From c882fab836a4ca050666545f9fb9bdc7fee082a7 Mon Sep 17 00:00:00 2001 From: Victor Chernyakin Date: Mon, 22 Sep 2025 08:20:30 -0700 Subject: [PATCH 1/2] [clang-tidy][NFC] http -> https --- clang-tools-extra/clang-tidy/ClangTidy.cpp | 2 +- clang-tools-extra/clang-tidy/ClangTidyDiagnosticConsumer.cpp | 2 +- clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h | 2 +- clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h | 2 +- clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h | 2 +- .../clang-tidy/abseil/DurationConversionCastCheck.h | 2 +- clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h | 2 +- .../clang-tidy/abseil/DurationFactoryFloatCheck.h | 2 +- .../clang-tidy/abseil/DurationFactoryScaleCheck.h | 2 +- .../clang-tidy/abseil/DurationSubtractionCheck.h | 2 +- .../clang-tidy/abseil/DurationUnnecessaryConversionCheck.h | 2 +- .../clang-tidy/abseil/FasterStrsplitDelimiterCheck.h | 2 +- .../clang-tidy/abseil/NoInternalDependenciesCheck.h | 2 +- clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h | 2 +- .../clang-tidy/abseil/RedundantStrcatCallsCheck.h | 2 +- clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h | 2 +- .../clang-tidy/abseil/StringFindStrContainsCheck.h | 2 +- clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h | 2 +- clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h | 2 +- .../clang-tidy/abseil/UpgradeDurationConversionsCheck.h | 2 +- clang-tools-extra/clang-tidy/add_new_check.py | 2 +- .../clang-tidy/altera/IdDependentBackwardBranchCheck.h | 2 +- .../clang-tidy/altera/KernelNameRestrictionCheck.h | 2 +- .../clang-tidy/altera/SingleWorkItemBarrierCheck.h | 2 +- clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h | 2 +- clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h | 2 +- clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h | 2 +- clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h | 2 +- clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h | 2 +- clang-tools-extra/clang-tidy/android/CloexecDupCheck.h | 2 +- .../clang-tidy/android/CloexecEpollCreate1Check.h | 2 +- .../clang-tidy/android/CloexecEpollCreateCheck.h | 2 +- clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h | 2 +- .../clang-tidy/android/CloexecInotifyInit1Check.h | 2 +- .../clang-tidy/android/CloexecInotifyInitCheck.h | 2 +- .../clang-tidy/android/CloexecMemfdCreateCheck.h | 2 +- clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h | 2 +- clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h | 2 +- clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h | 2 +- clang-tools-extra/clang-tidy/boost/UseRangesCheck.h | 2 +- clang-tools-extra/clang-tidy/boost/UseToStringCheck.h | 2 +- .../clang-tidy/bugprone/AssignmentInIfConditionCheck.h | 2 +- .../clang-tidy/bugprone/BadSignalToKillThreadCheck.h | 2 +- .../clang-tidy/bugprone/BitwisePointerCastCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h | 2 +- .../clang-tidy/bugprone/CapturingThisInMemberVariableCheck.h | 2 +- .../clang-tidy/bugprone/CastingThroughVoidCheck.h | 2 +- .../clang-tidy/bugprone/ChainedComparisonCheck.h | 2 +- .../bugprone/ComparePointerToMemberVirtualFunctionCheck.h | 2 +- .../clang-tidy/bugprone/CopyConstructorInitCheck.h | 2 +- .../clang-tidy/bugprone/CrtpConstructorAccessibilityCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h | 2 +- .../bugprone/DerivedMethodShadowingBaseMethodCheck.h | 2 +- .../clang-tidy/bugprone/EasilySwappableParametersCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/EmptyCatchCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h | 2 +- .../clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h | 2 +- .../clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h | 2 +- .../bugprone/ImplicitWideningOfMultiplicationResultCheck.h | 2 +- .../clang-tidy/bugprone/IncDecInConditionsCheck.h | 2 +- .../clang-tidy/bugprone/IncorrectEnableIfCheck.h | 2 +- .../clang-tidy/bugprone/IncorrectEnableSharedFromThisCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h | 2 +- .../bugprone/InvalidEnumDefaultInitializationCheck.h | 2 +- .../clang-tidy/bugprone/LambdaFunctionNameCheck.h | 2 +- .../clang-tidy/bugprone/MisleadingSetterOfReferenceCheck.h | 2 +- .../bugprone/MisplacedOperatorInStrlenInAllocCheck.h | 2 +- .../bugprone/MisplacedPointerArithmeticInAllocCheck.h | 2 +- .../clang-tidy/bugprone/MisplacedWideningCastCheck.h | 2 +- .../clang-tidy/bugprone/MoveForwardingReferenceCheck.h | 2 +- .../bugprone/MultiLevelImplicitPointerConversionCheck.h | 2 +- .../clang-tidy/bugprone/MultipleNewInOneExpressionCheck.h | 2 +- .../clang-tidy/bugprone/MultipleStatementMacroCheck.h | 2 +- .../clang-tidy/bugprone/NarrowingConversionsCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h | 2 +- .../clang-tidy/bugprone/NonZeroEnumToBoolConversionCheck.h | 2 +- .../bugprone/NondeterministicPointerIterationOrderCheck.h | 2 +- .../clang-tidy/bugprone/NotNullTerminatedResultCheck.h | 2 +- .../clang-tidy/bugprone/OptionalValueConversionCheck.h | 2 +- .../clang-tidy/bugprone/ParentVirtualCallCheck.h | 2 +- .../bugprone/PointerArithmeticOnPolymorphicObjectCheck.h | 2 +- .../clang-tidy/bugprone/RedundantBranchConditionCheck.h | 2 +- .../clang-tidy/bugprone/ReservedIdentifierCheck.h | 2 +- .../clang-tidy/bugprone/ReturnConstRefFromParameterCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h | 2 +- .../clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/StandaloneEmptyCheck.h | 2 +- .../clang-tidy/bugprone/StringConstructorCheck.h | 2 +- .../clang-tidy/bugprone/StringIntegerAssignmentCheck.h | 2 +- .../clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h | 2 +- .../clang-tidy/bugprone/StringviewNullptrCheck.h | 2 +- .../clang-tidy/bugprone/SuspiciousEnumUsageCheck.h | 2 +- .../clang-tidy/bugprone/SuspiciousIncludeCheck.h | 2 +- .../clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h | 2 +- .../clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h | 2 +- .../clang-tidy/bugprone/SuspiciousMissingCommaCheck.h | 2 +- .../clang-tidy/bugprone/SuspiciousReallocUsageCheck.h | 2 +- .../clang-tidy/bugprone/SuspiciousSemicolonCheck.h | 2 +- .../clang-tidy/bugprone/SuspiciousStringCompareCheck.h | 2 +- .../clang-tidy/bugprone/SuspiciousStringviewDataUsageCheck.h | 2 +- .../clang-tidy/bugprone/SwitchMissingDefaultCaseCheck.h | 2 +- .../clang-tidy/bugprone/TaggedUnionMemberCountCheck.h | 2 +- .../clang-tidy/bugprone/TerminatingContinueCheck.h | 2 +- .../clang-tidy/bugprone/ThrowKeywordMissingCheck.h | 2 +- .../clang-tidy/bugprone/ThrowingStaticInitializationCheck.h | 2 +- .../clang-tidy/bugprone/TooSmallLoopVariableCheck.h | 2 +- .../clang-tidy/bugprone/UncheckedOptionalAccessCheck.h | 2 +- .../bugprone/UncheckedStringToNumberConversionCheck.h | 2 +- .../clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h | 2 +- .../clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h | 2 +- .../clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h | 2 +- .../clang-tidy/bugprone/UnintendedCharOstreamOutputCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/UnsafeFunctionsCheck.h | 2 +- .../clang-tidy/bugprone/UnusedLocalNonTrivialVariableCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h | 2 +- .../clang-tidy/bugprone/UnusedReturnValueCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h | 2 +- clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h | 2 +- clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h | 2 +- .../clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h | 2 +- clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h | 2 +- clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h | 2 +- clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h | 2 +- .../clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h | 2 +- .../clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h | 2 +- clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h | 2 +- clang-tools-extra/clang-tidy/concurrency/MtUnsafeCheck.h | 2 +- .../concurrency/ThreadCanceltypeAsynchronousCheck.h | 2 +- .../cppcoreguidelines/AvoidConstOrRefDataMembersCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/AvoidDoWhileCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/AvoidGotoCheck.h | 2 +- .../cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h | 2 +- .../AvoidReferenceCoroutineParametersCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/InitVariablesCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/MacroUsageCheck.h | 2 +- .../cppcoreguidelines/MisleadingCaptureDefaultByValueCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/MissingStdForwardCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/NoMallocCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/NoSuspendWithLockCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/OwningMemoryCheck.h | 2 +- .../cppcoreguidelines/PreferMemberInitializerCheck.h | 2 +- .../cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h | 2 +- .../ProBoundsAvoidUncheckedContainerAccess.h | 2 +- .../cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h | 2 +- .../cppcoreguidelines/ProBoundsPointerArithmeticCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h | 2 +- .../cppcoreguidelines/ProTypeReinterpretCastCheck.h | 2 +- .../cppcoreguidelines/ProTypeStaticCastDowncastCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h | 2 +- .../cppcoreguidelines/RvalueReferenceParamNotMovedCheck.h | 2 +- clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h | 2 +- .../cppcoreguidelines/SpecialMemberFunctionsCheck.h | 2 +- .../clang-tidy/cppcoreguidelines/UseEnumClassCheck.h | 2 +- .../cppcoreguidelines/VirtualClassDestructorCheck.h | 2 +- clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h | 2 +- .../clang-tidy/darwin/DispatchOnceNonstaticCheck.h | 2 +- .../clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h | 2 +- .../clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h | 2 +- .../clang-tidy/fuchsia/MultipleInheritanceCheck.h | 2 +- .../clang-tidy/fuchsia/OverloadedOperatorCheck.h | 2 +- .../clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h | 2 +- clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h | 2 +- .../clang-tidy/fuchsia/VirtualInheritanceCheck.h | 2 +- clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h | 2 +- clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h | 2 +- .../clang-tidy/google/AvoidThrowingObjCExceptionCheck.h | 2 +- .../clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h | 2 +- clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h | 2 +- .../clang-tidy/google/ExplicitConstructorCheck.h | 2 +- clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h | 2 +- clang-tools-extra/clang-tidy/google/FloatTypesCheck.h | 2 +- clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h | 2 +- .../clang-tidy/google/GlobalNamesInHeadersCheck.h | 2 +- .../clang-tidy/google/GlobalVariableDeclarationCheck.h | 2 +- clang-tools-extra/clang-tidy/google/IntegerTypesCheck.cpp | 2 +- clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h | 2 +- clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h | 2 +- clang-tools-extra/clang-tidy/google/TodoCommentCheck.h | 2 +- .../clang-tidy/google/UnnamedNamespaceInHeaderCheck.h | 2 +- clang-tools-extra/clang-tidy/hicpp/ExceptionBaseclassCheck.h | 2 +- clang-tools-extra/clang-tidy/hicpp/IgnoredRemoveResultCheck.h | 2 +- .../clang-tidy/hicpp/MultiwayPathsCoveredCheck.h | 2 +- clang-tools-extra/clang-tidy/hicpp/NoAssemblerCheck.h | 2 +- clang-tools-extra/clang-tidy/hicpp/SignedBitwiseCheck.h | 2 +- clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h | 2 +- clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h | 2 +- clang-tools-extra/clang-tidy/llvm/IncludeOrderCheck.h | 2 +- .../clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h | 2 +- .../clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h | 2 +- .../clang-tidy/llvm/PreferStaticOverAnonymousNamespaceCheck.h | 2 +- clang-tools-extra/clang-tidy/llvm/UseRangesCheck.h | 2 +- clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h | 2 +- .../clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h | 2 +- .../clang-tidy/llvmlibc/InlineFunctionDeclCheck.h | 2 +- .../clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h | 2 +- .../clang-tidy/misc/ConfusableIdentifierCheck.cpp | 2 +- clang-tools-extra/clang-tidy/misc/ConstCorrectnessCheck.h | 2 +- clang-tools-extra/clang-tidy/misc/CoroutineHostileRAIICheck.h | 2 +- clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h | 2 +- clang-tools-extra/clang-tidy/misc/HeaderIncludeCycleCheck.h | 2 +- clang-tools-extra/clang-tidy/misc/IncludeCleanerCheck.h | 2 +- clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h | 2 +- clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h | 2 +- .../clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h | 2 +- .../clang-tidy/misc/OverrideWithDifferentVisibilityCheck.h | 2 +- clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h | 2 +- .../clang-tidy/misc/UnconventionalAssignOperatorCheck.h | 2 +- clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h | 2 +- .../clang-tidy/misc/UseAnonymousNamespaceCheck.h | 2 +- clang-tools-extra/clang-tidy/misc/UseInternalLinkageCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h | 2 +- .../clang-tidy/modernize/AvoidSetjmpLongjmpCheck.h | 2 +- .../clang-tidy/modernize/AvoidVariadicFunctionsCheck.h | 2 +- .../clang-tidy/modernize/DeprecatedHeadersCheck.h | 2 +- .../clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h | 2 +- .../clang-tidy/modernize/RawStringLiteralCheck.h | 2 +- .../modernize/ReplaceDisallowCopyAndAssignMacroCheck.h | 2 +- .../clang-tidy/modernize/ReplaceRandomShuffleCheck.h | 2 +- .../clang-tidy/modernize/ReturnBracedInitListCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/TypeTraitsCheck.h | 2 +- .../clang-tidy/modernize/UnaryStaticAssertCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseConstraintsCheck.h | 2 +- .../clang-tidy/modernize/UseDefaultMemberInitCheck.h | 2 +- .../clang-tidy/modernize/UseDesignatedInitializersCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseEmplaceCheck.h | 2 +- .../clang-tidy/modernize/UseEqualsDefaultCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h | 2 +- .../clang-tidy/modernize/UseIntegerSignComparisonCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseRangesCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseScopedLockCheck.h | 2 +- .../clang-tidy/modernize/UseStartsEndsWithCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseStdFormatCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseStdNumbersCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseStdPrintCheck.h | 2 +- .../clang-tidy/modernize/UseTrailingReturnTypeCheck.h | 2 +- .../clang-tidy/modernize/UseTransparentFunctorsCheck.h | 2 +- .../clang-tidy/modernize/UseUncaughtExceptionsCheck.h | 2 +- clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h | 2 +- clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h | 2 +- clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h | 2 +- clang-tools-extra/clang-tidy/objc/AssertEquals.h | 2 +- clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h | 2 +- clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h | 2 +- clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h | 2 +- clang-tools-extra/clang-tidy/objc/MissingHashCheck.h | 2 +- clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.cpp | 2 +- clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.h | 2 +- .../clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h | 2 +- clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h | 2 +- clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h | 2 +- clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h | 2 +- clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h | 2 +- clang-tools-extra/clang-tidy/performance/EnumSizeCheck.h | 2 +- .../clang-tidy/performance/FasterStringFindCheck.h | 2 +- clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h | 2 +- .../performance/InefficientStringConcatenationCheck.h | 2 +- .../clang-tidy/performance/InefficientVectorOperationCheck.h | 2 +- .../clang-tidy/performance/MoveConstructorInitCheck.h | 2 +- .../clang-tidy/performance/NoAutomaticMoveCheck.h | 2 +- clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h | 2 +- .../clang-tidy/performance/TriviallyDestructibleCheck.h | 2 +- .../clang-tidy/performance/TypePromotionInMathFnCheck.h | 2 +- .../clang-tidy/performance/UnnecessaryValueParamCheck.h | 2 +- .../clang-tidy/portability/AvoidPragmaOnceCheck.h | 2 +- .../clang-tidy/portability/RestrictSystemIncludesCheck.h | 2 +- .../clang-tidy/portability/SIMDIntrinsicsCheck.h | 2 +- .../clang-tidy/portability/StdAllocatorConstCheck.h | 2 +- .../portability/TemplateVirtualMemberFunctionCheck.h | 2 +- .../clang-tidy/readability/AmbiguousSmartptrResetCallCheck.h | 2 +- .../readability/AvoidNestedConditionalOperatorCheck.h | 2 +- .../clang-tidy/readability/AvoidReturnWithVoidValueCheck.h | 2 +- .../readability/AvoidUnconditionalPreprocessorIfCheck.h | 2 +- .../clang-tidy/readability/ConstReturnTypeCheck.h | 2 +- .../clang-tidy/readability/ContainerContainsCheck.h | 2 +- .../clang-tidy/readability/ConvertMemberFunctionsToStatic.h | 2 +- .../clang-tidy/readability/DeleteNullPointerCheck.h | 2 +- .../clang-tidy/readability/ElseAfterReturnCheck.h | 2 +- .../clang-tidy/readability/EnumInitialValueCheck.h | 2 +- .../readability/FunctionCognitiveComplexityCheck.cpp | 2 +- .../clang-tidy/readability/FunctionCognitiveComplexityCheck.h | 2 +- .../clang-tidy/readability/IdentifierLengthCheck.h | 2 +- .../clang-tidy/readability/ImplicitBoolConversionCheck.h | 2 +- .../readability/InconsistentDeclarationParameterNameCheck.h | 2 +- .../clang-tidy/readability/IsolateDeclarationCheck.h | 2 +- clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h | 2 +- .../clang-tidy/readability/MakeMemberFunctionConstCheck.h | 2 +- .../clang-tidy/readability/MathMissingParenthesesCheck.h | 2 +- .../clang-tidy/readability/MisleadingIndentationCheck.h | 2 +- .../clang-tidy/readability/MisplacedArrayIndexCheck.h | 2 +- .../clang-tidy/readability/NamespaceCommentCheck.h | 2 +- .../clang-tidy/readability/NonConstParameterCheck.h | 2 +- .../clang-tidy/readability/OperatorsRepresentationCheck.h | 2 +- clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h | 2 +- .../clang-tidy/readability/RedundantAccessSpecifiersCheck.h | 2 +- .../clang-tidy/readability/RedundantCastingCheck.h | 2 +- .../clang-tidy/readability/RedundantControlFlowCheck.h | 2 +- .../clang-tidy/readability/RedundantDeclarationCheck.h | 2 +- .../readability/RedundantFunctionPtrDereferenceCheck.h | 2 +- .../clang-tidy/readability/RedundantInlineSpecifierCheck.h | 2 +- .../clang-tidy/readability/RedundantMemberInitCheck.h | 2 +- .../clang-tidy/readability/RedundantPreprocessorCheck.h | 2 +- .../readability/ReferenceToConstructedTemporaryCheck.h | 2 +- .../clang-tidy/readability/SimplifyBooleanExprCheck.h | 2 +- .../clang-tidy/readability/SimplifySubscriptExprCheck.h | 2 +- .../readability/StaticAccessedThroughInstanceCheck.h | 2 +- .../readability/StaticDefinitionInAnonymousNamespaceCheck.h | 2 +- clang-tools-extra/clang-tidy/readability/StringCompareCheck.h | 2 +- .../clang-tidy/readability/SuspiciousCallArgumentCheck.cpp | 4 ++-- .../clang-tidy/readability/SuspiciousCallArgumentCheck.h | 2 +- .../clang-tidy/readability/UniqueptrDeleteReleaseCheck.h | 2 +- .../clang-tidy/readability/UppercaseLiteralSuffixCheck.h | 2 +- clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h | 2 +- clang-tools-extra/clang-tidy/readability/UseStdMinMaxCheck.h | 2 +- clang-tools-extra/clang-tidy/tool/ClangTidyMain.cpp | 2 +- clang-tools-extra/clang-tidy/tool/ClangTidyMain.h | 2 +- clang-tools-extra/clang-tidy/tool/ClangTidyToolMain.cpp | 2 +- clang-tools-extra/clang-tidy/tool/run-clang-tidy.py | 2 +- clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h | 2 +- 333 files changed, 334 insertions(+), 334 deletions(-) diff --git a/clang-tools-extra/clang-tidy/ClangTidy.cpp b/clang-tools-extra/clang-tidy/ClangTidy.cpp index e100f1412b066..7e18f3806a143 100644 --- a/clang-tools-extra/clang-tidy/ClangTidy.cpp +++ b/clang-tools-extra/clang-tidy/ClangTidy.cpp @@ -9,7 +9,7 @@ /// \file This file implements a clang-tidy tool. /// /// This tool uses the Clang Tooling infrastructure, see -/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html /// for details on setting it up with LLVM source tree. /// //===----------------------------------------------------------------------===// diff --git a/clang-tools-extra/clang-tidy/ClangTidyDiagnosticConsumer.cpp b/clang-tools-extra/clang-tidy/ClangTidyDiagnosticConsumer.cpp index 823c7b5626e97..65fd09f99ef0f 100644 --- a/clang-tools-extra/clang-tidy/ClangTidyDiagnosticConsumer.cpp +++ b/clang-tools-extra/clang-tidy/ClangTidyDiagnosticConsumer.cpp @@ -10,7 +10,7 @@ /// and ClangTidyError classes. /// /// This tool uses the Clang Tooling infrastructure, see -/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html /// for details on setting it up with LLVM source tree. /// //===----------------------------------------------------------------------===// diff --git a/clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h b/clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h index 414085146bfe4..49d27b3c35144 100644 --- a/clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/CleanupCtadCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::abseil { /// deduction (CTAD), in C++17 and higher. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/cleanup-ctad.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/cleanup-ctad.html class CleanupCtadCheck : public utils::TransformerClangTidyCheck { public: CleanupCtadCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h index e740326a3d6de..b728118c3da03 100644 --- a/clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationAdditionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// ``absl::Time`` domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-addition.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-addition.html class DurationAdditionCheck : public ClangTidyCheck { public: DurationAdditionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h index d9fc8cb165235..45ec6877fb6cb 100644 --- a/clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationComparisonCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-comparison.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-comparison.html class DurationComparisonCheck : public ClangTidyCheck { public: DurationComparisonCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h index cd45bc078fde6..c41ba479a12b8 100644 --- a/clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationConversionCastCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// the right conversion function instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-conversion-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-conversion-cast.html class DurationConversionCastCheck : public ClangTidyCheck { public: DurationConversionCastCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h index 810f7d269f38f..802b6b91b60d5 100644 --- a/clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationDivisionCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::abseil { // Find potential incorrect uses of integer division of absl::Duration objects. // // For the user-facing documentation see: -// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-division.html +// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-division.html class DurationDivisionCheck : public ClangTidyCheck { public: diff --git a/clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h index 1d688da43e268..9133cd50b02cd 100644 --- a/clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationFactoryFloatCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::abseil { /// component. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-float.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-float.html class DurationFactoryFloatCheck : public ClangTidyCheck { public: DurationFactoryFloatCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h index 1d53d13fa9f9a..e02620b6c8201 100644 --- a/clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationFactoryScaleCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::abseil { /// case of zero and suggests `ZeroDuration()`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-scale.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-factory-scale.html class DurationFactoryScaleCheck : public ClangTidyCheck { public: DurationFactoryScaleCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h index b092561df909c..4b3ed9c53be6c 100644 --- a/clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationSubtractionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// `absl::Duration` domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-subtraction.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-subtraction.html class DurationSubtractionCheck : public ClangTidyCheck { public: DurationSubtractionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h b/clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h index a5bd4dca6ce1f..59af8968e8b38 100644 --- a/clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/DurationUnnecessaryConversionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// to numeric types and back again. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-unnecessary-conversion.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/duration-unnecessary-conversion.html class DurationUnnecessaryConversionCheck : public ClangTidyCheck { public: DurationUnnecessaryConversionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h b/clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h index 96e261d86697b..3a3f241088d14 100644 --- a/clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/FasterStrsplitDelimiterCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// is a single character string literal and replaces it with a character. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/faster-strsplit-delimiter.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/faster-strsplit-delimiter.html class FasterStrsplitDelimiterCheck : public ClangTidyCheck { public: FasterStrsplitDelimiterCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h b/clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h index 7b46ba55e008f..2911a1ad14ae8 100644 --- a/clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/NoInternalDependenciesCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// against doing so. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/no-internal-dependencies.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/no-internal-dependencies.html class NoInternalDependenciesCheck : public ClangTidyCheck { public: NoInternalDependenciesCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h b/clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h index d3ab5cc5219ef..c970c9aced55f 100644 --- a/clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/NoNamespaceCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// Abseil's compatibility guidelines. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/no-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/no-namespace.html class NoNamespaceCheck : public ClangTidyCheck { public: NoNamespaceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h b/clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h index a5300a399c89d..8fc1eaf25d800 100644 --- a/clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/RedundantStrcatCallsCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::abseil { /// StrCat(1, StrCat(2, 3)) ==> StrCat(1, 2, 3) /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/redundant-strcat-calls.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/redundant-strcat-calls.html class RedundantStrcatCallsCheck : public ClangTidyCheck { public: RedundantStrcatCallsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h b/clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h index 93245c01cebb4..56d63b6565ffe 100644 --- a/clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/StrCatAppendCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// should be used instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/str-cat-append.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/str-cat-append.html class StrCatAppendCheck : public ClangTidyCheck { public: StrCatAppendCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h b/clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h index f939c0b5791e5..a96f111a33468 100644 --- a/clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/StringFindStrContainsCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::abseil { /// types) and suggests replacing with absl::StrContains. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/string-find-str-contains.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/string-find-str-contains.html class StringFindStrContainsCheck : public utils::TransformerClangTidyCheck { public: StringFindStrContainsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h b/clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h index bbf74bebd26ae..703d9514e8c07 100644 --- a/clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/TimeComparisonCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/time-comparison.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/time-comparison.html class TimeComparisonCheck : public ClangTidyCheck { public: TimeComparisonCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h b/clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h index f8bb599d36d5d..3f44a3ded91e4 100644 --- a/clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/TimeSubtractionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::abseil { /// in the time domain instead of the numeric domain. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/time-subtraction.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/time-subtraction.html class TimeSubtractionCheck : public ClangTidyCheck { public: TimeSubtractionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h b/clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h index e4865b941f2ac..742ff41faed96 100644 --- a/clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h +++ b/clang-tools-extra/clang-tidy/abseil/UpgradeDurationConversionsCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::abseil { /// factories. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/abseil/upgrade-duration-conversions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/abseil/upgrade-duration-conversions.html class UpgradeDurationConversionsCheck : public ClangTidyCheck { public: UpgradeDurationConversionsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/add_new_check.py b/clang-tools-extra/clang-tidy/add_new_check.py index dfa429e6455b2..80e1afe1a121c 100755 --- a/clang-tools-extra/clang-tidy/add_new_check.py +++ b/clang-tools-extra/clang-tidy/add_new_check.py @@ -109,7 +109,7 @@ def write_header( %(description)s /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/%(module)s/%(check_name)s.html +/// https://clang.llvm.org/extra/clang-tidy/checks/%(module)s/%(check_name)s.html class %(check_name_camel)s : public ClangTidyCheck { public: %(check_name_camel)s(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h b/clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h index 0030faa3c5ec5..b777918ab7e7b 100644 --- a/clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h +++ b/clang-tools-extra/clang-tidy/altera/IdDependentBackwardBranchCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::altera { /// degradation. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera/id-dependent-backward-branch.html +/// https://clang.llvm.org/extra/clang-tidy/checks/altera/id-dependent-backward-branch.html class IdDependentBackwardBranchCheck : public ClangTidyCheck { private: enum LoopType { UnknownLoop = -1, DoLoop = 0, WhileLoop = 1, ForLoop = 2 }; diff --git a/clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h b/clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h index bd8aafecf4f76..182d10b5539e5 100644 --- a/clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h +++ b/clang-tools-extra/clang-tidy/altera/KernelNameRestrictionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::altera { /// `Verilog.cl`, or `VHDL.cl`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera/kernel-name-restriction.html +/// https://clang.llvm.org/extra/clang-tidy/checks/altera/kernel-name-restriction.html class KernelNameRestrictionCheck : public ClangTidyCheck { public: KernelNameRestrictionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h b/clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h index 5560f2765f9f9..dab3dbce50371 100644 --- a/clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h +++ b/clang-tools-extra/clang-tidy/altera/SingleWorkItemBarrierCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::altera { /// kernels, which may be inefficient or cause an error. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera/single-work-item-barrier.html +/// https://clang.llvm.org/extra/clang-tidy/checks/altera/single-work-item-barrier.html class SingleWorkItemBarrierCheck : public ClangTidyCheck { const unsigned AOCVersion; diff --git a/clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h b/clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h index f6f2d1fa529e5..93da4d3d136fe 100644 --- a/clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h +++ b/clang-tools-extra/clang-tidy/altera/StructPackAlignCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::altera { /// packing and/or aligning of said structs as needed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera/struct-pack-align.html +/// https://clang.llvm.org/extra/clang-tidy/checks/altera/struct-pack-align.html class StructPackAlignCheck : public ClangTidyCheck { public: StructPackAlignCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h b/clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h index 453176fa4894a..90c4755667754 100644 --- a/clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h +++ b/clang-tools-extra/clang-tidy/altera/UnrollLoopsCheck.h @@ -21,7 +21,7 @@ namespace clang::tidy::altera { /// they cannot be fully unrolled, and should be partially unrolled. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/altera/unroll-loops.html +/// https://clang.llvm.org/extra/clang-tidy/checks/altera/unroll-loops.html class UnrollLoopsCheck : public ClangTidyCheck { public: UnrollLoopsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h b/clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h index e7286dc519484..02c4e0056ea15 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h +++ b/clang-tools-extra/clang-tidy/android/CloexecAccept4Check.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// Finds code that uses accept4() without using the SOCK_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept4.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept4.html class CloexecAccept4Check : public CloexecCheck { public: CloexecAccept4Check(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h b/clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h index 9b982b2b104ca..4540f938fd478 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecAcceptCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// accept() is better to be replaced by accept4(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-accept.html class CloexecAcceptCheck : public CloexecCheck { public: CloexecAcceptCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h b/clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h index e0629f2ac4061..ee2f51abf05fc 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecCreatCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// creat() is better to be replaced by open(). /// Find the usage of creat() and redirect user to use open(). -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-creat.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-creat.html class CloexecCreatCheck : public CloexecCheck { public: CloexecCreatCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h b/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h index 3016867e56189..f5699685ed086 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecDupCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::android { /// Find the usage of dup() and redirect user to use fcntl(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-dup.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-dup.html class CloexecDupCheck : public CloexecCheck { public: CloexecDupCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h b/clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h index cb0d40b8b9f36..f467b87a6cf70 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h +++ b/clang-tools-extra/clang-tidy/android/CloexecEpollCreate1Check.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// Finds code that uses epoll_create1() without using the EPOLL_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create1.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create1.html class CloexecEpollCreate1Check : public CloexecCheck { public: CloexecEpollCreate1Check(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h b/clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h index 9010179bd7036..a8d17c82d457d 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecEpollCreateCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// epoll_create() is better to be replaced by epoll_create1(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-epoll-create.html class CloexecEpollCreateCheck : public CloexecCheck { public: CloexecEpollCreateCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h b/clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h index 1e0e7d76933c7..646b237a663e0 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecFopenCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::android { /// This check only works when corresponding argument is StringLiteral. No /// constant propagation. /// -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-fopen.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-fopen.html class CloexecFopenCheck : public CloexecCheck { public: CloexecFopenCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h b/clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h index 50bc4bbaa7de5..3960d05e2e1f0 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h +++ b/clang-tools-extra/clang-tidy/android/CloexecInotifyInit1Check.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// Finds code that uses inotify_init1() without using the IN_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init1.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init1.html class CloexecInotifyInit1Check : public CloexecCheck { public: CloexecInotifyInit1Check(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h b/clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h index 7db4ab15c2f9e..cb9e6820571bc 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecInotifyInitCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// inotify_init() is better to be replaced by inotify_init1(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-inotify-init.html class CloexecInotifyInitCheck : public CloexecCheck { public: CloexecInotifyInitCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h b/clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h index 43a27dd5658a5..dd96ee968f3b4 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecMemfdCreateCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// Finds code that uses memfd_create() without using the MFD_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-memfd-create.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-memfd-create.html class CloexecMemfdCreateCheck : public CloexecCheck { public: CloexecMemfdCreateCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h b/clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h index 17d9b4f326e86..496bd6b6cbbc0 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h +++ b/clang-tools-extra/clang-tidy/android/CloexecPipe2Check.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// Finds code that uses pipe2() without using the O_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe2.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe2.html class CloexecPipe2Check : public CloexecCheck { public: CloexecPipe2Check(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h b/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h index 47a202e8542eb..f0145e14eb49f 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecPipeCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// Suggests to replace calls to pipe() with calls to pipe2(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-pipe.html class CloexecPipeCheck : public CloexecCheck { public: CloexecPipeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h b/clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h index 8ef02c1f197b7..0a29d7224e781 100644 --- a/clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h +++ b/clang-tools-extra/clang-tidy/android/CloexecSocketCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::android { /// Finds code that uses socket() without using the SOCK_CLOEXEC flag. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-socket.html +/// https://clang.llvm.org/extra/clang-tidy/checks/android/cloexec-socket.html class CloexecSocketCheck : public CloexecCheck { public: CloexecSocketCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/boost/UseRangesCheck.h b/clang-tools-extra/clang-tidy/boost/UseRangesCheck.h index 107d801969fc4..cd844656dd7b7 100644 --- a/clang-tools-extra/clang-tidy/boost/UseRangesCheck.h +++ b/clang-tools-extra/clang-tidy/boost/UseRangesCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::boost { /// replaced with a boost ranges version instead /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/boost/use-ranges.html +/// https://clang.llvm.org/extra/clang-tidy/checks/boost/use-ranges.html class UseRangesCheck : public utils::UseRangesCheck { public: UseRangesCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/boost/UseToStringCheck.h b/clang-tools-extra/clang-tidy/boost/UseToStringCheck.h index a245d11ee1c8a..af87f15a1dc0b 100644 --- a/clang-tools-extra/clang-tidy/boost/UseToStringCheck.h +++ b/clang-tools-extra/clang-tidy/boost/UseToStringCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::boost { /// ``std::to_string`` and ``std::to_wstring`` calls. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/boost/use-to-string.html +/// https://clang.llvm.org/extra/clang-tidy/checks/boost/use-to-string.html class UseToStringCheck : public ClangTidyCheck { public: UseToStringCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/AssignmentInIfConditionCheck.h b/clang-tools-extra/clang-tidy/bugprone/AssignmentInIfConditionCheck.h index 3ae4f36913d5f..613c3a7b30a2e 100644 --- a/clang-tools-extra/clang-tidy/bugprone/AssignmentInIfConditionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/AssignmentInIfConditionCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// Catches assignments within the condition clause of an if statement. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/assignment-in-if-condition.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/assignment-in-if-condition.html class AssignmentInIfConditionCheck : public ClangTidyCheck { public: AssignmentInIfConditionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h b/clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h index aa4d83c89a08d..9a6c9db418fd1 100644 --- a/clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/BadSignalToKillThreadCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// Finds ``pthread_kill`` function calls when thread is terminated by /// ``SIGTERM`` signal. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/bad-signal-to-kill-thread.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/bad-signal-to-kill-thread.html class BadSignalToKillThreadCheck : public ClangTidyCheck { public: BadSignalToKillThreadCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/BitwisePointerCastCheck.h b/clang-tools-extra/clang-tidy/bugprone/BitwisePointerCastCheck.h index 71dc159573619..f8e44bda3018e 100644 --- a/clang-tools-extra/clang-tidy/bugprone/BitwisePointerCastCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/BitwisePointerCastCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// ``std::bit_cast`` or ``memcpy``. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/bitwise-pointer-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/bitwise-pointer-cast.html class BitwisePointerCastCheck : public ClangTidyCheck { public: BitwisePointerCastCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h b/clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h index 22dbb2384900c..3888d5ede7b41 100644 --- a/clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/BranchCloneCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::bugprone { /// the true and false expressions are Type I clones of each other. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/branch-clone.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/branch-clone.html class BranchCloneCheck : public ClangTidyCheck { public: BranchCloneCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/CapturingThisInMemberVariableCheck.h b/clang-tools-extra/clang-tidy/bugprone/CapturingThisInMemberVariableCheck.h index 6aba9ee84d2bd..9acc3f2f9b63a 100644 --- a/clang-tools-extra/clang-tidy/bugprone/CapturingThisInMemberVariableCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/CapturingThisInMemberVariableCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::bugprone { /// assignments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/capturing-this-in-member-variable.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/capturing-this-in-member-variable.html class CapturingThisInMemberVariableCheck : public ClangTidyCheck { public: CapturingThisInMemberVariableCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/CastingThroughVoidCheck.h b/clang-tools-extra/clang-tidy/bugprone/CastingThroughVoidCheck.h index 313f3f240f5b3..0d2eba1977e97 100644 --- a/clang-tools-extra/clang-tidy/bugprone/CastingThroughVoidCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/CastingThroughVoidCheck.h @@ -15,7 +15,7 @@ namespace clang::tidy::bugprone { /// Detects unsafe or redundant two-step casting operations involving ``void*``. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/casting-through-void.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/casting-through-void.html class CastingThroughVoidCheck : public ClangTidyCheck { public: CastingThroughVoidCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ChainedComparisonCheck.h b/clang-tools-extra/clang-tidy/bugprone/ChainedComparisonCheck.h index bf8e3f709d30b..7c1022904a3a6 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ChainedComparisonCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ChainedComparisonCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// behavior or logical errors. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/chained-comparison.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/chained-comparison.html class ChainedComparisonCheck : public ClangTidyCheck { public: ChainedComparisonCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ComparePointerToMemberVirtualFunctionCheck.h b/clang-tools-extra/clang-tidy/bugprone/ComparePointerToMemberVirtualFunctionCheck.h index 15561e068a670..0f245d18d9f8f 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ComparePointerToMemberVirtualFunctionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ComparePointerToMemberVirtualFunctionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// member virtual function and anything other than null-pointer-constant. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/compare-pointer-to-member-virtual-function.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/compare-pointer-to-member-virtual-function.html class ComparePointerToMemberVirtualFunctionCheck : public ClangTidyCheck { public: ComparePointerToMemberVirtualFunctionCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h b/clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h index 02755b5894b18..cba1a25d9bc19 100644 --- a/clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/CopyConstructorInitCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// the base class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/copy-constructor-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/copy-constructor-init.html class CopyConstructorInitCheck : public ClangTidyCheck { public: CopyConstructorInitCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/CrtpConstructorAccessibilityCheck.h b/clang-tools-extra/clang-tidy/bugprone/CrtpConstructorAccessibilityCheck.h index c7d7c9f7c0e69..95cf673744b91 100644 --- a/clang-tools-extra/clang-tidy/bugprone/CrtpConstructorAccessibilityCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/CrtpConstructorAccessibilityCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// CRTP can be constructed outside itself and the derived class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/crtp-constructor-accessibility.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/crtp-constructor-accessibility.html class CrtpConstructorAccessibilityCheck : public ClangTidyCheck { public: CrtpConstructorAccessibilityCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h b/clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h index 6443b0aa59548..486562c30f79e 100644 --- a/clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/DanglingHandleCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// Detect dangling references in value handlers like std::string_view. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/dangling-handle.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/dangling-handle.html class DanglingHandleCheck : public ClangTidyCheck { public: DanglingHandleCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/DerivedMethodShadowingBaseMethodCheck.h b/clang-tools-extra/clang-tidy/bugprone/DerivedMethodShadowingBaseMethodCheck.h index d157e84ebdd98..6ef3cd7c04dc1 100644 --- a/clang-tools-extra/clang-tidy/bugprone/DerivedMethodShadowingBaseMethodCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/DerivedMethodShadowingBaseMethodCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// a base class /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/derived-method-shadowing-base-method.html class DerivedMethodShadowingBaseMethodCheck : public ClangTidyCheck { public: DerivedMethodShadowingBaseMethodCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h b/clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h index 284b4f5b9935e..8e74870e192d9 100644 --- a/clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/EasilySwappableParametersCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// swapped (or badly ordered) arguments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/easily-swappable-parameters.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/easily-swappable-parameters.html class EasilySwappableParametersCheck : public ClangTidyCheck { public: EasilySwappableParametersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/EmptyCatchCheck.h b/clang-tools-extra/clang-tidy/bugprone/EmptyCatchCheck.h index acef43934adba..db8ee02dfd404 100644 --- a/clang-tools-extra/clang-tidy/bugprone/EmptyCatchCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/EmptyCatchCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// Detects and suggests addressing issues with empty catch statements. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/empty-catch.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/empty-catch.html class EmptyCatchCheck : public ClangTidyCheck { public: EmptyCatchCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h b/clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h index 974b07c42407d..ae6e2024e415d 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ExceptionEscapeCheck.h @@ -21,7 +21,7 @@ namespace clang::tidy::bugprone { /// given as option to the checker. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/exception-escape.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/exception-escape.html class ExceptionEscapeCheck : public ClangTidyCheck { public: ExceptionEscapeCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h b/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h index 72dab600e3330..119728d972309 100644 --- a/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/FoldInitTypeCheck.h @@ -21,7 +21,7 @@ namespace clang::tidy::bugprone { /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/fold-init-type.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/fold-init-type.html class FoldInitTypeCheck : public ClangTidyCheck { public: FoldInitTypeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h b/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h index 700e52f7bb86d..5fa4f0984b107 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ForwardDeclarationNamespaceCheck.h @@ -34,7 +34,7 @@ namespace clang::tidy::bugprone { /// point. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/forward-declaration-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/forward-declaration-namespace.html class ForwardDeclarationNamespaceCheck : public ClangTidyCheck { public: ForwardDeclarationNamespaceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h b/clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h index ead0edb6a2b3a..35e09d64481e7 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ForwardingReferenceOverloadCheck.h @@ -23,7 +23,7 @@ namespace clang::tidy::bugprone { /// C++ Design, item 26. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/forwarding-reference-overload.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/forwarding-reference-overload.html class ForwardingReferenceOverloadCheck : public ClangTidyCheck { public: ForwardingReferenceOverloadCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h b/clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h index 74c64eb43f3c9..3aba92f4a2a8d 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ImplicitWideningOfMultiplicationResultCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// Diagnoses instances of an implicit widening of multiplication result. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/implicit-widening-of-multiplication-result.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/implicit-widening-of-multiplication-result.html class ImplicitWideningOfMultiplicationResultCheck : public ClangTidyCheck { const ast_matchers::MatchFinder::MatchResult *Result; bool ShouldUseCXXStaticCast; diff --git a/clang-tools-extra/clang-tidy/bugprone/IncDecInConditionsCheck.h b/clang-tools-extra/clang-tidy/bugprone/IncDecInConditionsCheck.h index 2e2dcb1cde7bc..f4be441489854 100644 --- a/clang-tools-extra/clang-tidy/bugprone/IncDecInConditionsCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/IncDecInConditionsCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// ambiguity in the variable's value. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/inc-dec-in-conditions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/inc-dec-in-conditions.html class IncDecInConditionsCheck : public ClangTidyCheck { public: IncDecInConditionsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/IncorrectEnableIfCheck.h b/clang-tools-extra/clang-tidy/bugprone/IncorrectEnableIfCheck.h index ea9cb4ecd0006..d22bab57bcbd3 100644 --- a/clang-tools-extra/clang-tidy/bugprone/IncorrectEnableIfCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/IncorrectEnableIfCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// ``type`` type. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-if.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-if.html class IncorrectEnableIfCheck : public ClangTidyCheck { public: IncorrectEnableIfCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/IncorrectEnableSharedFromThisCheck.h b/clang-tools-extra/clang-tidy/bugprone/IncorrectEnableSharedFromThisCheck.h index 866ae56631e36..554065fb52931 100644 --- a/clang-tools-extra/clang-tidy/bugprone/IncorrectEnableSharedFromThisCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/IncorrectEnableSharedFromThisCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// otherwise occur when calling ``shared_from_this``. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/incorrect-enable-shared-from-this.html class IncorrectEnableSharedFromThisCheck : public ClangTidyCheck { public: IncorrectEnableSharedFromThisCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h b/clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h index 0766e2fa3c35d..e26a55575b822 100644 --- a/clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/InfiniteLoopCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// not changed at all). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/infinite-loop.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/infinite-loop.html class InfiniteLoopCheck : public ClangTidyCheck { public: InfiniteLoopCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h b/clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h index b191cf693029e..777e31868c961 100644 --- a/clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/IntegerDivisionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// cause unintended loss of precision. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/integer-division.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/integer-division.html class IntegerDivisionCheck : public ClangTidyCheck { public: IntegerDivisionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/InvalidEnumDefaultInitializationCheck.h b/clang-tools-extra/clang-tidy/bugprone/InvalidEnumDefaultInitializationCheck.h index b9b4f20d111fc..4f1a4a2a21af3 100644 --- a/clang-tools-extra/clang-tidy/bugprone/InvalidEnumDefaultInitializationCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/InvalidEnumDefaultInitializationCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// the enum has no enumerator with value of 0. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/invalid-enum-default-initialization.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/invalid-enum-default-initialization.html class InvalidEnumDefaultInitializationCheck : public ClangTidyCheck { public: InvalidEnumDefaultInitializationCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h b/clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h index 9e53951c4a7bd..f672a56317395 100644 --- a/clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/LambdaFunctionNameCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// (i.e., `operator()`). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/lambda-function-name.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/lambda-function-name.html class LambdaFunctionNameCheck : public ClangTidyCheck { public: struct SourceRangeLessThan { diff --git a/clang-tools-extra/clang-tidy/bugprone/MisleadingSetterOfReferenceCheck.h b/clang-tools-extra/clang-tidy/bugprone/MisleadingSetterOfReferenceCheck.h index b44f7a4ccb795..e0b6b929b5b95 100644 --- a/clang-tools-extra/clang-tidy/bugprone/MisleadingSetterOfReferenceCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MisleadingSetterOfReferenceCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// is used to set value of a field with reference type. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/throw-keyword-missing.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/throw-keyword-missing.html class MisleadingSetterOfReferenceCheck : public ClangTidyCheck { public: MisleadingSetterOfReferenceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h b/clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h index 764fd3ff97fed..f650145203ce6 100644 --- a/clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MisplacedOperatorInStrlenInAllocCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// argument to a memory allocation function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-operator-in-strlen-in-alloc.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-operator-in-strlen-in-alloc.html class MisplacedOperatorInStrlenInAllocCheck : public ClangTidyCheck { public: MisplacedOperatorInStrlenInAllocCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h b/clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h index a86d2a33d503f..e78c30cbb644a 100644 --- a/clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MisplacedPointerArithmeticInAllocCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// memory allocation function instead of its argument. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-pointer-arithmetic-in-alloc.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-pointer-arithmetic-in-alloc.html class MisplacedPointerArithmeticInAllocCheck : public ClangTidyCheck { public: MisplacedPointerArithmeticInAllocCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h b/clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h index 5fde5c7d0e46d..151bbcf028783 100644 --- a/clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MisplacedWideningCastCheck.h @@ -24,7 +24,7 @@ namespace clang::tidy::bugprone { // be the most common case. Enabled by default. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-widening-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/misplaced-widening-cast.html class MisplacedWideningCastCheck : public ClangTidyCheck { public: MisplacedWideningCastCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h b/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h index 4fc876a232f37..523f49a2c94a9 100644 --- a/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MoveForwardingReferenceCheck.h @@ -30,7 +30,7 @@ namespace clang::tidy::bugprone { /// The check suggests replacing the std::move with a std::forward. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/move-forwarding-reference.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/move-forwarding-reference.html class MoveForwardingReferenceCheck : public ClangTidyCheck { public: MoveForwardingReferenceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/MultiLevelImplicitPointerConversionCheck.h b/clang-tools-extra/clang-tidy/bugprone/MultiLevelImplicitPointerConversionCheck.h index d0a9a21523862..6d3d6e5f1c687 100644 --- a/clang-tools-extra/clang-tidy/bugprone/MultiLevelImplicitPointerConversionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MultiLevelImplicitPointerConversionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// indirection. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/multi-level-implicit-pointer-conversion.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/multi-level-implicit-pointer-conversion.html class MultiLevelImplicitPointerConversionCheck : public ClangTidyCheck { public: MultiLevelImplicitPointerConversionCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/bugprone/MultipleNewInOneExpressionCheck.h b/clang-tools-extra/clang-tidy/bugprone/MultipleNewInOneExpressionCheck.h index 53ad4a514bcc7..a94fa6eef7a54 100644 --- a/clang-tools-extra/clang-tidy/bugprone/MultipleNewInOneExpressionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MultipleNewInOneExpressionCheck.h @@ -14,7 +14,7 @@ namespace clang::tidy::bugprone { /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-new-in-one-expression.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-new-in-one-expression.html class MultipleNewInOneExpressionCheck : public ClangTidyCheck { public: MultipleNewInOneExpressionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h b/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h index 73a00fa493797..1a2d4a410b46e 100644 --- a/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/MultipleStatementMacroCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// other ones will be executed unconditionally. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-statement-macro.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/multiple-statement-macro.html class MultipleStatementMacroCheck : public ClangTidyCheck { public: MultipleStatementMacroCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/NarrowingConversionsCheck.h b/clang-tools-extra/clang-tidy/bugprone/NarrowingConversionsCheck.h index 1f37086e3af55..9c05827556e67 100644 --- a/clang-tools-extra/clang-tidy/bugprone/NarrowingConversionsCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/NarrowingConversionsCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// i += 0.1; /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/narrowing-conversions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/narrowing-conversions.html class NarrowingConversionsCheck : public ClangTidyCheck { public: NarrowingConversionsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h b/clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h index 4760b171e75ce..8b01c700bdcc7 100644 --- a/clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/NoEscapeCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// attribute, then we warn the user of their error. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/no-escape.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/no-escape.html class NoEscapeCheck : public ClangTidyCheck { public: NoEscapeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/NonZeroEnumToBoolConversionCheck.h b/clang-tools-extra/clang-tidy/bugprone/NonZeroEnumToBoolConversionCheck.h index 977545fd5b65c..551d46eaaea0b 100644 --- a/clang-tools-extra/clang-tidy/bugprone/NonZeroEnumToBoolConversionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/NonZeroEnumToBoolConversionCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// `enum` type doesn't have a zero-value enumerator. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/non-zero-enum-to-bool-conversion.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/non-zero-enum-to-bool-conversion.html class NonZeroEnumToBoolConversionCheck : public ClangTidyCheck { public: NonZeroEnumToBoolConversionCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/NondeterministicPointerIterationOrderCheck.h b/clang-tools-extra/clang-tidy/bugprone/NondeterministicPointerIterationOrderCheck.h index 698872fefca90..054d5804745bc 100644 --- a/clang-tools-extra/clang-tidy/bugprone/NondeterministicPointerIterationOrderCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/NondeterministicPointerIterationOrderCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// pointers. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/nondeterministic-pointer-iteration-order.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/nondeterministic-pointer-iteration-order.html class NondeterministicPointerIterationOrderCheck : public ClangTidyCheck { public: NondeterministicPointerIterationOrderCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h b/clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h index fa2ca59b65300..ca3fbf0febf7a 100644 --- a/clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/NotNullTerminatedResultCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::bugprone { /// when the string is read. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/not-null-terminated-result.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/not-null-terminated-result.html class NotNullTerminatedResultCheck : public ClangTidyCheck { public: NotNullTerminatedResultCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/OptionalValueConversionCheck.h b/clang-tools-extra/clang-tidy/bugprone/OptionalValueConversionCheck.h index 83e08e7359224..3341865e1ec84 100644 --- a/clang-tools-extra/clang-tidy/bugprone/OptionalValueConversionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/OptionalValueConversionCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::bugprone { /// of the same optional-like type. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/optional-value-conversion.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/optional-value-conversion.html class OptionalValueConversionCheck : public ClangTidyCheck { public: OptionalValueConversionCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h b/clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h index 2f86d75a6d64d..dfed78e6992fa 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ParentVirtualCallCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// Finds calls to grand..-parent virtual methods instead of parent's. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/parent-virtual-call.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/parent-virtual-call.html class ParentVirtualCallCheck : public ClangTidyCheck { public: ParentVirtualCallCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/PointerArithmeticOnPolymorphicObjectCheck.h b/clang-tools-extra/clang-tidy/bugprone/PointerArithmeticOnPolymorphicObjectCheck.h index 13f9df656c98c..6255359b558a7 100644 --- a/clang-tools-extra/clang-tidy/bugprone/PointerArithmeticOnPolymorphicObjectCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/PointerArithmeticOnPolymorphicObjectCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// virtual function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/pointer-arithmetic-on-polymorphic-object.html class PointerArithmeticOnPolymorphicObjectCheck : public ClangTidyCheck { public: PointerArithmeticOnPolymorphicObjectCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h b/clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h index 854de520807fc..c4a1c0c94459e 100644 --- a/clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/RedundantBranchConditionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// in the outer `if` statement and were not changed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/redundant-branch-condition.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/redundant-branch-condition.html class RedundantBranchConditionCheck : public ClangTidyCheck { public: RedundantBranchConditionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h b/clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h index 5b6fbff266217..89e2c86f99a8f 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ReservedIdentifierCheck.h @@ -27,7 +27,7 @@ namespace clang::tidy::bugprone { /// double underscore occurring anywhere. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/reserved-identifier.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/reserved-identifier.html class ReservedIdentifierCheck final : public RenamerClangTidyCheck { const bool Invert; const std::vector AllowedIdentifiersRaw; diff --git a/clang-tools-extra/clang-tidy/bugprone/ReturnConstRefFromParameterCheck.h b/clang-tools-extra/clang-tidy/bugprone/ReturnConstRefFromParameterCheck.h index 8149bd29030b3..9496bc08e995a 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ReturnConstRefFromParameterCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ReturnConstRefFromParameterCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// xvalues as arguments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/return-const-ref-from-parameter.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/return-const-ref-from-parameter.html class ReturnConstRefFromParameterCheck : public ClangTidyCheck { public: ReturnConstRefFromParameterCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h b/clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h index 6589b19fbe048..b5317793cbf45 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SignalHandlerCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::bugprone { /// Checker for signal handler functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/signal-handler.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/signal-handler.html class SignalHandlerCheck : public ClangTidyCheck { public: enum class AsyncSafeFunctionSetKind { Minimal, POSIX }; diff --git a/clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h b/clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h index c735ac634c801..56504e5a0fd2f 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SignedCharMisuseCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::bugprone { /// implicit conversion happens. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/signed-char-misuse.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/signed-char-misuse.html class SignedCharMisuseCheck : public ClangTidyCheck { public: SignedCharMisuseCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h b/clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h index 8fc351b8c6cb2..d87d37856ac09 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SizeofContainerCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// user wanted to use `.size()` instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-container.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-container.html class SizeofContainerCheck : public ClangTidyCheck { public: SizeofContainerCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h b/clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h index 6d7c33977db93..652a76a0415ae 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SizeofExpressionCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// Find suspicious usages of sizeof expressions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-expression.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/sizeof-expression.html class SizeofExpressionCheck : public ClangTidyCheck { public: SizeofExpressionCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h b/clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h index 23bf8056c0f61..bf24b7b211aa6 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SpuriouslyWakeUpFunctionsCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::bugprone { /// condition parameter. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/spuriously-wake-up-functions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/spuriously-wake-up-functions.html class SpuriouslyWakeUpFunctionsCheck : public ClangTidyCheck { public: SpuriouslyWakeUpFunctionsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/StandaloneEmptyCheck.h b/clang-tools-extra/clang-tidy/bugprone/StandaloneEmptyCheck.h index 85b25d8e25abc..0ef65a3a392fa 100644 --- a/clang-tools-extra/clang-tidy/bugprone/StandaloneEmptyCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StandaloneEmptyCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// as an alternative if it is an existing member function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/standalone-empty.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/standalone-empty.html class StandaloneEmptyCheck : public ClangTidyCheck { public: StandaloneEmptyCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h b/clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h index 5ab05e119abe9..0d7a203a52e12 100644 --- a/clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StringConstructorCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// Finds suspicious string constructor and check their parameters. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-constructor.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-constructor.html class StringConstructorCheck : public ClangTidyCheck { public: StringConstructorCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h b/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h index 68783b7da53c6..67bd29738cbc3 100644 --- a/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StringIntegerAssignmentCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// Finds instances where an integer is assigned to a string. /// /// For more details see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-integer-assignment.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-integer-assignment.html class StringIntegerAssignmentCheck : public ClangTidyCheck { public: StringIntegerAssignmentCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h b/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h index 59aece123057a..272b54eb09666 100644 --- a/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StringLiteralWithEmbeddedNulCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// Find suspicious string literals with embedded NUL characters. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-literal-with-embedded-nul.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/string-literal-with-embedded-nul.html class StringLiteralWithEmbeddedNulCheck : public ClangTidyCheck { public: StringLiteralWithEmbeddedNulCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h b/clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h index 81a10101049c9..183a4f776a7f6 100644 --- a/clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/StringviewNullptrCheck.h @@ -30,7 +30,7 @@ namespace clang::tidy::bugprone { /// to `nullptr`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/stringview-nullptr.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/stringview-nullptr.html class StringviewNullptrCheck : public utils::TransformerClangTidyCheck { public: StringviewNullptrCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h index 542bf7577f927..91095ecd5d00d 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousEnumUsageCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// The checker detects various cases when an enum is probably misused (as a /// bitmask). /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-enum-usage.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-enum-usage.html class SuspiciousEnumUsageCheck : public ClangTidyCheck { public: SuspiciousEnumUsageCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h index 03f569e5a483e..3aa9491ef0e3b 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousIncludeCheck.h @@ -22,7 +22,7 @@ namespace clang::tidy::bugprone { /// #include "baz.h" // no diagnostic /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-include.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-include.html class SuspiciousIncludeCheck : public ClangTidyCheck { public: SuspiciousIncludeCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h index c36d256242e19..391aa8f4dce3d 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemoryComparisonCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// arguments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memory-comparison.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memory-comparison.html class SuspiciousMemoryComparisonCheck : public ClangTidyCheck { public: SuspiciousMemoryComparisonCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h index 41ef525c7f9dd..a1f5f2bfd1a3b 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMemsetUsageCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// Finds memset calls with potential mistakes in their arguments. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memset-usage.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-memset-usage.html class SuspiciousMemsetUsageCheck : public ClangTidyCheck { public: SuspiciousMemsetUsageCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h index 3a26b0a4a317e..fddd2491fa77d 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousMissingCommaCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// accidentally. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-missing-comma.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-missing-comma.html class SuspiciousMissingCommaCheck : public ClangTidyCheck { public: SuspiciousMissingCommaCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousReallocUsageCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousReallocUsageCheck.h index 2517d5f7ae319..2abcae4d94ec3 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousReallocUsageCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousReallocUsageCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// variable as passed to the first argument. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-realloc-usage.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-realloc-usage.html class SuspiciousReallocUsageCheck : public ClangTidyCheck { public: SuspiciousReallocUsageCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h index 73131c7f9f12a..10bdf328df0ff 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousSemicolonCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// unintendedly. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-semicolon.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-semicolon.html class SuspiciousSemicolonCheck : public ClangTidyCheck { public: SuspiciousSemicolonCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h index 6f01b1ad087bd..9c29f5907a28b 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringCompareCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// Find suspicious calls to string compare functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-string-compare.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-string-compare.html class SuspiciousStringCompareCheck : public ClangTidyCheck { public: SuspiciousStringCompareCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringviewDataUsageCheck.h b/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringviewDataUsageCheck.h index 57cb164af8565..eae8aad5b7d3e 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringviewDataUsageCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SuspiciousStringviewDataUsageCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// termination. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-stringview-data-usage.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-stringview-data-usage.html class SuspiciousStringviewDataUsageCheck : public ClangTidyCheck { public: SuspiciousStringviewDataUsageCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/SwitchMissingDefaultCaseCheck.h b/clang-tools-extra/clang-tidy/bugprone/SwitchMissingDefaultCaseCheck.h index f5237775650ea..fccf14b194229 100644 --- a/clang-tools-extra/clang-tidy/bugprone/SwitchMissingDefaultCaseCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/SwitchMissingDefaultCaseCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::bugprone { /// warnings. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/switch-missing-default-case.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/switch-missing-default-case.html class SwitchMissingDefaultCaseCheck : public ClangTidyCheck { public: SwitchMissingDefaultCaseCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/TaggedUnionMemberCountCheck.h b/clang-tools-extra/clang-tidy/bugprone/TaggedUnionMemberCountCheck.h index 0c337df405061..01424ef8e57f9 100644 --- a/clang-tools-extra/clang-tidy/bugprone/TaggedUnionMemberCountCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/TaggedUnionMemberCountCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// different from the number of data members inside the union. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/tagged-union-member-count.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/tagged-union-member-count.html class TaggedUnionMemberCountCheck : public ClangTidyCheck { public: TaggedUnionMemberCountCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h b/clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h index 79a794de3819a..c37fdc63e5d70 100644 --- a/clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/TerminatingContinueCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// a condition which always evaluates to false). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/terminating-continue.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/terminating-continue.html class TerminatingContinueCheck : public ClangTidyCheck { public: TerminatingContinueCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h b/clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h index ee1e7d20d39e0..7a8165503a4c3 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ThrowKeywordMissingCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// class that has 'EXCEPTION', 'Exception' or 'exception' in its name. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/throw-keyword-missing.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/throw-keyword-missing.html class ThrowKeywordMissingCheck : public ClangTidyCheck { public: ThrowKeywordMissingCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/ThrowingStaticInitializationCheck.h b/clang-tools-extra/clang-tidy/bugprone/ThrowingStaticInitializationCheck.h index 0a6471e359061..4ec554fc78fc6 100644 --- a/clang-tools-extra/clang-tidy/bugprone/ThrowingStaticInitializationCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/ThrowingStaticInitializationCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// throw. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/throwing-static-initialization.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/throwing-static-initialization.html class ThrowingStaticInitializationCheck : public ClangTidyCheck { public: ThrowingStaticInitializationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h b/clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h index e2c1bb7b002e3..1546533ed88b8 100644 --- a/clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/TooSmallLoopVariableCheck.h @@ -24,7 +24,7 @@ namespace clang::tidy::bugprone { /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/too-small-loop-variable.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/too-small-loop-variable.html class TooSmallLoopVariableCheck : public ClangTidyCheck { public: TooSmallLoopVariableCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h b/clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h index 3c0f261126823..11086fb4bfda1 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UncheckedOptionalAccessCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::bugprone { /// value. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unchecked-optional-access.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/unchecked-optional-access.html class UncheckedOptionalAccessCheck : public ClangTidyCheck { public: UncheckedOptionalAccessCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/UncheckedStringToNumberConversionCheck.h b/clang-tools-extra/clang-tidy/bugprone/UncheckedStringToNumberConversionCheck.h index 365b409f8311c..5053a124343b2 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UncheckedStringToNumberConversionCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UncheckedStringToNumberConversionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// reasonable error handling for conversion errors. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unchecked-string-to-number-conversion.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/unchecked-string-to-number-conversion.html class UncheckedStringToNumberConversionCheck : public ClangTidyCheck { public: UncheckedStringToNumberConversionCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h b/clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h index fd067c48a16e0..c9a232a1b177d 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UndefinedMemoryManipulationCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// behavior. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/undefined-memory-manipulation.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/undefined-memory-manipulation.html class UndefinedMemoryManipulationCheck : public ClangTidyCheck { public: UndefinedMemoryManipulationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h index 0724b4ac6d3e9..ed51191bf9d58 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnhandledExceptionAtNewCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// failure. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unhandled-exception-at-new.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/unhandled-exception-at-new.html class UnhandledExceptionAtNewCheck : public ClangTidyCheck { public: UnhandledExceptionAtNewCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h index 61d33028aadc8..d8f9057174d85 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnhandledSelfAssignmentCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// using the copy-and-swap or the copy-and-move method. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unhandled-self-assignment.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/unhandled-self-assignment.html class UnhandledSelfAssignmentCheck : public ClangTidyCheck { public: UnhandledSelfAssignmentCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UnintendedCharOstreamOutputCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnintendedCharOstreamOutputCheck.h index af53dc6158696..88db2fb0dfcf7 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UnintendedCharOstreamOutputCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnintendedCharOstreamOutputCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::bugprone { /// an ostream. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unintended-char-ostream-output.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/unintended-char-ostream-output.html class UnintendedCharOstreamOutputCheck : public ClangTidyCheck { public: UnintendedCharOstreamOutputCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UnsafeFunctionsCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnsafeFunctionsCheck.h index 6495bd34f6c58..99bb91a173187 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UnsafeFunctionsCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnsafeFunctionsCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::bugprone { /// but is not exclusive to, the functions from the /// Annex K. "Bounds-checking interfaces" of C11. /// -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unsafe-functions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/unsafe-functions.html class UnsafeFunctionsCheck : public ClangTidyCheck { public: UnsafeFunctionsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UnusedLocalNonTrivialVariableCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnusedLocalNonTrivialVariableCheck.h index 92eaf290f2073..5de5a76755539 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UnusedLocalNonTrivialVariableCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnusedLocalNonTrivialVariableCheck.h @@ -24,7 +24,7 @@ namespace clang::tidy::bugprone { /// 'IncludeTypes' matches. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unused-local-non-trivial-variable.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/unused-local-non-trivial-variable.html class UnusedLocalNonTrivialVariableCheck : public ClangTidyCheck { public: UnusedLocalNonTrivialVariableCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h index 376f664f74548..10012aff487cc 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnusedRaiiCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::bugprone { /// Finds temporaries that look like RAII objects. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unused-raii.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/unused-raii.html class UnusedRaiiCheck : public ClangTidyCheck { public: UnusedRaiiCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h b/clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h index f81603cadbe80..fd1b3d6aa9974 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UnusedReturnValueCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// Detects function calls where the return value is unused. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/unused-return-value.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/unused-return-value.html class UnusedReturnValueCheck : public ClangTidyCheck { public: UnusedReturnValueCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h b/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h index ac85c80ee0b5b..d38b29e09fa8b 100644 --- a/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/UseAfterMoveCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::bugprone { /// intervening reinitialization. /// /// For details, see the user-facing documentation: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/use-after-move.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/use-after-move.html class UseAfterMoveCheck : public ClangTidyCheck { public: UseAfterMoveCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h b/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h index b852dffa7c6ea..71d302f49ff95 100644 --- a/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h +++ b/clang-tools-extra/clang-tidy/bugprone/VirtualNearMissCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::bugprone { /// very similar name and an identical signature defined in a base class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/virtual-near-miss.html +/// https://clang.llvm.org/extra/clang-tidy/checks/bugprone/virtual-near-miss.html class VirtualNearMissCheck : public ClangTidyCheck { public: VirtualNearMissCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h b/clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h index 94234f284c045..c2f8b39faaab1 100644 --- a/clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h +++ b/clang-tools-extra/clang-tidy/cert/CommandProcessorCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::cert { /// actually launched. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert/env33-c.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert/env33-c.html class CommandProcessorCheck : public ClangTidyCheck { public: CommandProcessorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h b/clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h index f8cb4d6e32d69..8f9d0e470a755 100644 --- a/clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h +++ b/clang-tools-extra/clang-tidy/cert/DefaultOperatorNewAlignmentCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cert { /// the default operator new. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert/mem57-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert/mem57-cpp.html class DefaultOperatorNewAlignmentCheck : public ClangTidyCheck { public: DefaultOperatorNewAlignmentCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h b/clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h index e9207385f0d20..d00c036f00f24 100644 --- a/clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h +++ b/clang-tools-extra/clang-tidy/cert/FloatLoopCounter.h @@ -18,7 +18,7 @@ namespace clang::tidy::cert { /// https://www.securecoding.cert.org/confluence/display/c/FLP30-C.+Do+not+use+floating-point+variables+as+loop+counters /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert/flp30-c.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert/flp30-c.html class FloatLoopCounter : public ClangTidyCheck { public: FloatLoopCounter(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h b/clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h index b024b9008d876..a9d607665adb3 100644 --- a/clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h +++ b/clang-tools-extra/clang-tidy/cert/LimitedRandomnessCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::cert { /// This check warns for the usage of std::rand() function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert/msc50-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert/msc50-cpp.html class LimitedRandomnessCheck : public ClangTidyCheck { public: LimitedRandomnessCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h b/clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h index ecb3d164b5272..c211fa004120c 100644 --- a/clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h +++ b/clang-tools-extra/clang-tidy/cert/MutatingCopyCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cert { /// in copy constructors and copy assignment operators. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert/oop58-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert/oop58-cpp.html class MutatingCopyCheck : public ClangTidyCheck { public: MutatingCopyCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h b/clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h index 221bdca0baae7..4589ce444c878 100644 --- a/clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h +++ b/clang-tools-extra/clang-tidy/cert/NonTrivialTypesLibcMemoryCallsCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cert { /// 'memcmp' and similar derivatives on non-trivial types. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert/oop57-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert/oop57-cpp.html class NonTrivialTypesLibcMemoryCallsCheck : public ClangTidyCheck { public: NonTrivialTypesLibcMemoryCallsCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h b/clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h index d34b8e702f670..ea30127e25e08 100644 --- a/clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h +++ b/clang-tools-extra/clang-tidy/cert/ProperlySeededRandomGeneratorCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::cert { /// constant expression is a security vulnerability. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert/msc51-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert/msc51-cpp.html class ProperlySeededRandomGeneratorCheck : public ClangTidyCheck { public: ProperlySeededRandomGeneratorCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h b/clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h index 9b97feb7fe5f5..41a5145209686 100644 --- a/clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h +++ b/clang-tools-extra/clang-tidy/cert/ThrownExceptionTypeCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::cert { /// Checks whether a thrown object is nothrow copy constructible. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cert/err60-cpp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cert/err60-cpp.html class ThrownExceptionTypeCheck : public ClangTidyCheck { public: ThrownExceptionTypeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/concurrency/MtUnsafeCheck.h b/clang-tools-extra/clang-tidy/concurrency/MtUnsafeCheck.h index c5c707778bc32..12a4d4b6ec824 100644 --- a/clang-tools-extra/clang-tidy/concurrency/MtUnsafeCheck.h +++ b/clang-tools-extra/clang-tidy/concurrency/MtUnsafeCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::concurrency { /// Checks that non-thread-safe functions are not used. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/concurrency/mt-unsafe.html +/// https://clang.llvm.org/extra/clang-tidy/checks/concurrency/mt-unsafe.html class MtUnsafeCheck : public ClangTidyCheck { public: MtUnsafeCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h b/clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h index 2d5d82dfd9285..5711266f8d309 100644 --- a/clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h +++ b/clang-tools-extra/clang-tidy/concurrency/ThreadCanceltypeAsynchronousCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::concurrency { /// Finds ``pthread_setcanceltype`` function calls where a thread's /// cancellation type is set to asynchronous. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/concurrency/thread-canceltype-asynchronous.html +/// https://clang.llvm.org/extra/clang-tidy/checks/concurrency/thread-canceltype-asynchronous.html class ThreadCanceltypeAsynchronousCheck : public ClangTidyCheck { public: ThreadCanceltypeAsynchronousCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidConstOrRefDataMembersCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidConstOrRefDataMembersCheck.h index 9d458fe9a4d00..c228b2ba9e3fe 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidConstOrRefDataMembersCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidConstOrRefDataMembersCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// they make the class non-copy-assignable. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-const-or-ref-data-members.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-const-or-ref-data-members.html class AvoidConstOrRefDataMembersCheck : public ClangTidyCheck { public: AvoidConstOrRefDataMembersCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidDoWhileCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidDoWhileCheck.h index 0756d0860f961..06ec105ad07b6 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidDoWhileCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidDoWhileCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// subtle bugs. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-do-while.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-do-while.html class AvoidDoWhileCheck : public ClangTidyCheck { public: AvoidDoWhileCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h index 2b13df795d87c..929fceeb68a30 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidGotoCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// with looping constructs. Only forward jumps in nested loops are accepted. // /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-goto.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-goto.html class AvoidGotoCheck : public ClangTidyCheck { public: AvoidGotoCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h index 9c40fa3e9d341..5e7c968b12f97 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidNonConstGlobalVariablesCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// subject to unpredictable changes. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-non-const-global-variables.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-non-const-global-variables.html class AvoidNonConstGlobalVariablesCheck : public ClangTidyCheck { public: AvoidNonConstGlobalVariablesCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidReferenceCoroutineParametersCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidReferenceCoroutineParametersCheck.h index 3469ea7a8efee..78ed547787b9a 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidReferenceCoroutineParametersCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/AvoidReferenceCoroutineParametersCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::cppcoreguidelines { /// longer be valid. This implements CppCoreGuideline CP.53. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-reference-coroutine-parameters.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/avoid-reference-coroutine-parameters.html class AvoidReferenceCoroutineParametersCheck : public ClangTidyCheck { public: AvoidReferenceCoroutineParametersCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h index a1476494b4046..08a4a9d7c7851 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/InitVariablesCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::cppcoreguidelines { /// Find uninitialized local variables. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/init-variables.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/init-variables.html class InitVariablesCheck : public ClangTidyCheck { public: InitVariablesCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h index 2141fc2423bdf..780b4b39254a7 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/InterfacesGlobalInitCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::cppcoreguidelines { /// Flags possible initialization order issues of static variables. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/interfaces-global-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/interfaces-global-init.html class InterfacesGlobalInitCheck : public ClangTidyCheck { public: InterfacesGlobalInitCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h index dd553ba613f1e..d310a0c5cb0b9 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/MacroUsageCheck.h @@ -21,7 +21,7 @@ namespace tidy::cppcoreguidelines { /// constructs exist for the task. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/macro-usage.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/macro-usage.html class MacroUsageCheck : public ClangTidyCheck { public: MacroUsageCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/MisleadingCaptureDefaultByValueCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/MisleadingCaptureDefaultByValueCheck.h index 87187b3b70bcb..dcb05023768da 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/MisleadingCaptureDefaultByValueCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/MisleadingCaptureDefaultByValueCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::cppcoreguidelines { /// whether data members are captured by value or reference. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/misleading-capture-default-by-value.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/misleading-capture-default-by-value.html class MisleadingCaptureDefaultByValueCheck : public ClangTidyCheck { public: MisleadingCaptureDefaultByValueCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/MissingStdForwardCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/MissingStdForwardCheck.h index 247291076d939..2dd13e2124d74 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/MissingStdForwardCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/MissingStdForwardCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::cppcoreguidelines { /// This check implement CppCoreGuideline F.19. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/missing-std-forward.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/missing-std-forward.html class MissingStdForwardCheck : public ClangTidyCheck { public: MissingStdForwardCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h index 4e664197b5f72..e4dece6a54c90 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/NoMallocCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::cppcoreguidelines { /// Static Analyzer - unix.Malloc. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/no-malloc.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/no-malloc.html class NoMallocCheck : public ClangTidyCheck { public: /// Construct Checker and read in configuration for function names. diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/NoSuspendWithLockCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/NoSuspendWithLockCheck.h index 877a5173e7f10..7670f59e18c9e 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/NoSuspendWithLockCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/NoSuspendWithLockCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// This check implements CppCoreGuideline CP.52. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/no-suspend-with-lock.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/no-suspend-with-lock.html class NoSuspendWithLockCheck : public ClangTidyCheck { public: NoSuspendWithLockCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h index e191f09943710..462e9864a3f5d 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/OwningMemoryCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// nature of it whenever possible. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/owning-memory.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/owning-memory.html class OwningMemoryCheck : public ClangTidyCheck { public: OwningMemoryCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h index 6275aa61ba03d..d9acda1ca6fc0 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/PreferMemberInitializerCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// into the initialization list instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/prefer-member-initializer.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/prefer-member-initializer.html class PreferMemberInitializerCheck : public ClangTidyCheck { public: PreferMemberInitializerCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h index abd4e5a77009d..cea4bfacd6644 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsArrayToPointerDecayCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::cppcoreguidelines { /// This check flags all array to pointer decays /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-array-to-pointer-decay.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-array-to-pointer-decay.html class ProBoundsArrayToPointerDecayCheck : public ClangTidyCheck { public: ProBoundsArrayToPointerDecayCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsAvoidUncheckedContainerAccess.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsAvoidUncheckedContainerAccess.h index 2a89be4724037..0755da7ce4409 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsAvoidUncheckedContainerAccess.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsAvoidUncheckedContainerAccess.h @@ -19,7 +19,7 @@ namespace clang::tidy::cppcoreguidelines { /// See /// https://isocpp.github.io/CppCoreGuidelines/CppCoreGuidelines#slcon3-avoid-bounds-errors /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-avoid-unchecked-container-access.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-avoid-unchecked-container-access.html class ProBoundsAvoidUncheckedContainerAccess : public ClangTidyCheck { public: ProBoundsAvoidUncheckedContainerAccess(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h index 19d4ef8e25121..73f185529e1eb 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsConstantArrayIndexCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::cppcoreguidelines { /// have a constant index and are within bounds /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-constant-array-index.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-constant-array-index.html class ProBoundsConstantArrayIndexCheck : public ClangTidyCheck { const StringRef GslHeader; utils::IncludeInserter Inserter; diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h index 2bd113b38c4d4..45b798527ed4e 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProBoundsPointerArithmeticCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::cppcoreguidelines { /// arrays) is flagged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-pointer-arithmetic.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-bounds-pointer-arithmetic.html class ProBoundsPointerArithmeticCheck : public ClangTidyCheck { public: ProBoundsPointerArithmeticCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h index e05adc966a496..0b8cfc830854f 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeConstCastCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::cppcoreguidelines { /// Imposes limitations on the use of const_cast within C++ code. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-const-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-const-cast.html class ProTypeConstCastCheck : public ClangTidyCheck { public: ProTypeConstCastCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h index e6819c40a2bfc..f8e1d5a893da0 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeCstyleCastCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// downcast, const_cast, or reinterpret_cast. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-cstyle-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-cstyle-cast.html class ProTypeCstyleCastCheck : public ClangTidyCheck { public: ProTypeCstyleCastCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h index 58125303fb59b..8beaab394f04a 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeMemberInitCheck.h @@ -25,7 +25,7 @@ namespace clang::tidy::cppcoreguidelines { /// will result in false positives. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-member-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-member-init.html /// TODO: See if 'fixes' for false positives are optimized away by the compiler. /// TODO: For classes with multiple constructors, make sure that we don't offer /// multiple in-class initializer fixits for the same member. diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h index 63b04261ea436..4948d0ac2d785 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeReinterpretCastCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::cppcoreguidelines { /// Flags all occurrences of reinterpret_cast /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-reinterpret-cast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-reinterpret-cast.html class ProTypeReinterpretCastCheck : public ClangTidyCheck { public: ProTypeReinterpretCastCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h index 266441fd9144f..3d01fb9e52809 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeStaticCastDowncastCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// derived class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-static-cast-downcast.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-static-cast-downcast.html class ProTypeStaticCastDowncastCheck : public ClangTidyCheck { public: ProTypeStaticCastDowncastCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h index 5127e652b6466..fe82ce9630589 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeUnionAccessCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// Access to a union as a whole (e.g. passing to a function) is not flagged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-union-access.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-union-access.html class ProTypeUnionAccessCheck : public ClangTidyCheck { public: ProTypeUnionAccessCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h index f3b20e6e793e5..b28d3657703ba 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/ProTypeVarargCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// of va_arg. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-vararg.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/pro-type-vararg.html class ProTypeVarargCheck : public ClangTidyCheck { public: ProTypeVarargCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/RvalueReferenceParamNotMovedCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/RvalueReferenceParamNotMovedCheck.h index 739e1d706acc3..9fec58fb86036 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/RvalueReferenceParamNotMovedCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/RvalueReferenceParamNotMovedCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// the function body. This check implements CppCoreGuideline F.18. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/rvalue-reference-param-not-moved.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/rvalue-reference-param-not-moved.html class RvalueReferenceParamNotMovedCheck : public ClangTidyCheck { public: RvalueReferenceParamNotMovedCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h index 6d89a8a622a61..61990e6b493db 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/SlicingCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// or vtable. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/slicing.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/slicing.html class SlicingCheck : public ClangTidyCheck { public: SlicingCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h index ffd072a7f6a98..8cdaf315eac52 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/SpecialMemberFunctionsCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::cppcoreguidelines { /// are defined. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/special-member-functions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/special-member-functions.html class SpecialMemberFunctionsCheck : public ClangTidyCheck { public: SpecialMemberFunctionsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/UseEnumClassCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/UseEnumClassCheck.h index c699f9116a120..c269affc563b3 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/UseEnumClassCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/UseEnumClassCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::cppcoreguidelines { /// instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/use-enum-class.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/use-enum-class.html class UseEnumClassCheck : public ClangTidyCheck { public: UseEnumClassCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h b/clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h index 2c9d92ddeb4a7..3cfe8b2960488 100644 --- a/clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h +++ b/clang-tools-extra/clang-tidy/cppcoreguidelines/VirtualClassDestructorCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::cppcoreguidelines { /// nor protected and non-virtual. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/virtual-class-destructor.html +/// https://clang.llvm.org/extra/clang-tidy/checks/cppcoreguidelines/virtual-class-destructor.html class VirtualClassDestructorCheck : public ClangTidyCheck { public: VirtualClassDestructorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h b/clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h index 78cc968ba4efd..422292b9d9eab 100644 --- a/clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h +++ b/clang-tools-extra/clang-tidy/darwin/AvoidSpinlockCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::darwin { /// problems. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/darwin/avoid-spinlock.html +/// https://clang.llvm.org/extra/clang-tidy/checks/darwin/avoid-spinlock.html class AvoidSpinlockCheck : public ClangTidyCheck { public: AvoidSpinlockCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h b/clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h index 484b4f93e75f5..bc22ef8125f7c 100644 --- a/clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h +++ b/clang-tools-extra/clang-tidy/darwin/DispatchOnceNonstaticCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::darwin { /// storage duration, as required by the libdispatch documentation. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/darwin/dispatch-once-nonstatic.html +/// https://clang.llvm.org/extra/clang-tidy/checks/darwin/dispatch-once-nonstatic.html class DispatchOnceNonstaticCheck : public ClangTidyCheck { public: DispatchOnceNonstaticCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h b/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h index 9ba311c04e679..51bb15325c955 100644 --- a/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsCallsCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::fuchsia { /// Default arguments are not allowed in called functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/default-arguments-calls.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia/default-arguments-calls.html class DefaultArgumentsCallsCheck : public ClangTidyCheck { public: DefaultArgumentsCallsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h b/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h index b5a19c3b7c22e..1b0e3dd0a16f5 100644 --- a/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/DefaultArgumentsDeclarationsCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::fuchsia { /// Default parameters are not allowed in declared functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/default-arguments-declarations.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia/default-arguments-declarations.html class DefaultArgumentsDeclarationsCheck : public ClangTidyCheck { public: DefaultArgumentsDeclarationsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h b/clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h index 838987d20014f..66be18267ab8a 100644 --- a/clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/MultipleInheritanceCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::fuchsia { /// Multiple implementation inheritance is discouraged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/multiple-inheritance.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia/multiple-inheritance.html class MultipleInheritanceCheck : public ClangTidyCheck { public: MultipleInheritanceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h b/clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h index b974c6d7a4473..d91ecf8e468d2 100644 --- a/clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/OverloadedOperatorCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::fuchsia { /// Overloading operators is disallowed by the Fuchsia coding standard. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/overloaded-operator.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia/overloaded-operator.html class OverloadedOperatorCheck : public ClangTidyCheck { public: OverloadedOperatorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h b/clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h index 6b4ef681ee188..42d643e62f28b 100644 --- a/clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/StaticallyConstructedObjectsCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::fuchsia { /// constructor or has no explicit constructor. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/statically-constructed-objects.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia/statically-constructed-objects.html class StaticallyConstructedObjectsCheck : public ClangTidyCheck { public: StaticallyConstructedObjectsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h b/clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h index db6bc33ca0e06..c644e875b3a38 100644 --- a/clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/TrailingReturnCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::fuchsia { /// return types. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/trailing-return.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia/trailing-return.html class TrailingReturnCheck : public ClangTidyCheck { public: TrailingReturnCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h b/clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h index 8a3182dd57df7..45c6019f3abe4 100644 --- a/clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h +++ b/clang-tools-extra/clang-tidy/fuchsia/VirtualInheritanceCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::fuchsia { /// Defining classes with virtual inheritance is disallowed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/fuchsia/virtual-inheritance.html +/// https://clang.llvm.org/extra/clang-tidy/checks/fuchsia/virtual-inheritance.html class VirtualInheritanceCheck : public ClangTidyCheck { public: VirtualInheritanceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h b/clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h index dbd2034418762..a305bd524aefb 100644 --- a/clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h +++ b/clang-tools-extra/clang-tidy/google/AvoidCStyleCastsCheck.h @@ -24,7 +24,7 @@ namespace clang::tidy::google::readability { /// ones generated by `-Wold-style-cast`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/readability-casting.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/readability-casting.html class AvoidCStyleCastsCheck : public ClangTidyCheck { public: AvoidCStyleCastsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h b/clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h index fda0d5906a5cd..0b726222506a9 100644 --- a/clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h +++ b/clang-tools-extra/clang-tidy/google/AvoidNSObjectNewCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::google::objc { /// style guide. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/objc-avoid-nsobject-new.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/objc-avoid-nsobject-new.html class AvoidNSObjectNewCheck : public ClangTidyCheck { public: AvoidNSObjectNewCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h b/clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h index d32c02b9cfb4b..26a0465bc197f 100644 --- a/clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h +++ b/clang-tools-extra/clang-tidy/google/AvoidThrowingObjCExceptionCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::google::objc { /// the Google Objective-C Style Guide. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/objc-avoid-throwing-exception.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/objc-avoid-throwing-exception.html class AvoidThrowingObjCExceptionCheck : public ClangTidyCheck { public: AvoidThrowingObjCExceptionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h b/clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h index c2e39d3a7026d..921bec5438daa 100644 --- a/clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h +++ b/clang-tools-extra/clang-tidy/google/AvoidUnderscoreInGoogletestNameCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::google::readability { // https://google.github.io/googletest/faq.html#why-should-test-suite-names-and-test-names-not-contain-underscore /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/readability-avoid-underscore-in-googletest-name.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/readability-avoid-underscore-in-googletest-name.html class AvoidUnderscoreInGoogletestNameCheck : public ClangTidyCheck { public: using ClangTidyCheck::ClangTidyCheck; diff --git a/clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h b/clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h index c0e539598e00e..1d1e4e31f0c6c 100644 --- a/clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h +++ b/clang-tools-extra/clang-tidy/google/DefaultArgumentsCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::google { /// See https://google.github.io/styleguide/cppguide.html#Default_Arguments /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/default-arguments.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/default-arguments.html class DefaultArgumentsCheck : public ClangTidyCheck { public: DefaultArgumentsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h b/clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h index 4ed3671fd3951..0954a83223b7c 100644 --- a/clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h +++ b/clang-tools-extra/clang-tidy/google/ExplicitConstructorCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::google { /// See https://google.github.io/styleguide/cppguide.html#Explicit_Constructors /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/explicit-constructor.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/explicit-constructor.html class ExplicitConstructorCheck : public ClangTidyCheck { public: ExplicitConstructorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h b/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h index 49d5172f932d2..a02614fce9bac 100644 --- a/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h +++ b/clang-tools-extra/clang-tidy/google/ExplicitMakePairCheck.h @@ -21,7 +21,7 @@ namespace clang::tidy::google::build { /// Corresponding cpplint.py check name: 'build/explicit_make_pair'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/build-explicit-make-pair.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/build-explicit-make-pair.html class ExplicitMakePairCheck : public ClangTidyCheck { public: ExplicitMakePairCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/FloatTypesCheck.h b/clang-tools-extra/clang-tidy/google/FloatTypesCheck.h index b5534c046e68f..5efba5be5aa00 100644 --- a/clang-tools-extra/clang-tidy/google/FloatTypesCheck.h +++ b/clang-tools-extra/clang-tidy/google/FloatTypesCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::google::runtime { /// of portability. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/runtime-float.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/runtime-float.html class RuntimeFloatCheck : public ClangTidyCheck { public: RuntimeFloatCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h b/clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h index 1f4fe92d542a8..e4efadfd217a6 100644 --- a/clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h +++ b/clang-tools-extra/clang-tidy/google/FunctionNamingCheck.h @@ -22,7 +22,7 @@ namespace clang::tidy::google::objc { /// method or property declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/objc-function-naming.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/objc-function-naming.html class FunctionNamingCheck : public ClangTidyCheck { public: FunctionNamingCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h b/clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h index 4cc36630d3851..750b9f4f340f0 100644 --- a/clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h +++ b/clang-tools-extra/clang-tidy/google/GlobalNamesInHeadersCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::google::readability { /// Right now it only triggers on using declarations and directives. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/global-names-in-headers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/global-names-in-headers.html class GlobalNamesInHeadersCheck : public ClangTidyCheck { public: GlobalNamesInHeadersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h b/clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h index c6c32c3ff0884..9b55855b1fc86 100644 --- a/clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h +++ b/clang-tools-extra/clang-tidy/google/GlobalVariableDeclarationCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::google::objc { /// 'g[A-Z].*' (variables). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/objc-global-variable-declaration.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/objc-global-variable-declaration.html class GlobalVariableDeclarationCheck : public ClangTidyCheck { public: GlobalVariableDeclarationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.cpp b/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.cpp index 047c7f99ae299..52777fa5c4fd6 100644 --- a/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.cpp +++ b/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.cpp @@ -87,7 +87,7 @@ void IntegerTypesCheck::storeOptions(ClangTidyOptions::OptionMap &Opts) { void IntegerTypesCheck::registerMatchers(MatchFinder *Finder) { // Match any integer types, unless they are passed to a printf-based API: // - // http://google.github.io/styleguide/cppguide.html#64-bit_Portability + // https://google.github.io/styleguide/cppguide.html#64-bit_Portability // "Where possible, avoid passing arguments of types specified by // bitwidth typedefs to printf-based APIs." Finder->addMatcher( diff --git a/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h b/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h index be4989851f20a..a87c323211ec4 100644 --- a/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h +++ b/clang-tools-extra/clang-tidy/google/IntegerTypesCheck.h @@ -25,7 +25,7 @@ namespace tidy::google::runtime { /// Corresponding cpplint.py check: 'runtime/int'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/runtime-int.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/runtime-int.html class IntegerTypesCheck : public ClangTidyCheck { public: IntegerTypesCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h b/clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h index 126f0fbc61b87..fc4d5201245cb 100644 --- a/clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h +++ b/clang-tools-extra/clang-tidy/google/OverloadedUnaryAndCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::google::runtime { /// Corresponding cpplint.py check name: 'runtime/operator'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/runtime-operator.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/runtime-operator.html class OverloadedUnaryAndCheck : public ClangTidyCheck { public: OverloadedUnaryAndCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/google/TodoCommentCheck.h b/clang-tools-extra/clang-tidy/google/TodoCommentCheck.h index d56036095bab9..05f9cc6618eb1 100644 --- a/clang-tools-extra/clang-tidy/google/TodoCommentCheck.h +++ b/clang-tools-extra/clang-tidy/google/TodoCommentCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::google::readability { /// Corresponding cpplint.py check: 'readability/todo' /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/readability-todo.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/readability-todo.html class TodoCommentCheck : public ClangTidyCheck { public: TodoCommentCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h b/clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h index 84f8ae56f2635..78e8127a5a342 100644 --- a/clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h +++ b/clang-tools-extra/clang-tidy/google/UnnamedNamespaceInHeaderCheck.h @@ -21,7 +21,7 @@ namespace clang::tidy::google::build { /// Corresponding cpplint.py check name: 'build/namespaces'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/google/build-namespaces.html +/// https://clang.llvm.org/extra/clang-tidy/checks/google/build-namespaces.html class UnnamedNamespaceInHeaderCheck : public ClangTidyCheck { public: UnnamedNamespaceInHeaderCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/hicpp/ExceptionBaseclassCheck.h b/clang-tools-extra/clang-tidy/hicpp/ExceptionBaseclassCheck.h index bc21249663af8..12fe7f7eb340d 100644 --- a/clang-tools-extra/clang-tidy/hicpp/ExceptionBaseclassCheck.h +++ b/clang-tools-extra/clang-tidy/hicpp/ExceptionBaseclassCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::hicpp { /// std::exception. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/hicpp/exception-baseclass.html +/// https://clang.llvm.org/extra/clang-tidy/checks/hicpp/exception-baseclass.html class ExceptionBaseclassCheck : public ClangTidyCheck { public: ExceptionBaseclassCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/hicpp/IgnoredRemoveResultCheck.h b/clang-tools-extra/clang-tidy/hicpp/IgnoredRemoveResultCheck.h index 8cf58d5a6978a..07e624e446403 100644 --- a/clang-tools-extra/clang-tidy/hicpp/IgnoredRemoveResultCheck.h +++ b/clang-tools-extra/clang-tidy/hicpp/IgnoredRemoveResultCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::hicpp { /// are not ignored according to rule 17.5.1. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/hicpp/ignored-remove-result.html +/// https://clang.llvm.org/extra/clang-tidy/checks/hicpp/ignored-remove-result.html class IgnoredRemoveResultCheck : public bugprone::UnusedReturnValueCheck { public: IgnoredRemoveResultCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.h b/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.h index 2507f6cde338e..902be2d9d324d 100644 --- a/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.h +++ b/clang-tools-extra/clang-tidy/hicpp/MultiwayPathsCoveredCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::hicpp { /// without a final 'else'-branch. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/hicpp/multiway-paths-covered.html +/// https://clang.llvm.org/extra/clang-tidy/checks/hicpp/multiway-paths-covered.html class MultiwayPathsCoveredCheck : public ClangTidyCheck { public: MultiwayPathsCoveredCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/hicpp/NoAssemblerCheck.h b/clang-tools-extra/clang-tidy/hicpp/NoAssemblerCheck.h index cf397df1578a4..1ff40eae4622b 100644 --- a/clang-tools-extra/clang-tidy/hicpp/NoAssemblerCheck.h +++ b/clang-tools-extra/clang-tidy/hicpp/NoAssemblerCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::hicpp { /// Find assembler statements. No fix is offered. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/hicpp/no-assembler.html +/// https://clang.llvm.org/extra/clang-tidy/checks/hicpp/no-assembler.html class NoAssemblerCheck : public ClangTidyCheck { public: NoAssemblerCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/hicpp/SignedBitwiseCheck.h b/clang-tools-extra/clang-tidy/hicpp/SignedBitwiseCheck.h index b3538e7e51f58..499a4e7bebc14 100644 --- a/clang-tools-extra/clang-tidy/hicpp/SignedBitwiseCheck.h +++ b/clang-tools-extra/clang-tidy/hicpp/SignedBitwiseCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::hicpp { /// bitwise operations on signed integer types. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/hicpp/signed-bitwise.html +/// https://clang.llvm.org/extra/clang-tidy/checks/hicpp/signed-bitwise.html class SignedBitwiseCheck : public ClangTidyCheck { public: SignedBitwiseCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h b/clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h index a450f50c30cb8..e7dc0bee86ac2 100644 --- a/clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h +++ b/clang-tools-extra/clang-tidy/linuxkernel/MustCheckErrsCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::linuxkernel { /// directly return a value from one of these error functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/linuxkernel/must-check-errs.html +/// https://clang.llvm.org/extra/clang-tidy/checks/linuxkernel/must-check-errs.html class MustCheckErrsCheck : public ClangTidyCheck { public: MustCheckErrsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h b/clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h index 1eb307d8347df..cfc920bb85e23 100644 --- a/clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h +++ b/clang-tools-extra/clang-tidy/llvm/HeaderGuardCheck.h @@ -15,7 +15,7 @@ namespace clang::tidy::llvm_check { /// Finds and fixes header guards that do not adhere to LLVM style. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm/header-guard.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvm/header-guard.html class LLVMHeaderGuardCheck : public utils::HeaderGuardCheck { public: LLVMHeaderGuardCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/llvm/IncludeOrderCheck.h b/clang-tools-extra/clang-tidy/llvm/IncludeOrderCheck.h index 27c6798481866..3a424cb9166a8 100644 --- a/clang-tools-extra/clang-tidy/llvm/IncludeOrderCheck.h +++ b/clang-tools-extra/clang-tidy/llvm/IncludeOrderCheck.h @@ -15,7 +15,7 @@ namespace clang::tidy::llvm_check { /// Checks the correct order of `#includes`. /// -/// See http://llvm.org/docs/CodingStandards.html#include-style +/// See https://llvm.org/docs/CodingStandards.html#include-style class IncludeOrderCheck : public ClangTidyCheck { public: IncludeOrderCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h b/clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h index cf4b64ad21686..aed7aa84f9d07 100644 --- a/clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h +++ b/clang-tools-extra/clang-tidy/llvm/PreferIsaOrDynCastInConditionalsCheck.h @@ -46,7 +46,7 @@ namespace clang::tidy::llvm_check { /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm/prefer-isa-or-dyn-cast-in-conditionals.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvm/prefer-isa-or-dyn-cast-in-conditionals.html class PreferIsaOrDynCastInConditionalsCheck : public ClangTidyCheck { public: PreferIsaOrDynCastInConditionalsCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h b/clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h index 9a7a0c3f35857..09d2ba4bc7340 100644 --- a/clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h +++ b/clang-tools-extra/clang-tidy/llvm/PreferRegisterOverUnsignedCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::llvm_check { /// the code more explicit. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm/prefer-register-over-unsigned.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvm/prefer-register-over-unsigned.html class PreferRegisterOverUnsignedCheck : public ClangTidyCheck { public: PreferRegisterOverUnsignedCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/llvm/PreferStaticOverAnonymousNamespaceCheck.h b/clang-tools-extra/clang-tidy/llvm/PreferStaticOverAnonymousNamespaceCheck.h index a8738e6fbd70d..aa979b9040775 100644 --- a/clang-tools-extra/clang-tidy/llvm/PreferStaticOverAnonymousNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/llvm/PreferStaticOverAnonymousNamespaceCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::llvm_check { /// suggests replacing them with ``static`` declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm/prefer-static-over-anonymous-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvm/prefer-static-over-anonymous-namespace.html class PreferStaticOverAnonymousNamespaceCheck : public ClangTidyCheck { public: PreferStaticOverAnonymousNamespaceCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/llvm/UseRangesCheck.h b/clang-tools-extra/clang-tidy/llvm/UseRangesCheck.h index b985288ea0e4c..c698a4c00d402 100644 --- a/clang-tools-extra/clang-tidy/llvm/UseRangesCheck.h +++ b/clang-tools-extra/clang-tidy/llvm/UseRangesCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::llvm_check { /// range-based algorithms from `llvm/ADT/STLExtras.h`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvm/use-ranges.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvm/use-ranges.html class UseRangesCheck : public utils::UseRangesCheck { public: UseRangesCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h b/clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h index 34c628ea5f6e4..8c44ceabcced5 100644 --- a/clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/llvmlibc/CalleeNamespaceCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::llvm_libc { /// Checks all calls resolve to functions within __llvm_libc namespace. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/callee-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/callee-namespace.html class CalleeNamespaceCheck : public ClangTidyCheck { public: CalleeNamespaceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h b/clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h index da97443191b9f..62b200560fd8c 100644 --- a/clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/llvmlibc/ImplementationInNamespaceCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::llvm_libc { /// Checks all llvm-libc implementation is within the correct namespace. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/implementation-in-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/implementation-in-namespace.html class ImplementationInNamespaceCheck : public ClangTidyCheck { public: ImplementationInNamespaceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/llvmlibc/InlineFunctionDeclCheck.h b/clang-tools-extra/clang-tidy/llvmlibc/InlineFunctionDeclCheck.h index 01a8df46ec666..cf8c11d7619ed 100644 --- a/clang-tools-extra/clang-tidy/llvmlibc/InlineFunctionDeclCheck.h +++ b/clang-tools-extra/clang-tidy/llvmlibc/InlineFunctionDeclCheck.h @@ -21,7 +21,7 @@ namespace clang::tidy::llvm_libc { /// https://libc.llvm.org/dev/code_style.html. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/inline-function-decl-check.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/inline-function-decl-check.html class InlineFunctionDeclCheck : public ClangTidyCheck { public: InlineFunctionDeclCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h b/clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h index 1c7b31037875d..4a7cfa3151bb0 100644 --- a/clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h +++ b/clang-tools-extra/clang-tidy/llvmlibc/RestrictSystemLibcHeadersCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::llvm_libc { /// compiler provided. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/restrict-system-libc-headers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/llvmlibc/restrict-system-libc-headers.html class RestrictSystemLibcHeadersCheck : public portability::RestrictSystemIncludesCheck { public: diff --git a/clang-tools-extra/clang-tidy/misc/ConfusableIdentifierCheck.cpp b/clang-tools-extra/clang-tidy/misc/ConfusableIdentifierCheck.cpp index 2d0323ac04515..b05fd049cef74 100644 --- a/clang-tools-extra/clang-tidy/misc/ConfusableIdentifierCheck.cpp +++ b/clang-tools-extra/clang-tidy/misc/ConfusableIdentifierCheck.cpp @@ -30,7 +30,7 @@ ConfusableIdentifierCheck::ConfusableIdentifierCheck(StringRef Name, ConfusableIdentifierCheck::~ConfusableIdentifierCheck() = default; // Build a skeleton out of the Original identifier, inspired by the algorithm -// described in http://www.unicode.org/reports/tr39/#def-skeleton +// described in https://www.unicode.org/reports/tr39/#def-skeleton // // FIXME: TR39 mandates: // diff --git a/clang-tools-extra/clang-tidy/misc/ConstCorrectnessCheck.h b/clang-tools-extra/clang-tidy/misc/ConstCorrectnessCheck.h index 650f35b50e189..fafcac407e029 100644 --- a/clang-tools-extra/clang-tidy/misc/ConstCorrectnessCheck.h +++ b/clang-tools-extra/clang-tidy/misc/ConstCorrectnessCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::misc { /// This check warns on variables which could be declared const but are not. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/const-correctness.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/const-correctness.html class ConstCorrectnessCheck : public ClangTidyCheck { public: ConstCorrectnessCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/misc/CoroutineHostileRAIICheck.h b/clang-tools-extra/clang-tidy/misc/CoroutineHostileRAIICheck.h index 95c2b04b82ea7..e100509ea261d 100644 --- a/clang-tools-extra/clang-tidy/misc/CoroutineHostileRAIICheck.h +++ b/clang-tools-extra/clang-tidy/misc/CoroutineHostileRAIICheck.h @@ -22,7 +22,7 @@ namespace clang::tidy::misc { /// types and types belonging to a configurable denylist. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/coroutine-hostile-raii.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/coroutine-hostile-raii.html class CoroutineHostileRAIICheck : public ClangTidyCheck { public: CoroutineHostileRAIICheck(llvm::StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h b/clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h index ce1293038078c..0c162cc53ff5f 100644 --- a/clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h +++ b/clang-tools-extra/clang-tidy/misc/DefinitionsInHeadersCheck.h @@ -22,7 +22,7 @@ namespace clang::tidy::misc { /// header files. True by default. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/definitions-in-headers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/definitions-in-headers.html class DefinitionsInHeadersCheck : public ClangTidyCheck { public: DefinitionsInHeadersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/misc/HeaderIncludeCycleCheck.h b/clang-tools-extra/clang-tidy/misc/HeaderIncludeCycleCheck.h index dcf538c4c2844..df66beb517255 100644 --- a/clang-tools-extra/clang-tidy/misc/HeaderIncludeCycleCheck.h +++ b/clang-tools-extra/clang-tidy/misc/HeaderIncludeCycleCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::misc { /// Check detects cyclic #include dependencies between user-defined headers. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/header-include-cycle.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/header-include-cycle.html class HeaderIncludeCycleCheck : public ClangTidyCheck { public: HeaderIncludeCycleCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/misc/IncludeCleanerCheck.h b/clang-tools-extra/clang-tidy/misc/IncludeCleanerCheck.h index 941a2aad79856..43e1ed894a16c 100644 --- a/clang-tools-extra/clang-tidy/misc/IncludeCleanerCheck.h +++ b/clang-tools-extra/clang-tidy/misc/IncludeCleanerCheck.h @@ -29,7 +29,7 @@ namespace clang::tidy::misc { /// Findings correspond to https://clangd.llvm.org/design/include-cleaner. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/include-cleaner.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/include-cleaner.html class IncludeCleanerCheck : public ClangTidyCheck { public: IncludeCleanerCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h b/clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h index 1abacb4c16426..2b8a05d003fad 100644 --- a/clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h +++ b/clang-tools-extra/clang-tidy/misc/MisplacedConstCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::misc { /// pointer type rather than to the pointee. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/misplaced-const.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/misplaced-const.html class MisplacedConstCheck : public ClangTidyCheck { public: MisplacedConstCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h b/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h index b678137927351..234883747036d 100644 --- a/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h +++ b/clang-tools-extra/clang-tidy/misc/NoRecursionCheck.h @@ -22,7 +22,7 @@ namespace tidy::misc { /// and displays one example of possible call graph loop (recursion). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/no-recursion.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/no-recursion.html class NoRecursionCheck : public ClangTidyCheck { public: NoRecursionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h b/clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h index 09077226eb5c5..a507eae13e7dc 100644 --- a/clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h +++ b/clang-tools-extra/clang-tidy/misc/NonPrivateMemberVariablesInClassesCheck.h @@ -23,7 +23,7 @@ namespace clang::tidy::misc { /// ignored and optionally all `public` member variables could be ignored. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/non-private-member-variables-in-classes.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/non-private-member-variables-in-classes.html class NonPrivateMemberVariablesInClassesCheck : public ClangTidyCheck { public: NonPrivateMemberVariablesInClassesCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/misc/OverrideWithDifferentVisibilityCheck.h b/clang-tools-extra/clang-tidy/misc/OverrideWithDifferentVisibilityCheck.h index 6e0909524991d..d8da30bd738d6 100644 --- a/clang-tools-extra/clang-tidy/misc/OverrideWithDifferentVisibilityCheck.h +++ b/clang-tools-extra/clang-tidy/misc/OverrideWithDifferentVisibilityCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::misc { /// in the base class. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/override-with-different-visibility.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/override-with-different-visibility.html class OverrideWithDifferentVisibilityCheck : public ClangTidyCheck { public: enum class ChangeKind { Any, Widening, Narrowing }; diff --git a/clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h b/clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h index 784548355c164..57289c39df22d 100644 --- a/clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h +++ b/clang-tools-extra/clang-tidy/misc/RedundantExpressionCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::misc { /// ineffective, useless parts. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/redundant-expression.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/redundant-expression.html class RedundantExpressionCheck : public ClangTidyCheck { public: RedundantExpressionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h b/clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h index 960c85eb89cbc..be9e7b971256c 100644 --- a/clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h +++ b/clang-tools-extra/clang-tidy/misc/UnconventionalAssignOperatorCheck.h @@ -23,7 +23,7 @@ namespace clang::tidy::misc { /// * The operator must always return ``*this``. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/unconventional-assign-operator.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/unconventional-assign-operator.html class UnconventionalAssignOperatorCheck : public ClangTidyCheck { public: UnconventionalAssignOperatorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h b/clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h index ce77acf443e2c..96d8d9da3ceb2 100644 --- a/clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h +++ b/clang-tools-extra/clang-tidy/misc/UnusedUsingDeclsCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::misc { /// Finds unused using declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/unused-using-decls.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/unused-using-decls.html class UnusedUsingDeclsCheck : public ClangTidyCheck { public: UnusedUsingDeclsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/misc/UseAnonymousNamespaceCheck.h b/clang-tools-extra/clang-tidy/misc/UseAnonymousNamespaceCheck.h index 10e10b0c32360..8548fbbc6a3cc 100644 --- a/clang-tools-extra/clang-tidy/misc/UseAnonymousNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/misc/UseAnonymousNamespaceCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::misc { /// suggests moving them to an anonymous namespace. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/use-anonymous-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/use-anonymous-namespace.html class UseAnonymousNamespaceCheck : public ClangTidyCheck { public: UseAnonymousNamespaceCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/misc/UseInternalLinkageCheck.h b/clang-tools-extra/clang-tidy/misc/UseInternalLinkageCheck.h index 8c82ac0b6b644..eedb5bd1adcab 100644 --- a/clang-tools-extra/clang-tidy/misc/UseInternalLinkageCheck.h +++ b/clang-tools-extra/clang-tidy/misc/UseInternalLinkageCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::misc { /// an anonymous namespace to enforce internal linkage. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/misc/use-internal-linkage.html +/// https://clang.llvm.org/extra/clang-tidy/checks/misc/use-internal-linkage.html class UseInternalLinkageCheck : public ClangTidyCheck { public: UseInternalLinkageCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h b/clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h index ba9e562324e55..94838cb1b5a78 100644 --- a/clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/AvoidBindCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::modernize { /// FIXME: Add support for function references and member function references. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/avoid-bind.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/avoid-bind.html class AvoidBindCheck : public ClangTidyCheck { public: AvoidBindCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h b/clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h index ff0809644050b..98488b8429002 100644 --- a/clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/AvoidCArraysCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::modernize { /// Find C-style array types and recommend to use std::array<> / std::vector<>. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/avoid-c-arrays.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/avoid-c-arrays.html class AvoidCArraysCheck : public ClangTidyCheck { public: AvoidCArraysCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/AvoidSetjmpLongjmpCheck.h b/clang-tools-extra/clang-tidy/modernize/AvoidSetjmpLongjmpCheck.h index 23a1cd169e152..d03617284f6d1 100644 --- a/clang-tools-extra/clang-tidy/modernize/AvoidSetjmpLongjmpCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/AvoidSetjmpLongjmpCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::modernize { /// Guards against use of setjmp/longjmp in C++ code /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/avoid-setjmp-longjmp.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/avoid-setjmp-longjmp.html class AvoidSetjmpLongjmpCheck : public ClangTidyCheck { public: AvoidSetjmpLongjmpCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/AvoidVariadicFunctionsCheck.h b/clang-tools-extra/clang-tidy/modernize/AvoidVariadicFunctionsCheck.h index d93e9d0c5d678..4fdea59983410 100644 --- a/clang-tools-extra/clang-tidy/modernize/AvoidVariadicFunctionsCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/AvoidVariadicFunctionsCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::modernize { /// Find all function definitions of C-style variadic functions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/avoid-variadic-functions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/avoid-variadic-functions.html class AvoidVariadicFunctionsCheck : public ClangTidyCheck { public: AvoidVariadicFunctionsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h b/clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h index c9409cb641c54..cbd1075497d8d 100644 --- a/clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/DeprecatedHeadersCheck.h @@ -29,7 +29,7 @@ namespace clang::tidy::modernize { /// Example: `` => `` /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/deprecated-headers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/deprecated-headers.html class DeprecatedHeadersCheck : public ClangTidyCheck { public: DeprecatedHeadersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h b/clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h index 0a0b4deb5abba..496f9cb4f271b 100644 --- a/clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/DeprecatedIosBaseAliasesCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::modernize { /// ``std::ios_base`` and replaces those that have a non-deprecated equivalent. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/deprecated-ios-base-aliases.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/deprecated-ios-base-aliases.html class DeprecatedIosBaseAliasesCheck : public ClangTidyCheck { public: DeprecatedIosBaseAliasesCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h b/clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h index 3f339f364d722..55c503a07f64f 100644 --- a/clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/MacroToEnumCheck.h @@ -18,7 +18,7 @@ class MacroToEnumCallbacks; /// Replaces groups of related macros with an unscoped anonymous enum. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/macro-to-enum.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/macro-to-enum.html class MacroToEnumCheck : public ClangTidyCheck { public: MacroToEnumCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h b/clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h index 025ce757b3d5f..063b35fc46d4f 100644 --- a/clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/MakeSharedCheck.h @@ -24,7 +24,7 @@ namespace clang::tidy::modernize { /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/make-shared.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/make-shared.html class MakeSharedCheck : public MakeSmartPtrCheck { public: MakeSharedCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h b/clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h index 5af9f846db29b..8ce6ec0bef636 100644 --- a/clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/RawStringLiteralCheck.h @@ -20,7 +20,7 @@ using CharsBitSet = std::bitset<1 << CHAR_BIT>; /// raw string literals. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/raw-string-literal.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/raw-string-literal.html class RawStringLiteralCheck : public ClangTidyCheck { public: RawStringLiteralCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h b/clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h index 44ca787fa4fcc..a58c22ba04ed3 100644 --- a/clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/ReplaceDisallowCopyAndAssignMacroCheck.h @@ -35,7 +35,7 @@ namespace clang::tidy::modernize { /// ~~~ /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/replace-disallow-copy-and-assign-macro.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/replace-disallow-copy-and-assign-macro.html class ReplaceDisallowCopyAndAssignMacroCheck : public ClangTidyCheck { public: ReplaceDisallowCopyAndAssignMacroCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h b/clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h index 23571dfa92175..5f2be10ca66bb 100644 --- a/clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/ReplaceRandomShuffleCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::modernize { /// replace all occurrences of std::random_shuffle with std::shuffle. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/replace-random-shuffle.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/replace-random-shuffle.html class ReplaceRandomShuffleCheck : public ClangTidyCheck { public: ReplaceRandomShuffleCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h b/clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h index c023cb5c4c2ca..ef465ea5e189d 100644 --- a/clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/ReturnBracedInitListCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::modernize { /// repeating the return type name. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/return-braced-init-list.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/return-braced-init-list.html class ReturnBracedInitListCheck : public ClangTidyCheck { public: ReturnBracedInitListCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/TypeTraitsCheck.h b/clang-tools-extra/clang-tidy/modernize/TypeTraitsCheck.h index 1f9ffc9b8b811..afbadba7741b7 100644 --- a/clang-tools-extra/clang-tidy/modernize/TypeTraitsCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/TypeTraitsCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::modernize { /// `traits<...>::value` into `traits_t<...>` and `traits_v<...>` respectively. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/type-traits.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/type-traits.html class TypeTraitsCheck : public ClangTidyCheck { public: TypeTraitsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h b/clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h index 94e78f01b06f9..95611c9b13e77 100644 --- a/clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UnaryStaticAssertCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::modernize { /// with the unary version. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/unary-static-assert.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/unary-static-assert.html class UnaryStaticAssertCheck : public ClangTidyCheck { public: UnaryStaticAssertCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h b/clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h index 5b7b1e0cc3b6e..64aff84b1be64 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseBoolLiteralsCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::modernize { /// Finds integer literals which are cast to bool. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-bool-literals.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-bool-literals.html class UseBoolLiteralsCheck : public ClangTidyCheck { public: UseBoolLiteralsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseConstraintsCheck.h b/clang-tools-extra/clang-tidy/modernize/UseConstraintsCheck.h index bf49f329baeab..c4c5c791d4a40 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseConstraintsCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseConstraintsCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::modernize { /// Replace enable_if with C++20 requires clauses. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-constraints.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-constraints.html class UseConstraintsCheck : public ClangTidyCheck { public: UseConstraintsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h b/clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h index 7ae04b78006a1..be6a18ad66d99 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseDefaultMemberInitCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::modernize { /// member initializer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-default-member-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-default-member-init.html class UseDefaultMemberInitCheck : public ClangTidyCheck { public: UseDefaultMemberInitCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseDesignatedInitializersCheck.h b/clang-tools-extra/clang-tidy/modernize/UseDesignatedInitializersCheck.h index e010509474287..2ca131963387d 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseDesignatedInitializersCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseDesignatedInitializersCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::modernize { /// written as designated initializers instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-designated-initializers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-designated-initializers.html class UseDesignatedInitializersCheck : public ClangTidyCheck { public: UseDesignatedInitializersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseEmplaceCheck.h b/clang-tools-extra/clang-tidy/modernize/UseEmplaceCheck.h index 2e9e142894a47..87ebf6ff98c2b 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseEmplaceCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseEmplaceCheck.h @@ -21,7 +21,7 @@ namespace clang::tidy::modernize { /// constructor of temporary object. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-emplace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-emplace.html class UseEmplaceCheck : public ClangTidyCheck { public: UseEmplaceCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h b/clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h index 51b386c2acaca..519f1899170cc 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseEqualsDefaultCheck.h @@ -31,7 +31,7 @@ namespace clang::tidy::modernize { /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-equals-default.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-equals-default.html class UseEqualsDefaultCheck : public ClangTidyCheck { public: UseEqualsDefaultCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h b/clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h index 590aa900b8768..31a956bc49c5f 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseEqualsDeleteCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::modernize { /// deleted member function from the ``private`` to the ``public`` section. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-equals-delete.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-equals-delete.html class UseEqualsDeleteCheck : public ClangTidyCheck { public: UseEqualsDeleteCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseIntegerSignComparisonCheck.h b/clang-tools-extra/clang-tidy/modernize/UseIntegerSignComparisonCheck.h index 106796f0c8072..860b9c882f6ea 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseIntegerSignComparisonCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseIntegerSignComparisonCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::modernize { /// C++20 ``std::cmp_*`` alternative, if available. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-integer-sign-comparison.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-integer-sign-comparison.html class UseIntegerSignComparisonCheck : public ClangTidyCheck { public: UseIntegerSignComparisonCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h b/clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h index cc46769900dd3..94d65cfae56ce 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseNodiscardCheck.h @@ -28,7 +28,7 @@ namespace clang::tidy::modernize { /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-nodiscard.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-nodiscard.html class UseNodiscardCheck : public ClangTidyCheck { public: UseNodiscardCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h b/clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h index 3a915e1fe7238..30b5d4ecd1cf2 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseNoexceptCheck.h @@ -26,7 +26,7 @@ namespace clang::tidy::modernize { /// \endcode /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-noexcept.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-noexcept.html class UseNoexceptCheck : public ClangTidyCheck { public: UseNoexceptCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseRangesCheck.h b/clang-tools-extra/clang-tidy/modernize/UseRangesCheck.h index 80ea6996afe55..d3a76dac912bb 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseRangesCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseRangesCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::modernize { /// replaced with a ranges version instead /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-ranges.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-ranges.html class UseRangesCheck : public utils::UseRangesCheck { public: UseRangesCheck(StringRef CheckName, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseScopedLockCheck.h b/clang-tools-extra/clang-tidy/modernize/UseScopedLockCheck.h index 553031857e086..8f6b5a4b2aaff 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseScopedLockCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseScopedLockCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::modernize { /// alternative ``std::scoped_lock``. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-scoped-lock.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-scoped-lock.html class UseScopedLockCheck : public ClangTidyCheck { public: UseScopedLockCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseStartsEndsWithCheck.h b/clang-tools-extra/clang-tidy/modernize/UseStartsEndsWithCheck.h index 70df8b87cb6f4..e71ebe7602bd4 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseStartsEndsWithCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseStartsEndsWithCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::modernize { /// ``std::string_view``. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-starts-ends-with.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-starts-ends-with.html class UseStartsEndsWithCheck : public ClangTidyCheck { public: UseStartsEndsWithCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseStdFormatCheck.h b/clang-tools-extra/clang-tidy/modernize/UseStdFormatCheck.h index e369c17a0f733..7dad065f218d7 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseStdFormatCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseStdFormatCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::modernize { /// now-unnecessary calls to std::string::c_str() and std::string::data(). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-std-format.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-std-format.html class UseStdFormatCheck : public ClangTidyCheck { public: UseStdFormatCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseStdNumbersCheck.h b/clang-tools-extra/clang-tidy/modernize/UseStdNumbersCheck.h index f1bd3b4eee2ba..e8853609af3c9 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseStdNumbersCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseStdNumbersCheck.h @@ -21,7 +21,7 @@ namespace clang::tidy::modernize { /// offers a replacement at the definition of those variables. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-std-numbers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-std-numbers.html class UseStdNumbersCheck : public ClangTidyCheck { public: UseStdNumbersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseStdPrintCheck.h b/clang-tools-extra/clang-tidy/modernize/UseStdPrintCheck.h index 1f7660991a275..f5b3f719c56ce 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseStdPrintCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseStdPrintCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::modernize { /// Convert calls to printf-like functions to std::print and std::println /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-std-print.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-std-print.html class UseStdPrintCheck : public ClangTidyCheck { public: UseStdPrintCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h b/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h index 9050bd5eba5e2..4aa1adaf30db5 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseTrailingReturnTypeCheck.h @@ -23,7 +23,7 @@ struct ClassifiedToken { /// Rewrites function signatures to use a trailing return type. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-trailing-return-type.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-trailing-return-type.html class UseTrailingReturnTypeCheck : public ClangTidyCheck { public: UseTrailingReturnTypeCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h b/clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h index dc9c76e8875a0..0af729b54cfce 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseTransparentFunctorsCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::modernize { /// Prefer using transparent functors to non-transparent ones. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-transparent-functors.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-transparent-functors.html class UseTransparentFunctorsCheck : public ClangTidyCheck { public: UseTransparentFunctorsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h b/clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h index 4c63efe0c6919..772133d492a9f 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseUncaughtExceptionsCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::modernize { /// without fixits. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-uncaught-exceptions.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-uncaught-exceptions.html class UseUncaughtExceptionsCheck : public ClangTidyCheck { public: UseUncaughtExceptionsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h b/clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h index 4ab1c4f6b9646..5ecabc7a17a45 100644 --- a/clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h +++ b/clang-tools-extra/clang-tidy/modernize/UseUsingCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::modernize { /// Check finds typedefs and replaces it with usings. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/modernize/use-using.html +/// https://clang.llvm.org/extra/clang-tidy/checks/modernize/use-using.html class UseUsingCheck : public ClangTidyCheck { const bool IgnoreMacros; diff --git a/clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h b/clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h index 7922750c135ac..07ee68a55b6b4 100644 --- a/clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h +++ b/clang-tools-extra/clang-tidy/mpi/BufferDerefCheck.h @@ -23,7 +23,7 @@ namespace clang::tidy::mpi { /// emitted. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/mpi/buffer-deref.html +/// https://clang.llvm.org/extra/clang-tidy/checks/mpi/buffer-deref.html class BufferDerefCheck : public ClangTidyCheck { public: BufferDerefCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h b/clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h index 60bcb0f3cf70c..5a7db17819967 100644 --- a/clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h +++ b/clang-tools-extra/clang-tidy/mpi/TypeMismatchCheck.h @@ -22,7 +22,7 @@ namespace clang::tidy::mpi { /// null pointer constants are skipped, in the course of verification. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/mpi/type-mismatch.html +/// https://clang.llvm.org/extra/clang-tidy/checks/mpi/type-mismatch.html class TypeMismatchCheck : public ClangTidyCheck { public: TypeMismatchCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/AssertEquals.h b/clang-tools-extra/clang-tidy/objc/AssertEquals.h index 0f4e303feea8b..8c21f9bd3a75e 100644 --- a/clang-tools-extra/clang-tidy/objc/AssertEquals.h +++ b/clang-tools-extra/clang-tidy/objc/AssertEquals.h @@ -18,7 +18,7 @@ namespace clang::tidy::objc { /// operands of type NSString*. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc/assert-equals.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc/assert-equals.html class AssertEquals final : public ClangTidyCheck { public: AssertEquals(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h b/clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h index 2fd3d11559a39..eba9f719ab26f 100644 --- a/clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h +++ b/clang-tools-extra/clang-tidy/objc/AvoidNSErrorInitCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::objc { /// NSError. errorWithDomain:code:userInfo: should be used instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc/avoid-nserror-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc/avoid-nserror-init.html class AvoidNSErrorInitCheck : public ClangTidyCheck { public: AvoidNSErrorInitCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h b/clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h index f44a123055eee..0b35655256544 100644 --- a/clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h +++ b/clang-tools-extra/clang-tidy/objc/DeallocInCategoryCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::objc { /// potentially causing issues. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc/dealloc-in-category.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc/dealloc-in-category.html class DeallocInCategoryCheck final : public ClangTidyCheck { public: DeallocInCategoryCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h b/clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h index 1f345c1da5156..2d238690d627a 100644 --- a/clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h +++ b/clang-tools-extra/clang-tidy/objc/ForbiddenSubclassingCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::objc { /// documented to not support subclassing. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc/forbidden-subclassing.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc/forbidden-subclassing.html class ForbiddenSubclassingCheck : public ClangTidyCheck { public: ForbiddenSubclassingCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/objc/MissingHashCheck.h b/clang-tools-extra/clang-tidy/objc/MissingHashCheck.h index cf0261e3cc38a..d94da489b1740 100644 --- a/clang-tools-extra/clang-tidy/objc/MissingHashCheck.h +++ b/clang-tools-extra/clang-tidy/objc/MissingHashCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::objc { /// appropriately implementing -hash. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc/missing-hash.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc/missing-hash.html class MissingHashCheck : public ClangTidyCheck { public: MissingHashCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.cpp b/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.cpp index 6a9adfe7d282d..763a6af5e3ee9 100644 --- a/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.cpp +++ b/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.cpp @@ -43,7 +43,7 @@ static bool isValidDatePattern(StringRef Pattern) { // Checks if the string pattern used as a date format specifier contains // any incorrect pattern and reports it as a warning. -// See: http://www.unicode.org/reports/tr35/tr35-dates.html#Date_Format_Patterns +// See: https://www.unicode.org/reports/tr35/tr35-dates.html#Date_Format_Patterns void NSDateFormatterCheck::check(const MatchFinder::MatchResult &Result) { // Callback implementation. const auto *StrExpr = Result.Nodes.getNodeAs("str_lit"); diff --git a/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.h b/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.h index dc0e89a08b680..706249c2e51f1 100644 --- a/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.h +++ b/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::objc { /// warnings if it contains any incorrect sub-pattern. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc/nsdate-formatter.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc/nsdate-formatter.html class NSDateFormatterCheck : public ClangTidyCheck { public: NSDateFormatterCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h b/clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h index d09ea8cc10298..d9d6c282256c5 100644 --- a/clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h +++ b/clang-tools-extra/clang-tidy/objc/NSInvocationArgumentLifetimeCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::objc { /// argument object lifetimes. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc/nsinvocation-argument-lifetime.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc/nsinvocation-argument-lifetime.html class NSInvocationArgumentLifetimeCheck : public ClangTidyCheck { public: NSInvocationArgumentLifetimeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h b/clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h index c883e59321124..daaebb11673a8 100644 --- a/clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h +++ b/clang-tools-extra/clang-tidy/objc/PropertyDeclarationCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::objc { /// @property(nonatomic) NSString *lowerCamelCase; /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc/property-declaration.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc/property-declaration.html class PropertyDeclarationCheck : public ClangTidyCheck { public: PropertyDeclarationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h b/clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h index baeba560a8fef..059ec680327ac 100644 --- a/clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h +++ b/clang-tools-extra/clang-tidy/objc/SuperSelfCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::objc { /// of NSObject and recommends calling a superclass initializer instead. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/objc/super-self.html +/// https://clang.llvm.org/extra/clang-tidy/checks/objc/super-self.html class SuperSelfCheck : public ClangTidyCheck { public: SuperSelfCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h b/clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h index 1703f55f902ba..39da124a4b37c 100644 --- a/clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h +++ b/clang-tools-extra/clang-tidy/openmp/ExceptionEscapeCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::openmp { /// out of the Structured Block it was thrown in. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/openmp/exception-escape.html +/// https://clang.llvm.org/extra/clang-tidy/checks/openmp/exception-escape.html class ExceptionEscapeCheck : public ClangTidyCheck { public: ExceptionEscapeCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h b/clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h index fb6b528df3ffb..659dab2759a52 100644 --- a/clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h +++ b/clang-tools-extra/clang-tidy/openmp/UseDefaultNoneCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::openmp { /// other than ``none``, and suggests to use the ``default(none)`` clause. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/openmp/use-default-none.html +/// https://clang.llvm.org/extra/clang-tidy/checks/openmp/use-default-none.html class UseDefaultNoneCheck : public ClangTidyCheck { public: UseDefaultNoneCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/performance/EnumSizeCheck.h b/clang-tools-extra/clang-tidy/performance/EnumSizeCheck.h index d87e6b8ab9f5e..aa606edbc60dd 100644 --- a/clang-tools-extra/clang-tidy/performance/EnumSizeCheck.h +++ b/clang-tools-extra/clang-tidy/performance/EnumSizeCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::performance { /// base. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/enum-size.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/enum-size.html class EnumSizeCheck : public ClangTidyCheck { public: EnumSizeCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h b/clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h index a7ab79a3809d4..2452d2e66ecd4 100644 --- a/clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h +++ b/clang-tools-extra/clang-tidy/performance/FasterStringFindCheck.h @@ -21,7 +21,7 @@ namespace clang::tidy::performance { /// The character literal overload is more efficient. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/faster-string-find.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/faster-string-find.html class FasterStringFindCheck : public ClangTidyCheck { public: FasterStringFindCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h b/clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h index 3ed05fecd015d..afe2f083aa1cf 100644 --- a/clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h +++ b/clang-tools-extra/clang-tidy/performance/ForRangeCopyCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::performance { /// A check that detects copied loop variables and suggests using const /// references. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/for-range-copy.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/for-range-copy.html class ForRangeCopyCheck : public ClangTidyCheck { public: ForRangeCopyCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h b/clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h index 810c0109574e9..b82a838e737d8 100644 --- a/clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h +++ b/clang-tools-extra/clang-tidy/performance/InefficientStringConcatenationCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::performance { /// concatenating strings, using the operator+, instead of operator+=. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/inefficient-string-concatenation.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/inefficient-string-concatenation.html class InefficientStringConcatenationCheck : public ClangTidyCheck { public: InefficientStringConcatenationCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h b/clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h index 9737d9d5ecb1a..18f7c1937edf7 100644 --- a/clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h +++ b/clang-tools-extra/clang-tidy/performance/InefficientVectorOperationCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::performance { /// field without calling Reserve() first. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/inefficient-vector-operation.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/inefficient-vector-operation.html class InefficientVectorOperationCheck : public ClangTidyCheck { public: InefficientVectorOperationCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h b/clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h index 7c5aec8c59fc8..be0a24e6c1280 100644 --- a/clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h +++ b/clang-tools-extra/clang-tidy/performance/MoveConstructorInitCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::performance { /// initializing a member or base class through a copy constructor instead of a /// move constructor. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/move-constructor-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/move-constructor-init.html class MoveConstructorInitCheck : public ClangTidyCheck { public: MoveConstructorInitCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h b/clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h index af80e74f3a5b4..b78e0b98921a4 100644 --- a/clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h +++ b/clang-tools-extra/clang-tidy/performance/NoAutomaticMoveCheck.h @@ -15,7 +15,7 @@ namespace clang::tidy::performance { /// Finds local variables that cannot be automatically moved due to constness. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/no-automatic-move.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/no-automatic-move.html class NoAutomaticMoveCheck : public ClangTidyCheck { public: NoAutomaticMoveCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h b/clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h index ed6f60f697da4..c3af0776cfd4a 100644 --- a/clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h +++ b/clang-tools-extra/clang-tidy/performance/NoIntToPtrCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::performance { /// Diagnoses every integer to pointer cast. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/no-int-to-ptr.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/no-int-to-ptr.html class NoIntToPtrCheck : public ClangTidyCheck { public: NoIntToPtrCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h b/clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h index ae96359a544ce..bf3d4801cc1a8 100644 --- a/clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h +++ b/clang-tools-extra/clang-tidy/performance/TriviallyDestructibleCheck.h @@ -22,7 +22,7 @@ namespace clang::tidy::performance { /// A::~A() = default; /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/trivially-destructible.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/trivially-destructible.html class TriviallyDestructibleCheck : public ClangTidyCheck { public: TriviallyDestructibleCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h b/clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h index 9d9b073c80400..cf74f80006274 100644 --- a/clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h +++ b/clang-tools-extra/clang-tidy/performance/TypePromotionInMathFnCheck.h @@ -22,7 +22,7 @@ namespace clang::tidy::performance { /// C). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/type-promotion-in-math-fn.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/type-promotion-in-math-fn.html class TypePromotionInMathFnCheck : public ClangTidyCheck { public: TypePromotionInMathFnCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h b/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h index 571857020cef4..d59fb4105381e 100644 --- a/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h +++ b/clang-tools-extra/clang-tidy/performance/UnnecessaryValueParamCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::performance { /// can safely be converted to const references. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/performance/unnecessary-value-param.html +/// https://clang.llvm.org/extra/clang-tidy/checks/performance/unnecessary-value-param.html class UnnecessaryValueParamCheck : public ClangTidyCheck { public: UnnecessaryValueParamCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/portability/AvoidPragmaOnceCheck.h b/clang-tools-extra/clang-tidy/portability/AvoidPragmaOnceCheck.h index 3638a9c46773e..97c7eb6c1eb6f 100644 --- a/clang-tools-extra/clang-tidy/portability/AvoidPragmaOnceCheck.h +++ b/clang-tools-extra/clang-tidy/portability/AvoidPragmaOnceCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::portability { /// portability. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability/avoid-pragma-once.html +/// https://clang.llvm.org/extra/clang-tidy/checks/portability/avoid-pragma-once.html class AvoidPragmaOnceCheck : public ClangTidyCheck { public: AvoidPragmaOnceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h b/clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h index 5347ae9d68b02..e37f89336bc92 100644 --- a/clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h +++ b/clang-tools-extra/clang-tidy/portability/RestrictSystemIncludesCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::portability { /// includes are specified, the check will exit without issuing any warnings. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability/restrict-system-includes.html +/// https://clang.llvm.org/extra/clang-tidy/checks/portability/restrict-system-includes.html class RestrictSystemIncludesCheck : public ClangTidyCheck { public: RestrictSystemIncludesCheck(StringRef Name, ClangTidyContext *Context, diff --git a/clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h b/clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h index ab0711335c920..db2d2307b1943 100644 --- a/clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h +++ b/clang-tools-extra/clang-tidy/portability/SIMDIntrinsicsCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::portability { /// Find SIMD intrinsics calls and suggest std::experimental::simd alternatives. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability/simd-intrinsics.html +/// https://clang.llvm.org/extra/clang-tidy/checks/portability/simd-intrinsics.html class SIMDIntrinsicsCheck : public ClangTidyCheck { public: SIMDIntrinsicsCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h b/clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h index b2f5feac21918..b62847f3dc277 100644 --- a/clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h +++ b/clang-tools-extra/clang-tidy/portability/StdAllocatorConstCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::portability { /// ``std::allocator``. They do not compile with libstdc++ or MSVC. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability/std-allocator-const.html +/// https://clang.llvm.org/extra/clang-tidy/checks/portability/std-allocator-const.html class StdAllocatorConstCheck : public ClangTidyCheck { public: StdAllocatorConstCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/portability/TemplateVirtualMemberFunctionCheck.h b/clang-tools-extra/clang-tidy/portability/TemplateVirtualMemberFunctionCheck.h index 01d5519d7e6fd..485bdef9b58dd 100644 --- a/clang-tools-extra/clang-tidy/portability/TemplateVirtualMemberFunctionCheck.h +++ b/clang-tools-extra/clang-tidy/portability/TemplateVirtualMemberFunctionCheck.h @@ -21,7 +21,7 @@ namespace clang::tidy::portability { /// compiler. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/portability/template-virtual-member-function.html +/// https://clang.llvm.org/extra/clang-tidy/checks/portability/template-virtual-member-function.html class TemplateVirtualMemberFunctionCheck : public ClangTidyCheck { public: TemplateVirtualMemberFunctionCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/AmbiguousSmartptrResetCallCheck.h b/clang-tools-extra/clang-tidy/readability/AmbiguousSmartptrResetCallCheck.h index 763cd7f01f9c3..f840cbec53473 100644 --- a/clang-tools-extra/clang-tidy/readability/AmbiguousSmartptrResetCallCheck.h +++ b/clang-tools-extra/clang-tidy/readability/AmbiguousSmartptrResetCallCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// the pointee type also has a 'reset' method /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/ambiguous-smartptr-reset-call.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/ambiguous-smartptr-reset-call.html class AmbiguousSmartptrResetCallCheck : public ClangTidyCheck { public: AmbiguousSmartptrResetCallCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/AvoidNestedConditionalOperatorCheck.h b/clang-tools-extra/clang-tidy/readability/AvoidNestedConditionalOperatorCheck.h index b14af6a0cf1c7..260c84304e138 100644 --- a/clang-tools-extra/clang-tidy/readability/AvoidNestedConditionalOperatorCheck.h +++ b/clang-tools-extra/clang-tidy/readability/AvoidNestedConditionalOperatorCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Identifies instances of nested conditional operators in the code. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/avoid-nested-conditional-operator.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/avoid-nested-conditional-operator.html class AvoidNestedConditionalOperatorCheck : public ClangTidyCheck { public: AvoidNestedConditionalOperatorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/AvoidReturnWithVoidValueCheck.h b/clang-tools-extra/clang-tidy/readability/AvoidReturnWithVoidValueCheck.h index 93e6268fd5dd5..1533b9acf2c02 100644 --- a/clang-tools-extra/clang-tidy/readability/AvoidReturnWithVoidValueCheck.h +++ b/clang-tools-extra/clang-tidy/readability/AvoidReturnWithVoidValueCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// result types. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/avoid-return-with-void-value.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/avoid-return-with-void-value.html class AvoidReturnWithVoidValueCheck : public ClangTidyCheck { public: AvoidReturnWithVoidValueCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/AvoidUnconditionalPreprocessorIfCheck.h b/clang-tools-extra/clang-tidy/readability/AvoidUnconditionalPreprocessorIfCheck.h index 2382a5e928972..6834ab7488afd 100644 --- a/clang-tools-extra/clang-tidy/readability/AvoidUnconditionalPreprocessorIfCheck.h +++ b/clang-tools-extra/clang-tidy/readability/AvoidUnconditionalPreprocessorIfCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// directives by analyzing `#if` conditions, such as `#if 0` and `#if 1`, etc. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/avoid-unconditional-preprocessor-if.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/avoid-unconditional-preprocessor-if.html class AvoidUnconditionalPreprocessorIfCheck : public ClangTidyCheck { public: AvoidUnconditionalPreprocessorIfCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h b/clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h index e3d9713d430ce..4b652f1a68226 100644 --- a/clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h +++ b/clang-tools-extra/clang-tidy/readability/ConstReturnTypeCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// the `const` qualifier from that return type. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/const-return-type.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/const-return-type.html class ConstReturnTypeCheck : public ClangTidyCheck { public: ConstReturnTypeCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h b/clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h index e419785060df0..8e058f20427fd 100644 --- a/clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h +++ b/clang-tools-extra/clang-tidy/readability/ContainerContainsCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::readability { /// to the `container.contains()` method. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/container-contains.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/container-contains.html class ContainerContainsCheck : public ClangTidyCheck { public: ContainerContainsCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/ConvertMemberFunctionsToStatic.h b/clang-tools-extra/clang-tidy/readability/ConvertMemberFunctionsToStatic.h index ee83d7b4784ff..2aab03f1a896f 100644 --- a/clang-tools-extra/clang-tidy/readability/ConvertMemberFunctionsToStatic.h +++ b/clang-tools-extra/clang-tidy/readability/ConvertMemberFunctionsToStatic.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// because they don't use the 'this' pointer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/ +/// https://clang.llvm.org/extra/clang-tidy/checks/ /// readability-convert-member-functions-to-static.html class ConvertMemberFunctionsToStatic : public ClangTidyCheck { public: diff --git a/clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h b/clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h index dc88646f07afa..52b1b2625e403 100644 --- a/clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h +++ b/clang-tools-extra/clang-tidy/readability/DeleteNullPointerCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// pointer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/delete-null-pointer.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/delete-null-pointer.html class DeleteNullPointerCheck : public ClangTidyCheck { public: DeleteNullPointerCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/ElseAfterReturnCheck.h b/clang-tools-extra/clang-tidy/readability/ElseAfterReturnCheck.h index ab025032317c7..ebbed28f6068e 100644 --- a/clang-tools-extra/clang-tidy/readability/ElseAfterReturnCheck.h +++ b/clang-tools-extra/clang-tidy/readability/ElseAfterReturnCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Flags the usages of `else` after `return`. /// -/// http://llvm.org/docs/CodingStandards.html#don-t-use-else-after-a-return +/// https://llvm.org/docs/CodingStandards.html#don-t-use-else-after-a-return class ElseAfterReturnCheck : public ClangTidyCheck { public: ElseAfterReturnCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/EnumInitialValueCheck.h b/clang-tools-extra/clang-tidy/readability/EnumInitialValueCheck.h index f070f867b6af8..d03e26b4468f4 100644 --- a/clang-tools-extra/clang-tidy/readability/EnumInitialValueCheck.h +++ b/clang-tools-extra/clang-tidy/readability/EnumInitialValueCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// styles: none, first only, or all initialized explicitly. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/enum-initial-value.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/enum-initial-value.html class EnumInitialValueCheck : public ClangTidyCheck { public: EnumInitialValueCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp b/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp index f9d81212e2842..4791df037d77d 100644 --- a/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp +++ b/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.cpp @@ -39,7 +39,7 @@ struct CognitiveComplexity final { // For details you can look at the Specification at // https://www.sonarsource.com/docs/CognitiveComplexity.pdf // or user-facing docs at - // http://clang.llvm.org/extra/clang-tidy/checks/readability/function-cognitive-complexity.html + // https://clang.llvm.org/extra/clang-tidy/checks/readability/function-cognitive-complexity.html // Here are all the possible reasons: enum Criteria : uint8_t { None = 0U, diff --git a/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h b/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h index 455fbfd9fa56a..046c6e162af88 100644 --- a/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h +++ b/clang-tools-extra/clang-tidy/readability/FunctionCognitiveComplexityCheck.h @@ -28,7 +28,7 @@ namespace clang::tidy::readability { /// macros. Default is `false`. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/function-cognitive-complexity.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/function-cognitive-complexity.html class FunctionCognitiveComplexityCheck : public ClangTidyCheck { public: FunctionCognitiveComplexityCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h b/clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h index 9626e2251426d..3adaf50bc57a1 100644 --- a/clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h +++ b/clang-tools-extra/clang-tidy/readability/IdentifierLengthCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// Warns about identifiers names whose length is too short. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/identifier-length.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/identifier-length.html class IdentifierLengthCheck : public ClangTidyCheck { public: IdentifierLengthCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h b/clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h index 8028a31719644..f88ceb1dd5a0c 100644 --- a/clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h +++ b/clang-tools-extra/clang-tidy/readability/ImplicitBoolConversionCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Checks for use of implicit bool conversions in expressions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/implicit-bool-conversion.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/implicit-bool-conversion.html class ImplicitBoolConversionCheck : public ClangTidyCheck { public: ImplicitBoolConversionCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h b/clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h index a7810bd25f69c..289e131d0d97a 100644 --- a/clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h +++ b/clang-tools-extra/clang-tidy/readability/InconsistentDeclarationParameterNameCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::readability { /// Checks for declarations of functions which differ in parameter names. /// /// For detailed documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/inconsistent-declaration-parameter-name.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/inconsistent-declaration-parameter-name.html /// class InconsistentDeclarationParameterNameCheck : public ClangTidyCheck { public: diff --git a/clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h b/clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h index c7e1ea33a0d0d..750b4d887de58 100644 --- a/clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h +++ b/clang-tools-extra/clang-tidy/readability/IsolateDeclarationCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// tries to refactor the code to one statement per declaration. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/isolate-declaration.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/isolate-declaration.html class IsolateDeclarationCheck : public ClangTidyCheck { public: IsolateDeclarationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h b/clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h index b703bd4ba984f..53954535ebe86 100644 --- a/clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h +++ b/clang-tools-extra/clang-tidy/readability/MagicNumbersCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::readability { /// Detects magic numbers, integer and floating point literals embedded in code. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/magic-numbers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/magic-numbers.html class MagicNumbersCheck : public ClangTidyCheck { public: MagicNumbersCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h b/clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h index 6be832260bd18..ac34b2b8258c1 100644 --- a/clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h +++ b/clang-tools-extra/clang-tidy/readability/MakeMemberFunctionConstCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Finds non-static member functions that can be made 'const'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/make-member-function-const.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/make-member-function-const.html class MakeMemberFunctionConstCheck : public ClangTidyCheck { public: MakeMemberFunctionConstCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/MathMissingParenthesesCheck.h b/clang-tools-extra/clang-tidy/readability/MathMissingParenthesesCheck.h index 3381d6612a709..d970a8a72cc27 100644 --- a/clang-tools-extra/clang-tidy/readability/MathMissingParenthesesCheck.h +++ b/clang-tools-extra/clang-tidy/readability/MathMissingParenthesesCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// operators of different priorities. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/math-missing-parentheses.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/math-missing-parentheses.html class MathMissingParenthesesCheck : public ClangTidyCheck { public: MathMissingParenthesesCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h b/clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h index 39bb4baba5141..8347f1a3611d9 100644 --- a/clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h +++ b/clang-tools-extra/clang-tidy/readability/MisleadingIndentationCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::readability { /// or spaces are used consistently and not mixed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/misleading-indentation.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/misleading-indentation.html class MisleadingIndentationCheck : public ClangTidyCheck { public: MisleadingIndentationCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h b/clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h index 1b11b6bea108e..0a6e0c8fb25a0 100644 --- a/clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h +++ b/clang-tools-extra/clang-tidy/readability/MisplacedArrayIndexCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// `array[index]`). /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/misplaced-array-index.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/misplaced-array-index.html class MisplacedArrayIndexCheck : public ClangTidyCheck { public: MisplacedArrayIndexCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/NamespaceCommentCheck.h b/clang-tools-extra/clang-tidy/readability/NamespaceCommentCheck.h index 883a2a44fee8d..fe5736fad0d15 100644 --- a/clang-tools-extra/clang-tidy/readability/NamespaceCommentCheck.h +++ b/clang-tools-extra/clang-tidy/readability/NamespaceCommentCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Checks that long namespaces have a closing comment. /// -/// http://llvm.org/docs/CodingStandards.html#namespace-indentation +/// https://llvm.org/docs/CodingStandards.html#namespace-indentation /// /// https://google.github.io/styleguide/cppguide.html#Namespaces class NamespaceCommentCheck : public ClangTidyCheck { diff --git a/clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h b/clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h index 61d6ebd4c2f2a..b0156183c0b88 100644 --- a/clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h +++ b/clang-tools-extra/clang-tidy/readability/NonConstParameterCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Warn when a pointer function parameter can be const. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/non-const-parameter.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/non-const-parameter.html class NonConstParameterCheck : public ClangTidyCheck { public: NonConstParameterCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/OperatorsRepresentationCheck.h b/clang-tools-extra/clang-tidy/readability/OperatorsRepresentationCheck.h index f1a9793481ada..2ce8ac0161bf9 100644 --- a/clang-tools-extra/clang-tidy/readability/OperatorsRepresentationCheck.h +++ b/clang-tools-extra/clang-tidy/readability/OperatorsRepresentationCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::readability { /// and overloaded operators in C++ code. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/operators-representation.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/operators-representation.html class OperatorsRepresentationCheck : public ClangTidyCheck { public: OperatorsRepresentationCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h b/clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h index c63b426bda7c8..186ce0dc431a8 100644 --- a/clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h +++ b/clang-tools-extra/clang-tidy/readability/QualifiedAutoCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::readability { /// 'const auto &'. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/qualified-auto.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/qualified-auto.html class QualifiedAutoCheck : public ClangTidyCheck { public: QualifiedAutoCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h index 6359dafc0e4eb..2b87848e77757 100644 --- a/clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantAccessSpecifiersCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Detects redundant access specifiers inside classes, structs, and unions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-access-specifiers.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-access-specifiers.html class RedundantAccessSpecifiersCheck : public ClangTidyCheck { public: RedundantAccessSpecifiersCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/RedundantCastingCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantCastingCheck.h index 97c87fb8b09a1..c09767d0cda2b 100644 --- a/clang-tools-extra/clang-tidy/readability/RedundantCastingCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantCastingCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// destination types, and subsequently recommend their removal. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-casting.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-casting.html class RedundantCastingCheck : public ClangTidyCheck { public: RedundantCastingCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h index 7698996d107e4..3018b1f8d14e6 100644 --- a/clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantControlFlowCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::readability { /// Eliminates redundant `continue` statements at the end of a loop body. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-control-flow.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-control-flow.html class RedundantControlFlowCheck : public ClangTidyCheck { public: RedundantControlFlowCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h index fff7827c6378a..b22cef9a2b776 100644 --- a/clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantDeclarationCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Find redundant variable declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-declaration.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-declaration.html class RedundantDeclarationCheck : public ClangTidyCheck { public: RedundantDeclarationCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h index f4a3671b0f7d1..5c82a5e02645f 100644 --- a/clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantFunctionPtrDereferenceCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Eliminate redundant dereferences of a function pointer. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-function-ptr-dereference.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-function-ptr-dereference.html class RedundantFunctionPtrDereferenceCheck : public ClangTidyCheck { public: RedundantFunctionPtrDereferenceCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/readability/RedundantInlineSpecifierCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantInlineSpecifierCheck.h index d1134b307a909..5e819e700fd16 100644 --- a/clang-tools-extra/clang-tidy/readability/RedundantInlineSpecifierCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantInlineSpecifierCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// declarations. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-inline-specifier.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-inline-specifier.html class RedundantInlineSpecifierCheck : public ClangTidyCheck { public: RedundantInlineSpecifierCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h index 2ce8c3f5f64f5..64d365d1e3f45 100644 --- a/clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantMemberInitCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// constructor would be called if they were not present. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-member-init.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-member-init.html class RedundantMemberInitCheck : public ClangTidyCheck { public: RedundantMemberInitCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h b/clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h index ca34f9783c619..75e5d6371703c 100644 --- a/clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h +++ b/clang-tools-extra/clang-tidy/readability/RedundantPreprocessorCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// the same condition. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-preprocessor.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/redundant-preprocessor.html class RedundantPreprocessorCheck : public ClangTidyCheck { public: RedundantPreprocessorCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/ReferenceToConstructedTemporaryCheck.h b/clang-tools-extra/clang-tidy/readability/ReferenceToConstructedTemporaryCheck.h index c95f65a3ec691..4c2b7f7e7f174 100644 --- a/clang-tools-extra/clang-tidy/readability/ReferenceToConstructedTemporaryCheck.h +++ b/clang-tools-extra/clang-tidy/readability/ReferenceToConstructedTemporaryCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// of a temporary object that has just been constructed. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/reference-to-constructed-temporary.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/reference-to-constructed-temporary.html class ReferenceToConstructedTemporaryCheck : public ClangTidyCheck { public: ReferenceToConstructedTemporaryCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h b/clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h index 2ab074e5dca69..466bc411bf800 100644 --- a/clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h +++ b/clang-tools-extra/clang-tidy/readability/SimplifyBooleanExprCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// them to use the appropriate boolean expression directly. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/simplify-boolean-expr.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/simplify-boolean-expr.html class SimplifyBooleanExprCheck : public ClangTidyCheck { public: SimplifyBooleanExprCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h b/clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h index 79ced95fd762c..45b4e3db67686 100644 --- a/clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h +++ b/clang-tools-extra/clang-tidy/readability/SimplifySubscriptExprCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Simplifies subscript expressions. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/simplify-subscript-expr.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/simplify-subscript-expr.html class SimplifySubscriptExprCheck : public ClangTidyCheck { public: SimplifySubscriptExprCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h b/clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h index 5b47bf7685bbf..c376806d00098 100644 --- a/clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h +++ b/clang-tools-extra/clang-tidy/readability/StaticAccessedThroughInstanceCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// instances and replaces them with uses of the appropriate qualified-id. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/static-accessed-through-instance.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/static-accessed-through-instance.html class StaticAccessedThroughInstanceCheck : public ClangTidyCheck { public: StaticAccessedThroughInstanceCheck(StringRef Name, ClangTidyContext *Context) diff --git a/clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h b/clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h index 9207ba0075b5d..55306556fb0a6 100644 --- a/clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h +++ b/clang-tools-extra/clang-tidy/readability/StaticDefinitionInAnonymousNamespaceCheck.h @@ -16,7 +16,7 @@ namespace clang::tidy::readability { /// Finds static function and variable definitions in anonymous namespace. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/static-definition-in-anonymous-namespace.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/static-definition-in-anonymous-namespace.html class StaticDefinitionInAnonymousNamespaceCheck : public ClangTidyCheck { public: StaticDefinitionInAnonymousNamespaceCheck(StringRef Name, diff --git a/clang-tools-extra/clang-tidy/readability/StringCompareCheck.h b/clang-tools-extra/clang-tidy/readability/StringCompareCheck.h index 9ff80b075f101..034e272975df0 100644 --- a/clang-tools-extra/clang-tidy/readability/StringCompareCheck.h +++ b/clang-tools-extra/clang-tidy/readability/StringCompareCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::readability { /// equality or inequality. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/string-compare.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/string-compare.html class StringCompareCheck : public ClangTidyCheck { public: StringCompareCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.cpp b/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.cpp index ad8b47aa96425..29084f4e875f7 100644 --- a/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.cpp +++ b/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.cpp @@ -208,7 +208,7 @@ static bool applyLevenshteinHeuristic(StringRef Arg, StringRef Param, return Dist > Threshold; } -// Based on http://en.wikipedia.org/wiki/Jaro–Winkler_distance. +// Based on https://en.wikipedia.org/wiki/Jaro–Winkler_distance. static bool applyJaroWinklerHeuristic(StringRef Arg, StringRef Param, int8_t Threshold) { std::size_t Match = 0, Transpos = 0; @@ -269,7 +269,7 @@ static bool applyJaroWinklerHeuristic(StringRef Arg, StringRef Param, return Dist > Threshold; } -// Based on http://en.wikipedia.org/wiki/Sørensen–Dice_coefficient +// Based on https://en.wikipedia.org/wiki/Sørensen–Dice_coefficient static bool applyDiceHeuristic(StringRef Arg, StringRef Param, int8_t Threshold) { llvm::StringSet<> ArgBigrams; diff --git a/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h b/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h index 43ae0f181302f..a44fdaea4959e 100644 --- a/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h +++ b/clang-tools-extra/clang-tidy/readability/SuspiciousCallArgumentCheck.h @@ -20,7 +20,7 @@ namespace clang::tidy::readability { /// of the function. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/suspicious-call-argument.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/suspicious-call-argument.html class SuspiciousCallArgumentCheck : public ClangTidyCheck { enum class Heuristic { Equality, diff --git a/clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h b/clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h index f7d6fe70058fc..ab6449e3fd416 100644 --- a/clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h +++ b/clang-tools-extra/clang-tidy/readability/UniqueptrDeleteReleaseCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// replaces them with: `` = nullptr;`` /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/uniqueptr-delete-release.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/uniqueptr-delete-release.html class UniqueptrDeleteReleaseCheck : public ClangTidyCheck { public: UniqueptrDeleteReleaseCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h b/clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h index 7c71fe064f3c9..e1eef3d5b58ee 100644 --- a/clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h +++ b/clang-tools-extra/clang-tidy/readability/UppercaseLiteralSuffixCheck.h @@ -19,7 +19,7 @@ namespace clang::tidy::readability { /// Alternatively, a list of destination suffixes can be provided. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/uppercase-literal-suffix.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/uppercase-literal-suffix.html class UppercaseLiteralSuffixCheck : public ClangTidyCheck { public: UppercaseLiteralSuffixCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h b/clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h index 4b7ffc1f36ace..f431311b4282a 100644 --- a/clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h +++ b/clang-tools-extra/clang-tidy/readability/UseAnyOfAllOfCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::readability { /// or std::all_of. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/use-anyofallof.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/use-anyofallof.html class UseAnyOfAllOfCheck : public ClangTidyCheck { public: using ClangTidyCheck::ClangTidyCheck; diff --git a/clang-tools-extra/clang-tidy/readability/UseStdMinMaxCheck.h b/clang-tools-extra/clang-tidy/readability/UseStdMinMaxCheck.h index 573394361cbda..e983412d6b7ba 100644 --- a/clang-tools-extra/clang-tidy/readability/UseStdMinMaxCheck.h +++ b/clang-tools-extra/clang-tidy/readability/UseStdMinMaxCheck.h @@ -17,7 +17,7 @@ namespace clang::tidy::readability { /// Replaces certain conditional statements with equivalent calls to /// ``std::min`` or ``std::max``. /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/readability/UseStdMinMax.html +/// https://clang.llvm.org/extra/clang-tidy/checks/readability/UseStdMinMax.html class UseStdMinMaxCheck : public ClangTidyCheck { public: UseStdMinMaxCheck(StringRef Name, ClangTidyContext *Context); diff --git a/clang-tools-extra/clang-tidy/tool/ClangTidyMain.cpp b/clang-tools-extra/clang-tidy/tool/ClangTidyMain.cpp index a2fa0edbbbea3..64157f530b8c0 100644 --- a/clang-tools-extra/clang-tidy/tool/ClangTidyMain.cpp +++ b/clang-tools-extra/clang-tidy/tool/ClangTidyMain.cpp @@ -9,7 +9,7 @@ /// \file This file implements a clang-tidy tool. /// /// This tool uses the Clang Tooling infrastructure, see -/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html /// for details on setting it up with LLVM source tree. /// //===----------------------------------------------------------------------===// diff --git a/clang-tools-extra/clang-tidy/tool/ClangTidyMain.h b/clang-tools-extra/clang-tidy/tool/ClangTidyMain.h index 35f75396828dd..f86828e8c46e9 100644 --- a/clang-tools-extra/clang-tidy/tool/ClangTidyMain.h +++ b/clang-tools-extra/clang-tidy/tool/ClangTidyMain.h @@ -9,7 +9,7 @@ /// \file This file declares the main function for the clang-tidy tool. /// /// This tool uses the Clang Tooling infrastructure, see -/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html /// for details on setting it up with LLVM source tree. /// //===----------------------------------------------------------------------===// diff --git a/clang-tools-extra/clang-tidy/tool/ClangTidyToolMain.cpp b/clang-tools-extra/clang-tidy/tool/ClangTidyToolMain.cpp index ea2897dfe1390..a2ba638ea15e8 100644 --- a/clang-tools-extra/clang-tidy/tool/ClangTidyToolMain.cpp +++ b/clang-tools-extra/clang-tidy/tool/ClangTidyToolMain.cpp @@ -9,7 +9,7 @@ /// \file This file contains clang-tidy tool entry point main function. /// /// This tool uses the Clang Tooling infrastructure, see -/// http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +/// https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html /// for details on setting it up with LLVM source tree. /// //===----------------------------------------------------------------------===// diff --git a/clang-tools-extra/clang-tidy/tool/run-clang-tidy.py b/clang-tools-extra/clang-tidy/tool/run-clang-tidy.py index eadf7194ab94f..f495f449b5b30 100755 --- a/clang-tools-extra/clang-tidy/tool/run-clang-tidy.py +++ b/clang-tools-extra/clang-tidy/tool/run-clang-tidy.py @@ -31,7 +31,7 @@ -header-filter=extra/clang-tidy Compilation database setup: -http://clang.llvm.org/docs/HowToSetupToolingForLLVM.html +https://clang.llvm.org/docs/HowToSetupToolingForLLVM.html """ import argparse diff --git a/clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h b/clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h index 5ecf9c4172d18..ee96fa74affc6 100644 --- a/clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h +++ b/clang-tools-extra/clang-tidy/zircon/TemporaryObjectsCheck.h @@ -18,7 +18,7 @@ namespace clang::tidy::zircon { /// discouraged. /// /// For the user-facing documentation see: -/// http://clang.llvm.org/extra/clang-tidy/checks/zircon/temporary-objects.html +/// https://clang.llvm.org/extra/clang-tidy/checks/zircon/temporary-objects.html class TemporaryObjectsCheck : public ClangTidyCheck { public: TemporaryObjectsCheck(StringRef Name, ClangTidyContext *Context) From c6010c31239ed683467009abe7e6c8b744fffda2 Mon Sep 17 00:00:00 2001 From: Victor Chernyakin Date: Mon, 22 Sep 2025 10:40:33 -0600 Subject: [PATCH 2/2] Fix formatting --- clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.cpp | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.cpp b/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.cpp index 763a6af5e3ee9..1481b2bb24e95 100644 --- a/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.cpp +++ b/clang-tools-extra/clang-tidy/objc/NSDateFormatterCheck.cpp @@ -43,7 +43,8 @@ static bool isValidDatePattern(StringRef Pattern) { // Checks if the string pattern used as a date format specifier contains // any incorrect pattern and reports it as a warning. -// See: https://www.unicode.org/reports/tr35/tr35-dates.html#Date_Format_Patterns +// See: +// https://www.unicode.org/reports/tr35/tr35-dates.html#Date_Format_Patterns void NSDateFormatterCheck::check(const MatchFinder::MatchResult &Result) { // Callback implementation. const auto *StrExpr = Result.Nodes.getNodeAs("str_lit");