forked from OSchip/llvm-project
109 lines
4.1 KiB
C++
109 lines
4.1 KiB
C++
//===--- CERTTidyModule.cpp - clang-tidy ----------------------------------===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "../ClangTidy.h"
|
|
#include "../ClangTidyModule.h"
|
|
#include "../ClangTidyModuleRegistry.h"
|
|
#include "../bugprone/UnhandledSelfAssignmentCheck.h"
|
|
#include "../google/UnnamedNamespaceInHeaderCheck.h"
|
|
#include "../misc/NewDeleteOverloadsCheck.h"
|
|
#include "../misc/NonCopyableObjects.h"
|
|
#include "../misc/StaticAssertCheck.h"
|
|
#include "../misc/ThrowByValueCatchByReferenceCheck.h"
|
|
#include "../performance/MoveConstructorInitCheck.h"
|
|
#include "../readability/UppercaseLiteralSuffixCheck.h"
|
|
#include "CommandProcessorCheck.h"
|
|
#include "DontModifyStdNamespaceCheck.h"
|
|
#include "FloatLoopCounter.h"
|
|
#include "LimitedRandomnessCheck.h"
|
|
#include "PostfixOperatorCheck.h"
|
|
#include "ProperlySeededRandomGeneratorCheck.h"
|
|
#include "SetLongJmpCheck.h"
|
|
#include "StaticObjectExceptionCheck.h"
|
|
#include "StrToNumCheck.h"
|
|
#include "ThrownExceptionTypeCheck.h"
|
|
#include "VariadicFunctionDefCheck.h"
|
|
|
|
namespace clang {
|
|
namespace tidy {
|
|
namespace cert {
|
|
|
|
class CERTModule : public ClangTidyModule {
|
|
public:
|
|
void addCheckFactories(ClangTidyCheckFactories &CheckFactories) override {
|
|
// C++ checkers
|
|
// DCL
|
|
CheckFactories.registerCheck<PostfixOperatorCheck>(
|
|
"cert-dcl21-cpp");
|
|
CheckFactories.registerCheck<VariadicFunctionDefCheck>("cert-dcl50-cpp");
|
|
CheckFactories.registerCheck<misc::NewDeleteOverloadsCheck>(
|
|
"cert-dcl54-cpp");
|
|
CheckFactories.registerCheck<DontModifyStdNamespaceCheck>(
|
|
"cert-dcl58-cpp");
|
|
CheckFactories.registerCheck<google::build::UnnamedNamespaceInHeaderCheck>(
|
|
"cert-dcl59-cpp");
|
|
// OOP
|
|
CheckFactories.registerCheck<performance::MoveConstructorInitCheck>(
|
|
"cert-oop11-cpp");
|
|
CheckFactories.registerCheck<bugprone::UnhandledSelfAssignmentCheck>(
|
|
"cert-oop54-cpp");
|
|
// ERR
|
|
CheckFactories.registerCheck<misc::ThrowByValueCatchByReferenceCheck>(
|
|
"cert-err09-cpp");
|
|
CheckFactories.registerCheck<SetLongJmpCheck>("cert-err52-cpp");
|
|
CheckFactories.registerCheck<StaticObjectExceptionCheck>("cert-err58-cpp");
|
|
CheckFactories.registerCheck<ThrownExceptionTypeCheck>("cert-err60-cpp");
|
|
CheckFactories.registerCheck<misc::ThrowByValueCatchByReferenceCheck>(
|
|
"cert-err61-cpp");
|
|
// MSC
|
|
CheckFactories.registerCheck<LimitedRandomnessCheck>("cert-msc50-cpp");
|
|
CheckFactories.registerCheck<ProperlySeededRandomGeneratorCheck>(
|
|
"cert-msc51-cpp");
|
|
|
|
// C checkers
|
|
// DCL
|
|
CheckFactories.registerCheck<misc::StaticAssertCheck>("cert-dcl03-c");
|
|
CheckFactories.registerCheck<readability::UppercaseLiteralSuffixCheck>(
|
|
"cert-dcl16-c");
|
|
// ENV
|
|
CheckFactories.registerCheck<CommandProcessorCheck>("cert-env33-c");
|
|
// FLP
|
|
CheckFactories.registerCheck<FloatLoopCounter>("cert-flp30-c");
|
|
// FIO
|
|
CheckFactories.registerCheck<misc::NonCopyableObjectsCheck>("cert-fio38-c");
|
|
// ERR
|
|
CheckFactories.registerCheck<StrToNumCheck>("cert-err34-c");
|
|
// MSC
|
|
CheckFactories.registerCheck<LimitedRandomnessCheck>("cert-msc30-c");
|
|
CheckFactories.registerCheck<ProperlySeededRandomGeneratorCheck>(
|
|
"cert-msc32-c");
|
|
}
|
|
|
|
ClangTidyOptions getModuleOptions() override {
|
|
ClangTidyOptions Options;
|
|
ClangTidyOptions::OptionMap &Opts = Options.CheckOptions;
|
|
Opts["cert-dcl16-c.NewSuffixes"] = "L;LL;LU;LLU";
|
|
Opts["cert-oop54-cpp.WarnOnlyIfThisHasSuspiciousField"] = "0";
|
|
return Options;
|
|
}
|
|
};
|
|
|
|
} // namespace cert
|
|
|
|
// Register the MiscTidyModule using this statically initialized variable.
|
|
static ClangTidyModuleRegistry::Add<cert::CERTModule>
|
|
X("cert-module",
|
|
"Adds lint checks corresponding to CERT secure coding guidelines.");
|
|
|
|
// This anchor is used to force the linker to link in the generated object file
|
|
// and thus register the CERTModule.
|
|
volatile int CERTModuleAnchorSource = 0;
|
|
|
|
} // namespace tidy
|
|
} // namespace clang
|