clang-tools 20.0.0git
UseNoexceptCheck.cpp
Go to the documentation of this file.
1//===--- UseNoexceptCheck.cpp - clang-tidy---------------------------------===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8
9#include "UseNoexceptCheck.h"
10#include "clang/AST/ASTContext.h"
11#include "clang/Lex/Lexer.h"
12
13using namespace clang::ast_matchers;
14
15namespace clang::tidy::modernize {
16
17namespace {
18AST_MATCHER(NamedDecl, isValid) { return !Node.isInvalidDecl(); }
19} // namespace
20
22 : ClangTidyCheck(Name, Context),
23 NoexceptMacro(Options.get("ReplacementString", "")),
24 UseNoexceptFalse(Options.get("UseNoexceptFalse", true)) {}
25
27 Options.store(Opts, "ReplacementString", NoexceptMacro);
28 Options.store(Opts, "UseNoexceptFalse", UseNoexceptFalse);
29}
30
31void UseNoexceptCheck::registerMatchers(MatchFinder *Finder) {
32 Finder->addMatcher(
33 functionDecl(
34 isValid(),
35 hasTypeLoc(loc(functionProtoType(hasDynamicExceptionSpec()))),
36 optionally(cxxMethodDecl(anyOf(hasAnyOverloadedOperatorName(
37 "delete[]", "delete"),
38 cxxDestructorDecl()))
39 .bind("del-dtor")))
40 .bind("funcDecl"),
41 this);
42
43 Finder->addMatcher(
44 parmVarDecl(anyOf(hasType(pointerType(pointee(parenType(innerType(
45 functionProtoType(hasDynamicExceptionSpec())))))),
46 hasType(memberPointerType(pointee(parenType(innerType(
47 functionProtoType(hasDynamicExceptionSpec()))))))))
48 .bind("parmVarDecl"),
49 this);
50}
51
52void UseNoexceptCheck::check(const MatchFinder::MatchResult &Result) {
53 const FunctionProtoType *FnTy = nullptr;
54 bool DtorOrOperatorDel = false;
55 SourceRange Range;
56
57 if (const auto *FuncDecl = Result.Nodes.getNodeAs<FunctionDecl>("funcDecl")) {
58 DtorOrOperatorDel = Result.Nodes.getNodeAs<FunctionDecl>("del-dtor");
59 FnTy = FuncDecl->getType()->getAs<FunctionProtoType>();
60 if (const auto *TSI = FuncDecl->getTypeSourceInfo())
61 Range =
62 TSI->getTypeLoc().castAs<FunctionTypeLoc>().getExceptionSpecRange();
63 } else if (const auto *ParmDecl =
64 Result.Nodes.getNodeAs<ParmVarDecl>("parmVarDecl")) {
65 FnTy = ParmDecl->getType()
66 ->castAs<Type>()
67 ->getPointeeType()
68 ->getAs<FunctionProtoType>();
69
70 if (const auto *TSI = ParmDecl->getTypeSourceInfo())
71 Range = TSI->getTypeLoc()
72 .getNextTypeLoc()
73 .IgnoreParens()
74 .castAs<FunctionProtoTypeLoc>()
75 .getExceptionSpecRange();
76 }
77
78 assert(FnTy && "FunctionProtoType is null.");
79 if (isUnresolvedExceptionSpec(FnTy->getExceptionSpecType()))
80 return;
81
82 assert(Range.isValid() && "Exception Source Range is invalid.");
83
84 CharSourceRange CRange = Lexer::makeFileCharRange(
85 CharSourceRange::getTokenRange(Range), *Result.SourceManager,
86 Result.Context->getLangOpts());
87
88 bool IsNoThrow = FnTy->isNothrow();
89 StringRef ReplacementStr =
90 IsNoThrow ? NoexceptMacro.empty() ? "noexcept" : NoexceptMacro
91 : NoexceptMacro.empty()
92 ? (DtorOrOperatorDel || UseNoexceptFalse) ? "noexcept(false)" : ""
93 : "";
94
95 FixItHint FixIt;
96 if ((IsNoThrow || NoexceptMacro.empty()) && CRange.isValid())
97 FixIt = FixItHint::CreateReplacement(CRange, ReplacementStr);
98
99 diag(Range.getBegin(), "dynamic exception specification '%0' is deprecated; "
100 "consider %select{using '%2'|removing it}1 instead")
101 << Lexer::getSourceText(CRange, *Result.SourceManager,
102 Result.Context->getLangOpts())
103 << ReplacementStr.empty() << ReplacementStr << FixIt;
104}
105
106} // namespace clang::tidy::modernize
llvm::SmallString< 256U > Name
NodeType Type
CharSourceRange Range
SourceRange for the file name.
::clang::DynTypedNode Node
std::optional< FixItHint > FixIt
void store(ClangTidyOptions::OptionMap &Options, StringRef LocalName, StringRef Value) const
Stores an option with the check-local name LocalName with string value Value to Options.
Base class for all clang-tidy checks.
DiagnosticBuilder diag(SourceLocation Loc, StringRef Description, DiagnosticIDs::Level Level=DiagnosticIDs::Warning)
Add a diagnostic with the check's name.
Every ClangTidyCheck reports errors through a DiagnosticsEngine provided by this context.
void check(const ast_matchers::MatchFinder::MatchResult &Result) override
ClangTidyChecks that register ASTMatchers should do the actual work in here.
void storeOptions(ClangTidyOptions::OptionMap &Opts) override
Should store all options supported by this check with their current values or default values for opti...
void registerMatchers(ast_matchers::MatchFinder *Finder) override
Override this to register AST matchers with Finder.
UseNoexceptCheck(StringRef Name, ClangTidyContext *Context)
AST_MATCHER(Decl, declHasNoReturnAttr)
matches a Decl if it has a "no return" attribute of any kind
static bool isValid(SourceRange Range)
llvm::StringMap< ClangTidyValue > OptionMap
static constexpr const char FuncDecl[]