forked from OSchip/llvm-project
[clang-tidy] Another batch of checks to rename from misc- to bugprone-.
Summary: clang-tidy/rename_check.py {misc,bugprone}-suspicious-semicolon clang-tidy/rename_check.py {misc,bugprone}-suspicious-string-compare clang-tidy/rename_check.py {misc,bugprone}-swapped-arguments clang-tidy/rename_check.py {misc,bugprone}-undelegated-constructor --check_class_name UndelegatedConstructor Reviewers: hokein, sammccall, aaron.ballman Subscribers: klimek, mgorny, xazax.hun, cfe-commits Differential Revision: https://reviews.llvm.org/D43870 llvm-svn: 326386
This commit is contained in:
parent
51ec5a9ce3
commit
eb9d944419
|
@ -33,8 +33,12 @@
|
|||
#include "SuspiciousEnumUsageCheck.h"
|
||||
#include "SuspiciousMemsetUsageCheck.h"
|
||||
#include "SuspiciousMissingCommaCheck.h"
|
||||
#include "SuspiciousSemicolonCheck.h"
|
||||
#include "SuspiciousStringCompareCheck.h"
|
||||
#include "SwappedArgumentsCheck.h"
|
||||
#include "ThrowKeywordMissingCheck.h"
|
||||
#include "UndefinedMemoryManipulationCheck.h"
|
||||
#include "UndelegatedConstructorCheck.h"
|
||||
#include "UseAfterMoveCheck.h"
|
||||
#include "VirtualNearMissCheck.h"
|
||||
|
||||
|
@ -91,10 +95,18 @@ public:
|
|||
"bugprone-suspicious-memset-usage");
|
||||
CheckFactories.registerCheck<SuspiciousMissingCommaCheck>(
|
||||
"bugprone-suspicious-missing-comma");
|
||||
CheckFactories.registerCheck<SuspiciousSemicolonCheck>(
|
||||
"bugprone-suspicious-semicolon");
|
||||
CheckFactories.registerCheck<SuspiciousStringCompareCheck>(
|
||||
"bugprone-suspicious-string-compare");
|
||||
CheckFactories.registerCheck<SwappedArgumentsCheck>(
|
||||
"bugprone-swapped-arguments");
|
||||
CheckFactories.registerCheck<ThrowKeywordMissingCheck>(
|
||||
"bugprone-throw-keyword-missing");
|
||||
CheckFactories.registerCheck<UndefinedMemoryManipulationCheck>(
|
||||
"bugprone-undefined-memory-manipulation");
|
||||
CheckFactories.registerCheck<UndelegatedConstructorCheck>(
|
||||
"bugprone-undelegated-constructor");
|
||||
CheckFactories.registerCheck<UseAfterMoveCheck>(
|
||||
"bugprone-use-after-move");
|
||||
CheckFactories.registerCheck<VirtualNearMissCheck>(
|
||||
|
|
|
@ -25,8 +25,12 @@ add_clang_library(clangTidyBugproneModule
|
|||
SuspiciousEnumUsageCheck.cpp
|
||||
SuspiciousMemsetUsageCheck.cpp
|
||||
SuspiciousMissingCommaCheck.cpp
|
||||
SuspiciousSemicolonCheck.cpp
|
||||
SuspiciousStringCompareCheck.cpp
|
||||
SwappedArgumentsCheck.cpp
|
||||
ThrowKeywordMissingCheck.cpp
|
||||
UndefinedMemoryManipulationCheck.cpp
|
||||
UndelegatedConstructorCheck.cpp
|
||||
UseAfterMoveCheck.cpp
|
||||
VirtualNearMissCheck.cpp
|
||||
|
||||
|
|
|
@ -16,7 +16,7 @@ using namespace clang::ast_matchers;
|
|||
|
||||
namespace clang {
|
||||
namespace tidy {
|
||||
namespace misc {
|
||||
namespace bugprone {
|
||||
|
||||
void SuspiciousSemicolonCheck::registerMatchers(MatchFinder *Finder) {
|
||||
Finder->addMatcher(
|
||||
|
@ -72,6 +72,6 @@ void SuspiciousSemicolonCheck::check(const MatchFinder::MatchResult &Result) {
|
|||
<< FixItHint::CreateRemoval(SourceRange(LocStart, LocEnd));
|
||||
}
|
||||
|
||||
} // namespace misc
|
||||
} // namespace bugprone
|
||||
} // namespace tidy
|
||||
} // namespace clang
|
|
@ -7,20 +7,20 @@
|
|||
//
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_SEMICOLON_H
|
||||
#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_SEMICOLON_H
|
||||
#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSSEMICOLONCHECK_H
|
||||
#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSSEMICOLONCHECK_H
|
||||
|
||||
#include "../ClangTidy.h"
|
||||
|
||||
namespace clang {
|
||||
namespace tidy {
|
||||
namespace misc {
|
||||
namespace bugprone {
|
||||
|
||||
/// This check finds semicolon that modifies the meaning of the program
|
||||
/// unintendedly.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/misc-suspicious-semicolon.html
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-semicolon.html
|
||||
class SuspiciousSemicolonCheck : public ClangTidyCheck {
|
||||
public:
|
||||
SuspiciousSemicolonCheck(StringRef Name, ClangTidyContext *Context)
|
||||
|
@ -29,8 +29,8 @@ public:
|
|||
void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
|
||||
};
|
||||
|
||||
} // namespace misc
|
||||
} // namespace bugprone
|
||||
} // namespace tidy
|
||||
} // namespace clang
|
||||
|
||||
#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_SEMICOLON_H
|
||||
#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSSEMICOLONCHECK_H
|
|
@ -18,7 +18,7 @@ using namespace clang::ast_matchers;
|
|||
|
||||
namespace clang {
|
||||
namespace tidy {
|
||||
namespace misc {
|
||||
namespace bugprone {
|
||||
|
||||
// Semicolon separated list of known string compare-like functions. The list
|
||||
// must ends with a semicolon.
|
||||
|
@ -213,6 +213,6 @@ void SuspiciousStringCompareCheck::check(
|
|||
}
|
||||
}
|
||||
|
||||
} // namespace misc
|
||||
} // namespace bugprone
|
||||
} // namespace tidy
|
||||
} // namespace clang
|
|
@ -7,19 +7,19 @@
|
|||
//
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_STRING_COMPARE_H
|
||||
#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_STRING_COMPARE_H
|
||||
#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSSTRINGCOMPARECHECK_H
|
||||
#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSSTRINGCOMPARECHECK_H
|
||||
|
||||
#include "../ClangTidy.h"
|
||||
|
||||
namespace clang {
|
||||
namespace tidy {
|
||||
namespace misc {
|
||||
namespace bugprone {
|
||||
|
||||
/// Find suspicious calls to string compare functions.
|
||||
///
|
||||
/// For the user-facing documentation see:
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/misc-suspicious-string-compare.html
|
||||
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-string-compare.html
|
||||
class SuspiciousStringCompareCheck : public ClangTidyCheck {
|
||||
public:
|
||||
SuspiciousStringCompareCheck(StringRef Name, ClangTidyContext *Context);
|
||||
|
@ -33,8 +33,8 @@ private:
|
|||
const std::string StringCompareLikeFunctions;
|
||||
};
|
||||
|
||||
} // namespace misc
|
||||
} // namespace bugprone
|
||||
} // namespace tidy
|
||||
} // namespace clang
|
||||
|
||||
#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SUSPICIOUS_STRING_COMPARE_H
|
||||
#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SUSPICIOUSSTRINGCOMPARECHECK_H
|
|
@ -17,7 +17,7 @@ using namespace clang::ast_matchers;
|
|||
|
||||
namespace clang {
|
||||
namespace tidy {
|
||||
namespace misc {
|
||||
namespace bugprone {
|
||||
|
||||
void SwappedArgumentsCheck::registerMatchers(MatchFinder *Finder) {
|
||||
Finder->addMatcher(callExpr().bind("call"), this);
|
||||
|
@ -97,6 +97,6 @@ void SwappedArgumentsCheck::check(const MatchFinder::MatchResult &Result) {
|
|||
}
|
||||
}
|
||||
|
||||
} // namespace misc
|
||||
} // namespace bugprone
|
||||
} // namespace tidy
|
||||
} // namespace clang
|
|
@ -7,14 +7,14 @@
|
|||
//
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SWAPPEDARGUMENTSCHECK_H
|
||||
#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SWAPPEDARGUMENTSCHECK_H
|
||||
#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SWAPPEDARGUMENTSCHECK_H
|
||||
#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SWAPPEDARGUMENTSCHECK_H
|
||||
|
||||
#include "../ClangTidy.h"
|
||||
|
||||
namespace clang {
|
||||
namespace tidy {
|
||||
namespace misc {
|
||||
namespace bugprone {
|
||||
|
||||
/// Finds potentially swapped arguments by looking at implicit conversions.
|
||||
class SwappedArgumentsCheck : public ClangTidyCheck {
|
||||
|
@ -25,8 +25,8 @@ public:
|
|||
void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
|
||||
};
|
||||
|
||||
} // namespace misc
|
||||
} // namespace bugprone
|
||||
} // namespace tidy
|
||||
} // namespace clang
|
||||
|
||||
#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MISC_SWAPPEDARGUMENTSCHECK_H
|
||||
#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SWAPPEDARGUMENTSCHECK_H
|
|
@ -1,4 +1,4 @@
|
|||
//===--- UndelegatedConstructor.cpp - clang-tidy --------------------------===//
|
||||
//===--- UndelegatedConstructorCheck.cpp - clang-tidy --------------------------===//
|
||||
//
|
||||
// The LLVM Compiler Infrastructure
|
||||
//
|
||||
|
@ -7,7 +7,7 @@
|
|||
//
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
#include "UndelegatedConstructor.h"
|
||||
#include "UndelegatedConstructorCheck.h"
|
||||
#include "clang/AST/ASTContext.h"
|
||||
#include "clang/Lex/Lexer.h"
|
||||
|
||||
|
@ -15,7 +15,7 @@ using namespace clang::ast_matchers;
|
|||
|
||||
namespace clang {
|
||||
namespace tidy {
|
||||
namespace misc {
|
||||
namespace bugprone {
|
||||
|
||||
namespace {
|
||||
AST_MATCHER_P(Stmt, ignoringTemporaryExpr,
|
||||
|
@ -79,6 +79,6 @@ void UndelegatedConstructorCheck::check(
|
|||
"A temporary object is created here instead");
|
||||
}
|
||||
|
||||
} // namespace misc
|
||||
} // namespace bugprone
|
||||
} // namespace tidy
|
||||
} // namespace clang
|
|
@ -1,4 +1,4 @@
|
|||
//===--- UndelegatedConstructor.h - clang-tidy ------------------*- C++ -*-===//
|
||||
//===--- UndelegatedConstructorCheck.h - clang-tidy -------------*- C++ -*-===//
|
||||
//
|
||||
// The LLVM Compiler Infrastructure
|
||||
//
|
||||
|
@ -14,7 +14,7 @@
|
|||
|
||||
namespace clang {
|
||||
namespace tidy {
|
||||
namespace misc {
|
||||
namespace bugprone {
|
||||
|
||||
/// Finds creation of temporary objects in constructors that look like a
|
||||
/// function call to another constructor of the same class.
|
||||
|
@ -29,7 +29,7 @@ public:
|
|||
void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
|
||||
};
|
||||
|
||||
} // namespace misc
|
||||
} // namespace bugprone
|
||||
} // namespace tidy
|
||||
} // namespace clang
|
||||
|
|
@ -21,7 +21,7 @@
|
|||
#include "../google/ExplicitConstructorCheck.h"
|
||||
#include "../misc/NewDeleteOverloadsCheck.h"
|
||||
#include "../misc/StaticAssertCheck.h"
|
||||
#include "../misc/UndelegatedConstructor.h"
|
||||
#include "../bugprone/UndelegatedConstructorCheck.h"
|
||||
#include "../modernize/DeprecatedHeadersCheck.h"
|
||||
#include "../modernize/UseAutoCheck.h"
|
||||
#include "../modernize/UseEmplaceCheck.h"
|
||||
|
@ -83,7 +83,7 @@ public:
|
|||
CheckFactories.registerCheck<misc::StaticAssertCheck>(
|
||||
"hicpp-static-assert");
|
||||
CheckFactories.registerCheck<modernize::UseAutoCheck>("hicpp-use-auto");
|
||||
CheckFactories.registerCheck<misc::UndelegatedConstructorCheck>(
|
||||
CheckFactories.registerCheck<bugprone::UndelegatedConstructorCheck>(
|
||||
"hicpp-undelegated-constructor");
|
||||
CheckFactories.registerCheck<modernize::UseEmplaceCheck>(
|
||||
"hicpp-use-emplace");
|
||||
|
|
|
@ -12,11 +12,7 @@ add_clang_library(clangTidyMiscModule
|
|||
SizeofContainerCheck.cpp
|
||||
SizeofExpressionCheck.cpp
|
||||
StaticAssertCheck.cpp
|
||||
SuspiciousSemicolonCheck.cpp
|
||||
SuspiciousStringCompareCheck.cpp
|
||||
SwappedArgumentsCheck.cpp
|
||||
ThrowByValueCatchByReferenceCheck.cpp
|
||||
UndelegatedConstructor.cpp
|
||||
UniqueptrResetReleaseCheck.cpp
|
||||
UnusedAliasDeclsCheck.cpp
|
||||
UnusedParametersCheck.cpp
|
||||
|
|
|
@ -19,12 +19,8 @@
|
|||
#include "SizeofContainerCheck.h"
|
||||
#include "SizeofExpressionCheck.h"
|
||||
#include "StaticAssertCheck.h"
|
||||
#include "SuspiciousSemicolonCheck.h"
|
||||
#include "SuspiciousStringCompareCheck.h"
|
||||
#include "SwappedArgumentsCheck.h"
|
||||
#include "ThrowByValueCatchByReferenceCheck.h"
|
||||
#include "UnconventionalAssignOperatorCheck.h"
|
||||
#include "UndelegatedConstructor.h"
|
||||
#include "UniqueptrResetReleaseCheck.h"
|
||||
#include "UnusedAliasDeclsCheck.h"
|
||||
#include "UnusedParametersCheck.h"
|
||||
|
@ -55,16 +51,8 @@ public:
|
|||
CheckFactories.registerCheck<SizeofExpressionCheck>(
|
||||
"misc-sizeof-expression");
|
||||
CheckFactories.registerCheck<StaticAssertCheck>("misc-static-assert");
|
||||
CheckFactories.registerCheck<SuspiciousSemicolonCheck>(
|
||||
"misc-suspicious-semicolon");
|
||||
CheckFactories.registerCheck<SuspiciousStringCompareCheck>(
|
||||
"misc-suspicious-string-compare");
|
||||
CheckFactories.registerCheck<SwappedArgumentsCheck>(
|
||||
"misc-swapped-arguments");
|
||||
CheckFactories.registerCheck<ThrowByValueCatchByReferenceCheck>(
|
||||
"misc-throw-by-value-catch-by-reference");
|
||||
CheckFactories.registerCheck<UndelegatedConstructorCheck>(
|
||||
"misc-undelegated-constructor");
|
||||
CheckFactories.registerCheck<UniqueptrResetReleaseCheck>(
|
||||
"misc-uniqueptr-reset-release");
|
||||
CheckFactories.registerCheck<UnusedAliasDeclsCheck>(
|
||||
|
|
|
@ -136,6 +136,18 @@ Improvements to clang-tidy
|
|||
- The 'misc-suspicious-missing-comma' check was renamed to `bugprone-suspicious-missing-comma
|
||||
<http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-missing-comma.html>`_
|
||||
|
||||
- The 'misc-suspicious-semicolon' check was renamed to `bugprone-suspicious-semicolon
|
||||
<http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-semicolon.html>`_
|
||||
|
||||
- The 'misc-suspicious-string-compare' check was renamed to `bugprone-suspicious-string-compare
|
||||
<http://clang.llvm.org/extra/clang-tidy/checks/bugprone-suspicious-string-compare.html>`_
|
||||
|
||||
- The 'misc-swapped-arguments' check was renamed to `bugprone-swapped-arguments
|
||||
<http://clang.llvm.org/extra/clang-tidy/checks/bugprone-swapped-arguments.html>`_
|
||||
|
||||
- The 'misc-undelegated-constructor' check was renamed to `bugprone-undelegated-constructor
|
||||
<http://clang.llvm.org/extra/clang-tidy/checks/bugprone-undelegated-constructor.html>`_
|
||||
|
||||
Improvements to include-fixer
|
||||
-----------------------------
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
.. title:: clang-tidy - misc-suspicious-semicolon
|
||||
.. title:: clang-tidy - bugprone-suspicious-semicolon
|
||||
|
||||
misc-suspicious-semicolon
|
||||
=========================
|
||||
bugprone-suspicious-semicolon
|
||||
=============================
|
||||
|
||||
Finds most instances of stray semicolons that unexpectedly alter the meaning of
|
||||
the code. More specifically, it looks for ``if``, ``while``, ``for`` and
|
|
@ -1,7 +1,7 @@
|
|||
.. title:: clang-tidy - misc-suspicious-string-compare
|
||||
.. title:: clang-tidy - bugprone-suspicious-string-compare
|
||||
|
||||
misc-suspicious-string-compare
|
||||
==============================
|
||||
bugprone-suspicious-string-compare
|
||||
==================================
|
||||
|
||||
Find suspicious usage of runtime string comparison functions.
|
||||
This check is valid in C and C++.
|
|
@ -0,0 +1,6 @@
|
|||
.. title:: clang-tidy - bugprone-swapped-arguments
|
||||
|
||||
bugprone-swapped-arguments
|
||||
==========================
|
||||
|
||||
Finds potentially swapped arguments by looking at implicit conversions.
|
|
@ -1,8 +1,7 @@
|
|||
.. title:: clang-tidy - misc-undelegated-constructor
|
||||
|
||||
misc-undelegated-constructor
|
||||
============================
|
||||
.. title:: clang-tidy - bugprone-undelegated-constructor
|
||||
|
||||
bugprone-undelegated-constructor
|
||||
================================
|
||||
|
||||
Finds creation of temporary objects in constructors that look like a
|
||||
function call to another constructor of the same class.
|
|
@ -1,11 +1,11 @@
|
|||
.. title:: clang-tidy - hicpp-undelegated-construtor
|
||||
.. meta::
|
||||
:http-equiv=refresh: 5;URL=misc-undelegated-constructor.html
|
||||
:http-equiv=refresh: 5;URL=bugprone-undelegated-constructor.html
|
||||
|
||||
hicpp-undelegated-constructor
|
||||
=============================
|
||||
|
||||
This check is an alias for `misc-undelegated-constructor <misc-undelegated-constructor.html>`_.
|
||||
This check is an alias for `bugprone-undelegated-constructor <bugprone-undelegated-constructor.html>`_.
|
||||
Partially implements `rule 12.4.5 <http://www.codingstandard.com/rule/12-4-5-use-delegating-constructors-to-reduce-code-duplication/>`_
|
||||
to find misplaced constructor calls inside a constructor.
|
||||
|
||||
|
|
|
@ -40,8 +40,12 @@ Clang-Tidy Checks
|
|||
bugprone-suspicious-enum-usage
|
||||
bugprone-suspicious-memset-usage
|
||||
bugprone-suspicious-missing-comma
|
||||
bugprone-suspicious-semicolon
|
||||
bugprone-suspicious-string-compare
|
||||
bugprone-swapped-arguments
|
||||
bugprone-throw-keyword-missing
|
||||
bugprone-undefined-memory-manipulation
|
||||
bugprone-undelegated-constructor
|
||||
bugprone-use-after-move
|
||||
bugprone-virtual-near-miss
|
||||
cert-dcl03-c (redirects to misc-static-assert) <cert-dcl03-c>
|
||||
|
@ -121,7 +125,7 @@ Clang-Tidy Checks
|
|||
hicpp-signed-bitwise
|
||||
hicpp-special-member-functions (redirects to cppcoreguidelines-special-member-functions) <hicpp-special-member-functions>
|
||||
hicpp-static-assert (redirects to misc-static-assert) <hicpp-static-assert>
|
||||
hicpp-undelegated-constructor (redirects to misc-undelegated-constructor) <hicpp-undelegated-constructor>
|
||||
hicpp-undelegated-constructor (redirects to bugprone-undelegated-constructor) <hicpp-undelegated-constructor>
|
||||
hicpp-use-auto (redirects to modernize-use-auto) <hicpp-use-auto>
|
||||
hicpp-use-emplace (redirects to modernize-use-emplace) <hicpp-use-emplace>
|
||||
hicpp-use-equals-default (redirects to modernize-use-equals-default) <hicpp-use-equals-default>
|
||||
|
@ -143,12 +147,8 @@ Clang-Tidy Checks
|
|||
misc-sizeof-container
|
||||
misc-sizeof-expression
|
||||
misc-static-assert
|
||||
misc-suspicious-semicolon
|
||||
misc-suspicious-string-compare
|
||||
misc-swapped-arguments
|
||||
misc-throw-by-value-catch-by-reference
|
||||
misc-unconventional-assign-operator
|
||||
misc-undelegated-constructor
|
||||
misc-uniqueptr-reset-release
|
||||
misc-unused-alias-decls
|
||||
misc-unused-parameters
|
||||
|
|
|
@ -1,7 +0,0 @@
|
|||
.. title:: clang-tidy - misc-swapped-arguments
|
||||
|
||||
misc-swapped-arguments
|
||||
======================
|
||||
|
||||
|
||||
Finds potentially swapped arguments by looking at implicit conversions.
|
|
@ -1,7 +1,7 @@
|
|||
// RUN: clang-tidy %s -checks="-*,misc-suspicious-semicolon" -- -DERROR 2>&1 \
|
||||
// RUN: clang-tidy %s -checks="-*,bugprone-suspicious-semicolon" -- -DERROR 2>&1 \
|
||||
// RUN: | FileCheck %s -check-prefix=CHECK-ERROR \
|
||||
// RUN: -implicit-check-not="{{warning|error}}:"
|
||||
// RUN: clang-tidy %s -checks="-*,misc-suspicious-semicolon,clang-diagnostic*" \
|
||||
// RUN: clang-tidy %s -checks="-*,bugprone-suspicious-semicolon,clang-diagnostic*" \
|
||||
// RUN: -- -DWERROR -Wno-everything -Werror=unused-variable 2>&1 \
|
||||
// RUN: | FileCheck %s -check-prefix=CHECK-WERROR \
|
||||
// RUN: -implicit-check-not="{{warning|error}}:"
|
||||
|
@ -13,7 +13,7 @@ bool g();
|
|||
|
||||
void f() {
|
||||
if (g());
|
||||
// CHECK-WERROR: :[[@LINE-1]]:11: warning: potentially unintended semicolon [misc-suspicious-semicolon]
|
||||
// CHECK-WERROR: :[[@LINE-1]]:11: warning: potentially unintended semicolon [bugprone-suspicious-semicolon]
|
||||
#if ERROR
|
||||
int a
|
||||
// CHECK-ERROR: :[[@LINE-1]]:8: error: expected ';' at end of declaration [clang-diagnostic-error]
|
|
@ -1,4 +1,4 @@
|
|||
// RUN: %check_clang_tidy %s misc-suspicious-semicolon %t
|
||||
// RUN: %check_clang_tidy %s bugprone-suspicious-semicolon %t
|
||||
|
||||
int x = 5;
|
||||
|
||||
|
@ -26,7 +26,7 @@ void correct3()
|
|||
void fail1()
|
||||
{
|
||||
if(x > 5); nop();
|
||||
// CHECK-MESSAGES: :[[@LINE-1]]:12: warning: potentially unintended semicolon [misc-suspicious-semicolon]
|
||||
// CHECK-MESSAGES: :[[@LINE-1]]:12: warning: potentially unintended semicolon [bugprone-suspicious-semicolon]
|
||||
// CHECK-FIXES: if(x > 5) nop();
|
||||
}
|
||||
|
||||
|
@ -34,7 +34,7 @@ void fail2()
|
|||
{
|
||||
if(x == 5);
|
||||
nop();
|
||||
// CHECK-MESSAGES: :[[@LINE-2]]:12: warning: potentially unintended semicolon [misc-suspicious-semicolon]
|
||||
// CHECK-MESSAGES: :[[@LINE-2]]:12: warning: potentially unintended semicolon [bugprone-suspicious-semicolon]
|
||||
// CHECK-FIXES: if(x == 5){{$}}
|
||||
}
|
||||
|
|
@ -1,7 +1,7 @@
|
|||
// RUN: %check_clang_tidy %s misc-suspicious-string-compare %t -- \
|
||||
// RUN: %check_clang_tidy %s bugprone-suspicious-string-compare %t -- \
|
||||
// RUN: -config='{CheckOptions: \
|
||||
// RUN: [{key: misc-suspicious-string-compare.WarnOnImplicitComparison, value: 1}, \
|
||||
// RUN: {key: misc-suspicious-string-compare.WarnOnLogicalNotComparison, value: 1}]}' \
|
||||
// RUN: [{key: bugprone-suspicious-string-compare.WarnOnImplicitComparison, value: 1}, \
|
||||
// RUN: {key: bugprone-suspicious-string-compare.WarnOnLogicalNotComparison, value: 1}]}' \
|
||||
// RUN: -- -std=c99
|
||||
|
||||
static const char A[] = "abc";
|
||||
|
@ -11,7 +11,7 @@ int strcmp(const char *, const char *);
|
|||
int test_warning_patterns() {
|
||||
if (strcmp(A, "a"))
|
||||
return 0;
|
||||
// CHECK-MESSAGES: [[@LINE-2]]:7: warning: function 'strcmp' is called without explicitly comparing result [misc-suspicious-string-compare]
|
||||
// CHECK-MESSAGES: [[@LINE-2]]:7: warning: function 'strcmp' is called without explicitly comparing result [bugprone-suspicious-string-compare]
|
||||
// CHECK-FIXES: if (strcmp(A, "a") != 0)
|
||||
|
||||
if (strcmp(A, "a") != 0 ||
|
|
@ -1,7 +1,7 @@
|
|||
// RUN: %check_clang_tidy %s misc-suspicious-string-compare %t -- \
|
||||
// RUN: %check_clang_tidy %s bugprone-suspicious-string-compare %t -- \
|
||||
// RUN: -config='{CheckOptions: \
|
||||
// RUN: [{key: misc-suspicious-string-compare.WarnOnImplicitComparison, value: 1}, \
|
||||
// RUN: {key: misc-suspicious-string-compare.WarnOnLogicalNotComparison, value: 1}]}' \
|
||||
// RUN: [{key: bugprone-suspicious-string-compare.WarnOnImplicitComparison, value: 1}, \
|
||||
// RUN: {key: bugprone-suspicious-string-compare.WarnOnLogicalNotComparison, value: 1}]}' \
|
||||
// RUN: --
|
||||
|
||||
typedef __SIZE_TYPE__ size;
|
||||
|
@ -61,7 +61,7 @@ int _mbsnbicmp_l(const unsigned char *, const unsigned char *, size, locale_t);
|
|||
int test_warning_patterns() {
|
||||
if (strcmp(A, "a"))
|
||||
return 0;
|
||||
// CHECK-MESSAGES: [[@LINE-2]]:7: warning: function 'strcmp' is called without explicitly comparing result [misc-suspicious-string-compare]
|
||||
// CHECK-MESSAGES: [[@LINE-2]]:7: warning: function 'strcmp' is called without explicitly comparing result [bugprone-suspicious-string-compare]
|
||||
// CHECK-FIXES: if (strcmp(A, "a") != 0)
|
||||
|
||||
if (strcmp(A, "a") == 0 ||
|
|
@ -1,4 +1,4 @@
|
|||
// RUN: %check_clang_tidy %s misc-swapped-arguments %t
|
||||
// RUN: %check_clang_tidy %s bugprone-swapped-arguments %t
|
||||
|
||||
void F(int, double);
|
||||
|
|
@ -1,4 +1,4 @@
|
|||
// RUN: clang-tidy %s -checks=-*,misc-undelegated-constructor -- -std=c++98 | count 0
|
||||
// RUN: clang-tidy %s -checks=-*,bugprone-undelegated-constructor -- -std=c++98 | count 0
|
||||
|
||||
// Note: this test expects no diagnostics, but FileCheck cannot handle that,
|
||||
// hence the use of | count 0.
|
|
@ -1,4 +1,4 @@
|
|||
// RUN: %check_clang_tidy %s misc-undelegated-constructor %t
|
||||
// RUN: %check_clang_tidy %s bugprone-undelegated-constructor %t
|
||||
|
||||
struct Ctor;
|
||||
Ctor foo();
|
||||
|
@ -9,7 +9,7 @@ struct Ctor {
|
|||
Ctor(int, int);
|
||||
Ctor(Ctor *i) {
|
||||
Ctor();
|
||||
// CHECK-MESSAGES: :[[@LINE-1]]:5: warning: did you intend to call a delegated constructor? A temporary object is created here instead [misc-undelegated-constructor]
|
||||
// CHECK-MESSAGES: :[[@LINE-1]]:5: warning: did you intend to call a delegated constructor? A temporary object is created here instead [bugprone-undelegated-constructor]
|
||||
Ctor(0);
|
||||
// CHECK-MESSAGES: :[[@LINE-1]]:5: warning: did you intend to call a delegated constructor?
|
||||
Ctor(1, 2);
|
|
@ -1,4 +1,4 @@
|
|||
// RUN: %check_clang_tidy %s misc-suspicious-semicolon %t
|
||||
// RUN: %check_clang_tidy %s bugprone-suspicious-semicolon %t
|
||||
|
||||
// This test checks if Objective-C 2.0 (@properties) and
|
||||
// Automatic Reference Counting (ARC) are enabled for .m files
|
||||
|
@ -16,6 +16,6 @@
|
|||
void fail(Foo *f)
|
||||
{
|
||||
if(f.shouldDoStuff); [f nop];
|
||||
// CHECK-MESSAGES: :[[@LINE-1]]:22: warning: potentially unintended semicolon [misc-suspicious-semicolon]
|
||||
// CHECK-MESSAGES: :[[@LINE-1]]:22: warning: potentially unintended semicolon [bugprone-suspicious-semicolon]
|
||||
// CHECK-FIXES: if(f.shouldDoStuff) [f nop];
|
||||
}
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
// RUN: %check_clang_tidy %s misc-suspicious-semicolon %t -- -- -fno-objc-arc -fobjc-abi-version=1
|
||||
// RUN: %check_clang_tidy %s bugprone-suspicious-semicolon %t -- -- -fno-objc-arc -fobjc-abi-version=1
|
||||
|
||||
// This test ensures check_clang_tidy.py allows disabling Objective-C ARC and
|
||||
// Objective-C 2.0 via passing arguments after -- on the command line.
|
||||
|
@ -24,6 +24,6 @@
|
|||
void fail(Foo *f)
|
||||
{
|
||||
if([f shouldDoStuff]); [f nop];
|
||||
// CHECK-MESSAGES: :[[@LINE-1]]:24: warning: potentially unintended semicolon [misc-suspicious-semicolon]
|
||||
// CHECK-MESSAGES: :[[@LINE-1]]:24: warning: potentially unintended semicolon [bugprone-suspicious-semicolon]
|
||||
// CHECK-FIXES: if([f shouldDoStuff]) [f nop];
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue