23#include "clang-tidy-config.h"
24#include "clang/AST/ASTConsumer.h"
25#include "clang/ASTMatchers/ASTMatchFinder.h"
26#include "clang/Basic/DiagnosticFrontend.h"
27#include "clang/Format/Format.h"
28#include "clang/Frontend/ASTConsumers.h"
29#include "clang/Frontend/CompilerInstance.h"
30#include "clang/Frontend/MultiplexConsumer.h"
31#include "clang/Frontend/TextDiagnosticPrinter.h"
32#include "clang/Lex/Preprocessor.h"
33#include "clang/Lex/PreprocessorOptions.h"
34#include "clang/Rewrite/Frontend/FixItRewriter.h"
35#include "clang/Tooling/Core/Diagnostic.h"
36#include "clang/Tooling/DiagnosticsYaml.h"
37#include "clang/Tooling/Refactoring.h"
38#include "clang/Tooling/Tooling.h"
39#include "llvm/Support/Process.h"
42#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
43#include "clang/Analysis/PathDiagnostic.h"
44#include "clang/StaticAnalyzer/Frontend/AnalysisConsumer.h"
48using namespace clang::driver;
56#if CLANG_TIDY_ENABLE_QUERY_BASED_CUSTOM_CHECKS
59 ClangTidyCheckFactories &Factories) =
nullptr;
64#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
65#define ANALYZER_CHECK_NAME_PREFIX "clang-analyzer-"
66static constexpr StringRef AnalyzerCheckNamePrefix = ANALYZER_CHECK_NAME_PREFIX;
68class AnalyzerDiagnosticConsumer :
public ento::PathDiagnosticConsumer {
70 AnalyzerDiagnosticConsumer(ClangTidyContext &Context) : Context(Context) {}
72 void FlushDiagnosticsImpl(std::vector<const ento::PathDiagnostic *> &Diags,
73 FilesMade *FilesMade)
override {
74 for (
const ento::PathDiagnostic *PD : Diags) {
75 SmallString<64> CheckName(AnalyzerCheckNamePrefix);
76 CheckName += PD->getCheckerName();
77 Context.diag(CheckName, PD->getLocation().asLocation(),
78 PD->getShortDescription())
79 << PD->path.back()->getRanges();
81 for (
const auto &DiagPiece :
82 PD->path.flatten(
true)) {
83 Context.diag(CheckName, DiagPiece->getLocation().asLocation(),
84 DiagPiece->getString(), DiagnosticIDs::Note)
85 << DiagPiece->getRanges();
90 StringRef getName()
const override {
return "ClangTidyDiags"; }
91 bool supportsLogicalOpControlFlow()
const override {
return true; }
92 bool supportsCrossFileDiagnostics()
const override {
return true; }
95 ClangTidyContext &Context;
101 ErrorReporter(ClangTidyContext &Context,
FixBehaviour ApplyFixes,
102 llvm::IntrusiveRefCntPtr<llvm::vfs::FileSystem> BaseFS)
103 : Files(FileSystemOptions(), std::move(BaseFS)),
104 DiagPrinter(new TextDiagnosticPrinter(llvm::outs(), DiagOpts)),
105 Diags(DiagnosticIDs::create(), DiagOpts, DiagPrinter),
106 SourceMgr(Diags, Files), Context(Context), ApplyFixes(ApplyFixes) {
107 DiagOpts.ShowColors = Context.getOptions().
UseColor.value_or(
108 llvm::sys::Process::StandardOutHasColors());
109 DiagPrinter->BeginSourceFile(LangOpts);
110 if (DiagOpts.ShowColors && !llvm::sys::Process::StandardOutIsDisplayed())
111 llvm::sys::Process::UseANSIEscapeCodes(
true);
114 SourceManager &getSourceManager() {
return SourceMgr; }
116 void reportDiagnostic(
const ClangTidyError &Error) {
117 const tooling::DiagnosticMessage &Message =
Error.Message;
118 const SourceLocation Loc =
119 getLocation(Message.FilePath, Message.FileOffset);
122 SmallVector<std::pair<SourceLocation, bool>, 4> FixLocations;
124 auto Level =
static_cast<DiagnosticsEngine::Level
>(
Error.DiagLevel);
125 std::string Name =
Error.DiagnosticName;
126 if (!
Error.EnabledDiagnosticAliases.empty())
127 Name +=
"," + llvm::join(
Error.EnabledDiagnosticAliases,
",");
128 if (
Error.IsWarningAsError) {
129 Name +=
",-warnings-as-errors";
130 Level = DiagnosticsEngine::Error;
133 auto Diag = Diags.Report(Loc, Diags.getCustomDiagID(Level,
"%0 [%1]"))
134 << Message.Message << Name;
135 for (
const FileByteRange &FBR :
Error.Message.Ranges)
136 Diag << getRange(FBR);
138 const llvm::StringMap<Replacements> *ChosenFix =
nullptr;
141 for (
const auto &FileAndReplacements : *ChosenFix) {
142 for (
const auto &Repl : FileAndReplacements.second) {
144 bool CanBeApplied =
false;
145 if (!Repl.isApplicable())
147 SourceLocation FixLoc;
148 SmallString<128> FixAbsoluteFilePath = Repl.getFilePath();
149 Files.makeAbsolutePath(FixAbsoluteFilePath);
150 tooling::Replacement R(FixAbsoluteFilePath, Repl.getOffset(),
151 Repl.getLength(), Repl.getReplacementText());
152 auto &Entry = FileReplacements[R.getFilePath()];
153 Replacements &Replacements = Entry.Replaces;
154 llvm::Error Err = Replacements.add(R);
157 llvm::errs() <<
"Trying to resolve conflict: "
158 << llvm::toString(std::move(Err)) <<
"\n";
159 const unsigned NewOffset =
160 Replacements.getShiftedCodePosition(R.getOffset());
161 const unsigned NewLength = Replacements.getShiftedCodePosition(
162 R.getOffset() + R.getLength()) -
164 if (NewLength == R.getLength()) {
165 R = Replacement(R.getFilePath(), NewOffset, NewLength,
166 R.getReplacementText());
167 Replacements = Replacements.merge(tooling::Replacements(R));
172 <<
"Can't resolve conflict, skipping the replacement.\n";
178 FixLoc = getLocation(FixAbsoluteFilePath, Repl.getOffset());
179 FixLocations.emplace_back(FixLoc, CanBeApplied);
180 Entry.BuildDir =
Error.BuildDirectory;
184 reportFix(Diag,
Error.Message.Fix);
186 for (
auto Fix : FixLocations) {
187 Diags.Report(
Fix.first,
Fix.second ? diag::note_fixit_applied
188 : diag::note_fixit_failed);
190 for (
const auto &Note :
Error.Notes)
195 if (TotalFixes > 0) {
196 auto &VFS = Files.getVirtualFileSystem();
197 auto OriginalCWD = VFS.getCurrentWorkingDirectory();
198 bool AnyNotWritten =
false;
200 for (
const auto &FileAndReplacements : FileReplacements) {
201 Rewriter Rewrite(SourceMgr, LangOpts);
202 const StringRef
File = FileAndReplacements.first();
203 VFS.setCurrentWorkingDirectory(FileAndReplacements.second.BuildDir);
204 llvm::ErrorOr<std::unique_ptr<MemoryBuffer>> Buffer =
205 SourceMgr.getFileManager().getBufferForFile(File);
207 llvm::errs() <<
"Can't get buffer for file " <<
File <<
": "
208 << Buffer.getError().message() <<
"\n";
212 const StringRef Code = Buffer.get()->getBuffer();
213 auto Style = format::getStyle(
214 Context.getOptionsForFile(File).FormatStyle.value_or(
"none"), File,
217 llvm::errs() << llvm::toString(Style.takeError()) <<
"\n";
220 llvm::Expected<tooling::Replacements> Replacements =
221 format::cleanupAroundReplacements(
222 Code, FileAndReplacements.second.Replaces, *Style);
224 llvm::errs() << llvm::toString(Replacements.takeError()) <<
"\n";
227 if (llvm::Expected<tooling::Replacements> FormattedReplacements =
228 format::formatReplacements(Code, *Replacements, *Style)) {
229 Replacements = std::move(FormattedReplacements);
231 llvm_unreachable(
"!Replacements");
233 llvm::errs() << llvm::toString(FormattedReplacements.takeError())
234 <<
". Skipping formatting.\n";
236 if (!tooling::applyAllReplacements(Replacements.get(), Rewrite))
237 llvm::errs() <<
"Can't apply replacements for file " <<
File <<
"\n";
238 AnyNotWritten |= Rewrite.overwriteChangedFiles();
242 llvm::errs() <<
"clang-tidy failed to apply suggested fixes.\n";
244 llvm::errs() <<
"clang-tidy applied " << AppliedFixes <<
" of "
245 << TotalFixes <<
" suggested fixes.\n";
249 VFS.setCurrentWorkingDirectory(*OriginalCWD);
253 unsigned getWarningsAsErrorsCount()
const {
return WarningsAsErrors; }
256 SourceLocation getLocation(StringRef FilePath,
unsigned Offset) {
257 if (FilePath.empty())
260 auto File = SourceMgr.getFileManager().getOptionalFileRef(FilePath);
264 const FileID ID = SourceMgr.getOrCreateFileID(*File, SrcMgr::C_User);
265 return SourceMgr.getLocForStartOfFile(ID).getLocWithOffset(Offset);
268 void reportFix(
const DiagnosticBuilder &Diag,
269 const llvm::StringMap<Replacements> &
Fix) {
270 for (
const auto &FileAndReplacements :
Fix) {
271 for (
const auto &Repl : FileAndReplacements.second) {
272 if (!Repl.isApplicable())
275 FBR.FilePath = Repl.getFilePath().str();
276 FBR.FileOffset = Repl.getOffset();
277 FBR.Length = Repl.getLength();
279 Diag << FixItHint::CreateReplacement(getRange(FBR),
280 Repl.getReplacementText());
285 void reportNote(
const tooling::DiagnosticMessage &Message) {
286 const SourceLocation Loc =
287 getLocation(Message.FilePath, Message.FileOffset);
289 Diags.Report(Loc, Diags.getCustomDiagID(DiagnosticsEngine::Note,
"%0"))
291 for (
const FileByteRange &FBR : Message.Ranges)
292 Diag << getRange(FBR);
293 reportFix(Diag, Message.Fix);
296 CharSourceRange getRange(
const FileByteRange &Range) {
297 SmallString<128> AbsoluteFilePath{Range.FilePath};
298 Files.makeAbsolutePath(AbsoluteFilePath);
299 const SourceLocation BeginLoc =
300 getLocation(AbsoluteFilePath, Range.FileOffset);
301 const SourceLocation EndLoc = BeginLoc.getLocWithOffset(Range.Length);
305 return CharSourceRange::getCharRange(BeginLoc, EndLoc);
308 struct ReplacementsWithBuildDir {
310 Replacements Replaces;
314 LangOptions LangOpts;
315 DiagnosticOptions DiagOpts;
316 DiagnosticConsumer *DiagPrinter;
317 DiagnosticsEngine Diags;
318 SourceManager SourceMgr;
319 llvm::StringMap<ReplacementsWithBuildDir> FileReplacements;
320 ClangTidyContext &Context;
322 unsigned TotalFixes = 0U;
323 unsigned AppliedFixes = 0U;
324 unsigned WarningsAsErrors = 0U;
327class ClangTidyASTConsumer :
public MultiplexConsumer {
329 ClangTidyASTConsumer(std::vector<std::unique_ptr<ASTConsumer>> Consumers,
330 std::unique_ptr<ClangTidyProfiling> Profiling,
331 std::unique_ptr<ast_matchers::MatchFinder> Finder,
332 std::vector<std::unique_ptr<ClangTidyCheck>> Checks)
333 : MultiplexConsumer(std::move(Consumers)),
334 Profiling(std::move(Profiling)), Finder(std::move(Finder)),
335 Checks(std::move(Checks)) {}
340 std::unique_ptr<ClangTidyProfiling> Profiling;
341 std::unique_ptr<ast_matchers::MatchFinder> Finder;
342 std::vector<std::unique_ptr<ClangTidyCheck>> Checks;
343 void anchor()
override {}
350 IntrusiveRefCntPtr<llvm::vfs::OverlayFileSystem> OverlayFS)
351 : Context(Context), OverlayFS(std::
move(OverlayFS)),
353#if CLANG_TIDY_ENABLE_QUERY_BASED_CUSTOM_CHECKS
357 for (
const ClangTidyModuleRegistry::entry E :
358 ClangTidyModuleRegistry::entries()) {
359 std::unique_ptr<ClangTidyModule> Module = E.instantiate();
360 Module->addCheckFactories(*CheckFactories);
364#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
367 clang::AnalyzerOptions &AnalyzerOptions) {
369 StringRef OptName(Opt.getKey());
370 if (!OptName.consume_front(AnalyzerCheckNamePrefix))
373 AnalyzerOptions.Config[OptName] = Opt.getValue().Value;
377using CheckersList = std::vector<std::pair<std::string, bool>>;
379static CheckersList getAnalyzerCheckersAndPackages(ClangTidyContext &Context,
380 bool IncludeExperimental) {
383 const auto &RegisteredCheckers =
384 AnalyzerOptions::getRegisteredCheckers(IncludeExperimental);
385 const bool AnalyzerChecksEnabled =
386 llvm::any_of(RegisteredCheckers, [&](StringRef CheckName) ->
bool {
387 return Context.isCheckEnabled(
388 (AnalyzerCheckNamePrefix + CheckName).str());
391 if (!AnalyzerChecksEnabled)
399 for (
const StringRef CheckName : RegisteredCheckers) {
400 const std::string ClangTidyCheckName(
401 (AnalyzerCheckNamePrefix + CheckName).str());
403 if (CheckName.starts_with(
"core") ||
404 Context.isCheckEnabled(ClangTidyCheckName)) {
405 List.emplace_back(std::string(CheckName),
true);
412std::unique_ptr<clang::ASTConsumer>
414 clang::CompilerInstance &Compiler, StringRef File) {
417 SourceManager *SM = &Compiler.getSourceManager();
418 Context.setSourceManager(SM);
419 Context.setCurrentFile(File);
420 Context.setASTContext(&Compiler.getASTContext());
422 auto WorkingDir = Compiler.getSourceManager()
424 .getVirtualFileSystem()
425 .getCurrentWorkingDirectory();
427 Context.setCurrentBuildDirectory(WorkingDir.get());
428#if CLANG_TIDY_ENABLE_QUERY_BASED_CUSTOM_CHECKS
432 std::vector<std::unique_ptr<ClangTidyCheck>>
Checks =
433 CheckFactories->createChecksForLanguage(&Context);
435 ast_matchers::MatchFinder::MatchFinderOptions FinderOptions;
437 std::unique_ptr<ClangTidyProfiling> Profiling;
438 if (Context.getEnableProfiling()) {
440 std::make_unique<ClangTidyProfiling>(Context.getProfileStorageParams());
441 FinderOptions.CheckProfiling.emplace(Profiling->Records);
445 if (!Context.getOptions().SystemHeaders.value_or(
false))
446 FinderOptions.IgnoreSystemHeaders =
true;
448 std::unique_ptr<ast_matchers::MatchFinder> Finder(
449 new ast_matchers::MatchFinder(std::move(FinderOptions)));
451 Preprocessor *PP = &Compiler.getPreprocessor();
452 Preprocessor *ModuleExpanderPP = PP;
454 if (Context.canEnableModuleHeadersParsing() &&
455 Context.getLangOpts().Modules && OverlayFS !=
nullptr) {
456 auto ModuleExpander = std::make_unique<ExpandModularHeadersPPCallbacks>(
457 &Compiler, *OverlayFS);
458 ModuleExpanderPP = ModuleExpander->getPreprocessor();
459 PP->addPPCallbacks(std::move(ModuleExpander));
462 for (
auto &Check :
Checks) {
463 Check->registerMatchers(&*Finder);
464 Check->registerPPCallbacks(*SM, PP, ModuleExpanderPP);
467 std::vector<std::unique_ptr<ASTConsumer>> Consumers;
469 Consumers.push_back(Finder->newASTConsumer());
471#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
472 AnalyzerOptions &AnalyzerOptions = Compiler.getAnalyzerOpts();
473 AnalyzerOptions.CheckersAndPackages = getAnalyzerCheckersAndPackages(
474 Context, Context.canEnableAnalyzerAlphaCheckers());
475 if (!AnalyzerOptions.CheckersAndPackages.empty()) {
476 setStaticAnalyzerCheckerOpts(Context.getOptions(), AnalyzerOptions);
477 AnalyzerOptions.AnalysisDiagOpt = PD_NONE;
478 std::unique_ptr<ento::AnalysisASTConsumer> AnalysisConsumer =
479 ento::CreateAnalysisConsumer(Compiler);
480 AnalysisConsumer->AddDiagnosticConsumer(
481 std::make_unique<AnalyzerDiagnosticConsumer>(Context));
482 Consumers.push_back(std::move(AnalysisConsumer));
485 return std::make_unique<ClangTidyASTConsumer>(
486 std::move(Consumers), std::move(Profiling), std::move(Finder),
491 std::vector<std::string> CheckNames;
492 for (
const auto &CheckFactory : *CheckFactories)
493 if (Context.isCheckEnabled(CheckFactory.getKey()))
494 CheckNames.emplace_back(CheckFactory.getKey());
496#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
497 for (
const auto &AnalyzerCheck : getAnalyzerCheckersAndPackages(
498 Context, Context.canEnableAnalyzerAlphaCheckers()))
499 CheckNames.emplace_back(
500 (AnalyzerCheckNamePrefix + AnalyzerCheck.first).str());
503 llvm::sort(CheckNames);
509 const std::vector<std::unique_ptr<ClangTidyCheck>>
Checks =
510 CheckFactories->createChecks(&Context);
511 for (
const auto &Check :
Checks)
512 Check->storeOptions(Options);
528 const std::vector<std::string> &EnabledChecks) {
530 for (
const auto &[OptionName, Value] : Options.
CheckOptions) {
531 const size_t CheckNameEndPos = OptionName.find(
'.');
532 if (CheckNameEndPos == StringRef::npos)
534 const StringRef CheckName = OptionName.substr(0, CheckNameEndPos);
535 if (llvm::binary_search(EnabledChecks, CheckName))
536 FilteredOptions[OptionName] = Value;
550 auto DiagOpts = std::make_unique<DiagnosticOptions>();
551 DiagnosticsEngine DE(llvm::makeIntrusiveRefCnt<DiagnosticIDs>(), *DiagOpts,
552 &DiagConsumer,
false);
558std::vector<ClangTidyError>
560 const CompilationDatabase &Compilations,
561 ArrayRef<std::string> InputFiles,
562 llvm::IntrusiveRefCntPtr<llvm::vfs::OverlayFileSystem> BaseFS,
565 ClangTool Tool(Compilations, InputFiles,
566 std::make_shared<PCHContainerOperations>(), BaseFS);
569 const ArgumentsAdjuster PerFileExtraArgumentsInserter =
570 [&Context](
const CommandLineArguments &Args, StringRef Filename) {
572 CommandLineArguments AdjustedArgs = Args;
574 auto I = AdjustedArgs.begin();
575 if (I != AdjustedArgs.end() && !StringRef(*I).starts_with(
"-"))
581 AdjustedArgs.insert(AdjustedArgs.end(), Opts.
ExtraArgs->begin(),
587 const ArgumentsAdjuster PerFileArgumentRemover =
588 [&Context](
const CommandLineArguments &Args, StringRef Filename) {
590 CommandLineArguments AdjustedArgs = Args;
593 for (
const StringRef ArgToRemove : *Opts.
RemovedArgs) {
594 AdjustedArgs.erase(std::remove(AdjustedArgs.begin(),
595 AdjustedArgs.end(), ArgToRemove),
603 Tool.appendArgumentsAdjuster(PerFileArgumentRemover);
604 Tool.appendArgumentsAdjuster(PerFileExtraArgumentsInserter);
605 Tool.appendArgumentsAdjuster(getStripPluginsAdjuster());
610 auto DiagOpts = std::make_unique<DiagnosticOptions>();
611 DiagnosticsEngine DE(DiagnosticIDs::create(), *DiagOpts, &DiagConsumer,
614 Tool.setDiagnosticConsumer(&DiagConsumer);
619 IntrusiveRefCntPtr<llvm::vfs::OverlayFileSystem> BaseFS,
621 : ConsumerFactory(Context, std::move(BaseFS)),
Quiet(
Quiet) {}
622 std::unique_ptr<FrontendAction> create()
override {
623 return std::make_unique<Action>(&ConsumerFactory);
626 bool runInvocation(std::shared_ptr<CompilerInvocation> Invocation,
628 std::shared_ptr<PCHContainerOperations> PCHContainerOps,
631 Invocation->getPreprocessorOpts().SetUpStaticAnalyzer =
true;
633 Invocation->getDiagnosticOpts().ShowCarets =
false;
634 return FrontendActionFactory::runInvocation(
635 Invocation, Files, PCHContainerOps, DiagConsumer);
639 class Action :
public ASTFrontendAction {
642 std::unique_ptr<ASTConsumer> CreateASTConsumer(CompilerInstance &Compiler,
643 StringRef File)
override {
655 ActionFactory Factory(Context, std::move(BaseFS),
Quiet);
657 return DiagConsumer.
take();
662 unsigned &WarningsAsErrorsCount,
663 llvm::IntrusiveRefCntPtr<llvm::vfs::FileSystem> BaseFS) {
664 ErrorReporter Reporter(Context,
Fix, std::move(BaseFS));
665 llvm::vfs::FileSystem &FileSystem =
666 Reporter.getSourceManager().getFileManager().getVirtualFileSystem();
667 auto InitialWorkingDir = FileSystem.getCurrentWorkingDirectory();
668 if (!InitialWorkingDir)
669 llvm::report_fatal_error(
"Cannot get current working path.");
672 if (!Error.BuildDirectory.empty()) {
677 FileSystem.setCurrentWorkingDirectory(Error.BuildDirectory);
679 Reporter.reportDiagnostic(Error);
681 FileSystem.setCurrentWorkingDirectory(InitialWorkingDir.get());
684 WarningsAsErrorsCount += Reporter.getWarningsAsErrorsCount();
688 const std::vector<ClangTidyError> &Errors,
690 TranslationUnitDiagnostics TUD;
691 TUD.MainSourceFile = std::string(MainFilePath);
692 for (
const auto &Error : Errors) {
693 tooling::Diagnostic Diag = Error;
694 if (Error.IsWarningAsError)
695 Diag.DiagLevel = tooling::Diagnostic::Error;
696 TUD.Diagnostics.insert(TUD.Diagnostics.end(), Diag);
699 yaml::Output YAML(OS);
712#if CLANG_TIDY_ENABLE_QUERY_BASED_CUSTOM_CHECKS
716 for (
const ClangTidyModuleRegistry::entry &Module :
717 ClangTidyModuleRegistry::entries()) {
718 Module.instantiate()->addCheckFactories(Factories);
721 for (
const auto &Factory : Factories)
722 Result.
Checks.insert(Factory.getKey());
724#if CLANG_TIDY_ENABLE_STATIC_ANALYZER
725 SmallString<64> Buffer(AnalyzerCheckNamePrefix);
726 const size_t DefSize = Buffer.size();
727 for (
const auto &AnalyzerCheck : AnalyzerOptions::getRegisteredCheckers(
729 Buffer.truncate(DefSize);
730 Buffer.append(AnalyzerCheck);
731 Result.
Checks.insert(Buffer);
734 static constexpr StringRef OptionNames[] = {
735#define GET_CHECKER_OPTIONS
736#define CHECKER_OPTION(TYPE, CHECKER, OPTION_NAME, DESCRIPTION, DEFAULT, \
738 ANALYZER_CHECK_NAME_PREFIX CHECKER ":" OPTION_NAME,
740#include "clang/StaticAnalyzer/Checkers/Checkers.inc"
742#undef GET_CHECKER_OPTIONS
745 Result.
Options.insert_range(OptionNames);
749 for (
const auto &Factory : Factories)
750 Factory.getValue()(Factory.getKey(), &Context);
static cl::opt< bool > UseColor("use-color", cl::desc(R"(Use colors in detailed AST output. If not set, colors
will be used if the terminal connected to
standard output supports colors.)"), cl::init(false), cl::cat(ClangQueryCategory))
static cl::opt< bool > EnableCheckProfile("enable-check-profile", desc(R"(
Enable per-check timing profiles, and print a
report to stderr.
)"), cl::init(false), cl::cat(ClangTidyCategory))
static cl::opt< bool > Fix("fix", desc(R"(
Apply suggested fixes. Without -fix-errors
clang-tidy will bail out if any compilation
errors were found.
)"), cl::init(false), cl::cat(ClangTidyCategory))
static cl::opt< bool > ExperimentalCustomChecks("experimental-custom-checks", desc(R"(
Enable experimental clang-query based
custom checks.
see https://clang.llvm.org/extra/clang-tidy/QueryBasedCustomChecks.html.
)"), cl::init(false), cl::cat(ClangTidyCategory))
static cl::opt< bool > AllowEnablingAnalyzerAlphaCheckers("allow-enabling-analyzer-alpha-checkers", cl::init(false), cl::Hidden, cl::cat(ClangTidyCategory))
This option allows enabling the experimental alpha checkers from the static analyzer.
static cl::opt< std::string > Checks("checks", desc(R"(
Comma-separated list of globs with optional '-'
prefix. Globs are processed in order of
appearance in the list. Globs without '-'
prefix add checks with matching names to the
set, globs with the '-' prefix remove checks
with matching names from the set of enabled
checks. This option's value is appended to the
value of the 'Checks' option in .clang-tidy
file, if any.
)"), cl::init(""), cl::cat(ClangTidyCategory))
static cl::opt< bool > Quiet("quiet", desc(R"(
Run clang-tidy in quiet mode. This suppresses
printing statistics about ignored warnings and
warnings treated as errors if the respective
options are specified.
)"), cl::init(false), cl::cat(ClangTidyCategory))
static cl::opt< std::string > StoreCheckProfile("store-check-profile", desc(R"(
By default reports are printed in tabulated
format to stderr. When this option is passed,
these per-TU profiles are instead stored as JSON.
)"), cl::value_desc("prefix"), cl::cat(ClangTidyCategory))
std::unique_ptr< clang::ASTConsumer > createASTConsumer(clang::CompilerInstance &Compiler, StringRef File)
Returns an ASTConsumer that runs the specified clang-tidy checks.
ClangTidyOptions::OptionMap getCheckOptions()
Get the union of options from all checks.
ClangTidyASTConsumerFactory(ClangTidyContext &Context, IntrusiveRefCntPtr< llvm::vfs::OverlayFileSystem > OverlayFS=nullptr)
std::vector< std::string > getCheckNames()
Get the list of enabled checks.
A collection of ClangTidyCheckFactory instances.
Every ClangTidyCheck reports errors through a DiagnosticsEngine provided by this context.
void setOptionsCollector(llvm::StringSet<> *Collector)
const ClangTidyOptions & getOptions() const
Returns options for CurrentFile.
void setProfileStoragePrefix(StringRef ProfilePrefix)
Control storage of profile date.
void setEnableProfiling(bool Profile)
Control profile collection in clang-tidy.
void setDiagnosticsEngine(std::unique_ptr< DiagnosticOptions > DiagOpts, DiagnosticsEngine *DiagEngine)
Sets the DiagnosticsEngine that diag() will emit diagnostics to.
ClangTidyOptions getOptionsForFile(StringRef File) const
Returns options for File.
A diagnostic consumer that turns each Diagnostic into a SourceManager-independent ClangTidyError.
std::vector< ClangTidyError > take()
void(* RegisterCustomChecks)(const ClangTidyOptions &O, ClangTidyCheckFactories &Factories)
const llvm::StringMap< tooling::Replacements > * getFixIt(const tooling::Diagnostic &Diagnostic, bool AnyFix)
Gets the Fix attached to Diagnostic.
ChecksAndOptions getAllChecksAndOptions(bool AllowEnablingAnalyzerAlphaCheckers, bool ExperimentalCustomChecks)
FixBehaviour
Controls what kind of fixes clang-tidy is allowed to apply.
@ FB_NoFix
Don't try to apply any fix.
@ FB_FixNotes
Apply fixes found in notes.
std::vector< std::string > getCheckNames(const ClangTidyOptions &Options, bool AllowEnablingAnalyzerAlphaCheckers, bool ExperimentalCustomChecks)
Fills the list of check names that are enabled when the provided filters are applied.
llvm::Registry< ClangTidyModule > ClangTidyModuleRegistry
ClangTidyOptions::OptionMap getCheckOptions(const ClangTidyOptions &Options, bool AllowEnablingAnalyzerAlphaCheckers, bool ExperimentalCustomChecks)
Returns the effective check-specific options.
void handleErrors(llvm::ArrayRef< ClangTidyError > Errors, ClangTidyContext &Context, FixBehaviour Fix, unsigned &WarningsAsErrorsCount, llvm::IntrusiveRefCntPtr< llvm::vfs::FileSystem > BaseFS)
Displays the found Errors to the users.
void filterCheckOptions(ClangTidyOptions &Options, const std::vector< std::string > &EnabledChecks)
Filters CheckOptions in Options to only include options specified in the EnabledChecks which is a sor...
void exportReplacements(const llvm::StringRef MainFilePath, const std::vector< ClangTidyError > &Errors, raw_ostream &OS)
std::vector< ClangTidyError > runClangTidy(clang::tidy::ClangTidyContext &Context, const CompilationDatabase &Compilations, ArrayRef< std::string > InputFiles, llvm::IntrusiveRefCntPtr< llvm::vfs::OverlayFileSystem > BaseFS, bool ApplyAnyFix, bool EnableCheckProfile, llvm::StringRef StoreCheckProfile, bool Quiet)
Some operations such as code completion produce a set of candidates.
llvm::StringMap< ClangTidyValue > OptionMap
A detected error complete with information to display diagnostic and automatic fix.
Contains options for clang-tidy.
OptionMap CheckOptions
Key-value mapping used to store check-specific options.
llvm::StringMap< ClangTidyValue > OptionMap
std::optional< std::string > Checks
Checks filter.
std::optional< ArgList > RemovedArgs
Remove command line arguments sent to the compiler matching this.
std::optional< ArgList > ExtraArgsBefore
Add extra compilation arguments to the start of the list.
std::optional< ArgList > ExtraArgs
Add extra compilation arguments to the end of the list.