salman-javed-nz updated this revision to Diff 381701.
salman-javed-nz added a comment.
Herald added a subscriber: arphaman.

Change double spaces after commas and periods to single space.


Repository:
  rG LLVM Github Monorepo

CHANGES SINCE LAST ACTION
  https://reviews.llvm.org/D112356/new/

https://reviews.llvm.org/D112356

Files:
  clang-tools-extra/docs/clang-tidy/Contributing.rst
  clang-tools-extra/docs/clang-tidy/checks/abseil-duration-conversion-cast.rst
  clang-tools-extra/docs/clang-tidy/checks/abseil-string-find-str-contains.rst
  clang-tools-extra/docs/clang-tidy/checks/android-cloexec-open.rst
  
clang-tools-extra/docs/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.rst
  clang-tools-extra/docs/clang-tidy/checks/modernize-use-auto.rst
  clang-tools-extra/docs/clang-tidy/checks/modernize-use-noexcept.rst
  clang-tools-extra/docs/clang-tidy/checks/readability-const-return-type.rst
  clang-tools-extra/docs/clang-tidy/checks/readability-data-pointer.rst
  clang-tools-extra/docs/clang-tidy/checks/readability-identifier-length.rst
  clang-tools-extra/docs/clang-tidy/checks/readability-qualified-auto.rst
  clang-tools-extra/docs/clang-tidy/index.rst

Index: clang-tools-extra/docs/clang-tidy/index.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/index.rst
+++ clang-tools-extra/docs/clang-tidy/index.rst
@@ -281,10 +281,10 @@
 =================================
 
 :program:`clang-tidy` diagnostics are intended to call out code that does not
-adhere to a coding standard, or is otherwise problematic in some way.  However,
+adhere to a coding standard, or is otherwise problematic in some way. However,
 if the code is known to be correct, it may be useful to silence the warning.
 Some clang-tidy checks provide a check-specific way to silence the diagnostics,
-e.g.  `bugprone-use-after-move <checks/bugprone-use-after-move.html>`_ can be
+e.g. `bugprone-use-after-move <checks/bugprone-use-after-move.html>`_ can be
 silenced by re-initializing the variable after it has been moved out,
 `bugprone-string-integer-assignment
 <checks/bugprone-string-integer-assignment.html>`_ can be suppressed by
Index: clang-tools-extra/docs/clang-tidy/checks/readability-qualified-auto.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/readability-qualified-auto.rst
+++ clang-tools-extra/docs/clang-tidy/checks/readability-qualified-auto.rst
@@ -65,7 +65,7 @@
    auto *Foo2 = cast<const int *>(Bar2);
    auto &Foo3 = cast<const int &>(Bar3);
 
-If AddConstToQualified is set to `false`,  it will be transformed into:
+If AddConstToQualified is set to `false`, it will be transformed into:
 
 .. code-block:: c++
 
Index: clang-tools-extra/docs/clang-tidy/checks/readability-identifier-length.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/readability-identifier-length.rst
+++ clang-tools-extra/docs/clang-tidy/checks/readability-identifier-length.rst
@@ -109,7 +109,7 @@
 .. option:: IgnoredExceptionVariableNames
 
     Specifies a regular expression for exception variable names that are to
-    be ignored.  The default value is `^[e]$` mainly for historical reasons.
+    be ignored. The default value is `^[e]$` mainly for historical reasons.
 
     .. code-block:: c++
 
Index: clang-tools-extra/docs/clang-tidy/checks/readability-data-pointer.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/readability-data-pointer.rst
+++ clang-tools-extra/docs/clang-tidy/checks/readability-data-pointer.rst
@@ -4,8 +4,8 @@
 ========================
 
 Finds cases where code could use ``data()`` rather than the address of the
-element at index 0 in a container.  This pattern is commonly used to materialize
-a pointer to the backing data of a container.  ``std::vector`` and
+element at index 0 in a container. This pattern is commonly used to materialize
+a pointer to the backing data of a container. ``std::vector`` and
 ``std::string`` provide a ``data()`` accessor to retrieve the data pointer which
 should be preferred.
 
Index: clang-tools-extra/docs/clang-tidy/checks/readability-const-return-type.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/readability-const-return-type.rst
+++ clang-tools-extra/docs/clang-tidy/checks/readability-const-return-type.rst
@@ -5,7 +5,7 @@
 
 Checks for functions with a ``const``-qualified return type and recommends
 removal of the ``const`` keyword. Such use of `const` is usually superfluous,
-and can prevent valuable compiler optimizations.  Does not (yet) fix trailing
+and can prevent valuable compiler optimizations. Does not (yet) fix trailing
 return types.
 
 Examples:
Index: clang-tools-extra/docs/clang-tidy/checks/modernize-use-noexcept.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/modernize-use-noexcept.rst
+++ clang-tools-extra/docs/clang-tidy/checks/modernize-use-noexcept.rst
@@ -4,7 +4,7 @@
 ======================
 
 This check replaces deprecated dynamic exception specifications with
-the appropriate noexcept specification (introduced in C++11).  By
+the appropriate noexcept specification (introduced in C++11). By
 default this check will replace ``throw()`` with ``noexcept``,
 and ``throw(<exception>[,...])`` or ``throw(...)`` with
 ``noexcept(false)``.
@@ -30,9 +30,9 @@
 .. option:: ReplacementString
 
   Users can use :option:`ReplacementString` to specify a macro to use
-  instead of ``noexcept``.  This is useful when maintaining source code
+  instead of ``noexcept``. This is useful when maintaining source code
   that uses custom exception specification marking other than
-  ``noexcept``.  Fix-it hints will only be generated for non-throwing
+  ``noexcept``. Fix-it hints will only be generated for non-throwing
   specifications.
 
 Example
Index: clang-tools-extra/docs/clang-tidy/checks/modernize-use-auto.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/modernize-use-auto.rst
+++ clang-tools-extra/docs/clang-tidy/checks/modernize-use-auto.rst
@@ -162,7 +162,7 @@
 The check handles ``static_cast``, ``dynamic_cast``, ``const_cast``,
 ``reinterpret_cast``, functional casts, C-style casts and function templates
 that behave as casts, such as ``llvm::dyn_cast``, ``boost::lexical_cast`` and
-``gsl::narrow_cast``.  Calls to function templates are considered to behave as
+``gsl::narrow_cast``. Calls to function templates are considered to behave as
 casts if the first template argument is explicit and is a type, and the function
 returns that type, or a pointer or reference to it.
 
Index: clang-tools-extra/docs/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.rst
+++ clang-tools-extra/docs/clang-tidy/checks/bugprone-misplaced-operator-in-strlen-in-alloc.rst
@@ -9,7 +9,7 @@
 allocation function (``malloc()``, ``calloc()``, ``realloc()``, ``alloca()``) or
 the ``new[]`` operator in `C++`. The check detects error cases even if one of
 these functions (except the ``new[]`` operator) is called by a constant function
-pointer.  Cases where ``1`` is added both to the parameter and the result of the
+pointer. Cases where ``1`` is added both to the parameter and the result of the
 ``strlen()``-like function are ignored, as are cases where the whole addition is
 surrounded by extra parentheses.
 
Index: clang-tools-extra/docs/clang-tidy/checks/android-cloexec-open.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/android-cloexec-open.rst
+++ clang-tools-extra/docs/clang-tidy/checks/android-cloexec-open.rst
@@ -4,7 +4,7 @@
 ====================
 
 A common source of security bugs is code that opens a file without using the
-``O_CLOEXEC`` flag.  Without that flag, an opened sensitive file would remain
+``O_CLOEXEC`` flag. Without that flag, an opened sensitive file would remain
 open across a fork+exec to a lower-privileged SELinux domain, leaking that
 sensitive data. Open-like functions including ``open()``, ``openat()``, and
 ``open64()`` should include ``O_CLOEXEC`` in their flags argument.
Index: clang-tools-extra/docs/clang-tidy/checks/abseil-string-find-str-contains.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/abseil-string-find-str-contains.rst
+++ clang-tools-extra/docs/clang-tidy/checks/abseil-string-find-str-contains.rst
@@ -10,7 +10,7 @@
 ``find()`` and ``npos`` from different string-like types.
 
 By default, "string-like types" includes ``::std::basic_string``,
-``::std::basic_string_view``, and ``::absl::string_view``.  See the
+``::std::basic_string_view``, and ``::absl::string_view``. See the
 StringLikeClasses option to change this.
 
 .. code-block:: c++
Index: clang-tools-extra/docs/clang-tidy/checks/abseil-duration-conversion-cast.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/checks/abseil-duration-conversion-cast.rst
+++ clang-tools-extra/docs/clang-tidy/checks/abseil-duration-conversion-cast.rst
@@ -27,5 +27,5 @@
 
 
 Note: In the second example, the suggested fix could yield a different result,
-as the conversion to integer could truncate.  In practice, this is very rare,
+as the conversion to integer could truncate. In practice, this is very rare,
 and you should use ``absl::Trunc`` to perform this operation explicitly instead.
Index: clang-tools-extra/docs/clang-tidy/Contributing.rst
===================================================================
--- clang-tools-extra/docs/clang-tidy/Contributing.rst
+++ clang-tools-extra/docs/clang-tidy/Contributing.rst
@@ -475,7 +475,7 @@
 
 .. code-block:: console
 
-  $ clang-tidy -enable-check-profile -store-check-profile=.  -checks=-*,readability-function-size source.cpp
+  $ clang-tidy -enable-check-profile -store-check-profile=. -checks=-*,readability-function-size source.cpp
   $ # Note that there won't be timings table printed to the console.
   $ ls /tmp/out/
   20180516161318717446360-source.cpp.json
_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to