summaryrefslogtreecommitdiffstats
path: root/clang-tools-extra
diff options
context:
space:
mode:
authorKirill Bobyrev <omtcyfz@gmail.com>2016-08-01 12:06:18 +0000
committerKirill Bobyrev <omtcyfz@gmail.com>2016-08-01 12:06:18 +0000
commit11cea45ccef4e7878f60b2c296569362a2b26b97 (patch)
tree4635ef77fc331f47b8c4cdf0289ba547b410d381 /clang-tools-extra
parentd10be623838db6d82c7ede9ea5d4cf267ff2dc8f (diff)
downloadbcm5719-llvm-11cea45ccef4e7878f60b2c296569362a2b26b97.tar.gz
bcm5719-llvm-11cea45ccef4e7878f60b2c296569362a2b26b97.zip
[clang-tidy] remove trailing whitespaces and retab
llvm-svn: 277340
Diffstat (limited to 'clang-tools-extra')
-rw-r--r--clang-tools-extra/clang-tidy/cert/LICENSE.TXT2
-rw-r--r--clang-tools-extra/clang-tidy/cert/StrToNumCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h2
-rw-r--r--clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h2
-rw-r--r--clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h2
-rw-r--r--clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h8
-rw-r--r--clang-tools-extra/clang-tidy/misc/MacroParenthesesCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/misc/MoveConstructorInitCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/misc/SizeofContainerCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/misc/StaticAssertCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/misc/StaticAssertCheck.h2
-rw-r--r--clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h2
-rw-r--r--clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h2
-rw-r--r--clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/misc/ThrowByValueCatchByReferenceCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/misc/UnusedAliasDeclsCheck.h2
-rw-r--r--clang-tools-extra/clang-tidy/misc/UnusedParametersCheck.h2
-rw-r--r--clang-tools-extra/clang-tidy/modernize/PassByValueCheck.cpp2
-rw-r--r--clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.cpp4
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-slicing.rst14
-rw-r--r--clang-tools-extra/docs/clang-tidy/checks/modernize-use-emplace.rst38
26 files changed, 54 insertions, 54 deletions
diff --git a/clang-tools-extra/clang-tidy/cert/LICENSE.TXT b/clang-tools-extra/clang-tidy/cert/LICENSE.TXT
index b332152c0ef..d8395cccead 100644
--- a/clang-tools-extra/clang-tidy/cert/LICENSE.TXT
+++ b/clang-tools-extra/clang-tidy/cert/LICENSE.TXT
@@ -7,7 +7,7 @@ additions:
Any file referencing a CERT Secure Coding guideline:
Please allow this letter to serve as confirmation that open source projects on
http://llvm.org are permitted to link via hypertext to the CERT(R) secure coding
-guidelines available at https://www.securecoding.cert.org.
+guidelines available at https://www.securecoding.cert.org.
The foregoing is permitted by the Terms of Use as follows:
"Linking to the Service
diff --git a/clang-tools-extra/clang-tidy/cert/StrToNumCheck.cpp b/clang-tools-extra/clang-tidy/cert/StrToNumCheck.cpp
index 5266daf8bc9..765513b1f8e 100644
--- a/clang-tools-extra/clang-tidy/cert/StrToNumCheck.cpp
+++ b/clang-tools-extra/clang-tidy/cert/StrToNumCheck.cpp
@@ -127,7 +127,7 @@ ConversionKind ClassifyFormatString(StringRef Fmt, const LangOptions &LO,
Handler H;
analyze_format_string::ParseScanfString(H, Fmt.begin(), Fmt.end(), LO, TI);
-
+
return H.get();
}
diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h
index b376e64d0d7..0afffb64f06 100644
--- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h
+++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h
@@ -15,7 +15,7 @@
namespace clang {
namespace tidy {
namespace cppcoreguidelines {
-
+
/// This check flags all array to pointer decays
///
/// For the user-facing documentation see:
diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.cpp b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.cpp
index 5331cdacddc..4b6fb420716 100644
--- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.cpp
+++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.cpp
@@ -16,7 +16,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
namespace cppcoreguidelines {
-
+
void ProTypeConstCastCheck::registerMatchers(MatchFinder *Finder) {
if (!getLangOpts().CPlusPlus)
return;
diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h
index fda082e1c2b..92a3a1b5db0 100644
--- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h
+++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h
@@ -15,7 +15,7 @@
namespace clang {
namespace tidy {
namespace cppcoreguidelines {
-
+
/// This check flags all instances of const_cast
///
/// For the user-facing documentation see:
diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.cpp b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.cpp
index 002f8f1ed2d..153e1cae810 100644
--- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.cpp
+++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.cpp
@@ -16,7 +16,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
namespace cppcoreguidelines {
-
+
void ProTypeStaticCastDowncastCheck::registerMatchers(MatchFinder *Finder) {
if (!getLangOpts().CPlusPlus)
return;
diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h
index d718feca2f8..77224237f79 100644
--- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h
+++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h
@@ -15,7 +15,7 @@
namespace clang {
namespace tidy {
namespace cppcoreguidelines {
-
+
/// Checks for usages of static_cast, where a base class is downcasted to a derived class.
///
/// For the user-facing documentation see:
diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h
index 62185354182..508ce6411cf 100644
--- a/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h
+++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h
@@ -30,7 +30,7 @@ public:
void registerMatchers(ast_matchers::MatchFinder *Finder) override;
void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
void onEndOfTranslationUnit() override;
-
+
enum class SpecialMemberFunctionKind {
Destructor,
CopyConstructor,
@@ -44,12 +44,12 @@ public:
using ClassDefiningSpecialMembersMap = llvm::DenseMap<ClassDefId, llvm::SmallVector<SpecialMemberFunctionKind, 5>>;
private:
-
+
static llvm::StringRef toString(SpecialMemberFunctionKind K);
static std::string join(llvm::ArrayRef<SpecialMemberFunctionKind> SMFS,
llvm::StringRef AndOr);
-
+
ClassDefiningSpecialMembersMap ClassWithSpecialMembers;
};
@@ -60,7 +60,7 @@ private:
namespace llvm {
/// Specialisation of DenseMapInfo to allow ClassDefId objects in DenseMaps
/// FIXME: Move this to the corresponding cpp file as is done for
-/// clang-tidy/readability/IdentifierNamingCheck.cpp.
+/// clang-tidy/readability/IdentifierNamingCheck.cpp.
template <>
struct DenseMapInfo<
clang::tidy::cppcoreguidelines::SpecialMemberFunctionsCheck::ClassDefId> {
diff --git a/clang-tools-extra/clang-tidy/misc/MacroParenthesesCheck.cpp b/clang-tools-extra/clang-tidy/misc/MacroParenthesesCheck.cpp
index ebfb8c03298..cfc94c479b5 100644
--- a/clang-tools-extra/clang-tidy/misc/MacroParenthesesCheck.cpp
+++ b/clang-tools-extra/clang-tidy/misc/MacroParenthesesCheck.cpp
@@ -154,7 +154,7 @@ void MacroParenthesesPPCallbacks::replacementList(const Token &MacroNameTok,
void MacroParenthesesPPCallbacks::argument(const Token &MacroNameTok,
const MacroInfo *MI) {
-
+
// Skip variable declaration.
bool VarDecl = possibleVarDecl(MI, MI->tokens_begin());
diff --git a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
index 45fa838345d..abaf4b178ce 100644
--- a/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
+++ b/clang-tools-extra/clang-tidy/misc/MiscTidyModule.cpp
@@ -120,7 +120,7 @@ public:
CheckFactories.registerCheck<SuspiciousSemicolonCheck>(
"misc-suspicious-semicolon");
CheckFactories.registerCheck<SuspiciousStringCompareCheck>(
- "misc-suspicious-string-compare");
+ "misc-suspicious-string-compare");
CheckFactories.registerCheck<SwappedArgumentsCheck>(
"misc-swapped-arguments");
CheckFactories.registerCheck<ThrowByValueCatchByReferenceCheck>(
diff --git a/clang-tools-extra/clang-tidy/misc/MoveConstructorInitCheck.cpp b/clang-tools-extra/clang-tidy/misc/MoveConstructorInitCheck.cpp
index acb6de47697..c696c4c65c7 100644
--- a/clang-tools-extra/clang-tidy/misc/MoveConstructorInitCheck.cpp
+++ b/clang-tools-extra/clang-tidy/misc/MoveConstructorInitCheck.cpp
@@ -133,7 +133,7 @@ void MoveConstructorInitCheck::handleMoveConstructor(
QualType QT = Initializer->getInit()->getType();
if (QT.isTriviallyCopyableType(*Result.Context))
return;
-
+
const auto *RD = QT->getAsCXXRecordDecl();
if (RD && RD->isTriviallyCopyable())
return;
diff --git a/clang-tools-extra/clang-tidy/misc/SizeofContainerCheck.cpp b/clang-tools-extra/clang-tidy/misc/SizeofContainerCheck.cpp
index 188d28ae2c4..7555d3b7e16 100644
--- a/clang-tools-extra/clang-tidy/misc/SizeofContainerCheck.cpp
+++ b/clang-tools-extra/clang-tidy/misc/SizeofContainerCheck.cpp
@@ -15,7 +15,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace misc {
void SizeofContainerCheck::registerMatchers(MatchFinder *Finder) {
Finder->addMatcher(
diff --git a/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.cpp b/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.cpp
index 6a7dc6cb565..a0e32222770 100644
--- a/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.cpp
+++ b/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.cpp
@@ -22,7 +22,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace misc {
StaticAssertCheck::StaticAssertCheck(StringRef Name, ClangTidyContext *Context)
: ClangTidyCheck(Name, Context) {}
diff --git a/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.h b/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.h
index 284fdebc784..faefce1723d 100644
--- a/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.h
+++ b/clang-tools-extra/clang-tidy/misc/StaticAssertCheck.h
@@ -16,7 +16,7 @@
namespace clang {
namespace tidy {
-namespace misc {
+namespace misc {
/// Replaces `assert()` with `static_assert()` if the condition is evaluatable
/// at compile time.
diff --git a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp b/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp
index 65af4a10b7b..69166860345 100644
--- a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp
+++ b/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.cpp
@@ -16,7 +16,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace misc {
void StringIntegerAssignmentCheck::registerMatchers(MatchFinder *Finder) {
if (!getLangOpts().CPlusPlus)
diff --git a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h b/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h
index e977b57f915..7d89c0c1174 100644
--- a/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h
+++ b/clang-tools-extra/clang-tidy/misc/StringIntegerAssignmentCheck.h
@@ -14,7 +14,7 @@
namespace clang {
namespace tidy {
-namespace misc {
+namespace misc {
/// Finds instances where an integer is assigned to a string.
///
diff --git a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp b/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp
index 3881a1f404e..605cfd975f4 100644
--- a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp
+++ b/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.cpp
@@ -99,7 +99,7 @@ void SuspiciousMissingCommaCheck::check(
const auto *ConcatenatedLiteral =
Result.Nodes.getNodeAs<StringLiteral>("str");
assert(InitializerList && ConcatenatedLiteral);
-
+
// Skip small arrays as they often generate false-positive.
unsigned int Size = InitializerList->getNumInits();
if (Size < SizeThreshold) return;
diff --git a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h b/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h
index 21cb680a438..428495943db 100644
--- a/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h
+++ b/clang-tools-extra/clang-tidy/misc/SuspiciousMissingCommaCheck.h
@@ -23,7 +23,7 @@ namespace misc {
class SuspiciousMissingCommaCheck : public ClangTidyCheck {
public:
SuspiciousMissingCommaCheck(StringRef Name, ClangTidyContext *Context);
- void storeOptions(ClangTidyOptions::OptionMap &Opts) override;
+ void storeOptions(ClangTidyOptions::OptionMap &Opts) override;
void registerMatchers(ast_matchers::MatchFinder *Finder) override;
void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
diff --git a/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp b/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp
index b6ffbe9ac2b..389be350675 100644
--- a/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp
+++ b/clang-tools-extra/clang-tidy/misc/SwappedArgumentsCheck.cpp
@@ -91,7 +91,7 @@ void SwappedArgumentsCheck::check(const MatchFinder::MatchResult &Result) {
<< RHSFrom->getType()
<< tooling::fixit::createReplacement(*LHS, *RHS, Ctx)
<< tooling::fixit::createReplacement(*RHS, *LHS, Ctx);
-
+
// Remember that we emitted a warning for this argument.
UsedArgs.insert(RHSCast);
}
diff --git a/clang-tools-extra/clang-tidy/misc/ThrowByValueCatchByReferenceCheck.cpp b/clang-tools-extra/clang-tidy/misc/ThrowByValueCatchByReferenceCheck.cpp
index 5e89bd1d445..8b8c379ac69 100644
--- a/clang-tools-extra/clang-tidy/misc/ThrowByValueCatchByReferenceCheck.cpp
+++ b/clang-tools-extra/clang-tidy/misc/ThrowByValueCatchByReferenceCheck.cpp
@@ -16,7 +16,7 @@ using namespace clang::ast_matchers;
namespace clang {
namespace tidy {
-namespace misc {
+namespace misc {
ThrowByValueCatchByReferenceCheck::ThrowByValueCatchByReferenceCheck(
StringRef Name, ClangTidyContext *Context)
diff --git a/clang-tools-extra/clang-tidy/misc/UnusedAliasDeclsCheck.h b/clang-tools-extra/clang-tidy/misc/UnusedAliasDeclsCheck.h
index 54f66f7c144..0525ba845cb 100644
--- a/clang-tools-extra/clang-tidy/misc/UnusedAliasDeclsCheck.h
+++ b/clang-tools-extra/clang-tidy/misc/UnusedAliasDeclsCheck.h
@@ -15,7 +15,7 @@
namespace clang {
namespace tidy {
-namespace misc {
+namespace misc {
/// Finds unused namespace alias declarations.
class UnusedAliasDeclsCheck : public ClangTidyCheck {
diff --git a/clang-tools-extra/clang-tidy/misc/UnusedParametersCheck.h b/clang-tools-extra/clang-tidy/misc/UnusedParametersCheck.h
index 45b7f935b2c..f8b27dee711 100644
--- a/clang-tools-extra/clang-tidy/misc/UnusedParametersCheck.h
+++ b/clang-tools-extra/clang-tidy/misc/UnusedParametersCheck.h
@@ -14,7 +14,7 @@
namespace clang {
namespace tidy {
-namespace misc {
+namespace misc {
/// Finds unused parameters and fixes them, so that `-Wunused-parameter` can be
/// turned on.
diff --git a/clang-tools-extra/clang-tidy/modernize/PassByValueCheck.cpp b/clang-tools-extra/clang-tidy/modernize/PassByValueCheck.cpp
index 6bc5c009e0b..6161d6dfc94 100644
--- a/clang-tools-extra/clang-tidy/modernize/PassByValueCheck.cpp
+++ b/clang-tools-extra/clang-tidy/modernize/PassByValueCheck.cpp
@@ -183,7 +183,7 @@ void PassByValueCheck::check(const MatchFinder::MatchResult &Result) {
// If the parameter is trivial to copy, don't move it. Moving a trivivally
// copyable type will cause a problem with misc-move-const-arg
- if (ParamDecl->getType().isTriviallyCopyableType(*Result.Context))
+ if (ParamDecl->getType().isTriviallyCopyableType(*Result.Context))
return;
auto Diag = diag(ParamDecl->getLocStart(), "pass by value and use std::move");
diff --git a/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.cpp b/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.cpp
index 71dc4551c56..f00133c4987 100644
--- a/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.cpp
+++ b/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.cpp
@@ -157,8 +157,8 @@ void UnnecessaryValueParamCheck::handleMoveFix(const ParmVarDecl &Var,
if (CopyArgument.getLocStart().isMacroID())
return;
const auto &SM = Context.getSourceManager();
- auto EndLoc = Lexer::getLocForEndOfToken(CopyArgument.getLocation(), 0, SM,
- Context.getLangOpts());
+ auto EndLoc = Lexer::getLocForEndOfToken(CopyArgument.getLocation(), 0, SM,
+ Context.getLangOpts());
Diag << FixItHint::CreateInsertion(CopyArgument.getLocStart(), "std::move(")
<< FixItHint::CreateInsertion(EndLoc, ")");
if (auto IncludeFixit = Inserter->CreateIncludeInsertion(
diff --git a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-slicing.rst b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-slicing.rst
index 0b1bb6beed4..94ceb98ca6f 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-slicing.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/cppcoreguidelines-slicing.rst
@@ -10,13 +10,13 @@ This can be misleading especially for member function slicing, for example:
.. code:: c++
- struct B { int a; virtual int f(); };
- struct D : B { int b; int f() override; };
- void use(B b) { // Missing reference, intended ?
- b.f(); // Calls B::f.
- }
- D d;
- use(d); // Slice.
+ struct B { int a; virtual int f(); };
+ struct D : B { int b; int f() override; };
+ void use(B b) { // Missing reference, intended ?
+ b.f(); // Calls B::f.
+ }
+ D d;
+ use(d); // Slice.
See the relevant CppCoreGuidelines sections for details:
https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md#es63-dont-slice
diff --git a/clang-tools-extra/docs/clang-tidy/checks/modernize-use-emplace.rst b/clang-tools-extra/docs/clang-tidy/checks/modernize-use-emplace.rst
index 1622dd65ebb..65c23832d1e 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/modernize-use-emplace.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/modernize-use-emplace.rst
@@ -20,25 +20,25 @@ Before:
.. code:: c++
- std::vector<MyClass> v;
- v.push_back(MyClass(21, 37));
+ std::vector<MyClass> v;
+ v.push_back(MyClass(21, 37));
- std::vector<std::pair<int,int>> w;
+ std::vector<std::pair<int,int>> w;
- w.push_back(std::pair<int,int>(21, 37));
- w.push_back(std::make_pair(21L, 37L));
+ w.push_back(std::pair<int,int>(21, 37));
+ w.push_back(std::make_pair(21L, 37L));
After:
.. code:: c++
- std::vector<MyClass> v;
- v.emplace_back(21, 37);
+ std::vector<MyClass> v;
+ v.emplace_back(21, 37);
- std::vector<std::pair<int,int>> w;
- w.emplace_back(21, 37);
- // This will be fixed to w.push_back(21, 37); in next version
- w.emplace_back(std::make_pair(21L, 37L);
+ std::vector<std::pair<int,int>> w;
+ w.emplace_back(21, 37);
+ // This will be fixed to w.push_back(21, 37); in next version
+ w.emplace_back(std::make_pair(21L, 37L);
The other situation is when we pass arguments that will be converted to a type
inside a container.
@@ -47,15 +47,15 @@ Before:
.. code:: c++
- std::vector<boost::optional<std::string> > v;
- v.push_back("abc");
+ std::vector<boost::optional<std::string> > v;
+ v.push_back("abc");
After:
.. code:: c++
- std::vector<boost::optional<std::string> > v;
- v.emplace_back("abc");
+ std::vector<boost::optional<std::string> > v;
+ v.emplace_back("abc");
In some cases the transformation would be valid, but the code
@@ -63,11 +63,11 @@ wouldn't be exception safe.
In this case the calls of ``push_back`` won't be replaced.
.. code:: c++
-
+
std::vector<std::unique_ptr<int>> v;
- v.push_back(std::unique_ptr<int>(new int(0)));
- auto *ptr = new int(1);
- v.push_back(std::unique_ptr<int>(ptr));
+ v.push_back(std::unique_ptr<int>(new int(0)));
+ auto *ptr = new int(1);
+ v.push_back(std::unique_ptr<int>(ptr));
This is because replacing it with ``emplace_back`` could cause a leak of this
pointer if ``emplace_back`` would throw exception before emplacement
OpenPOWER on IntegriCloud