Author: Piotr Zegar
Date: 2024-06-10T19:07:49Z
New Revision: bc70c29558c6ecb53e61cc8d668768e919e81bde

URL: 
https://github.com/llvm/llvm-project/commit/bc70c29558c6ecb53e61cc8d668768e919e81bde
DIFF: 
https://github.com/llvm/llvm-project/commit/bc70c29558c6ecb53e61cc8d668768e919e81bde.diff

LOG: [clang-tidy][DOC] Update doc for Clang Static Analyzer checks

Fix gen-static-analyzer-docs.py script.
Commit doc for:
 - clang-analyzer-cplusplus.ArrayDelete
 - clang-analyzer-security.SetgidSetuidOrder
 - clang-analyzer-unix.Stream

Added: 
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.ArrayDelete.rst
    
clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
    clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Stream.rst

Modified: 
    clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py
    clang-tools-extra/docs/clang-tidy/checks/list.rst

Removed: 
    


################################################################################
diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.ArrayDelete.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.ArrayDelete.rst
new file mode 100644
index 0000000000000..98147aaaa6883
--- /dev/null
+++ 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/cplusplus.ArrayDelete.rst
@@ -0,0 +1,14 @@
+.. title:: clang-tidy - clang-analyzer-cplusplus.ArrayDelete
+.. meta::
+   :http-equiv=refresh: 
5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-arraydelete
+
+clang-analyzer-cplusplus.ArrayDelete
+====================================
+
+Reports destructions of arrays of polymorphic objects that are destructed as
+their base class.
+
+The `clang-analyzer-cplusplus.ArrayDelete` check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-arraydelete>`_
+for more information.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
new file mode 100644
index 0000000000000..82f22b11f77fb
--- /dev/null
+++ 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/security.SetgidSetuidOrder.rst
@@ -0,0 +1,10 @@
+.. title:: clang-tidy - clang-analyzer-security.SetgidSetuidOrder
+
+clang-analyzer-security.SetgidSetuidOrder
+=========================================
+
+Warn on possible reversed order of 'setgid(getgid()))' and 'setuid(getuid())'
+(CERT: POS36-C).
+
+The clang-analyzer-security.SetgidSetuidOrder check is an alias of
+Clang Static Analyzer security.SetgidSetuidOrder.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Stream.rst 
b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Stream.rst
new file mode 100644
index 0000000000000..82a8bdcaefce7
--- /dev/null
+++ b/clang-tools-extra/docs/clang-tidy/checks/clang-analyzer/unix.Stream.rst
@@ -0,0 +1,13 @@
+.. title:: clang-tidy - clang-analyzer-unix.Stream
+.. meta::
+   :http-equiv=refresh: 
5;URL=https://clang.llvm.org/docs/analyzer/checkers.html#unix-stream
+
+clang-analyzer-unix.Stream
+==========================
+
+Check stream handling functions.
+
+The `clang-analyzer-unix.Stream` check is an alias, please see
+`Clang Static Analyzer Available Checkers
+<https://clang.llvm.org/docs/analyzer/checkers.html#unix-stream>`_
+for more information.

diff  --git 
a/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py 
b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py
index 8408ef5123ab3..fba1592c7c1c7 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py
+++ b/clang-tools-extra/docs/clang-tidy/checks/gen-static-analyzer-docs.py
@@ -130,7 +130,7 @@ def generate_documentation(checker, has_documentation):
 def update_documentation_list(checkers):
     with open(os.path.join(__location__, "list.rst"), "r+") as f:
         f_text = f.read()
-        check_text = f_text.split(".. csv-table:: Aliases..\n")[1]
+        check_text = f_text.split(':header: "Name", "Redirect", "Offers 
fixes"\n')[1]
         checks = [x for x in check_text.split("\n") if ":header:" not in x and 
x]
         old_check_text = "\n".join(checks)
         checks = [x for x in checks if "clang-analyzer-" not in x]

diff  --git a/clang-tools-extra/docs/clang-tidy/checks/list.rst 
b/clang-tools-extra/docs/clang-tidy/checks/list.rst
index 87d3db20f7684..a698cecc0825c 100644
--- a/clang-tools-extra/docs/clang-tidy/checks/list.rst
+++ b/clang-tools-extra/docs/clang-tidy/checks/list.rst
@@ -443,6 +443,7 @@ Check aliases
    :doc:`clang-analyzer-core.uninitialized.CapturedBlockVariable 
<clang-analyzer/core.uninitialized.CapturedBlockVariable>`, `Clang Static 
Analyzer core.uninitialized.CapturedBlockVariable 
<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-capturedblockvariable>`_,
    :doc:`clang-analyzer-core.uninitialized.NewArraySize 
<clang-analyzer/core.uninitialized.NewArraySize>`, `Clang Static Analyzer 
core.uninitialized.NewArraySize 
<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-newarraysize>`_,
    :doc:`clang-analyzer-core.uninitialized.UndefReturn 
<clang-analyzer/core.uninitialized.UndefReturn>`, `Clang Static Analyzer 
core.uninitialized.UndefReturn 
<https://clang.llvm.org/docs/analyzer/checkers.html#core-uninitialized-undefreturn>`_,
+   :doc:`clang-analyzer-cplusplus.ArrayDelete 
<clang-analyzer/cplusplus.ArrayDelete>`, `Clang Static Analyzer 
cplusplus.ArrayDelete 
<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-arraydelete>`_,
    :doc:`clang-analyzer-cplusplus.InnerPointer 
<clang-analyzer/cplusplus.InnerPointer>`, `Clang Static Analyzer 
cplusplus.InnerPointer 
<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-innerpointer>`_,
    :doc:`clang-analyzer-cplusplus.Move <clang-analyzer/cplusplus.Move>`, Clang 
Static Analyzer cplusplus.Move,
    :doc:`clang-analyzer-cplusplus.NewDelete 
<clang-analyzer/cplusplus.NewDelete>`, `Clang Static Analyzer 
cplusplus.NewDelete 
<https://clang.llvm.org/docs/analyzer/checkers.html#cplusplus-newdelete>`_,
@@ -497,6 +498,7 @@ Check aliases
    :doc:`clang-analyzer-osx.coreFoundation.containers.OutOfBounds 
<clang-analyzer/osx.coreFoundation.containers.OutOfBounds>`, `Clang Static 
Analyzer osx.coreFoundation.containers.OutOfBounds 
<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-outofbounds>`_,
    :doc:`clang-analyzer-osx.coreFoundation.containers.PointerSizedValues 
<clang-analyzer/osx.coreFoundation.containers.PointerSizedValues>`, `Clang 
Static Analyzer osx.coreFoundation.containers.PointerSizedValues 
<https://clang.llvm.org/docs/analyzer/checkers.html#osx-corefoundation-containers-pointersizedvalues>`_,
    :doc:`clang-analyzer-security.FloatLoopCounter 
<clang-analyzer/security.FloatLoopCounter>`, `Clang Static Analyzer 
security.FloatLoopCounter 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-floatloopcounter>`_,
+   :doc:`clang-analyzer-security.SetgidSetuidOrder 
<clang-analyzer/security.SetgidSetuidOrder>`, Clang Static Analyzer 
security.SetgidSetuidOrder,
    :doc:`clang-analyzer-security.cert.env.InvalidPtr 
<clang-analyzer/security.cert.env.InvalidPtr>`, `Clang Static Analyzer 
security.cert.env.InvalidPtr 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-cert-env-invalidptr>`_,
    :doc:`clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling 
<clang-analyzer/security.insecureAPI.DeprecatedOrUnsafeBufferHandling>`, `Clang 
Static Analyzer security.insecureAPI.DeprecatedOrUnsafeBufferHandling 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-deprecatedorunsafebufferhandling>`_,
    :doc:`clang-analyzer-security.insecureAPI.UncheckedReturn 
<clang-analyzer/security.insecureAPI.UncheckedReturn>`, `Clang Static Analyzer 
security.insecureAPI.UncheckedReturn 
<https://clang.llvm.org/docs/analyzer/checkers.html#security-insecureapi-uncheckedreturn>`_,
@@ -517,6 +519,7 @@ Check aliases
    :doc:`clang-analyzer-unix.MallocSizeof <clang-analyzer/unix.MallocSizeof>`, 
`Clang Static Analyzer unix.MallocSizeof 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-mallocsizeof>`_,
    :doc:`clang-analyzer-unix.MismatchedDeallocator 
<clang-analyzer/unix.MismatchedDeallocator>`, `Clang Static Analyzer 
unix.MismatchedDeallocator 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator>`_,
    :doc:`clang-analyzer-unix.StdCLibraryFunctions 
<clang-analyzer/unix.StdCLibraryFunctions>`, `Clang Static Analyzer 
unix.StdCLibraryFunctions 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-stdclibraryfunctions>`_,
+   :doc:`clang-analyzer-unix.Stream <clang-analyzer/unix.Stream>`, `Clang 
Static Analyzer unix.Stream 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-stream>`_,
    :doc:`clang-analyzer-unix.Vfork <clang-analyzer/unix.Vfork>`, `Clang Static 
Analyzer unix.Vfork 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-vfork>`_,
    :doc:`clang-analyzer-unix.cstring.BadSizeArg 
<clang-analyzer/unix.cstring.BadSizeArg>`, `Clang Static Analyzer 
unix.cstring.BadSizeArg 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-badsizearg>`_,
    :doc:`clang-analyzer-unix.cstring.NullArg 
<clang-analyzer/unix.cstring.NullArg>`, `Clang Static Analyzer 
unix.cstring.NullArg 
<https://clang.llvm.org/docs/analyzer/checkers.html#unix-cstring-nullarg>`_,


        
_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to