From 521bb810be1750a196b6b7620968f3261581f862 Mon Sep 17 00:00:00 2001 From: Nilstrieb <48135649+Nilstrieb@users.noreply.github.com> Date: Sat, 23 Apr 2022 13:42:26 +0200 Subject: [PATCH 01/11] Link to correct `as_mut` in docs for `pointer::as_ref` It previously linked to the unstable const-mut-cast method instead of the `mut` counterpart for `as_ref`. --- library/core/src/ptr/mut_ptr.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/library/core/src/ptr/mut_ptr.rs b/library/core/src/ptr/mut_ptr.rs index 56f9c84f5af6f..ed33cad57519e 100644 --- a/library/core/src/ptr/mut_ptr.rs +++ b/library/core/src/ptr/mut_ptr.rs @@ -287,7 +287,7 @@ impl *mut T { /// For the mutable counterpart see [`as_mut`]. /// /// [`as_uninit_ref`]: #method.as_uninit_ref-1 - /// [`as_mut`]: #method.as_mut + /// [`as_mut`]: #method.as_mut-1 /// /// # Safety /// From 15386dcb6eb7dde8491f4c06387bc0eefbe8f26f Mon Sep 17 00:00:00 2001 From: julio Date: Sat, 30 Apr 2022 11:02:22 -0700 Subject: [PATCH 02/11] add aliases for std::fs::canonicalize --- library/std/src/fs.rs | 2 ++ 1 file changed, 2 insertions(+) diff --git a/library/std/src/fs.rs b/library/std/src/fs.rs index 433b4d530136b..369a251696e0b 100644 --- a/library/std/src/fs.rs +++ b/library/std/src/fs.rs @@ -1930,6 +1930,8 @@ pub fn read_link>(path: P) -> io::Result { /// Ok(()) /// } /// ``` +#[doc(alias = "realpath")] +#[doc(alias = "GetFinalPathNameByHandle")] #[stable(feature = "fs_canonicalize", since = "1.5.0")] pub fn canonicalize>(path: P) -> io::Result { fs_imp::canonicalize(path.as_ref()) From 52de679c193c249d771d84fdaa1cce0bf70404a4 Mon Sep 17 00:00:00 2001 From: Oli Scherer Date: Tue, 3 May 2022 09:50:17 +0000 Subject: [PATCH 03/11] Add regression test --- .../auxiliary/collect_hidden_types.rs | 21 ++++++++++++++++++ .../collect_hidden_types.rs | 22 +++++++++++++++++++ 2 files changed, 43 insertions(+) create mode 100644 src/test/ui/type-alias-impl-trait/auxiliary/collect_hidden_types.rs create mode 100644 src/test/ui/type-alias-impl-trait/collect_hidden_types.rs diff --git a/src/test/ui/type-alias-impl-trait/auxiliary/collect_hidden_types.rs b/src/test/ui/type-alias-impl-trait/auxiliary/collect_hidden_types.rs new file mode 100644 index 0000000000000..75d20a6fef9fe --- /dev/null +++ b/src/test/ui/type-alias-impl-trait/auxiliary/collect_hidden_types.rs @@ -0,0 +1,21 @@ +#![feature(type_alias_impl_trait)] + +// edition:2018 + +use std::future::Future; + +pub trait Service { + type Future: Future; + fn call(&mut self, req: Request) -> Self::Future; +} + +// NOTE: the pub(crate) here is critical +pub(crate) fn new() -> () {} + +pub struct A; +impl Service<()> for A { + type Future = impl Future; + fn call(&mut self, _: ()) -> Self::Future { + async { new() } + } +} diff --git a/src/test/ui/type-alias-impl-trait/collect_hidden_types.rs b/src/test/ui/type-alias-impl-trait/collect_hidden_types.rs new file mode 100644 index 0000000000000..e78f178e464eb --- /dev/null +++ b/src/test/ui/type-alias-impl-trait/collect_hidden_types.rs @@ -0,0 +1,22 @@ +// aux-build:collect_hidden_types.rs +use collect_hidden_types::Service; +use std::future::Future; +use std::pin::Pin; +use std::task::Context; + +// build-pass + +// edition:2018 + +extern crate collect_hidden_types; + +fn broken(mut a: collect_hidden_types::A, cx: &mut Context<'_>) { + let mut fut = a.call(()); + let _ = unsafe { Pin::new_unchecked(&mut fut) }.poll(cx); +} + +pub async fn meeb(cx: &mut Context<'_>) { + broken(collect_hidden_types::A, cx); +} + +fn main() {} From 9a1dc2a0a2cff86d26563222f6c44e14bd5beea6 Mon Sep 17 00:00:00 2001 From: Martin Geisler Date: Tue, 3 May 2022 14:23:28 +0200 Subject: [PATCH 04/11] Remove hard links from `env::current_exe` security example MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The security example shows that `env::current_exe` will return the path used when the program was started. This is not really surprising considering how hard links work: after `ln foo bar`, the two files are _equivalent_. It is _not_ the case that `bar` is a “link” to `foo`, nor is `foo` a link to `bar`. They are simply two names for the same underlying data. The security vulnerability linked to seems to be different: there an attacker would start a SUID binary from a directory under the control of the attacker. The binary would respawn itself by executing the program found at `/proc/self/exe` (which the attacker can control). This is a real problem. In my opinion, the example given here doesn’t really show the same problem, it just shows a misunderstanding of what hard links are. I looked through the history a bit and found that the example was introduced in #33526. That PR actually has two commits, and the first (8478d48dad949b3b1374569a5391089a49094eeb) explains the race condition at the root of the linked security vulnerability. The second commit proceeds to replace the explanation with the example we have today. This commit reverts most of the second commit from #33526. --- library/std/src/env.rs | 47 +++++++++++++++--------------------------- 1 file changed, 17 insertions(+), 30 deletions(-) diff --git a/library/std/src/env.rs b/library/std/src/env.rs index f03d298d8699d..e287a93da7b03 100644 --- a/library/std/src/env.rs +++ b/library/std/src/env.rs @@ -644,36 +644,23 @@ pub fn temp_dir() -> PathBuf { /// /// # Security /// -/// The output of this function should not be used in anything that might have -/// security implications. For example: -/// -/// ``` -/// fn main() { -/// println!("{:?}", std::env::current_exe()); -/// } -/// ``` -/// -/// On Linux systems, if this is compiled as `foo`: -/// -/// ```bash -/// $ rustc foo.rs -/// $ ./foo -/// Ok("/home/alex/foo") -/// ``` -/// -/// And you make a hard link of the program: -/// -/// ```bash -/// $ ln foo bar -/// ``` -/// -/// When you run it, you won’t get the path of the original executable, you’ll -/// get the path of the hard link: -/// -/// ```bash -/// $ ./bar -/// Ok("/home/alex/bar") -/// ``` +/// The output of this function should not be trusted for anything +/// that might have security implications. Basically, if users can run +/// the executable, they can change the output arbitrarily. +/// +/// As an example, you can easily introduce a race condition. It goes +/// like this: +/// +/// 1. You get the path to the current executable using `current_exe()`, and +/// store it in a variable. +/// 2. Time passes. A malicious actor removes the current executable, and +/// replaces it with a malicious one. +/// 3. You then use the stored path to re-execute the current +/// executable. +/// +/// You expected to safely execute the current executable, but you're +/// instead executing something completely different. The code you +/// just executed run with your privileges. /// /// This sort of behavior has been known to [lead to privilege escalation] when /// used incorrectly. From c227d85021a4e5eaaac002af2c9d24b9f20ebed4 Mon Sep 17 00:00:00 2001 From: Oli Scherer Date: Thu, 5 May 2022 08:14:35 +0000 Subject: [PATCH 05/11] Add regression tests --- .../ui/type-alias-impl-trait/cross_inference.rs | 10 ++++++++++ .../type-alias-impl-trait/cross_inference_rpit.rs | 14 ++++++++++++++ 2 files changed, 24 insertions(+) create mode 100644 src/test/ui/type-alias-impl-trait/cross_inference.rs create mode 100644 src/test/ui/type-alias-impl-trait/cross_inference_rpit.rs diff --git a/src/test/ui/type-alias-impl-trait/cross_inference.rs b/src/test/ui/type-alias-impl-trait/cross_inference.rs new file mode 100644 index 0000000000000..dafaf40a69df4 --- /dev/null +++ b/src/test/ui/type-alias-impl-trait/cross_inference.rs @@ -0,0 +1,10 @@ +// check-pass + +#![feature(type_alias_impl_trait)] + +fn main() { + type T = impl Copy; + let foo: T = (1u32, 2u32); + let x: (_, _) = foo; + println!("{:?}", x); +} diff --git a/src/test/ui/type-alias-impl-trait/cross_inference_rpit.rs b/src/test/ui/type-alias-impl-trait/cross_inference_rpit.rs new file mode 100644 index 0000000000000..f6affbf175995 --- /dev/null +++ b/src/test/ui/type-alias-impl-trait/cross_inference_rpit.rs @@ -0,0 +1,14 @@ +// check-pass + +fn foo(b: bool) -> impl Copy { + if b { + return (5,6) + } + let x: (_, _) = foo(true); + println!("{:?}", x); + (1u32, 2u32) +} + +fn main() { + foo(false); +} From a75d559e24ed648acb3a95677b2f1fae5c2ac419 Mon Sep 17 00:00:00 2001 From: Oli Scherer Date: Thu, 5 May 2022 08:24:37 +0000 Subject: [PATCH 06/11] Add known bug cases --- .../cross_inference_pattern_bug.rs | 24 ++++++++++++++ .../cross_inference_pattern_bug.stderr | 32 +++++++++++++++++++ .../cross_inference_pattern_bug_no_type.rs | 13 ++++++++ ...cross_inference_pattern_bug_no_type.stderr | 10 ++++++ 4 files changed, 79 insertions(+) create mode 100644 src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug.rs create mode 100644 src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug.stderr create mode 100644 src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug_no_type.rs create mode 100644 src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug_no_type.stderr diff --git a/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug.rs b/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug.rs new file mode 100644 index 0000000000000..9ad7cad39d071 --- /dev/null +++ b/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug.rs @@ -0,0 +1,24 @@ +// known-bug +// failure-status: 101 +// compile-flags: --edition=2021 --crate-type=lib +// rustc-env:RUST_BACKTRACE=0 + +// normalize-stderr-test "thread 'rustc' panicked.*" -> "thread 'rustc' panicked" +// normalize-stderr-test "note:.*RUST_BACKTRACE=1.*\n" -> "" +// normalize-stderr-test "\nerror: internal compiler error.*\n\n" -> "" +// normalize-stderr-test "note:.*unexpectedly panicked.*\n\n" -> "" +// normalize-stderr-test "note: we would appreciate a bug report.*\n\n" -> "" +// normalize-stderr-test "note: compiler flags.*\n\n" -> "" +// normalize-stderr-test "note: rustc.*running on.*\n\n" -> "" +// normalize-stderr-test "#.*\n" -> "" +// normalize-stderr-test ".*delayed.*\n" -> "" + +// tracked in https://github.com/rust-lang/rust/issues/96572 + +#![feature(type_alias_impl_trait)] + +fn main() { + type T = impl Copy; + let foo: T = (1u32, 2u32); + let (a, b): (u32, u32) = foo; +} diff --git a/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug.stderr b/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug.stderr new file mode 100644 index 0000000000000..84d2705bf2453 --- /dev/null +++ b/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug.stderr @@ -0,0 +1,32 @@ +error: internal compiler error: no errors encountered even though `delay_span_bug` issued + +error: internal compiler error: broken MIR in DefId(0:3 ~ cross_inference_pattern_bug[646d]::main) ((_1.0: u32)): can't project out of PlaceTy { ty: main::T, variant_index: None } + --> $DIR/cross_inference_pattern_bug.rs:23:10 + | +LL | let (a, b): (u32, u32) = foo; + | ^ + | + +error: internal compiler error: TyKind::Error constructed but no error reported + | + +error: internal compiler error: TyKind::Error constructed but no error reported + | + +error: internal compiler error: broken MIR in DefId(0:3 ~ cross_inference_pattern_bug[646d]::main) ((_1.1: u32)): can't project out of PlaceTy { ty: main::T, variant_index: None } + --> $DIR/cross_inference_pattern_bug.rs:23:13 + | +LL | let (a, b): (u32, u32) = foo; + | ^ + | + +error: internal compiler error: TyKind::Error constructed but no error reported + | + +error: internal compiler error: TyKind::Error constructed but no error reported + | + +thread 'rustc' panicked + +query stack during panic: +end of query stack diff --git a/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug_no_type.rs b/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug_no_type.rs new file mode 100644 index 0000000000000..179f525de52b0 --- /dev/null +++ b/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug_no_type.rs @@ -0,0 +1,13 @@ +// known-bug +// compile-flags: --edition=2021 --crate-type=lib +// rustc-env:RUST_BACKTRACE=0 + +// tracked in https://github.com/rust-lang/rust/issues/96572 + +#![feature(type_alias_impl_trait)] + +fn main() { + type T = impl Copy; // error: unconstrained opaque type + let foo: T = (1u32, 2u32); + let (a, b) = foo; // removing this line makes the code compile +} diff --git a/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug_no_type.stderr b/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug_no_type.stderr new file mode 100644 index 0000000000000..8aa1f49563995 --- /dev/null +++ b/src/test/ui/type-alias-impl-trait/cross_inference_pattern_bug_no_type.stderr @@ -0,0 +1,10 @@ +error: unconstrained opaque type + --> $DIR/cross_inference_pattern_bug_no_type.rs:10:14 + | +LL | type T = impl Copy; // error: unconstrained opaque type + | ^^^^^^^^^ + | + = note: `T` must be used in combination with a concrete type within the same module + +error: aborting due to previous error + From 7443cc2bd66a79aa5a624e11b9b0172e56c2da48 Mon Sep 17 00:00:00 2001 From: Joshua Nelson Date: Thu, 5 May 2022 20:03:10 -0500 Subject: [PATCH 07/11] Enable compiler-docs by default for `compiler`, `codegen`, and `tools` profiles. --- src/bootstrap/defaults/config.codegen.toml | 4 ++++ src/bootstrap/defaults/config.compiler.toml | 4 ++++ src/bootstrap/defaults/config.tools.toml | 2 ++ 3 files changed, 10 insertions(+) diff --git a/src/bootstrap/defaults/config.codegen.toml b/src/bootstrap/defaults/config.codegen.toml index 011ff6821b771..088cbd1057ec5 100644 --- a/src/bootstrap/defaults/config.codegen.toml +++ b/src/bootstrap/defaults/config.codegen.toml @@ -1,4 +1,8 @@ # These defaults are meant for contributors to the compiler who modify codegen or LLVM +[build] +# Contributors working on the compiler will probably expect compiler docs to be generated. +compiler-docs = true + [llvm] # This enables debug-assertions in LLVM, # catching logic errors in codegen much earlier in the process. diff --git a/src/bootstrap/defaults/config.compiler.toml b/src/bootstrap/defaults/config.compiler.toml index 4d689d117bc0d..2f4ccb825c4d8 100644 --- a/src/bootstrap/defaults/config.compiler.toml +++ b/src/bootstrap/defaults/config.compiler.toml @@ -1,4 +1,8 @@ # These defaults are meant for contributors to the compiler who do not modify codegen or LLVM +[build] +# Contributors working on the compiler will probably expect compiler docs to be generated. +compiler-docs = true + [rust] # This enables `RUSTC_LOG=debug`, avoiding confusing situations # where adding `debug!()` appears to do nothing. diff --git a/src/bootstrap/defaults/config.tools.toml b/src/bootstrap/defaults/config.tools.toml index 88359fff191e3..6b6625342a67e 100644 --- a/src/bootstrap/defaults/config.tools.toml +++ b/src/bootstrap/defaults/config.tools.toml @@ -14,6 +14,8 @@ download-rustc = "if-unchanged" [build] # Document with the in-tree rustdoc by default, since `download-rustc` makes it quick to compile. doc-stage = 2 +# Contributors working on tools will probably expect compiler docs to be generated, so they can figure out how to use the API. +compiler-docs = true [llvm] # Will download LLVM from CI if available on your platform. From 101f9522651f05d58f7e07d20d841be189841843 Mon Sep 17 00:00:00 2001 From: Joshua Nelson Date: Thu, 5 May 2022 20:37:08 -0500 Subject: [PATCH 08/11] Don't constantly rebuild clippy on `x test src/tools/clippy`. This happened because the `SYSROOT` variable was set for `x test`, but not `x build`. Set it consistently for both to avoid unnecessary rebuilds. --- src/bootstrap/test.rs | 2 -- src/bootstrap/tool.rs | 4 ++++ 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/src/bootstrap/test.rs b/src/bootstrap/test.rs index 4dfc02dea4605..8f2347be90e86 100644 --- a/src/bootstrap/test.rs +++ b/src/bootstrap/test.rs @@ -664,8 +664,6 @@ impl Step for Clippy { &[], ); - // clippy tests need to know about the stage sysroot - cargo.env("SYSROOT", builder.sysroot(compiler)); cargo.env("RUSTC_TEST_SUITE", builder.rustc(compiler)); cargo.env("RUSTC_LIB_PATH", builder.rustc_libdir(compiler)); let host_libs = builder.stage_out(compiler, Mode::ToolRustc).join(builder.cargo_dir()); diff --git a/src/bootstrap/tool.rs b/src/bootstrap/tool.rs index fc1c2f04fabff..3b30e6de12a63 100644 --- a/src/bootstrap/tool.rs +++ b/src/bootstrap/tool.rs @@ -250,6 +250,10 @@ pub fn prepare_tool_cargo( } } + // clippy tests need to know about the stage sysroot. Set them consistently while building to + // avoid rebuilding when running tests. + cargo.env("SYSROOT", builder.sysroot(compiler)); + // if tools are using lzma we want to force the build script to build its // own copy cargo.env("LZMA_API_STATIC", "1"); From 02ac4a4e027dbebcb9205903a3e088b379a21e35 Mon Sep 17 00:00:00 2001 From: Arseniy Pendryak Date: Fri, 6 May 2022 13:12:45 +0300 Subject: [PATCH 09/11] Remove `adx_target_feature` feature from active features list The feature was stabilized in https://github.com/rust-lang/rust/pull/93745 --- compiler/rustc_feature/src/active.rs | 1 - 1 file changed, 1 deletion(-) diff --git a/compiler/rustc_feature/src/active.rs b/compiler/rustc_feature/src/active.rs index 5c07d9121cc54..520769d308e66 100644 --- a/compiler/rustc_feature/src/active.rs +++ b/compiler/rustc_feature/src/active.rs @@ -244,7 +244,6 @@ declare_features! ( // Unstable `#[target_feature]` directives. (active, aarch64_ver_target_feature, "1.27.0", Some(44839), None), - (active, adx_target_feature, "1.32.0", Some(44839), None), (active, arm_target_feature, "1.27.0", Some(44839), None), (active, avx512_target_feature, "1.27.0", Some(44839), None), (active, bpf_target_feature, "1.54.0", Some(44839), None), From 038fb67952eb220f1445001a2117170a81de2267 Mon Sep 17 00:00:00 2001 From: Yuki Okushi Date: Sat, 7 May 2022 00:57:23 +0900 Subject: [PATCH 10/11] Make the test `check-pass` not to produce a JSON file `run-pass` produces a JSON file when enabling save analysis. --- .../ui/const-generics/const-argument-non-static-lifetime.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/test/ui/const-generics/const-argument-non-static-lifetime.rs b/src/test/ui/const-generics/const-argument-non-static-lifetime.rs index 2792bb7df8547..36a569784adf7 100644 --- a/src/test/ui/const-generics/const-argument-non-static-lifetime.rs +++ b/src/test/ui/const-generics/const-argument-non-static-lifetime.rs @@ -1,4 +1,4 @@ -// [full] run-pass +// [full] check-pass // revisions: full min // regression test for #78180 From 14897180ae6a0506a5ad0a9f6a30ae1f75916179 Mon Sep 17 00:00:00 2001 From: Guillaume Gomez Date: Sat, 7 May 2022 20:18:23 +0200 Subject: [PATCH 11/11] Enforce quote rule for JS source code --- src/librustdoc/html/static/.eslintrc.js | 4 +++ src/librustdoc/html/static/js/main.js | 30 ++++++++-------- .../html/static/js/scrape-examples.js | 34 +++++++++---------- src/librustdoc/html/static/js/search.js | 27 ++++++++------- src/librustdoc/html/static/js/settings.js | 9 +++-- src/librustdoc/html/static/js/storage.js | 4 +-- 6 files changed, 56 insertions(+), 52 deletions(-) diff --git a/src/librustdoc/html/static/.eslintrc.js b/src/librustdoc/html/static/.eslintrc.js index e118ee5d5edc5..5fcffe715b12f 100644 --- a/src/librustdoc/html/static/.eslintrc.js +++ b/src/librustdoc/html/static/.eslintrc.js @@ -17,6 +17,10 @@ module.exports = { "error", "always" ], + "quotes": [ + "error", + "double" + ], "no-var": ["error"], "prefer-const": ["error"], "prefer-arrow-callback": ["error"], diff --git a/src/librustdoc/html/static/js/main.js b/src/librustdoc/html/static/js/main.js index ea20f6e28ecd6..336223ad28f32 100644 --- a/src/librustdoc/html/static/js/main.js +++ b/src/librustdoc/html/static/js/main.js @@ -291,7 +291,7 @@ function loadCss(cssFileName) { (function() { function loadScript(url) { - const script = document.createElement('script'); + const script = document.createElement("script"); script.src = url; document.head.append(script); } @@ -344,7 +344,7 @@ function loadCss(cssFileName) { searchState.input.blur(); }, showResults: search => { - if (search === null || typeof search === 'undefined') { + if (search === null || typeof search === "undefined") { search = searchState.outputElement(); } switchDisplayedElement(search); @@ -390,7 +390,7 @@ function loadCss(cssFileName) { loadSearch(); }); - if (search_input.value !== '') { + if (search_input.value !== "") { loadSearch(); } @@ -968,7 +968,7 @@ function loadCss(cssFileName) { onEachLazy(document.getElementsByClassName("notable-traits"), e => { e.onclick = function() { - this.getElementsByClassName('notable-traits-tooltiptext')[0] + this.getElementsByClassName("notable-traits-tooltiptext")[0] .classList.toggle("force-tooltip"); }; }); @@ -1070,29 +1070,29 @@ function loadCss(cssFileName) { const path = []; onEach(parent.childNodes, child => { - if (child.tagName === 'A') { + if (child.tagName === "A") { path.push(child.textContent); } }); - const el = document.createElement('textarea'); - el.value = path.join('::'); - el.setAttribute('readonly', ''); + const el = document.createElement("textarea"); + el.value = path.join("::"); + el.setAttribute("readonly", ""); // To not make it appear on the screen. - el.style.position = 'absolute'; - el.style.left = '-9999px'; + el.style.position = "absolute"; + el.style.left = "-9999px"; document.body.appendChild(el); el.select(); - document.execCommand('copy'); + document.execCommand("copy"); document.body.removeChild(el); // There is always one children, but multiple childNodes. - but.children[0].style.display = 'none'; + but.children[0].style.display = "none"; let tmp; if (but.childNodes.length < 2) { - tmp = document.createTextNode('✓'); + tmp = document.createTextNode("✓"); but.appendChild(tmp); } else { onEachLazy(but.childNodes, e => { @@ -1101,7 +1101,7 @@ function loadCss(cssFileName) { return true; } }); - tmp.textContent = '✓'; + tmp.textContent = "✓"; } if (reset_button_timeout !== null) { @@ -1109,7 +1109,7 @@ function loadCss(cssFileName) { } function reset_button() { - tmp.textContent = ''; + tmp.textContent = ""; reset_button_timeout = null; but.children[0].style.display = ""; } diff --git a/src/librustdoc/html/static/js/scrape-examples.js b/src/librustdoc/html/static/js/scrape-examples.js index 544bced4c5afd..408b7e19feadd 100644 --- a/src/librustdoc/html/static/js/scrape-examples.js +++ b/src/librustdoc/html/static/js/scrape-examples.js @@ -8,7 +8,7 @@ // Scroll code block to the given code location function scrollToLoc(elt, loc) { - const lines = elt.querySelector('.line-numbers'); + const lines = elt.querySelector(".line-numbers"); let scrollOffset; // If the block is greater than the size of the viewer, @@ -32,16 +32,16 @@ function updateScrapedExample(example) { const locs = JSON.parse(example.attributes.getNamedItem("data-locs").textContent); let locIndex = 0; - const highlights = Array.prototype.slice.call(example.querySelectorAll('.highlight')); - const link = example.querySelector('.scraped-example-title a'); + const highlights = Array.prototype.slice.call(example.querySelectorAll(".highlight")); + const link = example.querySelector(".scraped-example-title a"); if (locs.length > 1) { // Toggle through list of examples in a given file const onChangeLoc = changeIndex => { - removeClass(highlights[locIndex], 'focus'); + removeClass(highlights[locIndex], "focus"); changeIndex(); scrollToLoc(example, locs[locIndex][0]); - addClass(highlights[locIndex], 'focus'); + addClass(highlights[locIndex], "focus"); const url = locs[locIndex][1]; const title = locs[locIndex][2]; @@ -50,24 +50,24 @@ link.innerHTML = title; }; - example.querySelector('.prev') - .addEventListener('click', () => { + example.querySelector(".prev") + .addEventListener("click", () => { onChangeLoc(() => { locIndex = (locIndex - 1 + locs.length) % locs.length; }); }); - example.querySelector('.next') - .addEventListener('click', () => { + example.querySelector("next") + .addEventListener("click", () => { onChangeLoc(() => { locIndex = (locIndex + 1) % locs.length; }); }); } - const expandButton = example.querySelector('.expand'); + const expandButton = example.querySelector(".expand"); if (expandButton) { - expandButton.addEventListener('click', () => { + expandButton.addEventListener("click", () => { if (hasClass(example, "expanded")) { removeClass(example, "expanded"); scrollToLoc(example, locs[0][0]); @@ -81,19 +81,19 @@ scrollToLoc(example, locs[0][0]); } - const firstExamples = document.querySelectorAll('.scraped-example-list > .scraped-example'); + const firstExamples = document.querySelectorAll(".scraped-example-list > .scraped-example"); onEachLazy(firstExamples, updateScrapedExample); - onEachLazy(document.querySelectorAll('.more-examples-toggle'), toggle => { + onEachLazy(document.querySelectorAll(".more-examples-toggle"), toggle => { // Allow users to click the left border of the
section to close it, // since the section can be large and finding the [+] button is annoying. - onEachLazy(toggle.querySelectorAll('.toggle-line, .hide-more'), button => { - button.addEventListener('click', () => { + onEachLazy(toggle.querySelectorAll(".toggle-line, .hide-more"), button => { + button.addEventListener("click", () => { toggle.open = false; }); }); - const moreExamples = toggle.querySelectorAll('.scraped-example'); - toggle.querySelector('summary').addEventListener('click', () => { + const moreExamples = toggle.querySelectorAll(".scraped-example"); + toggle.querySelector("summary").addEventListener("click", () => { // Wrapping in setTimeout ensures the update happens after the elements are actually // visible. This is necessary since updateScrapedExample calls scrollToLoc which // depends on offsetHeight, a property that requires an element to be visible to diff --git a/src/librustdoc/html/static/js/search.js b/src/librustdoc/html/static/js/search.js index 3d8cfeecbed6d..1e3894c1fcd27 100644 --- a/src/librustdoc/html/static/js/search.js +++ b/src/librustdoc/html/static/js/search.js @@ -204,7 +204,7 @@ window.initSearch = rawSearchIndex => { * @return {boolean} */ function isPathStart(parserState) { - return parserState.userQuery.slice(parserState.pos, parserState.pos + 2) == '::'; + return parserState.userQuery.slice(parserState.pos, parserState.pos + 2) == "::"; } /** @@ -215,7 +215,7 @@ window.initSearch = rawSearchIndex => { * @return {boolean} */ function isReturnArrow(parserState) { - return parserState.userQuery.slice(parserState.pos, parserState.pos + 2) == '->'; + return parserState.userQuery.slice(parserState.pos, parserState.pos + 2) == "->"; } /** @@ -227,10 +227,10 @@ window.initSearch = rawSearchIndex => { */ function isIdentCharacter(c) { return ( - c === '_' || - (c >= '0' && c <= '9') || - (c >= 'a' && c <= 'z') || - (c >= 'A' && c <= 'Z')); + c === "_" || + (c >= "0" && c <= "9") || + (c >= "a" && c <= "z") || + (c >= "A" && c <= "Z")); } /** @@ -264,7 +264,7 @@ window.initSearch = rawSearchIndex => { * @return {QueryElement} - The newly created `QueryElement`. */ function createQueryElement(query, parserState, name, generics, isInGenerics) { - if (name === '*' || (name.length === 0 && generics.length === 0)) { + if (name === "*" || (name.length === 0 && generics.length === 0)) { return; } if (query.literalSearch && parserState.totalElems - parserState.genericsElems > 0) { @@ -1708,11 +1708,12 @@ window.initSearch = rawSearchIndex => { let crates = ""; if (window.ALL_CRATES.length > 1) { - crates = ` in "; for (const c of window.ALL_CRATES) { crates += ``; } - crates += ``; + crates += ""; } let typeFilter = ""; @@ -1720,17 +1721,17 @@ window.initSearch = rawSearchIndex => { typeFilter = " (type: " + escape(itemTypes[results.query.typeFilter]) + ")"; } - let output = `
` + + let output = "
" + `

Results for ${escape(results.query.userQuery)}` + `${typeFilter}

in ${crates}
`; if (results.query.error !== null) { output += `

Query parser error: "${results.query.error}".

`; - output += '
' + + output += "
" + makeTabHeader(0, "In Names", ret_others[1]) + "
"; currentTab = 0; } else if (results.query.foundElems <= 1 && results.query.returned.length === 0) { - output += `
` + + output += "
" + makeTabHeader(0, "In Names", ret_others[1]) + makeTabHeader(1, "In Parameters", ret_in_args[1]) + makeTabHeader(2, "In Return Types", ret_returned[1]) + @@ -1740,7 +1741,7 @@ window.initSearch = rawSearchIndex => { results.query.elems.length === 0 ? "In Function Return Types" : results.query.returned.length === 0 ? "In Function Parameters" : "In Function Signatures"; - output += '
' + + output += "
" + makeTabHeader(0, signatureTabTitle, ret_others[1]) + "
"; currentTab = 0; diff --git a/src/librustdoc/html/static/js/settings.js b/src/librustdoc/html/static/js/settings.js index a7b60a496890c..ad32a19389389 100644 --- a/src/librustdoc/html/static/js/settings.js +++ b/src/librustdoc/html/static/js/settings.js @@ -108,7 +108,7 @@ let output = ""; for (const setting of settings) { - output += `
`; + output += "
"; const js_data_name = setting["js_name"]; const setting_name = setting["name"]; @@ -217,11 +217,10 @@ if (isSettingsPage) { innerHTML += - `Back`; + "Back"; } else { - innerHTML += - `\ - Back`; + innerHTML += "Back"; } innerHTML += `
diff --git a/src/librustdoc/html/static/js/storage.js b/src/librustdoc/html/static/js/storage.js index 69940bb89df21..21de7d77d64e7 100644 --- a/src/librustdoc/html/static/js/storage.js +++ b/src/librustdoc/html/static/js/storage.js @@ -24,7 +24,7 @@ function getSettingValue(settingName) { if (settingsDataset !== null) { // See the comment for `default_settings.into_iter()` etc. in // `Options::from_matches` in `librustdoc/config.rs`. - const def = settingsDataset[settingName.replace(/-/g,'_')]; + const def = settingsDataset[settingName.replace(/-/g,"_")]; if (def !== undefined) { return def; } @@ -173,7 +173,7 @@ const updateSystemTheme = (function () { // fallback to the CSS computed value return () => { const cssTheme = getComputedStyle(document.documentElement) - .getPropertyValue('content'); + .getPropertyValue("content"); switchTheme( window.currentTheme,