Fix typos found by codespell.

This commit is contained in:
Matthias Krüger 2018-08-19 15:30:23 +02:00
parent a9fe312b98
commit 71120ef1e5
99 changed files with 130 additions and 130 deletions

View file

@ -28,7 +28,7 @@ fn start(_: isize, _: *const *const u8) -> isize {
let _: (char, u32) = Trait::without_default_impl(0);
// Currently, no object code is generated for trait methods with default
// implemenations, unless they are actually called from somewhere. Therefore
// implementations, unless they are actually called from somewhere. Therefore
// we cannot import the implementations and have to create our own inline.
//~ MONO_ITEM fn cgu_export_trait_method::Trait[0]::with_default_impl[0]<u32>
let _ = Trait::with_default_impl(0u32);

View file

@ -9,7 +9,7 @@
// except according to those terms.
// This crate attempts to enumerate the various scenarios for how a
// type can define fields and methods with various visiblities and
// type can define fields and methods with various visibilities and
// stabilities.
//
// The basic stability pattern in this file has four cases:
@ -23,7 +23,7 @@
//
// However, since stability attributes can only be observed in
// cross-crate linkage scenarios, there is little reason to take the
// cross-product (4 stability cases * 4 visiblity cases), because the
// cross-product (4 stability cases * 4 visibility cases), because the
// first three visibility cases cannot be accessed outside this crate,
// and therefore stability is only relevant when the visibility is pub
// to the whole universe.

View file

@ -8,7 +8,7 @@
// option. This file may not be copied, modified, or distributed
// except according to those terms.
// error-pattern:runned an unexported test
// error-pattern:ran an unexported test
// compile-flags:--test
// check-stdout
@ -17,6 +17,6 @@ mod m {
#[test]
fn unexported() {
panic!("runned an unexported test");
panic!("ran an unexported test");
}
}

View file

@ -1,6 +1,6 @@
-include ../tools.mk
# Test that hir-tree output doens't crash and includes
# Test that hir-tree output doesn't crash and includes
# the string constant we would expect to see.
all:

View file

@ -1,6 +1,6 @@
-include ../tools.mk
# Test that hir-tree output doens't crash and includes
# Test that hir-tree output doesn't crash and includes
# the string constant we would expect to see.
all:

View file

@ -3,7 +3,7 @@
LOG := $(TMPDIR)/log.txt
# This test builds a shared object, then an executable that links it as a native
# rust library (constrast to an rlib). The shared library and executable both
# rust library (contrast to an rlib). The shared library and executable both
# are compiled with address sanitizer, and we assert that a fault in the cdylib
# is correctly detected.

View file

@ -3,7 +3,7 @@
LOG := $(TMPDIR)/log.txt
# This test builds a shared object, then an executable that links it as a native
# rust library (constrast to an rlib). The shared library and executable both
# rust library (contrast to an rlib). The shared library and executable both
# are compiled with address sanitizer, and we assert that a fault in the dylib
# is correctly detected.

View file

@ -385,7 +385,7 @@ pub fn main() {
// RwLock (since we can grab the child pointers in read-only
// mode), but we cannot lock a std::sync::Mutex to guard reading
// from each node via the same pattern, since once you hit the
// cycle, you'll be trying to acquring the same lock twice.
// cycle, you'll be trying to acquiring the same lock twice.
// (We deal with this by exiting the traversal early if try_lock fails.)
// Cycle 12: { arc0 -> (arc1, arc2), arc1 -> (), arc2 -> arc0 }, refcells

View file

@ -310,7 +310,7 @@ fn test_order() {
}
fn test_once() {
// Make sure each argument are evaluted only once even though it may be
// Make sure each argument are evaluated only once even though it may be
// formatted multiple times
fn foo() -> isize {
static mut FOO: isize = 0;

View file

@ -27,7 +27,7 @@ pub fn main() {
}
match 'c' {
'a'...'z' => {}
_ => panic!("should suppport char ranges")
_ => panic!("should support char ranges")
}
match -3_isize {
-7...5 => {}

View file

@ -26,7 +26,7 @@ type TypeD = TypeA<'static>;
// trailing comma on lifetime bounds
type TypeE = TypeA<'static,>;
// normal type arugment
// normal type argument
type TypeF<T> = Box<T>;
// type argument with trailing comma

View file

@ -11,7 +11,7 @@
// Issue 33903:
// Built-in indexing should be used even when the index is not
// trivially an integer
// Only built-in indexing can be used in constant expresssions
// Only built-in indexing can be used in constant expressions
const FOO: i32 = [12, 34][0 + 1];

View file

@ -8,7 +8,7 @@
// option. This file may not be copied, modified, or distributed
// except according to those terms.
// Test that we are able to reinitilize box with moved referent
// Test that we are able to reinitialize box with moved referent
#![feature(nll)]
static mut ORDER: [usize; 3] = [0, 0, 0];
static mut INDEX: usize = 0;

View file

@ -34,7 +34,7 @@ pub fn main() {
}
match 'c' {
'a'..='z' => {}
_ => panic!("should suppport char ranges")
_ => panic!("should support char ranges")
}
match -3 {
-7..=5 => {}

View file

@ -9,7 +9,7 @@
// except according to those terms.
// Regression test for #23698: The reassignment checker only cared
// about the last assigment in a match arm body
// about the last assignment in a match arm body
// Use an extra function to make sure no extra assignments
// are introduced by macros in the match statement

View file

@ -26,7 +26,7 @@ fn sanity_check_size<T: Copy>(one: T) {
fn main() {
// This can fail if rustc and LLVM disagree on the size of a type.
// In this case, `Option<Packed<(&(), u32)>>` was erronously not
// In this case, `Option<Packed<(&(), u32)>>` was erroneously not
// marked as packed despite needing alignment `1` and containing
// its `&()` discriminant, which has alignment larger than `1`.
sanity_check_size((Some(Packed((&(), 0))), true));

View file

@ -33,7 +33,7 @@ extern fn send_signal() {
fn main() {
unsafe {
// Install signal hander that runs on alternate signal stack.
// Install signal handler that runs on alternate signal stack.
let mut action: sigaction = std::mem::zeroed();
action.sa_flags = (SA_ONSTACK | SA_SIGINFO) as _;
action.sa_sigaction = signal_handler as sighandler_t;

View file

@ -10,7 +10,7 @@
#![crate_name = "qwop"]
/// (writen on a spider's web) Some Macro
/// (written on a spider's web) Some Macro
#[macro_export]
macro_rules! some_macro {
() => {

View file

@ -8,7 +8,7 @@
// option. This file may not be copied, modified, or distributed
// except according to those terms.
// Check that the user gets an errror if they omit a binding from an
// Check that the user gets an error if they omit a binding from an
// object type.
pub trait Foo {

View file

@ -19,7 +19,7 @@
// revisions: ast migrate nll
// Since we are testing nll (and migration) explicitly as a separate
// revisions, dont worry about the --compare-mode=nll on this test.
// revisions, don't worry about the --compare-mode=nll on this test.
// ignore-compare-mode-nll

View file

@ -8,7 +8,7 @@
// option. This file may not be copied, modified, or distributed
// except according to those terms.
// We need to opt inot the `!` feature in order to trigger the
// We need to opt into the `!` feature in order to trigger the
// requirement that this is testing.
#![feature(never_type)]

View file

@ -24,7 +24,7 @@ error[E0401]: can't use type parameters from outer function
--> $DIR/E0401.rs:32:25
|
LL | impl<T> Iterator for A<T> {
| ---- `Self` type implicitely declared here, on the `impl`
| ---- `Self` type implicitly declared here, on the `impl`
...
LL | fn helper(sel: &Self) -> u8 { //~ ERROR E0401
| ------ ^^^^ use of type variable from outer function

View file

@ -8,7 +8,7 @@
// option. This file may not be copied, modified, or distributed
// except according to those terms.
// `#[macro_export] macro_rules` that doen't originate from macro expansions can be placed
// `#[macro_export] macro_rules` that doesn't originate from macro expansions can be placed
// into the root module soon enough to act as usual items and shadow globs and preludes.
#![feature(decl_macro)]

View file

@ -8,7 +8,7 @@
// option. This file may not be copied, modified, or distributed
// except according to those terms.
// Checks lexical scopes cannot see through normal module boundries
// Checks lexical scopes cannot see through normal module boundaries
fn f() {
fn g() {}

View file

@ -24,7 +24,7 @@
// run-pass
// This test has structs and functions that are by definiton unusable
// This test has structs and functions that are by definition unusable
// all over the place, so just go ahead and allow dead_code
#![allow(dead_code)]

View file

@ -8,7 +8,7 @@
// option. This file may not be copied, modified, or distributed
// except according to those terms.
// Confirm that we don't accidently divide or mod by zero in llvm_type
// Confirm that we don't accidentally divide or mod by zero in llvm_type
// compile-pass

View file

@ -10,7 +10,7 @@
#![feature(label_break_value)]
// These are forbidden occurences of label-break-value
// These are forbidden occurrences of label-break-value
fn labeled_unsafe() {
unsafe 'b: {} //~ ERROR expected one of `extern`, `fn`, or `{`

View file

@ -9,8 +9,8 @@
// except according to those terms.
// FIXME: Change to UI Test
// Check notes are placed on an assignment that can actually precede the current assigmnent
// Don't emmit a first assignment for assignment in a loop.
// Check notes are placed on an assignment that can actually precede the current assignment
// Don't emit a first assignment for assignment in a loop.
// compile-flags: -Zborrowck=compare

View file

@ -35,7 +35,7 @@ use lint_unused_extern_crate2::foo as bar;
use other::*;
mod foo {
// Test that this is unused even though an earler `extern crate` is used.
// Test that this is unused even though an earlier `extern crate` is used.
extern crate lint_unused_extern_crate2; //~ ERROR unused extern crate
}

View file

@ -11,7 +11,7 @@
#![feature(generic_associated_types)]
//FIXME(#44265): The lifetime shadowing and type parameter shadowing
// should cause an error. Now it compiles (errorneously) and this will be addressed
// should cause an error. Now it compiles (erroneously) and this will be addressed
// by a future PR. Then remove the following:
// compile-pass

View file

@ -12,7 +12,7 @@
#![deny(rust_2018_compatibility)]
// Don't make a suggestion for a raw identifer replacement unless raw
// Don't make a suggestion for a raw identifier replacement unless raw
// identifiers are enabled.
fn main() {

View file

@ -9,7 +9,7 @@
// except according to those terms.
// Test that we DO NOT warn when lifetime name is used multiple
// argments, or more than once in a single argument.
// arguments, or more than once in a single argument.
//
// compile-pass

View file

@ -8,7 +8,7 @@
// option. This file may not be copied, modified, or distributed
// except according to those terms.
// ignore-arm stdcall isn't suppported
// ignore-arm stdcall isn't supported
fn baz(f: extern "stdcall" fn(usize, ...)) {
//~^ ERROR: variadic function must have C or cdecl calling convention

View file

@ -8,8 +8,8 @@
// option. This file may not be copied, modified, or distributed
// except according to those terms.
// ignore-arm stdcall isn't suppported
// ignore-aarch64 stdcall isn't suppported
// ignore-arm stdcall isn't supported
// ignore-aarch64 stdcall isn't supported
extern "stdcall" {
fn printf(_: *const u8, ...); //~ ERROR: variadic function must have C or cdecl calling

View file

@ -10,7 +10,7 @@
// Test that we can quantify lifetimes outside a constraint (i.e., including
// the self type) in a where clause. Specifically, test that implementing for a
// specific lifetime is not enough to satisify the `for<'a> ...` constraint, which
// specific lifetime is not enough to satisfy the `for<'a> ...` constraint, which
// should require *all* lifetimes.
static X: &'static u32 = &42;