mirror of
https://github.com/servo/servo.git
synced 2025-07-29 10:10:34 +01:00
Update rustc to 00b112c45a604fa6f4b59af2a40c9deeadfdb7c6/rustc-1.0.0-dev.
This commit is contained in:
parent
ff8cbff810
commit
95fc29fa0d
255 changed files with 3550 additions and 3362 deletions
|
@ -7,7 +7,7 @@ use rustc::lint::{Context, LintPass, LintArray};
|
|||
use utils::match_ty_unwrap;
|
||||
|
||||
declare_lint!(BANNED_TYPE, Deny,
|
||||
"Ban various unsafe type combinations")
|
||||
"Ban various unsafe type combinations");
|
||||
|
||||
/// Lint for banning various unsafe types
|
||||
///
|
||||
|
|
|
@ -9,7 +9,7 @@ use rustc::middle::{ty, def};
|
|||
use utils::match_lang_ty;
|
||||
|
||||
declare_lint!(INHERITANCE_INTEGRITY, Deny,
|
||||
"Ensures that struct fields are properly laid out for inheritance to work")
|
||||
"Ensures that struct fields are properly laid out for inheritance to work");
|
||||
|
||||
/// Lint for ensuring proper layout of DOM structs
|
||||
///
|
||||
|
|
|
@ -9,7 +9,7 @@ use rustc::lint::{Context, LintPass, LintArray};
|
|||
use rustc::middle::ty;
|
||||
|
||||
declare_lint!(PRIVATIZE, Deny,
|
||||
"Allows to enforce private fields for struct definitions")
|
||||
"Allows to enforce private fields for struct definitions");
|
||||
|
||||
/// Lint for keeping DOM fields private
|
||||
///
|
||||
|
|
|
@ -8,7 +8,7 @@ use rustc::middle::ty::expr_ty;
|
|||
use rustc::middle::ty;
|
||||
|
||||
declare_lint!(STR_TO_STRING, Deny,
|
||||
"Warn when a String could use to_owned() instead of to_string()")
|
||||
"Warn when a String could use to_owned() instead of to_string()");
|
||||
|
||||
/// Prefer str.to_owned() over str.to_string()
|
||||
///
|
||||
|
|
|
@ -9,7 +9,7 @@ use rustc::middle::ty::expr_ty;
|
|||
use rustc::util::ppaux::Repr;
|
||||
|
||||
declare_lint!(TRANSMUTE_TYPE_LINT, Allow,
|
||||
"Warn and report types being transmuted")
|
||||
"Warn and report types being transmuted");
|
||||
|
||||
/// Lint for auditing transmutes
|
||||
///
|
||||
|
|
|
@ -11,7 +11,7 @@ use rustc::util::ppaux::Repr;
|
|||
use utils::unsafe_context;
|
||||
|
||||
declare_lint!(UNROOTED_MUST_ROOT, Deny,
|
||||
"Warn and report usage of unrooted jsmanaged objects")
|
||||
"Warn and report usage of unrooted jsmanaged objects");
|
||||
|
||||
/// Lint for ensuring safe usage of unrooted pointers
|
||||
///
|
||||
|
@ -84,7 +84,7 @@ impl LintPass for UnrootedPass {
|
|||
return;
|
||||
},
|
||||
visit::FkItemFn(_, _, style, _) => match style {
|
||||
ast::UnsafeFn => return,
|
||||
ast::Unsafety::Unsafe => return,
|
||||
_ => ()
|
||||
},
|
||||
_ => ()
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue