Enable clang-tidy checks we already pass

clang-13 brought some additional checks we can turn on that we already
pass, so enable them.  List of checks can be found in the diff, and
includes the suspicious includes check, which we previously had to
disable due to a clang bug.

Tested: Code compiles, clang-tidy passes

Signed-off-by: Ed Tanous <edtanous@google.com>
Change-Id: I1a4d1da0a8e775cdeb6b898bc1cdb0f3f7b6f06a
diff --git a/.clang-tidy b/.clang-tidy
index 15ade7f..6704aff 100644
--- a/.clang-tidy
+++ b/.clang-tidy
@@ -1,5 +1,6 @@
 Checks: '
 -*,
+boost-use-to-string,
 bugprone-argument-comment,
 bugprone-assert-side-effect,
 bugprone-bad-signal-to-kill-thread,
@@ -30,7 +31,9 @@
 bugprone-not-null-terminated-result,
 bugprone-parent-virtual-call,
 bugprone-posix-return,
+bugprone-redundant-branch-condition,
 bugprone-reserved-identifier,
+bugprone-signal-handler,
 bugprone-signed-char-misuse,
 bugprone-sizeof-container,
 bugprone-sizeof-expression,
@@ -39,7 +42,7 @@
 bugprone-string-integer-assignment,
 bugprone-string-literal-with-embedded-nul,
 bugprone-suspicious-enum-usage,
-#bugprone-suspicious-include,
+bugprone-suspicious-include,
 bugprone-suspicious-memset-usage,
 bugprone-suspicious-missing-comma,
 bugprone-suspicious-semicolon,
@@ -50,6 +53,7 @@
 bugprone-too-small-loop-variable,
 bugprone-undefined-memory-manipulation,
 bugprone-undelegated-constructor,
+bugprone-unhandled-exception-at-new,
 bugprone-unhandled-self-assignment,
 bugprone-unused-raii,
 bugprone-unused-return-value,
@@ -82,6 +86,11 @@
 cert-oop11-cpp,
 cert-oop54-cpp,
 cert-oop57-cpp,
+cert-oop58-cpp,
+cert-pos44-c,
+cert-pos47-c,
+cert-sig30-c,
+cert-str34-c,
 clang-analyzer-apiModeling.StdCLibraryFunctions,
 clang-analyzer-apiModeling.TrustNonnull,
 clang-analyzer-apiModeling.google.GTest,