zsh-workers
 help / color / mirror / code / Atom feed
* PATCH: unmetacheck revisited
@ 2005-10-26  9:59 Peter Stephenson
  0 siblings, 0 replies; only message in thread
From: Peter Stephenson @ 2005-10-26  9:59 UTC (permalink / raw)
  To: Zsh hackers list

I was too pessimistic about the check for an unmetafied line on a call
to zle: the case I was really worried about was an otherwise successful
call to a widget.  Otherwise you can get unnecessary warnings with
a redisplay etc.

Index: Src/Zle/zle_thingy.c
===================================================================
RCS file: /cvsroot/zsh/zsh/Src/Zle/zle_thingy.c,v
retrieving revision 1.20
diff -u -r1.20 zle_thingy.c
--- Src/Zle/zle_thingy.c	23 Oct 2005 17:43:00 -0000	1.20
+++ Src/Zle/zle_thingy.c	26 Oct 2005 09:57:03 -0000
@@ -358,8 +358,6 @@
     struct opn const *op, *opp;
     int n;
 
-    UNMETACHECK();
-
     /* select operation and ensure no clashing arguments */
     for(op = opns; op->o && !OPT_ISSET(ops,STOUC(op->o)); op++) ;
     if(op->o)
@@ -659,6 +657,8 @@
 	return 1;
     }
 
+    UNMETACHECK();
+
     while (*args && **args == '-') {
 	char *num;
 	if (!args[0][1] || args[0][1] == '-') {

-- 
Peter Stephenson <pws@csr.com>                  Software Engineer
CSR PLC, Churchill House, Cambridge Business Park, Cowley Road
Cambridge, CB4 0WZ, UK                          Tel: +44 (0)1223 692070


This message has been scanned for viruses by BlackSpider MailControl - www.blackspider.com


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2005-10-26  9:59 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2005-10-26  9:59 PATCH: unmetacheck revisited Peter Stephenson

Code repositories for project(s) associated with this public inbox

	https://git.vuxu.org/mirror/zsh/

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).