Node

Struct Node 

Source
pub struct Node<'a, D> { /* private fields */ }
Expand description

A STIX object in the Collection, exposing the object’s data and references to associated objects in the same collection.

Relationships are expressed as instance methods, scoped using the concrete type of the object data, e.g. Node<'a, IntrusionSet> exposes uses_attack_patterns.

Implementations§

Source§

impl<'a, D> Node<'a, D>

Source

pub fn data(&self) -> &'a D

The contents of the STIX object for this node.

§Usage

This is particularly useful when working with iterators: While the Node might be consumed by a transformation, the underlying data will live as long as its parent Collection.

Source

pub fn collection(&self) -> &'a Collection

The parent collection in which this node’s data resides.

Source§

impl<'a> Node<'a, Tool>

Source

pub fn delivers_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn drops_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn has_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source

pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>

Source

pub fn targets_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source

pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn used_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn used_by_campaigns(&self) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source

pub fn mitigated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>

Source

pub fn used_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn hosted_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn downloaded_by_malware( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn dropped_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn used_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn used_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source§

impl<'a> Node<'a, Identity>

Source

pub fn located_at_locations( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn targeted_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn targeted_by_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source

pub fn targeted_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn targeted_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn attributed_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn impersonated_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn targeted_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn targeted_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source§

impl<'a> Node<'a, Vulnerability>

Source

pub fn targeted_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn used_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn targeted_by_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source

pub fn mitigated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>

Source

pub fn remediated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>

Source

pub fn targeted_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn present_in_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn targeted_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn targeted_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn present_in_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn targeted_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source§

impl<'a> Node<'a, Campaign>

Source

pub fn attributed_to_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn attributed_to_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn compromises_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn originates_from_locations( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>

Source

pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source

pub fn uses_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn uses_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn uses_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source§

impl<'a> Node<'a, ThreatActor>

Source

pub fn attributed_to_identities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Identity>>

Source

pub fn compromises_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn hosts_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn owns_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn impersonates_identities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Identity>>

Source

pub fn located_at_locations( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>

Source

pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source

pub fn uses_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn uses_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn uses_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn attributed_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source

pub fn attributed_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn authored_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source§

impl<'a> Node<'a, Malware>

Source

pub fn authored_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn beacons_to_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn controls_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn downloads_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn downloads_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn drops_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn drops_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn exfiltrates_to_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn originates_from_locations( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>

Source

pub fn targets_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source

pub fn uses_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn uses_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn uses_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn delivered_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn used_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn used_by_campaigns(&self) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source

pub fn mitigated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>

Source

pub fn remediated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>

Source

pub fn used_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn controlled_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn delivered_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn hosted_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn controlled_by_malware( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn downloaded_by_malware( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn dropped_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn used_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn used_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn delivered_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn dropped_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source§

impl<'a> Node<'a, AttackPattern>

Source

pub fn compromises_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn subtechnique_of_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn delivers_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>

Source

pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source

pub fn uses_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn uses_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn uses_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source

pub fn subtechnique_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn used_by_campaigns(&self) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source

pub fn mitigated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>

Source

pub fn used_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn used_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn used_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source§

impl<'a> Node<'a, CourseOfAction>

Source

pub fn mitigates_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn mitigates_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn mitigates_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn mitigates_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source

pub fn remediates_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn remediates_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source§

impl<'a> Node<'a, IntrusionSet>

Source

pub fn attributed_to_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn hosts_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn owns_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>

Source

pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source

pub fn uses_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn uses_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn uses_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn attributed_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source§

impl<'a> Node<'a, Infrastructure>

Source

pub fn controls_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn controls_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn delivers_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn has_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>

Source

pub fn hosts_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn hosts_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn located_at_locations( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Location>>

Source

pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn compromised_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn compromised_by_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source

pub fn used_by_campaigns(&self) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source

pub fn hosted_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn owned_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn used_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn controlled_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn used_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn beaconed_by_to_by_malware( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn exfiltrated_by_to_by_malware( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn targeted_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn used_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn compromised_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn hosted_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn owned_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn used_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn targeted_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source

pub fn used_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Source§

impl<'a> Node<'a, Location>

Source

pub fn targeted_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>

Source

pub fn origin_of_campaigns(&self) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source

pub fn targeted_by_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>

Source

pub fn location_of_identities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Identity>>

Source

pub fn targeted_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>

Source

pub fn location_of_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>

Source

pub fn origin_of_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn targeted_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>

Source

pub fn location_of_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn targeted_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>

Source

pub fn targeted_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>

Trait Implementations§

Source§

impl<'a> AsRef<AttackPattern> for Node<'a, AttackPattern>

Source§

fn as_ref(&self) -> &AttackPattern

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<Campaign> for Node<'a, Campaign>

Source§

fn as_ref(&self) -> &Campaign

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<D: AsRef<CommonProperties>> AsRef<CommonProperties> for Node<'_, D>

Source§

fn as_ref(&self) -> &CommonProperties

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<CourseOfAction> for Node<'a, CourseOfAction>

Source§

fn as_ref(&self) -> &CourseOfAction

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<Identity> for Node<'a, Identity>

Source§

fn as_ref(&self) -> &Identity

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<Infrastructure> for Node<'a, Infrastructure>

Source§

fn as_ref(&self) -> &Infrastructure

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<IntrusionSet> for Node<'a, IntrusionSet>

Source§

fn as_ref(&self) -> &IntrusionSet

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<Location> for Node<'a, Location>

Source§

fn as_ref(&self) -> &Location

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<Malware> for Node<'a, Malware>

Source§

fn as_ref(&self) -> &Malware

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<MarkingDefinition> for Node<'a, MarkingDefinition>

Source§

fn as_ref(&self) -> &MarkingDefinition

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<Relationship> for Node<'a, Relationship>

Source§

fn as_ref(&self) -> &Relationship

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<ThreatActor> for Node<'a, ThreatActor>

Source§

fn as_ref(&self) -> &ThreatActor

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<Tool> for Node<'a, Tool>

Source§

fn as_ref(&self) -> &Tool

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a> AsRef<Vulnerability> for Node<'a, Vulnerability>

Source§

fn as_ref(&self) -> &Vulnerability

Converts this type into a shared reference of the (usually inferred) input type.
Source§

impl<'a, D> Clone for Node<'a, D>

Source§

fn clone(&self) -> Self

Returns a duplicate of the value. Read more
1.0.0 · Source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
Source§

impl<'a, D> Deref for Node<'a, D>

Source§

type Target = D

The resulting type after dereferencing.
Source§

fn deref(&self) -> &Self::Target

Dereferences the value.

Auto Trait Implementations§

§

impl<'a, D> Freeze for Node<'a, D>

§

impl<'a, D> RefUnwindSafe for Node<'a, D>
where D: RefUnwindSafe,

§

impl<'a, D> Send for Node<'a, D>
where D: Sync,

§

impl<'a, D> Sync for Node<'a, D>
where D: Sync,

§

impl<'a, D> Unpin for Node<'a, D>

§

impl<'a, D> UnwindSafe for Node<'a, D>
where D: RefUnwindSafe,

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
Source§

impl<T> CloneToUninit for T
where T: Clone,

Source§

unsafe fn clone_to_uninit(&self, dest: *mut u8)

🔬This is a nightly-only experimental API. (clone_to_uninit)
Performs copy-assignment from self to dest. Read more
Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Source§

impl<T> Object for T

Source§

impl<P, T> Receiver for P
where P: Deref<Target = T> + ?Sized, T: ?Sized,

Source§

type Target = T

🔬This is a nightly-only experimental API. (arbitrary_self_types)
The target type on which the method may be called.
Source§

impl<T> ToOwned for T
where T: Clone,

Source§

type Owned = T

The resulting type after obtaining ownership.
Source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
Source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.