[clang-tidy][NFC] http -> https (#160128)

This commit is contained in:
Victor Chernyakin
2025-09-22 11:47:12 -07:00
committed by GitHub
parent f6a14a01d2
commit 78d0b1af74
333 changed files with 335 additions and 334 deletions

View File

@@ -9,7 +9,7 @@
/// \file This file implements a clang-tidy tool.
///
/// This tool uses the Clang Tooling infrastructure, see
/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
/// for details on setting it up with LLVM source tree.
///
//===----------------------------------------------------------------------===//

View File

@@ -10,7 +10,7 @@
/// and ClangTidyError classes.
///
/// This tool uses the Clang Tooling infrastructure, see
/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html
/// for details on setting it up with LLVM source tree.
///
//===----------------------------------------------------------------------===//

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::abseil {
/// deduction (CTAD), in C++17 and higher.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/cleanup-ctad.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/cleanup-ctad.html
class CleanupCtadCheck : public utils::TransformerClangTidyCheck {
public:
CleanupCtadCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// ``absl::Time`` domain.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-addition.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-addition.html
class DurationAdditionCheck : public ClangTidyCheck {
public:
DurationAdditionCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// domain.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-comparison.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-comparison.html
class DurationComparisonCheck : public ClangTidyCheck {
public:
DurationComparisonCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// the right conversion function instead.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-conversion-cast.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-conversion-cast.html
class DurationConversionCastCheck : public ClangTidyCheck {
public:
DurationConversionCastCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::abseil {
// Find potential incorrect uses of integer division of absl::Duration objects.
//
// For the user-facing documentation see:
// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-division.html
// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-division.html
class DurationDivisionCheck : public ClangTidyCheck {
public:

View File

@@ -19,7 +19,7 @@ namespace clang::tidy::abseil {
/// component.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-float.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-float.html
class DurationFactoryFloatCheck : public ClangTidyCheck {
public:
DurationFactoryFloatCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -19,7 +19,7 @@ namespace clang::tidy::abseil {
/// case of zero and suggests `ZeroDuration()`.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-scale.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-scale.html
class DurationFactoryScaleCheck : public ClangTidyCheck {
public:
DurationFactoryScaleCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// `absl::Duration` domain.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-subtraction.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-subtraction.html
class DurationSubtractionCheck : public ClangTidyCheck {
public:
DurationSubtractionCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// to numeric types and back again.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-unnecessary-conversion.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-unnecessary-conversion.html
class DurationUnnecessaryConversionCheck : public ClangTidyCheck {
public:
DurationUnnecessaryConversionCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// is a single character string literal and replaces it with a character.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/faster-strsplit-delimiter.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/faster-strsplit-delimiter.html
class FasterStrsplitDelimiterCheck : public ClangTidyCheck {
public:
FasterStrsplitDelimiterCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// against doing so.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/no-internal-dependencies.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/no-internal-dependencies.html
class NoInternalDependenciesCheck : public ClangTidyCheck {
public:
NoInternalDependenciesCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// Abseil's compatibility guidelines.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/no-namespace.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/no-namespace.html
class NoNamespaceCheck : public ClangTidyCheck {
public:
NoNamespaceCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -20,7 +20,7 @@ namespace clang::tidy::abseil {
/// StrCat(1, StrCat(2, 3)) ==> StrCat(1, 2, 3)
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/redundant-strcat-calls.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/redundant-strcat-calls.html
class RedundantStrcatCallsCheck : public ClangTidyCheck {
public:
RedundantStrcatCallsCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// should be used instead.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/str-cat-append.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/str-cat-append.html
class StrCatAppendCheck : public ClangTidyCheck {
public:
StrCatAppendCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::abseil {
/// types) and suggests replacing with absl::StrContains.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/string-find-str-contains.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/string-find-str-contains.html
class StringFindStrContainsCheck : public utils::TransformerClangTidyCheck {
public:
StringFindStrContainsCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// domain.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/time-comparison.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/time-comparison.html
class TimeComparisonCheck : public ClangTidyCheck {
public:
TimeComparisonCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::abseil {
/// in the time domain instead of the numeric domain.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/time-subtraction.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/time-subtraction.html
class TimeSubtractionCheck : public ClangTidyCheck {
public:
TimeSubtractionCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -20,7 +20,7 @@ namespace clang::tidy::abseil {
/// factories.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/upgrade-duration-conversions.html
/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/upgrade-duration-conversions.html
class UpgradeDurationConversionsCheck : public ClangTidyCheck {
public:
UpgradeDurationConversionsCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -109,7 +109,7 @@ namespace clang::tidy::%(namespace)s {
%(description)s
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/%(module)s/%(check_name)s.html
/// https://clang.llvm.org/extra/clang-tidy/checks/%(module)s/%(check_name)s.html
class %(check_name_camel)s : public ClangTidyCheck {
public:
%(check_name_camel)s(StringRef Name, ClangTidyContext *Context)

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::altera {
/// degradation.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/altera/id-dependent-backward-branch.html
/// https://clang.llvm.org/extra/clang-tidy/checks/altera/id-dependent-backward-branch.html
class IdDependentBackwardBranchCheck : public ClangTidyCheck {
private:
enum LoopType { UnknownLoop = -1, DoLoop = 0, WhileLoop = 1, ForLoop = 2 };

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::altera {
/// `Verilog.cl`, or `VHDL.cl`.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/altera/kernel-name-restriction.html
/// https://clang.llvm.org/extra/clang-tidy/checks/altera/kernel-name-restriction.html
class KernelNameRestrictionCheck : public ClangTidyCheck {
public:
KernelNameRestrictionCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::altera {
/// kernels, which may be inefficient or cause an error.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/altera/single-work-item-barrier.html
/// https://clang.llvm.org/extra/clang-tidy/checks/altera/single-work-item-barrier.html
class SingleWorkItemBarrierCheck : public ClangTidyCheck {
const unsigned AOCVersion;

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::altera {
/// packing and/or aligning of said structs as needed.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/altera/struct-pack-align.html
/// https://clang.llvm.org/extra/clang-tidy/checks/altera/struct-pack-align.html
class StructPackAlignCheck : public ClangTidyCheck {
public:
StructPackAlignCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -21,7 +21,7 @@ namespace clang::tidy::altera {
/// they cannot be fully unrolled, and should be partially unrolled.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/altera/unroll-loops.html
/// https://clang.llvm.org/extra/clang-tidy/checks/altera/unroll-loops.html
class UnrollLoopsCheck : public ClangTidyCheck {
public:
UnrollLoopsCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// Finds code that uses accept4() without using the SOCK_CLOEXEC flag.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept4.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept4.html
class CloexecAccept4Check : public CloexecCheck {
public:
CloexecAccept4Check(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// accept() is better to be replaced by accept4().
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept.html
class CloexecAcceptCheck : public CloexecCheck {
public:
CloexecAcceptCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// creat() is better to be replaced by open().
/// Find the usage of creat() and redirect user to use open().
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-creat.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-creat.html
class CloexecCreatCheck : public CloexecCheck {
public:
CloexecCreatCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::android {
/// Find the usage of dup() and redirect user to use fcntl().
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-dup.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-dup.html
class CloexecDupCheck : public CloexecCheck {
public:
CloexecDupCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// Finds code that uses epoll_create1() without using the EPOLL_CLOEXEC flag.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create1.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create1.html
class CloexecEpollCreate1Check : public CloexecCheck {
public:
CloexecEpollCreate1Check(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// epoll_create() is better to be replaced by epoll_create1().
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create.html
class CloexecEpollCreateCheck : public CloexecCheck {
public:
CloexecEpollCreateCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -19,7 +19,7 @@ namespace clang::tidy::android {
/// This check only works when corresponding argument is StringLiteral. No
/// constant propagation.
///
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-fopen.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-fopen.html
class CloexecFopenCheck : public CloexecCheck {
public:
CloexecFopenCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// Finds code that uses inotify_init1() without using the IN_CLOEXEC flag.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init1.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init1.html
class CloexecInotifyInit1Check : public CloexecCheck {
public:
CloexecInotifyInit1Check(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// inotify_init() is better to be replaced by inotify_init1().
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init.html
class CloexecInotifyInitCheck : public CloexecCheck {
public:
CloexecInotifyInitCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// Finds code that uses memfd_create() without using the MFD_CLOEXEC flag.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-memfd-create.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-memfd-create.html
class CloexecMemfdCreateCheck : public CloexecCheck {
public:
CloexecMemfdCreateCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// Finds code that uses pipe2() without using the O_CLOEXEC flag.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe2.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe2.html
class CloexecPipe2Check : public CloexecCheck {
public:
CloexecPipe2Check(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// Suggests to replace calls to pipe() with calls to pipe2().
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe.html
class CloexecPipeCheck : public CloexecCheck {
public:
CloexecPipeCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::android {
/// Finds code that uses socket() without using the SOCK_CLOEXEC flag.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-socket.html
/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-socket.html
class CloexecSocketCheck : public CloexecCheck {
public:
CloexecSocketCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::boost {
/// replaced with a boost ranges version instead
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/boost/use-ranges.html
/// https://clang.llvm.org/extra/clang-tidy/checks/boost/use-ranges.html
class UseRangesCheck : public utils::UseRangesCheck {
public:
UseRangesCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::boost {
/// ``std::to_string`` and ``std::to_wstring`` calls.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/boost/use-to-string.html
/// https://clang.llvm.org/extra/clang-tidy/checks/boost/use-to-string.html
class UseToStringCheck : public ClangTidyCheck {
public:
UseToStringCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
/// Catches assignments within the condition clause of an if statement.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/assignment-in-if-condition.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/assignment-in-if-condition.html
class AssignmentInIfConditionCheck : public ClangTidyCheck {
public:
AssignmentInIfConditionCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// Finds ``pthread_kill`` function calls when thread is terminated by
/// ``SIGTERM`` signal.
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/bad-signal-to-kill-thread.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/bad-signal-to-kill-thread.html
class BadSignalToKillThreadCheck : public ClangTidyCheck {
public:
BadSignalToKillThreadCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// ``std::bit_cast`` or ``memcpy``.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/bitwise-pointer-cast.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/bitwise-pointer-cast.html
class BitwisePointerCastCheck : public ClangTidyCheck {
public:
BitwisePointerCastCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -20,7 +20,7 @@ namespace clang::tidy::bugprone {
/// the true and false expressions are Type I clones of each other.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/branch-clone.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/branch-clone.html
class BranchCloneCheck : public ClangTidyCheck {
public:
BranchCloneCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -20,7 +20,7 @@ namespace clang::tidy::bugprone {
/// assignments.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/capturing-this-in-member-variable.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/capturing-this-in-member-variable.html
class CapturingThisInMemberVariableCheck : public ClangTidyCheck {
public:
CapturingThisInMemberVariableCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -15,7 +15,7 @@ namespace clang::tidy::bugprone {
/// Detects unsafe or redundant two-step casting operations involving ``void*``.
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/casting-through-void.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/casting-through-void.html
class CastingThroughVoidCheck : public ClangTidyCheck {
public:
CastingThroughVoidCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// behavior or logical errors.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/chained-comparison.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/chained-comparison.html
class ChainedComparisonCheck : public ClangTidyCheck {
public:
ChainedComparisonCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// member virtual function and anything other than null-pointer-constant.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/compare-pointer-to-member-virtual-function.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/compare-pointer-to-member-virtual-function.html
class ComparePointerToMemberVirtualFunctionCheck : public ClangTidyCheck {
public:
ComparePointerToMemberVirtualFunctionCheck(StringRef Name,

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// the base class.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/copy-constructor-init.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/copy-constructor-init.html
class CopyConstructorInitCheck : public ClangTidyCheck {
public:
CopyConstructorInitCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// CRTP can be constructed outside itself and the derived class.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/crtp-constructor-accessibility.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/crtp-constructor-accessibility.html
class CrtpConstructorAccessibilityCheck : public ClangTidyCheck {
public:
CrtpConstructorAccessibilityCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
/// Detect dangling references in value handlers like std::string_view.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/dangling-handle.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/dangling-handle.html
class DanglingHandleCheck : public ClangTidyCheck {
public:
DanglingHandleCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// a base class
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.html
class DerivedMethodShadowingBaseMethodCheck : public ClangTidyCheck {
public:
DerivedMethodShadowingBaseMethodCheck(StringRef Name,

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// swapped (or badly ordered) arguments.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/easily-swappable-parameters.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/easily-swappable-parameters.html
class EasilySwappableParametersCheck : public ClangTidyCheck {
public:
EasilySwappableParametersCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// Detects and suggests addressing issues with empty catch statements.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/empty-catch.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/empty-catch.html
class EmptyCatchCheck : public ClangTidyCheck {
public:
EmptyCatchCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -21,7 +21,7 @@ namespace clang::tidy::bugprone {
/// given as option to the checker.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/exception-escape.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/exception-escape.html
class ExceptionEscapeCheck : public ClangTidyCheck {
public:
ExceptionEscapeCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -21,7 +21,7 @@ namespace clang::tidy::bugprone {
/// \endcode
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/fold-init-type.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/fold-init-type.html
class FoldInitTypeCheck : public ClangTidyCheck {
public:
FoldInitTypeCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -34,7 +34,7 @@ namespace clang::tidy::bugprone {
/// point.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/forward-declaration-namespace.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/forward-declaration-namespace.html
class ForwardDeclarationNamespaceCheck : public ClangTidyCheck {
public:
ForwardDeclarationNamespaceCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -23,7 +23,7 @@ namespace clang::tidy::bugprone {
/// C++ Design, item 26.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/forwarding-reference-overload.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/forwarding-reference-overload.html
class ForwardingReferenceOverloadCheck : public ClangTidyCheck {
public:
ForwardingReferenceOverloadCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// Diagnoses instances of an implicit widening of multiplication result.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/implicit-widening-of-multiplication-result.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/implicit-widening-of-multiplication-result.html
class ImplicitWideningOfMultiplicationResultCheck : public ClangTidyCheck {
const ast_matchers::MatchFinder::MatchResult *Result;
bool ShouldUseCXXStaticCast;

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// ambiguity in the variable's value.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/inc-dec-in-conditions.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/inc-dec-in-conditions.html
class IncDecInConditionsCheck : public ClangTidyCheck {
public:
IncDecInConditionsCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// ``type`` type.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-if.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-if.html
class IncorrectEnableIfCheck : public ClangTidyCheck {
public:
IncorrectEnableIfCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// otherwise occur when calling ``shared_from_this``.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.html
class IncorrectEnableSharedFromThisCheck : public ClangTidyCheck {
public:
IncorrectEnableSharedFromThisCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// not changed at all).
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/infinite-loop.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/infinite-loop.html
class InfiniteLoopCheck : public ClangTidyCheck {
public:
InfiniteLoopCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// cause unintended loss of precision.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/integer-division.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/integer-division.html
class IntegerDivisionCheck : public ClangTidyCheck {
public:
IntegerDivisionCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// the enum has no enumerator with value of 0.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/invalid-enum-default-initialization.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/invalid-enum-default-initialization.html
class InvalidEnumDefaultInitializationCheck : public ClangTidyCheck {
public:
InvalidEnumDefaultInitializationCheck(StringRef Name,

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// (i.e., `operator()`).
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/lambda-function-name.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/lambda-function-name.html
class LambdaFunctionNameCheck : public ClangTidyCheck {
public:
struct SourceRangeLessThan {

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// is used to set value of a field with reference type.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/throw-keyword-missing.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/throw-keyword-missing.html
class MisleadingSetterOfReferenceCheck : public ClangTidyCheck {
public:
MisleadingSetterOfReferenceCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// argument to a memory allocation function.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-operator-in-strlen-in-alloc.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-operator-in-strlen-in-alloc.html
class MisplacedOperatorInStrlenInAllocCheck : public ClangTidyCheck {
public:
MisplacedOperatorInStrlenInAllocCheck(StringRef Name,

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// memory allocation function instead of its argument.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-pointer-arithmetic-in-alloc.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-pointer-arithmetic-in-alloc.html
class MisplacedPointerArithmeticInAllocCheck : public ClangTidyCheck {
public:
MisplacedPointerArithmeticInAllocCheck(StringRef Name,

View File

@@ -24,7 +24,7 @@ namespace clang::tidy::bugprone {
// be the most common case. Enabled by default.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-widening-cast.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-widening-cast.html
class MisplacedWideningCastCheck : public ClangTidyCheck {
public:
MisplacedWideningCastCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -30,7 +30,7 @@ namespace clang::tidy::bugprone {
/// The check suggests replacing the std::move with a std::forward.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/move-forwarding-reference.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/move-forwarding-reference.html
class MoveForwardingReferenceCheck : public ClangTidyCheck {
public:
MoveForwardingReferenceCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// indirection.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/multi-level-implicit-pointer-conversion.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/multi-level-implicit-pointer-conversion.html
class MultiLevelImplicitPointerConversionCheck : public ClangTidyCheck {
public:
MultiLevelImplicitPointerConversionCheck(StringRef Name,

View File

@@ -14,7 +14,7 @@
namespace clang::tidy::bugprone {
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-new-in-one-expression.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-new-in-one-expression.html
class MultipleNewInOneExpressionCheck : public ClangTidyCheck {
public:
MultipleNewInOneExpressionCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// other ones will be executed unconditionally.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-statement-macro.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-statement-macro.html
class MultipleStatementMacroCheck : public ClangTidyCheck {
public:
MultipleStatementMacroCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// i += 0.1;
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/narrowing-conversions.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/narrowing-conversions.html
class NarrowingConversionsCheck : public ClangTidyCheck {
public:
NarrowingConversionsCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// attribute, then we warn the user of their error.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/no-escape.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/no-escape.html
class NoEscapeCheck : public ClangTidyCheck {
public:
NoEscapeCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// `enum` type doesn't have a zero-value enumerator.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/non-zero-enum-to-bool-conversion.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/non-zero-enum-to-bool-conversion.html
class NonZeroEnumToBoolConversionCheck : public ClangTidyCheck {
public:
NonZeroEnumToBoolConversionCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// pointers.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/nondeterministic-pointer-iteration-order.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/nondeterministic-pointer-iteration-order.html
class NondeterministicPointerIterationOrderCheck : public ClangTidyCheck {
public:
NondeterministicPointerIterationOrderCheck(StringRef Name,

View File

@@ -20,7 +20,7 @@ namespace clang::tidy::bugprone {
/// when the string is read.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/not-null-terminated-result.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/not-null-terminated-result.html
class NotNullTerminatedResultCheck : public ClangTidyCheck {
public:
NotNullTerminatedResultCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -19,7 +19,7 @@ namespace clang::tidy::bugprone {
/// of the same optional-like type.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/optional-value-conversion.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/optional-value-conversion.html
class OptionalValueConversionCheck : public ClangTidyCheck {
public:
OptionalValueConversionCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
/// Finds calls to grand..-parent virtual methods instead of parent's.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/parent-virtual-call.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/parent-virtual-call.html
class ParentVirtualCallCheck : public ClangTidyCheck {
public:
ParentVirtualCallCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// virtual function.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.html
class PointerArithmeticOnPolymorphicObjectCheck : public ClangTidyCheck {
public:
PointerArithmeticOnPolymorphicObjectCheck(StringRef Name,

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// in the outer `if` statement and were not changed.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/redundant-branch-condition.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/redundant-branch-condition.html
class RedundantBranchConditionCheck : public ClangTidyCheck {
public:
RedundantBranchConditionCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -27,7 +27,7 @@ namespace clang::tidy::bugprone {
/// double underscore occurring anywhere.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/reserved-identifier.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/reserved-identifier.html
class ReservedIdentifierCheck final : public RenamerClangTidyCheck {
const bool Invert;
const std::vector<StringRef> AllowedIdentifiersRaw;

View File

@@ -18,7 +18,7 @@ namespace clang::tidy::bugprone {
/// xvalues as arguments.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/return-const-ref-from-parameter.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/return-const-ref-from-parameter.html
class ReturnConstRefFromParameterCheck : public ClangTidyCheck {
public:
ReturnConstRefFromParameterCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -19,7 +19,7 @@ namespace clang::tidy::bugprone {
/// Checker for signal handler functions.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/signal-handler.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/signal-handler.html
class SignalHandlerCheck : public ClangTidyCheck {
public:
enum class AsyncSafeFunctionSetKind { Minimal, POSIX };

View File

@@ -20,7 +20,7 @@ namespace clang::tidy::bugprone {
/// implicit conversion happens.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/signed-char-misuse.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/signed-char-misuse.html
class SignedCharMisuseCheck : public ClangTidyCheck {
public:
SignedCharMisuseCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// user wanted to use `.size()` instead.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-container.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-container.html
class SizeofContainerCheck : public ClangTidyCheck {
public:
SizeofContainerCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
/// Find suspicious usages of sizeof expressions.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-expression.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-expression.html
class SizeofExpressionCheck : public ClangTidyCheck {
public:
SizeofExpressionCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -19,7 +19,7 @@ namespace clang::tidy::bugprone {
/// condition parameter.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/spuriously-wake-up-functions.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/spuriously-wake-up-functions.html
class SpuriouslyWakeUpFunctionsCheck : public ClangTidyCheck {
public:
SpuriouslyWakeUpFunctionsCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// as an alternative if it is an existing member function.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/standalone-empty.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/standalone-empty.html
class StandaloneEmptyCheck : public ClangTidyCheck {
public:
StandaloneEmptyCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
/// Finds suspicious string constructor and check their parameters.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-constructor.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-constructor.html
class StringConstructorCheck : public ClangTidyCheck {
public:
StringConstructorCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
/// Finds instances where an integer is assigned to a string.
///
/// For more details see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-integer-assignment.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-integer-assignment.html
class StringIntegerAssignmentCheck : public ClangTidyCheck {
public:
StringIntegerAssignmentCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
/// Find suspicious string literals with embedded NUL characters.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-literal-with-embedded-nul.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-literal-with-embedded-nul.html
class StringLiteralWithEmbeddedNulCheck : public ClangTidyCheck {
public:
StringLiteralWithEmbeddedNulCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -30,7 +30,7 @@ namespace clang::tidy::bugprone {
/// to `nullptr`.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/stringview-nullptr.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/stringview-nullptr.html
class StringviewNullptrCheck : public utils::TransformerClangTidyCheck {
public:
StringviewNullptrCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
/// The checker detects various cases when an enum is probably misused (as a
/// bitmask).
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-enum-usage.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-enum-usage.html
class SuspiciousEnumUsageCheck : public ClangTidyCheck {
public:
SuspiciousEnumUsageCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -22,7 +22,7 @@ namespace clang::tidy::bugprone {
/// #include "baz.h" // no diagnostic
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-include.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-include.html
class SuspiciousIncludeCheck : public ClangTidyCheck {
public:
SuspiciousIncludeCheck(StringRef Name, ClangTidyContext *Context);

View File

@@ -17,7 +17,7 @@ namespace clang::tidy::bugprone {
/// arguments.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memory-comparison.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memory-comparison.html
class SuspiciousMemoryComparisonCheck : public ClangTidyCheck {
public:
SuspiciousMemoryComparisonCheck(StringRef Name, ClangTidyContext *Context)

View File

@@ -16,7 +16,7 @@ namespace clang::tidy::bugprone {
/// Finds memset calls with potential mistakes in their arguments.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memset-usage.html
/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memset-usage.html
class SuspiciousMemsetUsageCheck : public ClangTidyCheck {
public:
SuspiciousMemsetUsageCheck(StringRef Name, ClangTidyContext *Context)

Some files were not shown because too many files have changed in this diff Show More