuer = Issuer::new(issuer_metadata, None);

  let client_metadata = ClientMetadata {
      client_id: Some("identifier".to_string()),
      ..Default::default()
  };

  let mut client = issuer
      .client(client_metadata, None, None, None, None)
      .unwrap();

  let body: HashMap<String, String> = HashMap::new();

  let _token_set = client
      .grant_async(body, GrantExtras::default(), true)
      .await
      .unwrap();
source

pub async fn oauth_callback_async( &mut self, redirect_uri: Option<&str>, parameters: CallbackParams, checks: Option<OAuthCallbackChecks<'_>>, extras: Option<CallbackExtras> ) -> Result<TokenSet, OidcClientError>

§OAuth Callback

Performs the callback for Authorization Server’s authorization response.

§Example:
  let issuer_metadata = IssuerMetadata {
      issuer: "https://auth.example.com".to_string(),
      token_endpoint: Some("https://auth.example.com/token".to_string()),
      ..Default::default()
  };

  let issuer = Issuer::new(issuer_metadata, None);

  let client_metadata = ClientMetadata {
      client_id: Some("identifier".to_string()),
      client_secret: Some("secure".to_string()),
      ..Default::default()
  };

  let mut client = issuer
      .client(client_metadata, None, None, None, None)
      .unwrap();

  let callback_params = CallbackParams {
      code: Some("code".to_string()),
      ..Default::default()
  };

  let checks = OAuthCallbackChecks {
      response_type: Some("code"),
      ..Default::default()
  };

  let _token_set = client
      .oauth_callback_async(
          Some("https://rp.example.com/cb"),
          callback_params,
          Some(checks),
          None,
      )
      .await
      .unwrap();
source

pub fn set_skip_max_age_check(&mut self, max_age_check: bool)

§Skip Max Age Check

When skip_max_age_check is set to true, Id Token’s Max age wont be validated

source

pub fn set_skip_nonce_check(&mut self, nonce_check: bool)

§Skip Nonce Check

When skip_nonce_check is set to true, Id token’s Nonce wont be validated

source

pub fn set_clock_skew_duration(&mut self, duration: Duration)

§Set Clock Skew

It is possible the RP or OP environment has a system clock skew, which can result in the error “JWT not active yet”.

source

pub async fn callback_async( &mut self, redirect_uri: Option<&str>, parameters: CallbackParams, checks: Option<OpenIDCallbackChecks<'_>>, extras: Option<CallbackExtras> ) -> Result<TokenSet, OidcClientError>

§Callback

Performs the callback for Authorization Server’s authorization response.

§Example:
  let issuer_metadata = IssuerMetadata {
      issuer: "https://auth.example.com".to_string(),
      token_endpoint: Some("https://auth.example.com/token".to_string()),
      ..Default::default()
  };

  let issuer = Issuer::new(issuer_metadata, None);

  let client_metadata = ClientMetadata {
      client_id: Some("identifier".to_string()),
      client_secret: Some("secure".to_string()),
      ..Default::default()
  };

  let mut client = issuer
      .client(client_metadata, None, None, None, None)
      .unwrap();

  let callback_params = CallbackParams {
      code: Some("code".to_string()),
      ..Default::default()
  };

  let checks = OpenIDCallbackChecks {
      max_age: Some(300),
      oauth_checks: Some(OAuthCallbackChecks {
          state: Some("state"),
          ..Default::default()
      }),
      ..Default::default()
  };

  let _token_set = client
      .callback_async(
          Some("https://rp.example.com/cb"),
          callback_params,
          Some(checks),
          None,
      )
      .await
      .unwrap();
source

pub async fn introspect_async( &mut self, token: String, token_type_hint: Option<String>, extras: Option<IntrospectionExtras> ) -> Result<Response, OidcClientError>

§Introspect

Performs an introspection request at Issuer::introspection_endpoint

  • token : The token to introspect
  • token_type_hint : Type of the token passed in token. Usually access_token or refresh_token
  • extras: See IntrospectionExtras
§Example:
  let issuer_metadata = IssuerMetadata {
      issuer: "https://auth.example.com".to_string(),
      introspection_endpoint: Some("https://auth.example.com/introspect".to_string()),
      ..Default::default()
  };

  let issuer = Issuer::new(issuer_metadata, None);

  let client_metadata = ClientMetadata {
      client_id: Some("identifier".to_string()),
      client_secret: Some("secure".to_string()),
      ..Default::default()
  };

  let mut client = issuer
      .client(client_metadata, None, None, None, None)
      .unwrap();

  let extras = IntrospectionExtras {
      client_assertion_payload: Some(HashMap::new()),
      introspect_body: Some(HashMap::new()),
  };

  let introspection_response = client
      .introspect_async("token".to_string(), Some("hint".to_string()), Some(extras))
      .await
      .unwrap();

  let _body = introspection_response.body;
  let _headers = introspection_response.headers;
  let _status = introspection_response.status;
source

pub fn request_resource_async<'life0, 'life1, 'life_self, 'async_recursion>( &'life_self mut self, resource_url: &'life0 str, access_token: &'life1 str, token_type: Option<&'async_recursion str>, retry: bool, options: RequestResourceOptions<'async_recursion> ) -> Pin<Box<dyn Future<Output = Result<Response, OidcClientError>> + 'async_recursion>>
where 'life0: 'async_recursion, 'life1: 'async_recursion, 'life_self: 'async_recursion,

§Request Resource

Performs a request to fetch using the access token at resource_url.

  • resource_url : Url of the resource server
  • access_token : Token to authenticate the resource fetch request
  • token_type : Type of the token. Eg: Bearer, DPoP
  • retry : Whether to retry if the request failed or not
  • options : See RequestResourceOptions
§Example:
   let issuer_metadata = IssuerMetadata {
       issuer: "https://auth.example.com".to_string(),
       ..Default::default()
   };

   let issuer = Issuer::new(issuer_metadata, None);

   let client_metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       client_secret: Some("secure".to_string()),
       ..Default::default()
   };

   let mut client = issuer
       .client(client_metadata, None, None, None, None)
       .unwrap();

   let resource_response = client
       .request_resource_async(
           "https://resource.example.com/resource",
           "token",
           Some("Bearer"),
           true,
           RequestResourceOptions::default(),
       )
       .await
       .unwrap();

   let _body = resource_response.body;
   let _headers = resource_response.headers;
   let _status = resource_response.status;
source

pub fn callback_params( &self, incoming_url: Option<&Url>, incoming_body: Option<String> ) -> Result<CallbackParams, OidcClientError>

§Callback Params

Tries to convert the Url or a body string to CallbackParams

  • incoming_url : The full url of the request (Url). Use this param if the request is of the type GET
  • incoming_body : Incoming body. Use this param if the request is of the type POST

Only one of the above parameter is parsed.

###Example:

   let issuer_metadata = IssuerMetadata {
       issuer: "https://auth.example.com".to_string(),
       ..Default::default()
   };

   let issuer = Issuer::new(issuer_metadata, None);

   let client_metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       client_secret: Some("secure".to_string()),
       ..Default::default()
   };

   let client = issuer
       .client(client_metadata, None, None, None, None)
       .unwrap();

   let _params = client
       .callback_params(None, Some("code=123&id_token=token".to_string()))
       .unwrap();
   // Or
   let _params = client
       .callback_params(
           Some(
               &"https:://example.com/cb?code=123&id_token=token"
                   .parse()
                   .unwrap(),
           ),
           None,
       )
       .unwrap();
source

pub async fn refresh_async( &mut self, token_set: TokenSet, extras: Option<RefreshTokenExtras<'_>> ) -> Result<TokenSet, OidcClientError>

§Refresh Request

Performs a Token Refresh request at Issuer’s token_endpoint

###Example:

   let issuer_metadata = IssuerMetadata {
       issuer: "https://auth.example.com".to_string(),
       token_endpoint: Some("https://auth.example.com/token".to_string()),
       ..Default::default()
   };

   let issuer = Issuer::new(issuer_metadata, None);

   let client_metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       client_secret: Some("larger_than_32_char_client_secret".to_string()),
       id_token_signed_response_alg: Some("HS256".to_string()),
       ..Default::default()
   };

   let mut client = issuer
       .client(client_metadata, None, None, None, None)
       .unwrap();

   let params = TokenSetParams {
       id_token: Some("id_token".to_string()),
       refresh_token: Some("refresh".to_string()),
       ..Default::default()
   };

   let old_token_set = TokenSet::new(params);

   // let mut jwk = Jwk::generate_rsa_key(2048).unwrap();
   // jwk.set_algorithm("PS256");

   let extras = RefreshTokenExtras {
       client_assertion_payload: Some(HashMap::new()),
       exchange_body: Some(HashMap::new()),
       // dpop: Some(&jwk),
       dpop: None,
   };

   let _token_set = client
       .refresh_async(old_token_set, Some(extras))
       .await
       .unwrap();
source

pub async fn revoke_async( &mut self, token: &str, token_type_hint: Option<&str>, extras: Option<RevokeExtras> ) -> Result<Response, OidcClientError>

§Revoke Token

Performs a token revocation at Issuer’s revocation_endpoint

  • token : The token to be revoked
  • token_type_hint : Hint to which type of token is being revoked
  • extras : See RevokeExtras

###Example:

   let issuer_metadata = IssuerMetadata {
       issuer: "https://auth.example.com".to_string(),
       revocation_endpoint: Some("https://auth.example.com/token/revoke".to_string()),
       ..Default::default()
   };

   let issuer = Issuer::new(issuer_metadata, None);

   let client_metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       token_endpoint_auth_method: Some("none".to_string()),
       ..Default::default()
   };

   let mut client = issuer
       .client(client_metadata, None, None, None, None)
       .unwrap();

   let extras = RevokeExtras {
       client_assertion_payload: Some(HashMap::new()),
       revocation_body: Some(HashMap::new()),
   };

   let revoke_response = client
       .revoke_async("token", Some("hint"), Some(extras))
       .await
       .unwrap();

   let _body = revoke_response.body; // Should be None
   let _headers = revoke_response.headers;
   let _status = revoke_response.status;
source

pub async fn userinfo_async( &mut self, token_set: &TokenSet, options: UserinfoOptions<'_> ) -> Result<Value, OidcClientError>

§Userinfo

Performs userinfo request at Issuer’s userinfo endpoint.

###Example:

   let issuer_metadata = IssuerMetadata {
       issuer: "https://auth.example.com".to_string(),
       userinfo_endpoint: Some("https://auth.example.com/me".to_string()),
       ..Default::default()
   };

   let issuer = Issuer::new(issuer_metadata, None);

   let client_metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       id_token_signed_response_alg: Some("none".to_string()),
       ..Default::default()
   };
   let params = TokenSetParams {
       id_token: Some("id_token".to_string()),
       refresh_token: Some("refresh".to_string()),
       ..Default::default()
   };

   let token_set = TokenSet::new(params);

   let mut client = issuer
       .client(client_metadata, None, None, None, None)
       .unwrap();

   // let mut jwk = Jwk::generate_rsa_key(2048).unwrap();
   // jwk.set_algorithm("PS256");

   let options = UserinfoOptions {
       params: Some(HashMap::new()),
       method: "POST",
       via: "body",
       // dpop: Some(&jwk),
       dpop: None,
   };

   let _serde_json_value = client.userinfo_async(&token_set, options).await.unwrap();
source

pub async fn request_object_async( &mut self, request_object: Value ) -> Result<String, OidcClientError>

§Request Object

Creates a request object for JAR

  • request_object : A Value which should be an object

###Example:

   let issuer_metadata = IssuerMetadata {
       issuer: "https://auth.example.com".to_string(),
       jwks_uri: Some("https://auth.example.com/certs".to_string()),
       ..Default::default()
   };

   let issuer = Issuer::new(issuer_metadata, None);

   let client_metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       request_object_signing_alg: Some("EdDSA".to_string()),
       ..Default::default()
   };

   let mut client = issuer
       .client(client_metadata, None, None, None, None)
       .unwrap();

   let req_object = json!({
     "scope": "read write",
     "response_type": "code",
     "redirect_uri": "https://example.com",
     "state": "93d33d57-59c7-4b41-9a15-80e2ed1482e2",
     "client_id": "123"
   });

   let _request_object_jwt = client.request_object_async(req_object).await.unwrap();
source

pub async fn pushed_authorization_request_async( &mut self, parameters: Option<AuthorizationParameters>, extras: Option<PushedAuthorizationRequestExtras<'_>> ) -> Result<Value, OidcClientError>

§Pushed Authorization Request

Performs a PAR on the pushed_authorization_request_endpoint

###Example:

   let issuer_metadata = IssuerMetadata {
       issuer: "https://auth.example.com".to_string(),
       pushed_authorization_request_endpoint: Some("https://auth.example.com/par".to_string()),
       ..Default::default()
   };

   let issuer = Issuer::new(issuer_metadata, None);

   let client_metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       client_secret: Some("secure".to_string()),
       response_type: Some("code".to_string()),
       grant_types: Some(vec!["authrorization_code".to_string()]),
       redirect_uri: Some("https://example.com/cb".to_string()),
       ..Default::default()
   };

   let mut client = issuer
       .client(client_metadata, None, None, None, None)
       .unwrap();

   let auth_params = AuthorizationParameters {
       scope: Some(vec!["some".to_string()]),
       ..Default::default()
   };

   // let mut jwk = Jwk::generate_rsa_key(2048).unwrap();
   // jwk.set_algorithm("PS256");

   let extras = PushedAuthorizationRequestExtras {
       client_assertion_payload: Some(HashMap::new()),
       // dpop: Some(&jwk),
       dpop: None,
   };

   let _request_object_jwt = client
       .pushed_authorization_request_async(Some(auth_params), Some(extras))
       .await
       .unwrap();
source

pub async fn device_authorization_async( &mut self, params: DeviceAuthorizationParams, extras: Option<DeviceAuthorizationExtras> ) -> Result<DeviceFlowHandle, OidcClientError>

§Device Authorization Grant

Performs a Device Authorization Grant at device_authorization_request_endpoint.

###Example:

   let issuer_metadata = IssuerMetadata {
       issuer: "https://auth.example.com".to_string(),
       device_authorization_endpoint: Some("https://auth.example/device".to_string()),
       token_endpoint: Some("https://op.example.com/token".to_string()),
       ..Default::default()
   };

   let issuer = Issuer::new(issuer_metadata, None);

   let client_metadata = ClientMetadata {
       client_id: Some("identifier".to_string()),
       client_secret: Some("secure".to_string()),
       ..Default::default()
   };

   let mut client = issuer
       .client(client_metadata, None, None, None, None)
       .unwrap();

   let mut other = HashMap::new();
   other.insert("acr_values".to_string(), json!(["acr1"]));
   other.insert("claims_locales".to_string(), json!(["some"]));

   let params = DeviceAuthorizationParams {
       client_id: Some("client_id".to_string()), // not necessary
       scope: Some(vec!["some".to_string()]),
       max_age: Some(300),
       // Authorization Paramters for the auth request is extracted from other
       other,
   };

   // let mut jwk = Jwk::generate_rsa_key(2048).unwrap();
   // jwk.set_algorithm("PS256");

   let extras = DeviceAuthorizationExtras {
       client_assertion_payload: Some(HashMap::new()),
       exchange_body: Some(HashMap::new()),
       // dpop: Some(&jwk),
       dpop: None,
   };

   let mut device_flow_handle = client
       .device_authorization_async(params, Some(extras))
       .await
       .unwrap();

   let _device_grant_response = device_flow_handle.grant_async();

Trait Implementations§

source§

impl Clone for Client

source§

fn clone(&self) -> Self

Returns a copy of the value. Read more
1.0.0 · source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
source§

impl Debug for Client

source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more

Auto Trait Implementations§

§

impl !RefUnwindSafe for Client

§

impl !Send for Client

§

impl !Sync for Client

§

impl Unpin for Client

§

impl !UnwindSafe for Client

Blanket Implementations§

source§

impl<T> Any for T
where T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
source§

impl<T> Borrow<T> for T
where T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

§

impl<T> Instrument for T

§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided [Span], returning an Instrumented wrapper. Read more
§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
source§

impl<T, U> Into<U> for T
where U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<T> Same for T

§

type Output = T

Should always be Self
source§

impl<T> ToOwned for T
where T: Clone,

§

type Owned = T

The resulting type after obtaining ownership.
source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
§

impl<V, T> VZip<V> for T
where V: MultiLane<T>,

§

fn vzip(self) -> V

§

impl<T> WithSubscriber for T

§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a [WithDispatch] wrapper. Read more
§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a [WithDispatch] wrapper. Read more