pub struct Node<'a, D> { /* private fields */ }Expand description
A STIX object in the Collection, exposing the object’s data and references
to associated objects in the same collection.
Relationships are expressed as instance methods, scoped using the concrete type
of the object data, e.g. Node<'a, IntrusionSet> exposes uses_attack_patterns.
Implementations§
Source§impl<'a, D> Node<'a, D>
impl<'a, D> Node<'a, D>
Sourcepub fn data(&self) -> &'a D
pub fn data(&self) -> &'a D
The contents of the STIX object for this node.
§Usage
This is particularly useful when working with iterators: While the Node
might be consumed by a transformation, the underlying data will live as long
as its parent Collection.
Sourcepub fn collection(&self) -> &'a Collection
pub fn collection(&self) -> &'a Collection
The parent collection in which this node’s data resides.
Source§impl<'a> Node<'a, Tool>
impl<'a> Node<'a, Tool>
pub fn delivers_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn drops_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn has_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>
pub fn targets_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn used_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn used_by_campaigns(&self) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
pub fn mitigated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>
pub fn used_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
pub fn hosted_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn downloaded_by_malware( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn dropped_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn used_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn used_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
Source§impl<'a> Node<'a, Identity>
impl<'a> Node<'a, Identity>
pub fn located_at_locations( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn targeted_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn targeted_by_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
pub fn targeted_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
pub fn targeted_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn attributed_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn impersonated_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn targeted_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn targeted_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
Source§impl<'a> Node<'a, Vulnerability>
impl<'a> Node<'a, Vulnerability>
pub fn targeted_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn used_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn targeted_by_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
pub fn mitigated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>
pub fn remediated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>
pub fn targeted_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
pub fn present_in_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn targeted_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn targeted_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn present_in_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn targeted_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
Source§impl<'a> Node<'a, Campaign>
impl<'a> Node<'a, Campaign>
pub fn attributed_to_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
pub fn attributed_to_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn compromises_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn originates_from_locations( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>
pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
pub fn uses_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn uses_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn uses_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
Source§impl<'a> Node<'a, ThreatActor>
impl<'a> Node<'a, ThreatActor>
pub fn attributed_to_identities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Identity>>
pub fn compromises_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn hosts_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn owns_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn impersonates_identities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Identity>>
pub fn located_at_locations( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>
pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
pub fn uses_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn uses_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn uses_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn attributed_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
pub fn attributed_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
Source§impl<'a> Node<'a, Malware>
impl<'a> Node<'a, Malware>
pub fn beacons_to_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn controls_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn downloads_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn downloads_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn drops_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn drops_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn exfiltrates_to_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn originates_from_locations( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>
pub fn targets_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
pub fn uses_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn uses_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn uses_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn delivered_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn used_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn used_by_campaigns(&self) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
pub fn mitigated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>
pub fn remediated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>
pub fn used_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
pub fn controlled_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn delivered_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn hosted_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn controlled_by_malware( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn downloaded_by_malware( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn dropped_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn used_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn used_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn delivered_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn dropped_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
Source§impl<'a> Node<'a, AttackPattern>
impl<'a> Node<'a, AttackPattern>
pub fn compromises_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn subtechnique_of_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn delivers_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>
pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
pub fn uses_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn uses_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn uses_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
pub fn subtechnique_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn used_by_campaigns(&self) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
pub fn mitigated_by_courses_of_action( &self, ) -> impl Iterator<Item = Ref<'a, 'a, CourseOfAction>>
pub fn used_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
pub fn used_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn used_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
Source§impl<'a> Node<'a, CourseOfAction>
impl<'a> Node<'a, CourseOfAction>
pub fn mitigates_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn mitigates_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn mitigates_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn mitigates_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
pub fn remediates_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn remediates_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
Source§impl<'a> Node<'a, IntrusionSet>
impl<'a> Node<'a, IntrusionSet>
pub fn attributed_to_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn hosts_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn owns_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn targets_identities(&self) -> impl Iterator<Item = Ref<'a, 'a, Identity>>
pub fn targets_locations(&self) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn targets_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
pub fn uses_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn uses_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn uses_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn attributed_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
Source§impl<'a> Node<'a, Infrastructure>
impl<'a> Node<'a, Infrastructure>
pub fn controls_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn controls_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn delivers_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn has_vulnerabilities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Vulnerability>>
pub fn hosts_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn hosts_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn located_at_locations( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Location>>
pub fn uses_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn compromised_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn compromised_by_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
pub fn used_by_campaigns(&self) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
pub fn hosted_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
pub fn owned_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
pub fn used_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
pub fn controlled_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn used_by_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn beaconed_by_to_by_malware( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn exfiltrated_by_to_by_malware( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn targeted_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn used_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn compromised_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn hosted_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn owned_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn used_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn targeted_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
pub fn used_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
Source§impl<'a> Node<'a, Location>
impl<'a> Node<'a, Location>
pub fn targeted_by_attack_patterns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, AttackPattern>>
pub fn origin_of_campaigns(&self) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
pub fn targeted_by_campaigns( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Campaign>>
pub fn location_of_identities( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Identity>>
pub fn targeted_by_intrusion_sets( &self, ) -> impl Iterator<Item = Ref<'a, 'a, IntrusionSet>>
pub fn location_of_infrastructure( &self, ) -> impl Iterator<Item = Ref<'a, 'a, Infrastructure>>
pub fn origin_of_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn targeted_by_malware(&self) -> impl Iterator<Item = Ref<'a, 'a, Malware>>
pub fn location_of_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn targeted_by_threat_actors( &self, ) -> impl Iterator<Item = Ref<'a, 'a, ThreatActor>>
pub fn targeted_by_tools(&self) -> impl Iterator<Item = Ref<'a, 'a, Tool>>
Trait Implementations§
Source§impl<'a> AsRef<AttackPattern> for Node<'a, AttackPattern>
impl<'a> AsRef<AttackPattern> for Node<'a, AttackPattern>
Source§fn as_ref(&self) -> &AttackPattern
fn as_ref(&self) -> &AttackPattern
Converts this type into a shared reference of the (usually inferred) input type.
Source§impl<D: AsRef<CommonProperties>> AsRef<CommonProperties> for Node<'_, D>
impl<D: AsRef<CommonProperties>> AsRef<CommonProperties> for Node<'_, D>
Source§fn as_ref(&self) -> &CommonProperties
fn as_ref(&self) -> &CommonProperties
Converts this type into a shared reference of the (usually inferred) input type.
Source§impl<'a> AsRef<CourseOfAction> for Node<'a, CourseOfAction>
impl<'a> AsRef<CourseOfAction> for Node<'a, CourseOfAction>
Source§fn as_ref(&self) -> &CourseOfAction
fn as_ref(&self) -> &CourseOfAction
Converts this type into a shared reference of the (usually inferred) input type.
Source§impl<'a> AsRef<Infrastructure> for Node<'a, Infrastructure>
impl<'a> AsRef<Infrastructure> for Node<'a, Infrastructure>
Source§fn as_ref(&self) -> &Infrastructure
fn as_ref(&self) -> &Infrastructure
Converts this type into a shared reference of the (usually inferred) input type.
Source§impl<'a> AsRef<IntrusionSet> for Node<'a, IntrusionSet>
impl<'a> AsRef<IntrusionSet> for Node<'a, IntrusionSet>
Source§fn as_ref(&self) -> &IntrusionSet
fn as_ref(&self) -> &IntrusionSet
Converts this type into a shared reference of the (usually inferred) input type.
Source§impl<'a> AsRef<MarkingDefinition> for Node<'a, MarkingDefinition>
impl<'a> AsRef<MarkingDefinition> for Node<'a, MarkingDefinition>
Source§fn as_ref(&self) -> &MarkingDefinition
fn as_ref(&self) -> &MarkingDefinition
Converts this type into a shared reference of the (usually inferred) input type.
Source§impl<'a> AsRef<Relationship> for Node<'a, Relationship>
impl<'a> AsRef<Relationship> for Node<'a, Relationship>
Source§fn as_ref(&self) -> &Relationship
fn as_ref(&self) -> &Relationship
Converts this type into a shared reference of the (usually inferred) input type.
Source§impl<'a> AsRef<ThreatActor> for Node<'a, ThreatActor>
impl<'a> AsRef<ThreatActor> for Node<'a, ThreatActor>
Source§fn as_ref(&self) -> &ThreatActor
fn as_ref(&self) -> &ThreatActor
Converts this type into a shared reference of the (usually inferred) input type.
Source§impl<'a> AsRef<Vulnerability> for Node<'a, Vulnerability>
impl<'a> AsRef<Vulnerability> for Node<'a, Vulnerability>
Source§fn as_ref(&self) -> &Vulnerability
fn as_ref(&self) -> &Vulnerability
Converts this type into a shared reference of the (usually inferred) input type.
Auto Trait Implementations§
impl<'a, D> Freeze for Node<'a, D>
impl<'a, D> RefUnwindSafe for Node<'a, D>where
D: RefUnwindSafe,
impl<'a, D> Send for Node<'a, D>where
D: Sync,
impl<'a, D> Sync for Node<'a, D>where
D: Sync,
impl<'a, D> Unpin for Node<'a, D>
impl<'a, D> UnwindSafe for Node<'a, D>where
D: RefUnwindSafe,
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more