Create issues for many TODOs (#1163)

* Create issues for many TODOs

* Update src/crates-io.md

Co-authored-by: Joshua Nelson <github@jyn.dev>

* Update src/backend/inline-asm.md

Co-authored-by: Yuki Okushi <jtitor@2k36.org>

Co-authored-by: Joshua Nelson <github@jyn.dev>
Co-authored-by: Yuki Okushi <jtitor@2k36.org>
This commit is contained in:
Ryan Levick 2021-07-02 10:43:12 +02:00 committed by GitHub
parent 76c1d45ae5
commit 6f1c331e94
10 changed files with 15 additions and 13 deletions

View File

@ -3,4 +3,4 @@
AST validation is the process of checking various correctness properties about AST validation is the process of checking various correctness properties about
the AST after macro expansion. the AST after macro expansion.
**TODO**: write this chapter. **TODO**: write this chapter. [#656](https://github.com/rust-lang/rustc-dev-guide/issues/656)

View File

@ -1,4 +1,5 @@
# Inline Assembly # Inline Assembly
**TODO: You can find more info in **TODO**: You can find more info
https://github.com/rust-lang/rust/pull/69171#issue-375572066** [here](https://github.com/rust-lang/rust/pull/69171#issue-375572066)
[#1162](https://github.com/rust-lang/rustc-dev-guide/issues/1162)

View File

@ -12,7 +12,9 @@ reasons:
- The dependency may have transitive dependencies that have one of the above - The dependency may have transitive dependencies that have one of the above
problems. problems.
TODO: what is the vetting process? As of <!-- date: 2021-07 --> July 2021, there is no official policy for vetting
new dependencies to the compiler. Generally, new dependencies are not added
to the compiler unless there is a good reason to do so.
## Permitted dependencies ## Permitted dependencies

View File

@ -314,8 +314,7 @@ Clang always embeds an MD5 checksum, though this does not appear in documentatio
* New demangler in `libiberty` (gcc source tree). * New demangler in `libiberty` (gcc source tree).
* New demangler in LLVM or LLDB. * New demangler in LLVM or LLDB.
**TODO**: Check the location of the demangler source. **TODO**: Check the location of the demangler source. [#1157](https://github.com/rust-lang/rustc-dev-guide/issues/1157)
[Question on Github](https://github.com/rust-lang/rustc-dev-guide/pull/316#discussion_r283062536).
#### Reuse Rust compiler for expressions #### Reuse Rust compiler for expressions

View File

@ -1,3 +1,3 @@
# Feature Gate Checking # Feature Gate Checking
**TODO**: this chapter **TODO**: this chapter [#1158](https://github.com/rust-lang/rustc-dev-guide/issues/1158)

View File

@ -5,4 +5,4 @@ The `-Z unpretty=hir-tree` flag will dump out the HIR.
If you are trying to correlate `NodeId`s or `DefId`s with source code, the If you are trying to correlate `NodeId`s or `DefId`s with source code, the
`--pretty expanded,identified` flag may be useful. `--pretty expanded,identified` flag may be useful.
TODO: anything else? TODO: anything else? [#1159](https://github.com/rust-lang/rustc-dev-guide/issues/1159)

View File

@ -82,7 +82,7 @@ See the [HIR chapter][hir-map] for more detailed information.
- [`Promoted`] identifies a promoted constant within another item (related to - [`Promoted`] identifies a promoted constant within another item (related to
const evaluation). Note: it is unique only locally within the item, so it const evaluation). Note: it is unique only locally within the item, so it
should be associated with a `DefId`. should be associated with a `DefId`.
[`GlobalId`] will give you a more specific identifier (TODO). [`GlobalId`] will give you a more specific identifier.
- [`GlobalId`] identifies a global variable: a `const`, a `static`, a `const fn` - [`GlobalId`] identifies a global variable: a `const`, a `static`, a `const fn`
where all arguments are [zero-sized types], or a promoted constant. where all arguments are [zero-sized types], or a promoted constant.

View File

@ -608,10 +608,10 @@ Because the Rust ABI is unstable, we use the C ABI for this conversion.
[pm]: https://doc.rust-lang.org/nightly/nightly-rustc/rustc_expand/proc_macro/index.html [pm]: https://doc.rust-lang.org/nightly/nightly-rustc/rustc_expand/proc_macro/index.html
[pms]: https://doc.rust-lang.org/nightly/nightly-rustc/rustc_expand/proc_macro_server/index.html [pms]: https://doc.rust-lang.org/nightly/nightly-rustc/rustc_expand/proc_macro_server/index.html
TODO: more here. TODO: more here. [#1160](https://github.com/rust-lang/rustc-dev-guide/issues/1160)
### Custom Derive ### Custom Derive
Custom derives are a special type of proc macro. Custom derives are a special type of proc macro.
TODO: more? TODO: more? [#1160](https://github.com/rust-lang/rustc-dev-guide/issues/1160)

View File

@ -164,7 +164,7 @@ To tell the difference between speculative loads and loads initiated by the
user, resolve passes around a `record_used` parameter, which is `false` when user, resolve passes around a `record_used` parameter, which is `false` when
the load is speculative. the load is speculative.
## TODO: ## TODO: [#16](https://github.com/rust-lang/rustc-dev-guide/issues/16)
This is a result of the first pass of learning the code. It is definitely This is a result of the first pass of learning the code. It is definitely
incomplete and not detailed enough. It also might be inaccurate in places. incomplete and not detailed enough. It also might be inaccurate in places.

View File

@ -41,4 +41,4 @@ For more details, see the [`collect`][collect] module.
[queries]: ./query.md [queries]: ./query.md
[collect]: https://doc.rust-lang.org/nightly/nightly-rustc/rustc_typeck/collect/ [collect]: https://doc.rust-lang.org/nightly/nightly-rustc/rustc_typeck/collect/
**TODO**: actually talk about type checking... **TODO**: actually talk about type checking... [#1161](https://github.com/rust-lang/rustc-dev-guide/issues/1161)