Author: Victor Chernyakin Date: 2026-03-04T22:18:30-08:00 New Revision: 7bb3139304fc2c6497639bbb87651ff32f22707f
URL: https://github.com/llvm/llvm-project/commit/7bb3139304fc2c6497639bbb87651ff32f22707f DIFF: https://github.com/llvm/llvm-project/commit/7bb3139304fc2c6497639bbb87651ff32f22707f.diff LOG: [clang-tidy][NFC] Run tests in multiple language modes where possible (#184741) Added: Modified: clang-tools-extra/test/clang-tidy/checkers/abseil/cleanup-ctad.cpp clang-tools-extra/test/clang-tidy/checkers/boost/use-ranges-pipe.cpp clang-tools-extra/test/clang-tidy/checkers/boost/use-ranges.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/assignment-in-if-condition-cxx20.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/bitwise-pointer-cast-cxx20.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/branch-clone-fallthrough.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/branch-clone-if-constexpr-template.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/default-operator-new-on-overaligned-type-cpp17.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/default-operator-new-on-overaligned-type.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/exception-escape-consteval.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/fold-init-type.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/incorrect-enable-if.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/multiple-new-in-one-expression.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/narrowing-conversions-bitfields.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/nondeterministic-pointer-iteration-order.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-memcpy-safe-cxx.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-memcpy-safe-other.c clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-value-dependent-crash.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-wmemcpy-safe-cxx.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/signal-handler.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/stringview-nullptr.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/suspicious-memory-comparison.c clang-tools-extra/test/clang-tidy/checkers/bugprone/suspicious-string-compare.c clang-tools-extra/test/clang-tidy/checkers/bugprone/unhandled-exception-at-new.cpp clang-tools-extra/test/clang-tidy/checkers/bugprone/use-after-move.cpp clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/avoid-reference-coroutine-parameters.cpp clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/missing-std-forward-custom-function.cpp clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/no-suspend-with-lock.cpp clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/rvalue-reference-param-not-moved-custom-function.cpp clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/rvalue-reference-param-not-moved.cpp clang-tools-extra/test/clang-tidy/checkers/google/readability-namespace-comments-missing-nested-namespaces.cpp clang-tools-extra/test/clang-tidy/checkers/hicpp/signed-bitwise-integer-literals.cpp clang-tools-extra/test/clang-tidy/checkers/misc/coroutine-hostile-raii.cpp clang-tools-extra/test/clang-tidy/checkers/misc/misplaced-const-cxx17.cpp clang-tools-extra/test/clang-tidy/checkers/misc/static-assert.cpp clang-tools-extra/test/clang-tidy/checkers/misc/unconventional-assign-operator-cxx23.cpp clang-tools-extra/test/clang-tidy/checkers/misc/use-internal-linkage-consteval.cpp clang-tools-extra/test/clang-tidy/checkers/misc/use-internal-linkage-module.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/avoid-c-arrays-c++20.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/concat-nested-namespaces.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/loop-convert-reverse.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/loop-convert-rewritten-binop.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/make-unique-inaccessible-ctors.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/type-traits-GH153649.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/use-constraints-first-greatergreater.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/use-designated-initializers.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/use-nullptr-cxx20.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/use-ranges-pipe.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/use-ranges.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/use-starts-ends-with.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-format-custom.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-numbers.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-print-absl.cpp clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-print-custom.cpp clang-tools-extra/test/clang-tidy/checkers/performance/noexcept-move-constructor.cpp clang-tools-extra/test/clang-tidy/checkers/readability/braces-around-statements-consteval-if.cpp clang-tools-extra/test/clang-tidy/checkers/readability/braces-around-statements-constexpr-if-templates.cpp clang-tools-extra/test/clang-tidy/checkers/readability/container-size-empty-cxx20.cpp clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return-if-consteval.cpp clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return-if-constexpr.cpp clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return.cpp clang-tools-extra/test/clang-tidy/checkers/readability/function-cognitive-complexity.cpp clang-tools-extra/test/clang-tidy/checkers/readability/function-size-variables-c++17.cpp clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-anon-record-fields.cpp clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-case-match.cpp clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-outofline.cpp clang-tools-extra/test/clang-tidy/checkers/readability/implicit-bool-conversion-cxx20.cpp clang-tools-extra/test/clang-tidy/checkers/readability/redundant-casting.cpp clang-tools-extra/test/clang-tidy/checkers/readability/redundant-inline-specifier.cpp clang-tools-extra/test/clang-tidy/checkers/readability/simplify-boolean-expr-cxx23.cpp Removed: ################################################################################ diff --git a/clang-tools-extra/test/clang-tidy/checkers/abseil/cleanup-ctad.cpp b/clang-tools-extra/test/clang-tidy/checkers/abseil/cleanup-ctad.cpp index 53400ac04d3b5..e4eb968950297 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/abseil/cleanup-ctad.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/abseil/cleanup-ctad.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s abseil-cleanup-ctad -std=c++17 %t +// RUN: %check_clang_tidy %s abseil-cleanup-ctad -std=c++17-or-later %t namespace std { diff --git a/clang-tools-extra/test/clang-tidy/checkers/boost/use-ranges-pipe.cpp b/clang-tools-extra/test/clang-tidy/checkers/boost/use-ranges-pipe.cpp index 2b32429a77a60..9254c461e8188 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/boost/use-ranges-pipe.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/boost/use-ranges-pipe.cpp @@ -1,7 +1,7 @@ -// RUN: %check_clang_tidy -std=c++14 %s boost-use-ranges %t -check-suffixes=,PIPE \ +// RUN: %check_clang_tidy -std=c++14-or-later %s boost-use-ranges %t -check-suffixes=,PIPE \ // RUN: -config="{CheckOptions: { \ // RUN: boost-use-ranges.UseReversePipe: true }}" -- -isystem %clang_tidy_headers -I %S/Inputs/use-ranges/ -// RUN: %check_clang_tidy -std=c++14 %s boost-use-ranges %t -check-suffixes=,NOPIPE -- -isystem %clang_tidy_headers -I %S/Inputs/use-ranges/ +// RUN: %check_clang_tidy -std=c++14-or-later %s boost-use-ranges %t -check-suffixes=,NOPIPE -- -isystem %clang_tidy_headers -I %S/Inputs/use-ranges/ // CHECK-FIXES: #include <boost/algorithm/cxx11/is_sorted.hpp> // CHECK-FIXES: #include <boost/range/adaptor/reversed.hpp> diff --git a/clang-tools-extra/test/clang-tidy/checkers/boost/use-ranges.cpp b/clang-tools-extra/test/clang-tidy/checkers/boost/use-ranges.cpp index a11915e26269f..0e52607099801 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/boost/use-ranges.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/boost/use-ranges.cpp @@ -1,5 +1,5 @@ // RUN: %check_clang_tidy -std=c++14 %s boost-use-ranges %t -- -- -isystem %clang_tidy_headers -I %S/Inputs/use-ranges/ -// RUN: %check_clang_tidy -std=c++17 %s boost-use-ranges %t -check-suffixes=,CPP17 -- -isystem %clang_tidy_headers -I %S/Inputs/use-ranges/ +// RUN: %check_clang_tidy -std=c++17-or-later %s boost-use-ranges %t -check-suffixes=,CPP17 -- -isystem %clang_tidy_headers -I %S/Inputs/use-ranges/ // CHECK-FIXES: #include <boost/range/algorithm/find.hpp> // CHECK-FIXES: #include <boost/range/algorithm/reverse.hpp> diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/assignment-in-if-condition-cxx20.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/assignment-in-if-condition-cxx20.cpp index b332b2e49ec7f..20a63c7337131 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/assignment-in-if-condition-cxx20.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/assignment-in-if-condition-cxx20.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s bugprone-assignment-in-if-condition %t +// RUN: %check_clang_tidy -std=c++20-or-later %s bugprone-assignment-in-if-condition %t void testRequires() { if constexpr (requires(int &a) { a = 0; }) { diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/bitwise-pointer-cast-cxx20.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/bitwise-pointer-cast-cxx20.cpp index 6f7b827a980ae..da739db322a32 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/bitwise-pointer-cast-cxx20.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/bitwise-pointer-cast-cxx20.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s bugprone-bitwise-pointer-cast %t +// RUN: %check_clang_tidy -std=c++20-or-later %s bugprone-bitwise-pointer-cast %t void memcpy(void* to, void* dst, unsigned long long size) { diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/branch-clone-fallthrough.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/branch-clone-fallthrough.cpp index fb1bebb78b6ce..3ee668ed97f73 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/branch-clone-fallthrough.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/branch-clone-fallthrough.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s bugprone-branch-clone %t -- -- -std=c++17 +// RUN: %check_clang_tidy -std=c++17-or-later %s bugprone-branch-clone %t -- void handle(int); diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/branch-clone-if-constexpr-template.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/branch-clone-if-constexpr-template.cpp index 10cf06e8d9cc8..e3bfe6d0a397f 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/branch-clone-if-constexpr-template.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/branch-clone-if-constexpr-template.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s bugprone-branch-clone %t -- -- -std=c++17 +// RUN: %check_clang_tidy -std=c++17-or-later %s bugprone-branch-clone %t void handle(int); diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/default-operator-new-on-overaligned-type-cpp17.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/default-operator-new-on-overaligned-type-cpp17.cpp index b05108c1e9775..d11b1221984d9 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/default-operator-new-on-overaligned-type-cpp17.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/default-operator-new-on-overaligned-type-cpp17.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s -std=c++14 bugprone-default-operator-new-on-overaligned-type %t +// RUN: %check_clang_tidy %s -std=c++11,c++14 bugprone-default-operator-new-on-overaligned-type %t // RUN: clang-tidy -checks='-*,bugprone-default-operator-new-on-overaligned-type' --extra-arg=-Wno-unused-variable --warnings-as-errors='*' %s -- -std=c++17 -faligned-allocation // RUN: clang-tidy -checks='-*,bugprone-default-operator-new-on-overaligned-type' --extra-arg=-Wno-unused-variable --warnings-as-errors='*' %s -- -std=c++17 -faligned-allocation diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/default-operator-new-on-overaligned-type.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/default-operator-new-on-overaligned-type.cpp index 379d8a2ff0f3c..d5cd5b7fefe19 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/default-operator-new-on-overaligned-type.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/default-operator-new-on-overaligned-type.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s -std=c++14 bugprone-default-operator-new-on-overaligned-type %t +// RUN: %check_clang_tidy %s -std=c++11,c++14 bugprone-default-operator-new-on-overaligned-type %t namespace std { typedef __typeof(sizeof(int)) size_t; diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/exception-escape-consteval.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/exception-escape-consteval.cpp index 6e4298bba8bf1..d058cbeb5a20d 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/exception-escape-consteval.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/exception-escape-consteval.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s bugprone-exception-escape %t -- \ +// RUN: %check_clang_tidy -std=c++20-or-later %s bugprone-exception-escape %t -- \ // RUN: -- -fexceptions -Wno-everything namespace GH104457 { diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/fold-init-type.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/fold-init-type.cpp index b343028b9a6dc..52f1f8508e1ee 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/fold-init-type.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/fold-init-type.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s bugprone-fold-init-type -std=c++17 %t +// RUN: %check_clang_tidy %s bugprone-fold-init-type -std=c++17-or-later %t namespace std { template <class InputIt, class T> diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/incorrect-enable-if.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/incorrect-enable-if.cpp index 6ebd97fabd524..7882156f19a44 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/incorrect-enable-if.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/incorrect-enable-if.cpp @@ -1,5 +1,5 @@ -// RUN: %check_clang_tidy -std=c++11 %s bugprone-incorrect-enable-if %t -// RUN: %check_clang_tidy -check-suffix=CXX20 -std=c++20 %s bugprone-incorrect-enable-if %t +// RUN: %check_clang_tidy -std=c++11,c++14,c++17 %s bugprone-incorrect-enable-if %t +// RUN: %check_clang_tidy -std=c++20-or-later -check-suffix=CXX20 %s bugprone-incorrect-enable-if %t // NOLINTBEGIN namespace std { diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/multiple-new-in-one-expression.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/multiple-new-in-one-expression.cpp index 3bf8544d599f3..713e88457493b 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/multiple-new-in-one-expression.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/multiple-new-in-one-expression.cpp @@ -1,5 +1,5 @@ -// RUN: %check_clang_tidy -std=c++11 -check-suffixes=ALL,CPP11 %s bugprone-multiple-new-in-one-expression %t -- -- -target x86_64-unknown-unknown -// RUN: %check_clang_tidy -std=c++17 -check-suffixes=ALL,CPP17 %s bugprone-multiple-new-in-one-expression %t -- -- -target x86_64-unknown-unknown +// RUN: %check_clang_tidy -std=c++11,c++14 -check-suffixes=ALL,CPP11 %s bugprone-multiple-new-in-one-expression %t -- -- -target x86_64-unknown-unknown +// RUN: %check_clang_tidy -std=c++17-or-later -check-suffixes=ALL,CPP17 %s bugprone-multiple-new-in-one-expression %t -- -- -target x86_64-unknown-unknown namespace std { typedef __typeof__(sizeof(0)) size_t; diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/narrowing-conversions-bitfields.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/narrowing-conversions-bitfields.cpp index a7bb3c8d0c0c7..9770f44749267 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/narrowing-conversions-bitfields.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/narrowing-conversions-bitfields.cpp @@ -1,5 +1,5 @@ // RUN: %check_clang_tidy %s bugprone-narrowing-conversions %t \ -// RUN: -std=c++17 -- -target x86_64-unknown-linux +// RUN: -std=c++17-or-later -- -target x86_64-unknown-linux #define CHAR_BITS 8 static_assert(sizeof(unsigned int) == 32 / CHAR_BITS); diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/nondeterministic-pointer-iteration-order.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/nondeterministic-pointer-iteration-order.cpp index 91853874d0afc..ab65a5491d6d5 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/nondeterministic-pointer-iteration-order.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/nondeterministic-pointer-iteration-order.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s bugprone-nondeterministic-pointer-iteration-order %t -- -- -I%S -std=c++!4 +// RUN: %check_clang_tidy -std=c++14-or-later %s bugprone-nondeterministic-pointer-iteration-order %t -- -- -I%S #include "Inputs/system-header-simulator/sim_set" #include "Inputs/system-header-simulator/sim_unordered_set" diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-memcpy-safe-cxx.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-memcpy-safe-cxx.cpp index 8465b2bb81afd..e938780d06366 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-memcpy-safe-cxx.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-memcpy-safe-cxx.cpp @@ -1,5 +1,5 @@ -// RUN: %check_clang_tidy %s bugprone-not-null-terminated-result %t -- \ -// RUN: -- -std=c++11 -I %S/Inputs/not-null-terminated-result +// RUN: %check_clang_tidy -std=c++11-or-later %s bugprone-not-null-terminated-result %t -- \ +// RUN: -- -I %S/Inputs/not-null-terminated-result #include "not-null-terminated-result-cxx.h" diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-memcpy-safe-other.c b/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-memcpy-safe-other.c index 606e0d8906fd7..117be44978da8 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-memcpy-safe-other.c +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-memcpy-safe-other.c @@ -1,5 +1,5 @@ -// RUN: %check_clang_tidy %s bugprone-not-null-terminated-result %t -- \ -// RUN: -- -std=c11 -I %S/Inputs/not-null-terminated-result +// RUN: %check_clang_tidy -std=c11-or-later %s bugprone-not-null-terminated-result %t -- \ +// RUN: -- -I %S/Inputs/not-null-terminated-result #include "not-null-terminated-result-c.h" diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-value-dependent-crash.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-value-dependent-crash.cpp index 5f361c35e448c..b3cf685b05603 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-value-dependent-crash.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-value-dependent-crash.cpp @@ -1,5 +1,5 @@ -// RUN: %check_clang_tidy %s bugprone-not-null-terminated-result %t -- \ -// RUN: -- -std=c++17 -I %S/Inputs/not-null-terminated-result +// RUN: %check_clang_tidy -std=c++17-or-later %s bugprone-not-null-terminated-result %t -- \ +// RUN: -- -I %S/Inputs/not-null-terminated-result // This test case reproduces the crash when the check tries to evaluate // a value-dependent expression using EvaluateAsInt() in diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-wmemcpy-safe-cxx.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-wmemcpy-safe-cxx.cpp index 948d483f539b5..4d485afe1adeb 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-wmemcpy-safe-cxx.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/not-null-terminated-result-wmemcpy-safe-cxx.cpp @@ -1,5 +1,5 @@ -// RUN: %check_clang_tidy %s bugprone-not-null-terminated-result %t -- \ -// RUN: -- -std=c++11 -I %S/Inputs/not-null-terminated-result +// RUN: %check_clang_tidy -std=c++11-or-later %s bugprone-not-null-terminated-result %t -- \ +// RUN: -- -I %S/Inputs/not-null-terminated-result #include "not-null-terminated-result-cxx.h" diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/signal-handler.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/signal-handler.cpp index f1dc5ede35f29..8dcfb3330befe 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/signal-handler.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/signal-handler.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++14 %s bugprone-signal-handler %t -- -- -isystem %clang_tidy_headers -isystem %S/Inputs/signal-handler -target x86_64-unknown-unknown +// RUN: %check_clang_tidy -std=c++11,c++14 %s bugprone-signal-handler %t -- -- -isystem %clang_tidy_headers -isystem %S/Inputs/signal-handler -target x86_64-unknown-unknown // FIXME: Fix the checker to work in C++17 or later mode. #include "stdcpp.h" #include "stdio.h" diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/stringview-nullptr.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/stringview-nullptr.cpp index b85ba02e7e41b..422d32207e211 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/stringview-nullptr.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/stringview-nullptr.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s bugprone-stringview-nullptr -std=c++17 %t +// RUN: %check_clang_tidy %s bugprone-stringview-nullptr -std=c++17-or-later %t namespace std { diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/suspicious-memory-comparison.c b/clang-tools-extra/test/clang-tidy/checkers/bugprone/suspicious-memory-comparison.c index e0abba013d65a..d3ecffec9a781 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/suspicious-memory-comparison.c +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/suspicious-memory-comparison.c @@ -1,5 +1,5 @@ -// RUN: %check_clang_tidy %s bugprone-suspicious-memory-comparison %t \ -// RUN: -- -- -target x86_64-unknown-unknown -std=c99 +// RUN: %check_clang_tidy -std=c99-or-later %s bugprone-suspicious-memory-comparison %t \ +// RUN: -- -- -target x86_64-unknown-unknown typedef __SIZE_TYPE__ size_t; int memcmp(const void *lhs, const void *rhs, size_t count); diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/suspicious-string-compare.c b/clang-tools-extra/test/clang-tidy/checkers/bugprone/suspicious-string-compare.c index 99068476d6a78..a72f7a3785677 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/suspicious-string-compare.c +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/suspicious-string-compare.c @@ -1,8 +1,7 @@ -// RUN: %check_clang_tidy %s bugprone-suspicious-string-compare %t -- \ +// RUN: %check_clang_tidy -std=c99-or-later %s bugprone-suspicious-string-compare %t -- \ // RUN: -config='{CheckOptions: \ // RUN: {bugprone-suspicious-string-compare.WarnOnImplicitComparison: true, \ -// RUN: bugprone-suspicious-string-compare.WarnOnLogicalNotComparison: true}}' \ -// RUN: -- -std=c99 +// RUN: bugprone-suspicious-string-compare.WarnOnLogicalNotComparison: true}}' static const char A[] = "abc"; diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/unhandled-exception-at-new.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/unhandled-exception-at-new.cpp index 297db099f0667..1f1a093726e4e 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/unhandled-exception-at-new.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/unhandled-exception-at-new.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++14 %s bugprone-unhandled-exception-at-new %t -- -- -fexceptions +// RUN: %check_clang_tidy -std=c++11,c++14 %s bugprone-unhandled-exception-at-new %t -- -- -fexceptions // FIXME: Fix the checker to work in C++17 or later mode. namespace std { typedef __typeof__(sizeof(0)) size_t; diff --git a/clang-tools-extra/test/clang-tidy/checkers/bugprone/use-after-move.cpp b/clang-tools-extra/test/clang-tidy/checkers/bugprone/use-after-move.cpp index 0f1678cff35a7..fd6a3961ba43b 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/bugprone/use-after-move.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/bugprone/use-after-move.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++11 -check-suffixes=,CXX11 %s bugprone-use-after-move %t -- \ +// RUN: %check_clang_tidy -std=c++11,c++14 -check-suffixes=,CXX11 %s bugprone-use-after-move %t -- \ // RUN: -config='{CheckOptions: { \ // RUN: bugprone-use-after-move.InvalidationFunctions: "::Database<>::StaticCloseConnection;Database<>::CloseConnection;FriendCloseConnection;FreeCloseConnection", \ // RUN: bugprone-use-after-move.ReinitializationFunctions: "::Database<>::Reset;::Database<>::StaticReset;::FriendReset;::RegularReset" \ diff --git a/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/avoid-reference-coroutine-parameters.cpp b/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/avoid-reference-coroutine-parameters.cpp index 4df872ee15c6f..2ad93e22fc884 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/avoid-reference-coroutine-parameters.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/avoid-reference-coroutine-parameters.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s cppcoreguidelines-avoid-reference-coroutine-parameters %t -- +// RUN: %check_clang_tidy -std=c++20-or-later %s cppcoreguidelines-avoid-reference-coroutine-parameters %t // NOLINTBEGIN namespace std { diff --git a/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/missing-std-forward-custom-function.cpp b/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/missing-std-forward-custom-function.cpp index 7ccac1a10015f..deab545eb39a3 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/missing-std-forward-custom-function.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/missing-std-forward-custom-function.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++14 %s cppcoreguidelines-missing-std-forward %t -- \ +// RUN: %check_clang_tidy -std=c++14-or-later %s cppcoreguidelines-missing-std-forward %t -- \ // RUN: -config="{CheckOptions: {cppcoreguidelines-missing-std-forward.ForwardFunction: custom_forward}}" -- -fno-delayed-template-parsing // NOLINTBEGIN diff --git a/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/no-suspend-with-lock.cpp b/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/no-suspend-with-lock.cpp index a6e0cd778c40c..9b7c04abebbdb 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/no-suspend-with-lock.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/no-suspend-with-lock.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s cppcoreguidelines-no-suspend-with-lock %t -- -- -fno-delayed-template-parsing -fexceptions +// RUN: %check_clang_tidy -std=c++20-or-later %s cppcoreguidelines-no-suspend-with-lock %t -- -- -fno-delayed-template-parsing -fexceptions // NOLINTBEGIN namespace std { diff --git a/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/rvalue-reference-param-not-moved-custom-function.cpp b/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/rvalue-reference-param-not-moved-custom-function.cpp index 4ed29824496fc..db32ff6ef9bf3 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/rvalue-reference-param-not-moved-custom-function.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/rvalue-reference-param-not-moved-custom-function.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++11 %s cppcoreguidelines-rvalue-reference-param-not-moved %t -- \ +// RUN: %check_clang_tidy -std=c++11-or-later %s cppcoreguidelines-rvalue-reference-param-not-moved %t -- \ // RUN: -config="{CheckOptions: {cppcoreguidelines-rvalue-reference-param-not-moved.AllowPartialMove: true, cppcoreguidelines-rvalue-reference-param-not-moved.IgnoreUnnamedParams: true, cppcoreguidelines-rvalue-reference-param-not-moved.IgnoreNonDeducedTemplateTypes: true, cppcoreguidelines-rvalue-reference-param-not-moved.MoveFunction: custom_move}}" -- -fno-delayed-template-parsing // NOLINTBEGIN diff --git a/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/rvalue-reference-param-not-moved.cpp b/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/rvalue-reference-param-not-moved.cpp index e996690102dff..4e64ea11d3cb4 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/rvalue-reference-param-not-moved.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/cppcoreguidelines/rvalue-reference-param-not-moved.cpp @@ -1,6 +1,6 @@ // RUN: %check_clang_tidy -std=c++11 %s cppcoreguidelines-rvalue-reference-param-not-moved %t -- \ // RUN: -config="{CheckOptions: {cppcoreguidelines-rvalue-reference-param-not-moved.AllowPartialMove: true, cppcoreguidelines-rvalue-reference-param-not-moved.IgnoreUnnamedParams: true, cppcoreguidelines-rvalue-reference-param-not-moved.IgnoreNonDeducedTemplateTypes: true}}" -- -fno-delayed-template-parsing -// RUN: %check_clang_tidy -check-suffix=,CXX14 -std=c++14 %s cppcoreguidelines-rvalue-reference-param-not-moved %t -- \ +// RUN: %check_clang_tidy -check-suffix=,CXX14 -std=c++14-or-later %s cppcoreguidelines-rvalue-reference-param-not-moved %t -- \ // RUN: -config="{CheckOptions: {cppcoreguidelines-rvalue-reference-param-not-moved.AllowPartialMove: true, cppcoreguidelines-rvalue-reference-param-not-moved.IgnoreUnnamedParams: true, cppcoreguidelines-rvalue-reference-param-not-moved.IgnoreNonDeducedTemplateTypes: true}}" -- -fno-delayed-template-parsing // RUN: %check_clang_tidy -check-suffix=,NOSUBEXPR -std=c++11 %s cppcoreguidelines-rvalue-reference-param-not-moved %t -- \ // RUN: -config="{CheckOptions: {cppcoreguidelines-rvalue-reference-param-not-moved.AllowPartialMove: false, cppcoreguidelines-rvalue-reference-param-not-moved.IgnoreUnnamedParams: true, cppcoreguidelines-rvalue-reference-param-not-moved.IgnoreNonDeducedTemplateTypes: true}}" -- -fno-delayed-template-parsing diff --git a/clang-tools-extra/test/clang-tidy/checkers/google/readability-namespace-comments-missing-nested-namespaces.cpp b/clang-tools-extra/test/clang-tidy/checkers/google/readability-namespace-comments-missing-nested-namespaces.cpp index de42df30cb796..18fc7252c32ff 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/google/readability-namespace-comments-missing-nested-namespaces.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/google/readability-namespace-comments-missing-nested-namespaces.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s google-readability-namespace-comments %t -std=c++20 \ +// RUN: %check_clang_tidy %s google-readability-namespace-comments %t -std=c++20-or-later \ // RUN: '-config={CheckOptions: { \ // RUN: google-readability-namespace-comments.AllowOmittingNamespaceComments: true, \ // RUN: google-readability-namespace-comments.ShortNamespaceLines: 0, \ diff --git a/clang-tools-extra/test/clang-tidy/checkers/hicpp/signed-bitwise-integer-literals.cpp b/clang-tools-extra/test/clang-tidy/checkers/hicpp/signed-bitwise-integer-literals.cpp index aca7ae1fd76fb..509988875c3d5 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/hicpp/signed-bitwise-integer-literals.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/hicpp/signed-bitwise-integer-literals.cpp @@ -1,6 +1,5 @@ -// RUN: %check_clang_tidy %s hicpp-signed-bitwise %t -- \ -// RUN: -config="{CheckOptions: {hicpp-signed-bitwise.IgnorePositiveIntegerLiterals: true}}" \ -// RUN: -- -std=c++11 +// RUN: %check_clang_tidy -std=c++11-or-later %s hicpp-signed-bitwise %t -- \ +// RUN: -config="{CheckOptions: {hicpp-signed-bitwise.IgnorePositiveIntegerLiterals: true}}" void examples() { unsigned UValue = 40u; diff --git a/clang-tools-extra/test/clang-tidy/checkers/misc/coroutine-hostile-raii.cpp b/clang-tools-extra/test/clang-tidy/checkers/misc/coroutine-hostile-raii.cpp index dff73aeb7a5ee..b697e1a8481d9 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/misc/coroutine-hostile-raii.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/misc/coroutine-hostile-raii.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s misc-coroutine-hostile-raii %t \ +// RUN: %check_clang_tidy -std=c++20-or-later %s misc-coroutine-hostile-raii %t \ // RUN: -config="{CheckOptions: {\ // RUN: misc-coroutine-hostile-raii.RAIITypesList: 'my::Mutex; ::my::other::Mutex', \ // RUN: misc-coroutine-hostile-raii.AllowedAwaitablesList: 'safe::awaitable; ::transformable::awaitable', \ diff --git a/clang-tools-extra/test/clang-tidy/checkers/misc/misplaced-const-cxx17.cpp b/clang-tools-extra/test/clang-tidy/checkers/misc/misplaced-const-cxx17.cpp index 56029325420e1..6fa32d1e7f452 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/misc/misplaced-const-cxx17.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/misc/misplaced-const-cxx17.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -expect-clang-tidy-error %s misc-misplaced-const %t -- -- -std=c++17 +// RUN: %check_clang_tidy -std=c++17-or-later -expect-clang-tidy-error %s misc-misplaced-const %t // This test previously would cause a failed assertion because the structured // binding declaration had no valid type associated with it. This ensures the diff --git a/clang-tools-extra/test/clang-tidy/checkers/misc/static-assert.cpp b/clang-tools-extra/test/clang-tidy/checkers/misc/static-assert.cpp index 897049cbc5388..f11069fe5983d 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/misc/static-assert.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/misc/static-assert.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++11 -check-suffixes=,CXX11 %s misc-static-assert %t +// RUN: %check_clang_tidy -std=c++11,c++14 -check-suffixes=,CXX11 %s misc-static-assert %t // RUN: %check_clang_tidy -std=c++17-or-later -check-suffixes=,CXX17 %s misc-static-assert %t void abort() {} diff --git a/clang-tools-extra/test/clang-tidy/checkers/misc/unconventional-assign-operator-cxx23.cpp b/clang-tools-extra/test/clang-tidy/checkers/misc/unconventional-assign-operator-cxx23.cpp index d947df164be86..4fd4fa689fb07 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/misc/unconventional-assign-operator-cxx23.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/misc/unconventional-assign-operator-cxx23.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++23 %s misc-unconventional-assign-operator %t +// RUN: %check_clang_tidy -std=c++23-or-later %s misc-unconventional-assign-operator %t struct BadArgument { BadArgument &operator=(this BadArgument& self, BadArgument &); diff --git a/clang-tools-extra/test/clang-tidy/checkers/misc/use-internal-linkage-consteval.cpp b/clang-tools-extra/test/clang-tidy/checkers/misc/use-internal-linkage-consteval.cpp index b63e87da25cea..540a9e018eff8 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/misc/use-internal-linkage-consteval.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/misc/use-internal-linkage-consteval.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s misc-use-internal-linkage %t -- -- -I%S/Inputs/use-internal-linkage +// RUN: %check_clang_tidy -std=c++20-or-later %s misc-use-internal-linkage %t -- -- -I%S/Inputs/use-internal-linkage consteval void gh122096() {} diff --git a/clang-tools-extra/test/clang-tidy/checkers/misc/use-internal-linkage-module.cpp b/clang-tools-extra/test/clang-tidy/checkers/misc/use-internal-linkage-module.cpp index aff978f1619d9..ae1dc359c7ad8 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/misc/use-internal-linkage-module.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/misc/use-internal-linkage-module.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s misc-use-internal-linkage %t -- -- -I%S/Inputs/use-internal-linkage +// RUN: %check_clang_tidy -std=c++20-or-later %s misc-use-internal-linkage %t -- -- -I%S/Inputs/use-internal-linkage module; diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/avoid-c-arrays-c++20.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/avoid-c-arrays-c++20.cpp index c9391e3339623..6fa9d09aa7df4 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/avoid-c-arrays-c++20.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/avoid-c-arrays-c++20.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s modernize-avoid-c-arrays %t +// RUN: %check_clang_tidy -std=c++20-or-later %s modernize-avoid-c-arrays %t void f1(int data[], int size) { // CHECK-MESSAGES: :[[@LINE-1]]:9: warning: do not declare C-style arrays, use 'std::span' instead diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/concat-nested-namespaces.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/concat-nested-namespaces.cpp index 4326fa6412021..18b0ae9e25c41 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/concat-nested-namespaces.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/concat-nested-namespaces.cpp @@ -1,5 +1,5 @@ // RUN: %check_clang_tidy -std=c++17 -check-suffix=NORMAL -check-header %S/Inputs/concat-nested-namespaces/modernize-concat-nested-namespaces.h %s modernize-concat-nested-namespaces %t -// RUN: %check_clang_tidy -std=c++20 -check-suffixes=NORMAL,CPP20 -check-header %S/Inputs/concat-nested-namespaces/modernize-concat-nested-namespaces.h %s modernize-concat-nested-namespaces %t +// RUN: %check_clang_tidy -std=c++20-or-later -check-suffixes=NORMAL,CPP20 -check-header %S/Inputs/concat-nested-namespaces/modernize-concat-nested-namespaces.h %s modernize-concat-nested-namespaces %t #include "modernize-concat-nested-namespaces.h" diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/loop-convert-reverse.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/loop-convert-reverse.cpp index 8f35a9f514a06..801f8c017b4e1 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/loop-convert-reverse.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/loop-convert-reverse.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 -check-suffixes=,RANGES %s modernize-loop-convert %t +// RUN: %check_clang_tidy -std=c++20-or-later -check-suffixes=,RANGES %s modernize-loop-convert %t // RUN: %check_clang_tidy -check-suffixes=,CUSTOM,CUSTOM-NO-SYS %s modernize-loop-convert %t -- \ // RUN: -config="{CheckOptions: { \ diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/loop-convert-rewritten-binop.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/loop-convert-rewritten-binop.cpp index 310e57e2652fe..d441bef38fb6a 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/loop-convert-rewritten-binop.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/loop-convert-rewritten-binop.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s modernize-loop-convert %t -- -- -I %S/Inputs/loop-convert +// RUN: %check_clang_tidy -std=c++20-or-later %s modernize-loop-convert %t -- -- -I %S/Inputs/loop-convert namespace std { struct strong_ordering { diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/make-unique-inaccessible-ctors.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/make-unique-inaccessible-ctors.cpp index 55af2d1bbd348..8ae0440ab0d1f 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/make-unique-inaccessible-ctors.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/make-unique-inaccessible-ctors.cpp @@ -1,5 +1,5 @@ // RUN: %check_clang_tidy -std=c++14,c++17 -check-suffix=CXX-14-17 %s modernize-make-unique %t -- -- -I %S/Inputs/smart-ptr -D CXX_14_17=1 -// RUN: %check_clang_tidy -std=c++20 -check-suffix=CXX-20 %s modernize-make-unique %t -- -- -I %S/Inputs/smart-ptr -D CXX_20=1 +// RUN: %check_clang_tidy -std=c++20-or-later -check-suffix=CXX-20 %s modernize-make-unique %t -- -- -I %S/Inputs/smart-ptr -D CXX_20=1 #include "unique_ptr.h" // CHECK-FIXES: #include <memory> diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/type-traits-GH153649.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/type-traits-GH153649.cpp index 142eb5847ae10..e7a089af7a84c 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/type-traits-GH153649.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/type-traits-GH153649.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s modernize-type-traits %t +// RUN: %check_clang_tidy -std=c++17-or-later %s modernize-type-traits %t namespace std { template <class> struct tuple_size { diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-constraints-first-greatergreater.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-constraints-first-greatergreater.cpp index b92e9093c97ee..bbe1f3ca06a47 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-constraints-first-greatergreater.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-constraints-first-greatergreater.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s modernize-use-constraints %t -- -- -fno-delayed-template-parsing +// RUN: %check_clang_tidy -std=c++20-or-later %s modernize-use-constraints %t -- -- -fno-delayed-template-parsing // NOLINTBEGIN namespace std { diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-designated-initializers.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-designated-initializers.cpp index 88e06361c0c11..05f81335586fe 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-designated-initializers.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-designated-initializers.cpp @@ -1,13 +1,13 @@ -// RUN: %check_clang_tidy -std=c++20 %s modernize-use-designated-initializers %t \ +// RUN: %check_clang_tidy -std=c++20-or-later %s modernize-use-designated-initializers %t \ // RUN: -- \ // RUN: -- -fno-delayed-template-parsing -// RUN: %check_clang_tidy -check-suffixes=,SINGLE-ELEMENT -std=c++20 %s modernize-use-designated-initializers %t \ +// RUN: %check_clang_tidy -check-suffixes=,SINGLE-ELEMENT -std=c++20-or-later %s modernize-use-designated-initializers %t \ // RUN: -- -config="{CheckOptions: {modernize-use-designated-initializers.IgnoreSingleElementAggregates: false}}" \ // RUN: -- -fno-delayed-template-parsing -// RUN: %check_clang_tidy -check-suffixes=POD -std=c++20 %s modernize-use-designated-initializers %t \ +// RUN: %check_clang_tidy -check-suffixes=POD -std=c++20-or-later %s modernize-use-designated-initializers %t \ // RUN: -- -config="{CheckOptions: {modernize-use-designated-initializers.RestrictToPODTypes: true}}" \ // RUN: -- -fno-delayed-template-parsing -// RUN: %check_clang_tidy -check-suffixes=,MACROS -std=c++20 %s modernize-use-designated-initializers %t \ +// RUN: %check_clang_tidy -check-suffixes=,MACROS -std=c++20-or-later %s modernize-use-designated-initializers %t \ // RUN: -- -config="{CheckOptions: {modernize-use-designated-initializers.IgnoreMacros: false}}" \ // RUN: -- -fno-delayed-template-parsing diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-nullptr-cxx20.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-nullptr-cxx20.cpp index 5bc5b79b5524e..2cd2f1e07b0b1 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-nullptr-cxx20.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-nullptr-cxx20.cpp @@ -1,5 +1,5 @@ -// RUN: %check_clang_tidy -std=c++20 %s modernize-use-nullptr %t -- -- -DGCC -// RUN: %check_clang_tidy -std=c++20 %s modernize-use-nullptr %t -- -- -DCLANG +// RUN: %check_clang_tidy -std=c++20-or-later %s modernize-use-nullptr %t -- -- -DGCC +// RUN: %check_clang_tidy -std=c++20-or-later %s modernize-use-nullptr %t -- -- -DCLANG namespace std { class strong_ordering; diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-ranges-pipe.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-ranges-pipe.cpp index 9a78bd5958814..826347ceee518 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-ranges-pipe.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-ranges-pipe.cpp @@ -1,7 +1,7 @@ -// RUN: %check_clang_tidy -std=c++20 %s modernize-use-ranges %t -check-suffixes=,PIPE \ +// RUN: %check_clang_tidy -std=c++20-or-later %s modernize-use-ranges %t -check-suffixes=,PIPE \ // RUN: -config="{CheckOptions: { \ // RUN: modernize-use-ranges.UseReversePipe: true }}" -- -isystem %clang_tidy_headers -I %S/Inputs/use-ranges/ -// RUN: %check_clang_tidy -std=c++20 %s modernize-use-ranges %t -check-suffixes=,NOPIPE -- -isystem %clang_tidy_headers -I %S/Inputs/use-ranges/ +// RUN: %check_clang_tidy -std=c++20-or-later %s modernize-use-ranges %t -check-suffixes=,NOPIPE -- -isystem %clang_tidy_headers -I %S/Inputs/use-ranges/ // CHECK-FIXES: #include <algorithm> // CHECK-FIXES: #include <ranges> diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-ranges.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-ranges.cpp index c1338a7e9b640..6af58b778e10e 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-ranges.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-ranges.cpp @@ -1,6 +1,5 @@ // RUN: %check_clang_tidy -std=c++20 %s modernize-use-ranges %t -- -- -isystem %clang_tidy_headers -I %S/Inputs/ -// RUN: %check_clang_tidy -std=c++23 %s modernize-use-ranges %t -check-suffixes=,CPP23 -- -isystem %clang_tidy_headers -I %S/Inputs/ -// Example: ./check_clang_tidy.py -std=c++20 checkers/modernize/use-ranges.cpp modernize-use-ranges temp.txt -- -- -I ~/llvm-project/clang-tools-extra/test/clang-tidy/checkers/modernize/Inputs/ +// RUN: %check_clang_tidy -std=c++23-or-later %s modernize-use-ranges %t -check-suffixes=,CPP23 -- -isystem %clang_tidy_headers -I %S/Inputs/ // CHECK-FIXES: #include <algorithm> // CHECK-FIXES-CPP23: #include <numeric> diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-starts-ends-with.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-starts-ends-with.cpp index 88d04837c923e..720cafc267774 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-starts-ends-with.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-starts-ends-with.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s modernize-use-starts-ends-with %t -- \ +// RUN: %check_clang_tidy -std=c++20-or-later %s modernize-use-starts-ends-with %t -- \ // RUN: -- -isystem %clang_tidy_headers #include <string.h> diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-format-custom.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-format-custom.cpp index 493ded3a407fa..264b544ce0c03 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-format-custom.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-format-custom.cpp @@ -1,5 +1,5 @@ // RUN: %check_clang_tidy -check-suffixes=,STRICT \ -// RUN: -std=c++20 %s modernize-use-std-format %t -- \ +// RUN: -std=c++20-or-later %s modernize-use-std-format %t -- \ // RUN: -config="{CheckOptions: { \ // RUN: modernize-use-std-format.StrictMode: true, \ // RUN: modernize-use-std-format.StrFormatLikeFunctions: '::strprintf; mynamespace::strprintf2; any_format_type_strprintf', \ @@ -8,7 +8,7 @@ // RUN: }}" \ // RUN: -- -isystem %clang_tidy_headers // RUN: %check_clang_tidy -check-suffixes=,NOTSTRICT \ -// RUN: -std=c++20 %s modernize-use-std-format %t -- \ +// RUN: -std=c++20-or-later %s modernize-use-std-format %t -- \ // RUN: -config="{CheckOptions: { \ // RUN: modernize-use-std-format.StrFormatLikeFunctions: '::strprintf; mynamespace::strprintf2; any_format_type_strprintf', \ // RUN: modernize-use-std-format.ReplacementFormatFunction: 'fmt::format', \ diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-numbers.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-numbers.cpp index 11121ae6d8e93..53a31114321cf 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-numbers.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-numbers.cpp @@ -1,5 +1,5 @@ -// RUN: %check_clang_tidy -check-suffix=ALL -std=c++20 %s modernize-use-std-numbers %t -// RUN: %check_clang_tidy -check-suffix=ALL,IMPRECISE -std=c++20 %s modernize-use-std-numbers %t -- -config="{CheckOptions: { modernize-use-std-numbers.DiffThreshold: 0.01 }}" +// RUN: %check_clang_tidy -check-suffix=ALL -std=c++20-or-later %s modernize-use-std-numbers %t +// RUN: %check_clang_tidy -check-suffix=ALL,IMPRECISE -std=c++20-or-later %s modernize-use-std-numbers %t -- -config="{CheckOptions: { modernize-use-std-numbers.DiffThreshold: 0.01 }}" // CHECK-FIXES-ALL: #include <numbers> diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-print-absl.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-print-absl.cpp index 3dab6e9c9a13b..46f509ce9e4ba 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-print-absl.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-print-absl.cpp @@ -1,9 +1,9 @@ // RUN: %check_clang_tidy \ -// RUN: -std=c++23 %s modernize-use-std-print %t -- \ +// RUN: -std=c++23-or-later %s modernize-use-std-print %t -- \ // RUN: -config="{CheckOptions: {modernize-use-std-print.StrictMode: true}}" \ // RUN: -- -isystem %clang_tidy_headers // RUN: %check_clang_tidy \ -// RUN: -std=c++23 %s modernize-use-std-print %t -- \ +// RUN: -std=c++23-or-later %s modernize-use-std-print %t -- \ // RUN: -config="{CheckOptions: {modernize-use-std-print.StrictMode: false}}" \ // RUN: -- -isystem %clang_tidy_headers diff --git a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-print-custom.cpp b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-print-custom.cpp index 81a17179f1be0..41a0e653dc9e9 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-print-custom.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/modernize/use-std-print-custom.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++23 %s modernize-use-std-print %t -- \ +// RUN: %check_clang_tidy -std=c++23-or-later %s modernize-use-std-print %t -- \ // RUN: -config="{CheckOptions: \ // RUN: { \ // RUN: modernize-use-std-print.PrintfLikeFunctions: 'unqualified_printf;::myprintf; mynamespace::myprintf2; any_format_type_printf; fmt::printf', \ diff --git a/clang-tools-extra/test/clang-tidy/checkers/performance/noexcept-move-constructor.cpp b/clang-tools-extra/test/clang-tidy/checkers/performance/noexcept-move-constructor.cpp index 4df0927b62af5..76e1d9e493421 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/performance/noexcept-move-constructor.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/performance/noexcept-move-constructor.cpp @@ -1,5 +1,5 @@ // RUN: %check_clang_tidy %s performance-noexcept-move-constructor %t -- -- -fexceptions -// RUN: %check_clang_tidy -std=c++17 -check-suffixes=,ERR %s performance-noexcept-move-constructor %t \ +// RUN: %check_clang_tidy -std=c++17-or-later -check-suffixes=,ERR %s performance-noexcept-move-constructor %t \ // RUN: -- --fix-errors -- -fexceptions -DENABLE_ERROR namespace std diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/braces-around-statements-consteval-if.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/braces-around-statements-consteval-if.cpp index aa712edf445b6..a3f515b677e96 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/braces-around-statements-consteval-if.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/braces-around-statements-consteval-if.cpp @@ -1,4 +1,4 @@ -// RUN: clang-tidy %s -checks='-*,readability-braces-around-statements' -- -std=c++2b | count 0 +// RUN: clang-tidy %s -checks='-*,readability-braces-around-statements' -- -std=c++23 | count 0 constexpr void handle(bool) {} diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/braces-around-statements-constexpr-if-templates.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/braces-around-statements-constexpr-if-templates.cpp index 988125f9ce2d7..d1e1086606df6 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/braces-around-statements-constexpr-if-templates.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/braces-around-statements-constexpr-if-templates.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s readability-braces-around-statements %t -- -- -std=c++17 +// RUN: %check_clang_tidy -std=c++17-or-later %s readability-braces-around-statements %t void handle(bool); diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/container-size-empty-cxx20.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/container-size-empty-cxx20.cpp index 42fb927d8c587..0b293aad29ecb 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/container-size-empty-cxx20.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/container-size-empty-cxx20.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s readability-container-size-empty %t -- -- -fno-delayed-template-parsing +// RUN: %check_clang_tidy -std=c++20-or-later %s readability-container-size-empty %t -- -- -fno-delayed-template-parsing namespace std { struct strong_ordering { diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return-if-consteval.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return-if-consteval.cpp index 8810d215ee97f..ca9cb941dd2c5 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return-if-consteval.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return-if-consteval.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++23 %s readability-else-after-return %t +// RUN: %check_clang_tidy -std=c++23-or-later %s readability-else-after-return %t // Consteval if is an exception to the rule, we cannot remove the else. void f() { diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return-if-constexpr.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return-if-constexpr.cpp index 1edb3237eaf4d..d005aa11384f8 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return-if-constexpr.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return-if-constexpr.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s readability-else-after-return %t -- -- -std=c++17 +// RUN: %check_clang_tidy -std=c++17-or-later %s readability-else-after-return %t // Constexpr if is an exception to the rule, we cannot remove the else. void f() { diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return.cpp index 0bad90b5e537a..e987687a764cd 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/else-after-return.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s readability-else-after-return %t -- -- -isystem %clang_tidy_headers -fexceptions -std=c++17 +// RUN: %check_clang_tidy -std=c++17-or-later %s readability-else-after-return %t -- -- -isystem %clang_tidy_headers -fexceptions #include <string> struct my_exception { diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/function-cognitive-complexity.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/function-cognitive-complexity.cpp index 573e3f6ce8160..5ad34032fd2f0 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/function-cognitive-complexity.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/function-cognitive-complexity.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s readability-function-cognitive-complexity %t -- -config='{CheckOptions: {readability-function-cognitive-complexity.Threshold: 0}}' -- -std=c++11 -fblocks -fexceptions -w +// RUN: %check_clang_tidy -std=c++11-or-later %s readability-function-cognitive-complexity %t -- -config='{CheckOptions: {readability-function-cognitive-complexity.Threshold: 0}}' -- -fblocks -fexceptions -w // any function should be checked. diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/function-size-variables-c++17.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/function-size-variables-c++17.cpp index 5718be3bb41aa..97293ae2c4652 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/function-size-variables-c++17.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/function-size-variables-c++17.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s readability-function-size %t -- -config='{CheckOptions: {readability-function-size.LineThreshold: 0, readability-function-size.StatementThreshold: 0, readability-function-size.BranchThreshold: 0, readability-function-size.ParameterThreshold: 5, readability-function-size.NestingThreshold: 2, readability-function-size.VariableThreshold: 1}}' -- -std=c++17 +// RUN: %check_clang_tidy -std=c++17-or-later %s readability-function-size %t -- -config='{CheckOptions: {readability-function-size.LineThreshold: 0, readability-function-size.StatementThreshold: 0, readability-function-size.BranchThreshold: 0, readability-function-size.ParameterThreshold: 5, readability-function-size.NestingThreshold: 2, readability-function-size.VariableThreshold: 1}}' void structured_bindings() { int a[2] = {1, 2}; diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-anon-record-fields.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-anon-record-fields.cpp index 16efe3ffdf703..a0500a08226c9 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-anon-record-fields.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-anon-record-fields.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s readability-identifier-naming %t -- \ +// RUN: %check_clang_tidy -std=c++20-or-later %s readability-identifier-naming %t -- \ // RUN: -config='{CheckOptions: { \ // RUN: readability-identifier-naming.CheckAnonFieldInParent: true, \ // RUN: readability-identifier-naming.ClassConstantCase: CamelCase, \ diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-case-match.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-case-match.cpp index 72384e699b3d9..7aae8df79ce39 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-case-match.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-case-match.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s readability-identifier-naming %t -- \ +// RUN: %check_clang_tidy -std=c++20-or-later %s readability-identifier-naming %t -- \ // RUN: -config='{CheckOptions: { \ // RUN: readability-identifier-naming.ClassCase: Camel_Snake_Case, \ // RUN: readability-identifier-naming.StructCase: camel_Snake_Back, \ diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-outofline.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-outofline.cpp index 2945047dee4ca..9e033271d133c 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-outofline.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/identifier-naming-outofline.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy %s readability-identifier-naming %t -std=c++20 \ +// RUN: %check_clang_tidy %s readability-identifier-naming %t -std=c++20-or-later \ // RUN: --config='{CheckOptions: { \ // RUN: readability-identifier-naming.MethodCase: CamelCase, \ // RUN: }}' diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/implicit-bool-conversion-cxx20.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/implicit-bool-conversion-cxx20.cpp index 13aa5c5774b47..df5450c1954bf 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/implicit-bool-conversion-cxx20.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/implicit-bool-conversion-cxx20.cpp @@ -1,4 +1,4 @@ -// RUN: %check_clang_tidy -std=c++20 %s readability-implicit-bool-conversion %t +// RUN: %check_clang_tidy -std=c++20-or-later %s readability-implicit-bool-conversion %t namespace std { struct strong_ordering { diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/redundant-casting.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/redundant-casting.cpp index 3e723b8b61d1d..001057aeaa495 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/redundant-casting.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/redundant-casting.cpp @@ -5,12 +5,12 @@ // RUN: %check_clang_tidy -std=c++11,c++14,c++17 -check-suffix=,ALIASES %s readability-redundant-casting %t -- \ // RUN: -config='{CheckOptions: { readability-redundant-casting.IgnoreTypeAliases: true }}' \ // RUN: -- -fno-delayed-template-parsing -// RUN: %check_clang_tidy -std=c++20 %s readability-redundant-casting %t -- \ +// RUN: %check_clang_tidy -std=c++20-or-later %s readability-redundant-casting %t -- \ // RUN: -- -fno-delayed-template-parsing -D CXX_20=1 -// RUN: %check_clang_tidy -std=c++20 -check-suffix=,MACROS %s readability-redundant-casting %t -- \ +// RUN: %check_clang_tidy -std=c++20-or-later -check-suffix=,MACROS %s readability-redundant-casting %t -- \ // RUN: -config='{CheckOptions: { readability-redundant-casting.IgnoreMacros: false }}' \ // RUN: -- -fno-delayed-template-parsing -D CXX_20=1 -// RUN: %check_clang_tidy -std=c++20 -check-suffix=,ALIASES %s readability-redundant-casting %t -- \ +// RUN: %check_clang_tidy -std=c++20-or-later -check-suffix=,ALIASES %s readability-redundant-casting %t -- \ // RUN: -config='{CheckOptions: { readability-redundant-casting.IgnoreTypeAliases: true }}' \ // RUN: -- -fno-delayed-template-parsing -D CXX_20=1 diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/redundant-inline-specifier.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/redundant-inline-specifier.cpp index 882ce640b13c1..4bd97df154b5c 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/redundant-inline-specifier.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/redundant-inline-specifier.cpp @@ -1,5 +1,5 @@ -// RUN: %check_clang_tidy -std=c++17 %s readability-redundant-inline-specifier %t -// RUN: %check_clang_tidy -std=c++17 -check-suffixes=,STRICT %s readability-redundant-inline-specifier %t -- -config="{CheckOptions: {readability-redundant-inline-specifier.StrictMode: 'true'}}" +// RUN: %check_clang_tidy -std=c++17-or-later %s readability-redundant-inline-specifier %t +// RUN: %check_clang_tidy -std=c++17-or-later -check-suffixes=,STRICT %s readability-redundant-inline-specifier %t -- -config="{CheckOptions: {readability-redundant-inline-specifier.StrictMode: 'true'}}" template <typename T> inline T f() // CHECK-MESSAGES-STRICT: :[[@LINE-1]]:23: warning: function 'f' has inline specifier but is implicitly inlined [readability-redundant-inline-specifier] diff --git a/clang-tools-extra/test/clang-tidy/checkers/readability/simplify-boolean-expr-cxx23.cpp b/clang-tools-extra/test/clang-tidy/checkers/readability/simplify-boolean-expr-cxx23.cpp index f29d3f1b8a336..093eccba7921b 100644 --- a/clang-tools-extra/test/clang-tidy/checkers/readability/simplify-boolean-expr-cxx23.cpp +++ b/clang-tools-extra/test/clang-tidy/checkers/readability/simplify-boolean-expr-cxx23.cpp @@ -1,4 +1,4 @@ -// RUN: clang-tidy %s -checks='-*,readability-simplify-boolean-expr' -- -std=c++2b | count 0 +// RUN: clang-tidy %s -checks='-*,readability-simplify-boolean-expr' -- -std=c++23 | count 0 template <bool Cond> constexpr int testIf() { if consteval { _______________________________________________ cfe-commits mailing list [email protected] https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
