summaryrefslogtreecommitdiffstats
path: root/clang-tools-extra/clang-tidy
diff options
context:
space:
mode:
Diffstat (limited to 'clang-tools-extra/clang-tidy')
-rw-r--r--clang-tools-extra/clang-tidy/modernize/CMakeLists.txt1
-rw-r--r--clang-tools-extra/clang-tidy/modernize/ModernizeTidyModule.cpp3
-rw-r--r--clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.cpp477
-rw-r--r--clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h62
4 files changed, 543 insertions, 0 deletions
diff --git a/clang-tools-extra/clang-tidy/modernize/CMakeLists.txt b/clang-tools-extra/clang-tidy/modernize/CMakeLists.txt
index bb5c0aebb66..36193f0a6d1 100644
--- a/clang-tools-extra/clang-tidy/modernize/CMakeLists.txt
+++ b/clang-tools-extra/clang-tidy/modernize/CMakeLists.txt
@@ -30,6 +30,7 @@ add_clang_library(clangTidyModernizeModule
UseNoexceptCheck.cpp
UseNullptrCheck.cpp
UseOverrideCheck.cpp
+ UseTrailingReturnTypeCheck.cpp
UseTransparentFunctorsCheck.cpp
UseUncaughtExceptionsCheck.cpp
UseUsingCheck.cpp
diff --git a/clang-tools-extra/clang-tidy/modernize/ModernizeTidyModule.cpp b/clang-tools-extra/clang-tidy/modernize/ModernizeTidyModule.cpp
index 45ecdf93a72..6280f9c991e 100644
--- a/clang-tools-extra/clang-tidy/modernize/ModernizeTidyModule.cpp
+++ b/clang-tools-extra/clang-tidy/modernize/ModernizeTidyModule.cpp
@@ -35,6 +35,7 @@
#include "UseNoexceptCheck.h"
#include "UseNullptrCheck.h"
#include "UseOverrideCheck.h"
+#include "UseTrailingReturnTypeCheck.h"
#include "UseTransparentFunctorsCheck.h"
#include "UseUncaughtExceptionsCheck.h"
#include "UseUsingCheck.h"
@@ -87,6 +88,8 @@ public:
CheckFactories.registerCheck<UseNoexceptCheck>("modernize-use-noexcept");
CheckFactories.registerCheck<UseNullptrCheck>("modernize-use-nullptr");
CheckFactories.registerCheck<UseOverrideCheck>("modernize-use-override");
+ CheckFactories.registerCheck<UseTrailingReturnTypeCheck>(
+ "modernize-use-trailing-return-type");
CheckFactories.registerCheck<UseTransparentFunctorsCheck>(
"modernize-use-transparent-functors");
CheckFactories.registerCheck<UseUncaughtExceptionsCheck>(
diff --git a/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.cpp b/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.cpp
new file mode 100644
index 00000000000..469fe95823b
--- /dev/null
+++ b/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.cpp
@@ -0,0 +1,477 @@
+//===--- UseTrailingReturnTypeCheck.cpp - clang-tidy-----------------------===//
+//
+// The LLVM Compiler Infrastructure
+//
+// This file is distributed under the University of Illinois Open Source
+// License. See LICENSE.TXT for details.
+//
+//===----------------------------------------------------------------------===//
+
+#include "UseTrailingReturnTypeCheck.h"
+#include "clang/AST/ASTContext.h"
+#include "clang/AST/RecursiveASTVisitor.h"
+#include "clang/ASTMatchers/ASTMatchFinder.h"
+#include "clang/Tooling/FixIt.h"
+
+#include <cctype>
+
+using namespace clang::ast_matchers;
+
+namespace clang {
+namespace tidy {
+namespace modernize {
+namespace {
+struct UnqualNameVisitor : public RecursiveASTVisitor<UnqualNameVisitor> {
+public:
+ UnqualNameVisitor(const FunctionDecl &F, const SourceManager &SM)
+ : F(F), SM(SM) {}
+
+ bool Collision = false;
+
+ bool shouldWalkTypesOfTypeLocs() const { return false; }
+
+ bool VisitUnqualName(StringRef UnqualName) {
+ // Check for collisions with function arguments.
+ for (ParmVarDecl *Param : F.parameters())
+ if (const IdentifierInfo *Ident = Param->getIdentifier())
+ if (Ident->getName() == UnqualName) {
+ Collision = true;
+ return true;
+ }
+ return false;
+ }
+
+ bool TraverseTypeLoc(TypeLoc TL, bool Elaborated = false) {
+ if (TL.isNull())
+ return true;
+
+ if (!Elaborated) {
+ switch (TL.getTypeLocClass()) {
+ case TypeLoc::Record:
+ if (VisitUnqualName(
+ TL.getAs<RecordTypeLoc>().getTypePtr()->getDecl()->getName()))
+ return false;
+ break;
+ case TypeLoc::Enum:
+ if (VisitUnqualName(
+ TL.getAs<EnumTypeLoc>().getTypePtr()->getDecl()->getName()))
+ return false;
+ break;
+ case TypeLoc::TemplateSpecialization:
+ if (VisitUnqualName(TL.getAs<TemplateSpecializationTypeLoc>()
+ .getTypePtr()
+ ->getTemplateName()
+ .getAsTemplateDecl()
+ ->getName()))
+ return false;
+ break;
+ default:
+ break;
+ }
+ }
+
+ return RecursiveASTVisitor<UnqualNameVisitor>::TraverseTypeLoc(TL);
+ }
+
+ // Replace the base method in order to call ower own
+ // TraverseTypeLoc().
+ bool TraverseQualifiedTypeLoc(QualifiedTypeLoc TL) {
+ return TraverseTypeLoc(TL.getUnqualifiedLoc());
+ }
+
+ // Replace the base version to inform TraverseTypeLoc that the type is
+ // elaborated.
+ bool TraverseElaboratedTypeLoc(ElaboratedTypeLoc TL) {
+ if (TL.getQualifierLoc() &&
+ !TraverseNestedNameSpecifierLoc(TL.getQualifierLoc()))
+ return false;
+ return TraverseTypeLoc(TL.getNamedTypeLoc(), true);
+ }
+
+ bool VisitDeclRefExpr(DeclRefExpr *S) {
+ DeclarationName Name = S->getNameInfo().getName();
+ return S->getQualifierLoc() || !Name.isIdentifier() || !VisitUnqualName(Name.getAsIdentifierInfo()->getName());
+ }
+
+private:
+ const FunctionDecl &F;
+ const SourceManager &SM;
+};
+} // namespace
+
+constexpr llvm::StringLiteral Message =
+ "use a trailing return type for this function";
+
+static SourceLocation expandIfMacroId(SourceLocation Loc,
+ const SourceManager &SM) {
+ if (Loc.isMacroID())
+ Loc = expandIfMacroId(SM.getImmediateExpansionRange(Loc).getBegin(), SM);
+ assert(!Loc.isMacroID() &&
+ "SourceLocation must not be a macro ID after recursive expansion");
+ return Loc;
+}
+
+SourceLocation UseTrailingReturnTypeCheck::findTrailingReturnTypeSourceLocation(
+ const FunctionDecl &F, const FunctionTypeLoc &FTL, const ASTContext &Ctx,
+ const SourceManager &SM, const LangOptions &LangOpts) {
+ // We start with the location of the closing parenthesis.
+ SourceRange ExceptionSpecRange = F.getExceptionSpecSourceRange();
+ if (ExceptionSpecRange.isValid())
+ return Lexer::getLocForEndOfToken(ExceptionSpecRange.getEnd(), 0, SM,
+ LangOpts);
+
+ // If the function argument list ends inside of a macro, it is dangerous to
+ // start lexing from here - bail out.
+ SourceLocation ClosingParen = FTL.getRParenLoc();
+ if (ClosingParen.isMacroID())
+ return {};
+
+ SourceLocation Result =
+ Lexer::getLocForEndOfToken(ClosingParen, 0, SM, LangOpts);
+
+ // Skip subsequent CV and ref qualifiers.
+ std::pair<FileID, unsigned> Loc = SM.getDecomposedLoc(Result);
+ StringRef File = SM.getBufferData(Loc.first);
+ const char *TokenBegin = File.data() + Loc.second;
+ Lexer Lexer(SM.getLocForStartOfFile(Loc.first), LangOpts, File.begin(),
+ TokenBegin, File.end());
+ Token T;
+ while (!Lexer.LexFromRawLexer(T)) {
+ if (T.is(tok::raw_identifier)) {
+ IdentifierInfo &Info = Ctx.Idents.get(
+ StringRef(SM.getCharacterData(T.getLocation()), T.getLength()));
+ T.setIdentifierInfo(&Info);
+ T.setKind(Info.getTokenID());
+ }
+
+ if (T.isOneOf(tok::amp, tok::ampamp, tok::kw_const, tok::kw_volatile,
+ tok::kw_restrict)) {
+ Result = T.getEndLoc();
+ continue;
+ }
+ break;
+ }
+ return Result;
+}
+
+static bool IsCVR(Token T) {
+ return T.isOneOf(tok::kw_const, tok::kw_volatile, tok::kw_restrict);
+}
+
+static bool IsSpecifier(Token T) {
+ return T.isOneOf(tok::kw_constexpr, tok::kw_inline, tok::kw_extern,
+ tok::kw_static, tok::kw_friend, tok::kw_virtual);
+}
+
+static llvm::Optional<ClassifiedToken>
+classifyToken(const FunctionDecl &F, Preprocessor &PP, Token Tok) {
+ ClassifiedToken CT;
+ CT.T = Tok;
+ CT.isQualifier = true;
+ CT.isSpecifier = true;
+ bool ContainsQualifiers = false;
+ bool ContainsSpecifiers = false;
+ bool ContainsSomethingElse = false;
+
+ Token End;
+ End.setKind(tok::eof);
+ SmallVector<Token, 2> Stream{Tok, End};
+ PP.EnterTokenStream(Stream, false);
+ while (true) {
+ Token T;
+ PP.Lex(T);
+ if (T.is(tok::eof))
+ break;
+
+ bool Qual = IsCVR(T);
+ bool Spec = IsSpecifier(T);
+ CT.isQualifier &= Qual;
+ CT.isSpecifier &= Spec;
+ ContainsQualifiers |= Qual;
+ ContainsSpecifiers |= Spec;
+ ContainsSomethingElse |= !Qual && !Spec;
+ }
+
+ // If the Token/Macro contains more than one type of tokens, we would need
+ // to split the macro in order to move parts to the trailing return type.
+ if (ContainsQualifiers + ContainsSpecifiers + ContainsSomethingElse > 1)
+ return llvm::None;
+
+ return CT;
+}
+
+llvm::Optional<SmallVector<ClassifiedToken, 8>>
+UseTrailingReturnTypeCheck::classifyTokensBeforeFunctionName(
+ const FunctionDecl &F, const ASTContext &Ctx, const SourceManager &SM,
+ const LangOptions &LangOpts) {
+ SourceLocation BeginF = expandIfMacroId(F.getBeginLoc(), SM);
+ SourceLocation BeginNameF = expandIfMacroId(F.getLocation(), SM);
+
+ // Create tokens for everything before the name of the function.
+ std::pair<FileID, unsigned> Loc = SM.getDecomposedLoc(BeginF);
+ StringRef File = SM.getBufferData(Loc.first);
+ const char *TokenBegin = File.data() + Loc.second;
+ Lexer Lexer(SM.getLocForStartOfFile(Loc.first), LangOpts, File.begin(),
+ TokenBegin, File.end());
+ Token T;
+ SmallVector<ClassifiedToken, 8> ClassifiedTokens;
+ while (!Lexer.LexFromRawLexer(T) &&
+ SM.isBeforeInTranslationUnit(T.getLocation(), BeginNameF)) {
+ if (T.is(tok::raw_identifier)) {
+ IdentifierInfo &Info = Ctx.Idents.get(
+ StringRef(SM.getCharacterData(T.getLocation()), T.getLength()));
+
+ if (Info.hasMacroDefinition()) {
+ const MacroInfo *MI = PP->getMacroInfo(&Info);
+ if (!MI || MI->isFunctionLike()) {
+ // Cannot handle function style macros.
+ diag(F.getLocation(), Message);
+ return llvm::None;
+ }
+ }
+
+ T.setIdentifierInfo(&Info);
+ T.setKind(Info.getTokenID());
+ }
+
+ if (llvm::Optional<ClassifiedToken> CT = classifyToken(F, *PP, T))
+ ClassifiedTokens.push_back(*CT);
+ else {
+ diag(F.getLocation(), Message);
+ return llvm::None;
+ }
+ }
+
+ return ClassifiedTokens;
+}
+
+static bool hasAnyNestedLocalQualifiers(QualType Type) {
+ bool Result = Type.hasLocalQualifiers();
+ if (Type->isPointerType())
+ Result = Result || hasAnyNestedLocalQualifiers(
+ Type->castAs<PointerType>()->getPointeeType());
+ if (Type->isReferenceType())
+ Result = Result || hasAnyNestedLocalQualifiers(
+ Type->castAs<ReferenceType>()->getPointeeType());
+ return Result;
+}
+
+SourceRange UseTrailingReturnTypeCheck::findReturnTypeAndCVSourceRange(
+ const FunctionDecl &F, const ASTContext &Ctx, const SourceManager &SM,
+ const LangOptions &LangOpts) {
+
+ // We start with the range of the return type and expand to neighboring
+ // qualifiers (const, volatile and restrict).
+ SourceRange ReturnTypeRange = F.getReturnTypeSourceRange();
+ if (ReturnTypeRange.isInvalid()) {
+ // Happens if e.g. clang cannot resolve all includes and the return type is
+ // unknown.
+ diag(F.getLocation(), Message);
+ return {};
+ }
+
+ // If the return type has no local qualifiers, it's source range is accurate.
+ if (!hasAnyNestedLocalQualifiers(F.getReturnType()))
+ return ReturnTypeRange;
+
+ // Include qualifiers to the left and right of the return type.
+ llvm::Optional<SmallVector<ClassifiedToken, 8>> MaybeTokens =
+ classifyTokensBeforeFunctionName(F, Ctx, SM, LangOpts);
+ if (!MaybeTokens)
+ return {};
+ const SmallVector<ClassifiedToken, 8> &Tokens = *MaybeTokens;
+
+ ReturnTypeRange.setBegin(expandIfMacroId(ReturnTypeRange.getBegin(), SM));
+ ReturnTypeRange.setEnd(expandIfMacroId(ReturnTypeRange.getEnd(), SM));
+
+ bool ExtendedLeft = false;
+ for (size_t I = 0; I < Tokens.size(); I++) {
+ // If we found the beginning of the return type, include left qualifiers.
+ if (!SM.isBeforeInTranslationUnit(Tokens[I].T.getLocation(),
+ ReturnTypeRange.getBegin()) &&
+ !ExtendedLeft) {
+ assert(I <= size_t(std::numeric_limits<int>::max()) &&
+ "Integer overflow detected");
+ for (int J = static_cast<int>(I) - 1; J >= 0 && Tokens[J].isQualifier;
+ J--)
+ ReturnTypeRange.setBegin(Tokens[J].T.getLocation());
+ ExtendedLeft = true;
+ }
+ // If we found the end of the return type, include right qualifiers.
+ if (SM.isBeforeInTranslationUnit(ReturnTypeRange.getEnd(),
+ Tokens[I].T.getLocation())) {
+ for (size_t J = I; J < Tokens.size() && Tokens[J].isQualifier; J++)
+ ReturnTypeRange.setEnd(Tokens[J].T.getLocation());
+ break;
+ }
+ }
+
+ assert(!ReturnTypeRange.getBegin().isMacroID() &&
+ "Return type source range begin must not be a macro");
+ assert(!ReturnTypeRange.getEnd().isMacroID() &&
+ "Return type source range end must not be a macro");
+ return ReturnTypeRange;
+}
+
+bool UseTrailingReturnTypeCheck::keepSpecifiers(
+ std::string &ReturnType, std::string &Auto, SourceRange ReturnTypeCVRange,
+ const FunctionDecl &F, const FriendDecl *Fr, const ASTContext &Ctx,
+ const SourceManager &SM, const LangOptions &LangOpts) {
+ // Check if there are specifiers inside the return type. E.g. unsigned
+ // inline int.
+ const auto *M = dyn_cast<CXXMethodDecl>(&F);
+ if (!F.isConstexpr() && !F.isInlineSpecified() &&
+ F.getStorageClass() != SC_Extern && F.getStorageClass() != SC_Static &&
+ !Fr && !(M && M->isVirtualAsWritten()))
+ return true;
+
+ // Tokenize return type. If it contains macros which contain a mix of
+ // qualifiers, specifiers and types, give up.
+ llvm::Optional<SmallVector<ClassifiedToken, 8>> MaybeTokens =
+ classifyTokensBeforeFunctionName(F, Ctx, SM, LangOpts);
+ if (!MaybeTokens)
+ return false;
+
+ // Find specifiers, remove them from the return type, add them to 'auto'.
+ unsigned int ReturnTypeBeginOffset =
+ SM.getDecomposedLoc(ReturnTypeCVRange.getBegin()).second;
+ size_t InitialAutoLength = Auto.size();
+ unsigned int DeletedChars = 0;
+ for (ClassifiedToken CT : *MaybeTokens) {
+ if (SM.isBeforeInTranslationUnit(CT.T.getLocation(),
+ ReturnTypeCVRange.getBegin()) ||
+ SM.isBeforeInTranslationUnit(ReturnTypeCVRange.getEnd(),
+ CT.T.getLocation()))
+ continue;
+ if (!CT.isSpecifier)
+ continue;
+
+ // Add the token to 'auto' and remove it from the return type, including
+ // any whitespace following the token.
+ unsigned int TOffset = SM.getDecomposedLoc(CT.T.getLocation()).second;
+ assert(TOffset >= ReturnTypeBeginOffset &&
+ "Token location must be after the beginning of the return type");
+ unsigned int TOffsetInRT = TOffset - ReturnTypeBeginOffset - DeletedChars;
+ unsigned int TLengthWithWS = CT.T.getLength();
+ while (TOffsetInRT + TLengthWithWS < ReturnType.size() &&
+ std::isspace(ReturnType[TOffsetInRT + TLengthWithWS]))
+ TLengthWithWS++;
+ std::string Specifier = ReturnType.substr(TOffsetInRT, TLengthWithWS);
+ if (!std::isspace(Specifier.back()))
+ Specifier.push_back(' ');
+ Auto.insert(Auto.size() - InitialAutoLength, Specifier);
+ ReturnType.erase(TOffsetInRT, TLengthWithWS);
+ DeletedChars += TLengthWithWS;
+ }
+
+ return true;
+}
+
+void UseTrailingReturnTypeCheck::registerMatchers(MatchFinder *Finder) {
+ if (!getLangOpts().CPlusPlus11)
+ return;
+
+ auto F = functionDecl(unless(anyOf(hasTrailingReturn(), returns(voidType()),
+ returns(autoType()), cxxConversionDecl(),
+ cxxMethodDecl(isImplicit()))))
+ .bind("Func");
+
+ Finder->addMatcher(F, this);
+ Finder->addMatcher(friendDecl(hasDescendant(F)).bind("Friend"), this);
+}
+
+void UseTrailingReturnTypeCheck::registerPPCallbacks(
+ const SourceManager &SM, Preprocessor *PP, Preprocessor *ModuleExpanderPP) {
+ this->PP = PP;
+}
+
+void UseTrailingReturnTypeCheck::check(const MatchFinder::MatchResult &Result) {
+ assert(PP && "Expected registerPPCallbacks() to have been called before so "
+ "preprocessor is available");
+
+ const auto *F = Result.Nodes.getNodeAs<FunctionDecl>("Func");
+ const auto *Fr = Result.Nodes.getNodeAs<FriendDecl>("Friend");
+ assert(F && "Matcher is expected to find only FunctionDecls");
+
+ if (F->getLocation().isInvalid())
+ return;
+
+ // TODO: implement those
+ if (F->getDeclaredReturnType()->isFunctionPointerType() ||
+ F->getDeclaredReturnType()->isMemberFunctionPointerType() ||
+ F->getDeclaredReturnType()->isMemberPointerType() ||
+ F->getDeclaredReturnType()->getAs<DecltypeType>() != nullptr) {
+ diag(F->getLocation(), Message);
+ return;
+ }
+
+ const ASTContext &Ctx = *Result.Context;
+ const SourceManager &SM = *Result.SourceManager;
+ const LangOptions &LangOpts = getLangOpts();
+
+ const TypeSourceInfo *TSI = F->getTypeSourceInfo();
+ if (!TSI)
+ return;
+
+ FunctionTypeLoc FTL =
+ TSI->getTypeLoc().IgnoreParens().getAs<FunctionTypeLoc>();
+ if (!FTL) {
+ // FIXME: This may happen if we have __attribute__((...)) on the function.
+ // We abort for now. Remove this when the function type location gets
+ // available in clang.
+ diag(F->getLocation(), Message);
+ return;
+ }
+
+ SourceLocation InsertionLoc =
+ findTrailingReturnTypeSourceLocation(*F, FTL, Ctx, SM, LangOpts);
+ if (InsertionLoc.isInvalid()) {
+ diag(F->getLocation(), Message);
+ return;
+ }
+
+ // Using the declared return type via F->getDeclaredReturnType().getAsString()
+ // discards user formatting and order of const, volatile, type, whitespace,
+ // space before & ... .
+ SourceRange ReturnTypeCVRange =
+ findReturnTypeAndCVSourceRange(*F, Ctx, SM, LangOpts);
+ if (ReturnTypeCVRange.isInvalid())
+ return;
+
+ // Check if unqualified names in the return type conflict with other entities
+ // after the rewrite.
+ // FIXME: this could be done better, by performing a lookup of all
+ // unqualified names in the return type in the scope of the function. If the
+ // lookup finds a different entity than the original entity identified by the
+ // name, then we can either not perform a rewrite or explicitely qualify the
+ // entity. Such entities could be function parameter names, (inherited) class
+ // members, template parameters, etc.
+ UnqualNameVisitor UNV{*F, SM};
+ UNV.TraverseTypeLoc(FTL.getReturnLoc());
+ if (UNV.Collision) {
+ diag(F->getLocation(), Message);
+ return;
+ }
+
+ SourceLocation ReturnTypeEnd =
+ Lexer::getLocForEndOfToken(ReturnTypeCVRange.getEnd(), 0, SM, LangOpts);
+ StringRef CharAfterReturnType = Lexer::getSourceText(
+ CharSourceRange::getCharRange(ReturnTypeEnd,
+ ReturnTypeEnd.getLocWithOffset(1)),
+ SM, LangOpts);
+ bool NeedSpaceAfterAuto =
+ CharAfterReturnType.empty() || !std::isspace(CharAfterReturnType[0]);
+
+ std::string Auto = NeedSpaceAfterAuto ? "auto " : "auto";
+ std::string ReturnType = tooling::fixit::getText(ReturnTypeCVRange, Ctx);
+ keepSpecifiers(ReturnType, Auto, ReturnTypeCVRange, *F, Fr, Ctx, SM,
+ LangOpts);
+
+ diag(F->getLocation(), Message)
+ << FixItHint::CreateReplacement(ReturnTypeCVRange, Auto)
+ << FixItHint::CreateInsertion(InsertionLoc, " -> " + ReturnType);
+}
+
+} // namespace modernize
+} // namespace tidy
+} // namespace clang
diff --git a/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h b/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h
new file mode 100644
index 00000000000..565000d41a7
--- /dev/null
+++ b/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h
@@ -0,0 +1,62 @@
+//===--- UseTrailingReturnTypeCheck.h - clang-tidy---------------*- C++ -*-===//
+//
+// The LLVM Compiler Infrastructure
+//
+// This file is distributed under the University of Illinois Open Source
+// License. See LICENSE.TXT for details.
+//
+//===----------------------------------------------------------------------===//
+
+#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MODERNIZE_USETRAILINGRETURNTYPECHECK_H
+#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MODERNIZE_USETRAILINGRETURNTYPECHECK_H
+
+#include "../ClangTidy.h"
+
+namespace clang {
+namespace tidy {
+namespace modernize {
+
+struct ClassifiedToken {
+ Token T;
+ bool isQualifier;
+ bool isSpecifier;
+};
+
+/// Rewrites function signatures to use a trailing return type.
+///
+/// For the user-facing documentation see:
+/// http://clang.llvm.org/extra/clang-tidy/checks/modernize-use-trailing-type-return.html
+class UseTrailingReturnTypeCheck : public ClangTidyCheck {
+public:
+ UseTrailingReturnTypeCheck(StringRef Name, ClangTidyContext *Context)
+ : ClangTidyCheck(Name, Context) {}
+ void registerMatchers(ast_matchers::MatchFinder *Finder) override;
+ void registerPPCallbacks(const SourceManager &SM, Preprocessor *PP,
+ Preprocessor *ModuleExpanderPP) override;
+ void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
+
+private:
+ Preprocessor *PP = nullptr;
+
+ SourceLocation findTrailingReturnTypeSourceLocation(
+ const FunctionDecl &F, const FunctionTypeLoc &FTL, const ASTContext &Ctx,
+ const SourceManager &SM, const LangOptions &LangOpts);
+ llvm::Optional<SmallVector<ClassifiedToken, 8>>
+ classifyTokensBeforeFunctionName(const FunctionDecl &F, const ASTContext &Ctx,
+ const SourceManager &SM,
+ const LangOptions &LangOpts);
+ SourceRange findReturnTypeAndCVSourceRange(const FunctionDecl &F,
+ const ASTContext &Ctx,
+ const SourceManager &SM,
+ const LangOptions &LangOpts);
+ bool keepSpecifiers(std::string &ReturnType, std::string &Auto,
+ SourceRange ReturnTypeCVRange, const FunctionDecl &F,
+ const FriendDecl *Fr, const ASTContext &Ctx,
+ const SourceManager &SM, const LangOptions &LangOpts);
+};
+
+} // namespace modernize
+} // namespace tidy
+} // namespace clang
+
+#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_MODERNIZE_USETRAILINGRETURNTYPECHECK_H
OpenPOWER on IntegriCloud