This is an automated email from the ASF dual-hosted git repository.

bbender pushed a commit to branch develop
in repository https://gitbox.apache.org/repos/asf/geode-native.git


The following commit(s) were added to refs/heads/develop by this push:
     new f647a87  GEODE-7620: Updates CMake to properly include macOS SDK. 
(#565)
f647a87 is described below

commit f647a87beea17156b0d52d27c39f70c625617948
Author: Jacob Barrett <[email protected]>
AuthorDate: Mon Feb 10 09:52:39 2020 -0800

    GEODE-7620: Updates CMake to properly include macOS SDK. (#565)
    
    * Upgrades 3rd party dependencies.
    * Fixes Boost on MSVC
    * clang-tidy cleanup
    * Ignore clang-analyzer-optin.cplusplus.VirtualCall in integration/framework
---
 CMakeLists.txt                                     |  4 +-
 cppcache/CMakeLists.txt                            |  9 +----
 cppcache/include/geode/internal/geode_base.hpp     |  4 +-
 cppcache/integration/framework/.clang-tidy         |  3 +-
 cppcache/integration/framework/CMakeLists.txt      | 15 +-------
 cppcache/integration/test/CMakeLists.txt           |  7 ----
 cppcache/src/VersionedCacheableObjectPartList.hpp  |  2 -
 dependencies/ACE/CMakeLists.txt                    |  8 ++--
 dependencies/boost/CMakeLists.txt                  | 44 ++++++++++++++--------
 dependencies/boost/patches                         | 16 --------
 dependencies/gtest/CMakeLists.txt                  |  4 +-
 dependencies/sqlite/CMakeLists.txt                 |  4 +-
 tests/cpp/security/CredentialGenerator.hpp         |  8 ++--
 tests/cpp/security/DummyCredentialGenerator.hpp    | 23 ++++++-----
 tests/cpp/security/DummyCredentialGenerator2.hpp   | 28 +++++++-------
 tests/cpp/security/DummyCredentialGenerator3.hpp   | 28 +++++++-------
 tests/cpp/security/LdapUserCredentialGenerator.hpp | 13 +++----
 tests/cpp/security/NoopCredentialGenerator.hpp     |  5 +--
 tests/cpp/security/PkcsCredentialGenerator.hpp     |  8 ++--
 19 files changed, 101 insertions(+), 132 deletions(-)

diff --git a/CMakeLists.txt b/CMakeLists.txt
index cf9c5e4..9d2c301 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -31,7 +31,6 @@ include(ClangFormat)
 include(ApacheGeodeExportHeader)
 
 if(CMAKE_GENERATOR MATCHES Win64*)
-
   if ((CMAKE_GENERATOR MATCHES "Visual Studio") AND (CMAKE_GENERATOR_TOOLSET 
STREQUAL ""))
     message(FATAL_ERROR "GEODE expects that a user must provide -Thost=x64 if 
you are using a"
             " 64-bit toolset, otherwise you may get a linker error when DLLs 
are larger"
@@ -39,6 +38,9 @@ if(CMAKE_GENERATOR MATCHES Win64*)
             " to Visual Studio using the 32-bit toolset by default.")
   endif()
 endif()
+if(APPLE AND NOT DEFINED ENV{MACOSX_DEPLOYMENT_TARGET} AND NOT DEFINED 
ENV{SDKROOT})
+  set(CMAKE_OSX_DEPLOYMENT_TARGET 10.14)
+endif()
 
 get_property(GENERATOR_IS_MULTI_CONFIG GLOBAL PROPERTY 
GENERATOR_IS_MULTI_CONFIG)
 if(NOT CMAKE_BUILD_TYPE AND NOT GENERATOR_IS_MULTI_CONFIG)
diff --git a/cppcache/CMakeLists.txt b/cppcache/CMakeLists.txt
index 86304d6..6564bcf 100644
--- a/cppcache/CMakeLists.txt
+++ b/cppcache/CMakeLists.txt
@@ -70,10 +70,6 @@ set(SOURCES_ALL ${SOURCES} ${PRIVATE_HEADERS} 
${PUBLIC_HEADERS} ${CONFIGURE_IN_F
 
 add_library(_apache-geode INTERFACE)
 
-target_compile_definitions(_apache-geode INTERFACE
-  BOOST_STACKTRACE_GNU_SOURCE_NOT_REQUIRED
-)
-
 if(CMAKE_SYSTEM_NAME STREQUAL "SunOS")
   target_link_libraries(_apache-geode INTERFACE
     demangle
@@ -83,10 +79,6 @@ elseif (WIN32)
   target_link_libraries(_apache-geode INTERFACE
     Dbghelp
   )
-  target_compile_definitions(_apache-geode INTERFACE
-    # Required for Boost.WinAPI
-    _WIN32_WINNT=0x06020000
-  )
 endif()
 
 target_link_libraries(_apache-geode INTERFACE
@@ -94,6 +86,7 @@ target_link_libraries(_apache-geode INTERFACE
   Boost::boost
   Boost::filesystem
   Boost::thread
+  Boost::stacktrace
   XercesC::XercesC
 )
 
diff --git a/cppcache/include/geode/internal/geode_base.hpp 
b/cppcache/include/geode/internal/geode_base.hpp
index 1e222c9..26bf265 100644
--- a/cppcache/include/geode/internal/geode_base.hpp
+++ b/cppcache/include/geode/internal/geode_base.hpp
@@ -44,14 +44,14 @@
 
 /** Allocates x and throws OutOfMemoryException if it fails */
 #define _GEODE_NEW(v, stmt)                                             \
-  {                                                                     \
+  do {                                                                  \
     try {                                                               \
       v = new stmt;                                                     \
     } catch (const std::bad_alloc &) {                                  \
       throw apache::geode::client::OutOfMemoryException(                \
           "Out of Memory while executing \"" #v " = new " #stmt ";\""); \
     }                                                                   \
-  }
+  } while (0)
 
 /** Deletes x only if it exists */
 #define _GEODE_SAFE_DELETE(x) \
diff --git a/cppcache/integration/framework/.clang-tidy 
b/cppcache/integration/framework/.clang-tidy
index 1c4ed27..7346c59 100644
--- a/cppcache/integration/framework/.clang-tidy
+++ b/cppcache/integration/framework/.clang-tidy
@@ -1,5 +1,5 @@
 ---
-Checks:          
'-*,clang-diagnostic-*,clang-analyzer-*,-clang-analyzer-alpha*,google-*,-google-readability-todo,-google-runtime-references,-google-default-arguments,-clang-analyzer-unix.cstring.NullArg'
+Checks:          
'-*,clang-diagnostic-*,clang-analyzer-*,-clang-analyzer-alpha*,google-*,-google-readability-todo,-google-runtime-references,-google-default-arguments,-clang-analyzer-unix.cstring.NullArg,-clang-analyzer-optin.cplusplus.VirtualCall'
 WarningsAsErrors: '*'
 HeaderFilterRegex: '.*'
 FormatStyle:     file
@@ -12,3 +12,4 @@ FormatStyle:     file
 # TODO - Fix these checks
 # google-default-arguments
 # clang-analyzer-unix.cstring.NullArg - Generates errors in Boost, how do we 
ignore?
+# clang-analyzer-optin.cplusplus.VirtualCall - Boost.Process
diff --git a/cppcache/integration/framework/CMakeLists.txt 
b/cppcache/integration/framework/CMakeLists.txt
index 61fb4a1..5c7476b 100644
--- a/cppcache/integration/framework/CMakeLists.txt
+++ b/cppcache/integration/framework/CMakeLists.txt
@@ -33,11 +33,6 @@ add_library(integration-framework STATIC
 
 add_dependencies(integration-framework javaobject)
 
-target_compile_definitions(integration-framework
-  PUBLIC
-    BOOST_ASIO_HAS_MOVE
-)
-
 target_include_directories(integration-framework
   PUBLIC
     ${CMAKE_CURRENT_SOURCE_DIR}/..
@@ -54,15 +49,9 @@ target_link_libraries(integration-framework
     Boost::system
     Boost::log
     Boost::filesystem
+    Boost::process
+    Boost::asio
   PRIVATE
     _WarningsAsError
     internal
 )
-
-if(WIN32)
-  target_compile_definitions(integration-framework
-    PUBLIC
-      # Required for Boost.WinAPI
-      _WIN32_WINNT=0x06020000
-  )
-endif()
diff --git a/cppcache/integration/test/CMakeLists.txt 
b/cppcache/integration/test/CMakeLists.txt
index c2d77d3..23f819c 100644
--- a/cppcache/integration/test/CMakeLists.txt
+++ b/cppcache/integration/test/CMakeLists.txt
@@ -45,7 +45,6 @@ add_executable(cpp-integration-test
 
 target_compile_definitions(cpp-integration-test
   PUBLIC
-    BOOST_ASIO_HAS_MOVE
     GTEST_ELLIPSIS_NEEDS_POD_
 )
 
@@ -76,12 +75,6 @@ target_link_libraries(cpp-integration-test
 add_dependencies(cpp-integration-test cryptoImpl)
 
 if(WIN32)
-  target_compile_definitions(cpp-integration-test
-    PUBLIC
-      # Required for Boost.WinAPI
-      _WIN32_WINNT=0x06020000
-  )
-
   foreach (_target apache-geode testobject cryptoImpl)
     add_custom_command(TARGET cpp-integration-test POST_BUILD COMMAND 
${CMAKE_COMMAND} -E copy_if_different
         "$<TARGET_FILE:${_target}>"
diff --git a/cppcache/src/VersionedCacheableObjectPartList.hpp 
b/cppcache/src/VersionedCacheableObjectPartList.hpp
index 6406278..82fcf08 100644
--- a/cppcache/src/VersionedCacheableObjectPartList.hpp
+++ b/cppcache/src/VersionedCacheableObjectPartList.hpp
@@ -101,7 +101,6 @@ class VersionedCacheableObjectPartList : public 
CacheableObjectPartList {
     m_endpointMemId = 0;
     m_versionTags.resize(totalMapSize);
     this->m_hasKeys = false;
-    ;
   }
 
   VersionedCacheableObjectPartList(ThinClientRegion* region, uint16_t dsmemId,
@@ -113,7 +112,6 @@ class VersionedCacheableObjectPartList : public 
CacheableObjectPartList {
     m_serializeValues = false;
     m_hasTags = false;
     this->m_hasKeys = false;
-    ;
   }
 
   VersionedCacheableObjectPartList(
diff --git a/dependencies/ACE/CMakeLists.txt b/dependencies/ACE/CMakeLists.txt
index 4d0ebca..217f20c 100644
--- a/dependencies/ACE/CMakeLists.txt
+++ b/dependencies/ACE/CMakeLists.txt
@@ -13,9 +13,9 @@
 # See the License for the specific language governing permissions and
 # limitations under the License.
 
-project( ACE VERSION 6.5.5 LANGUAGES NONE )
+project( ACE VERSION 6.5.7 LANGUAGES NONE )
 
-set( SHA256 dc70f1422e5d880b7d2cb59483873acfe6918bb1456c7e36e8b510d9e7769f3b )
+set( SHA256 b966eaa82281c17a9c869609e6a1cdc617aa13e1123a8fce5bde93cb266d1fea )
 
 if ("SunOS" STREQUAL ${CMAKE_SYSTEM_NAME})
   set( ACE_PLATFORM sunos5_sunc++ )
@@ -30,8 +30,8 @@ elseif ("Linux" STREQUAL ${CMAKE_SYSTEM_NAME} )
   ## TODO fix visibility problem with g++
   set( _MAKE_ARGS ${_MAKE_ARGS} no_hidden_visibility=1 )
 elseif ("Darwin" STREQUAL ${CMAKE_SYSTEM_NAME} )
-  set( ACE_PLATFORM macosx_sierra )
-  set( ACE_CONFIG macosx-sierra )
+  set( ACE_PLATFORM macosx )
+  set( ACE_CONFIG macosx )
 elseif ("Windows" STREQUAL ${CMAKE_SYSTEM_NAME} )
   set( ACE_PLATFORM win32-msvc )
   set( ACE_CONFIG win32 )
diff --git a/dependencies/boost/CMakeLists.txt 
b/dependencies/boost/CMakeLists.txt
index afe54a9..c3673b8 100644
--- a/dependencies/boost/CMakeLists.txt
+++ b/dependencies/boost/CMakeLists.txt
@@ -13,9 +13,9 @@
 # See the License for the specific language governing permissions and
 # limitations under the License.
 
-project( boost VERSION 1.68.0 LANGUAGES NONE )
+project( boost VERSION 1.72.0 LANGUAGES NONE )
 
-set( SHA256 da3411ea45622579d419bfda66f45cd0f8c32a181d84adfa936f5688388995cf )
+set( SHA256 c66e88d5786f2ca4dbebb14e06b566fb642a1a6947ad8cc9091f9f445134143f )
 
 set(_B2_FLAGS
   -d0
@@ -77,19 +77,6 @@ ExternalProject_Get_Property( ${EXTERN} SOURCE_DIR )
 ExternalProject_Get_Property( ${EXTERN} INSTALL_DIR )
 set(INSTALL_DIR "${INSTALL_DIR}/$<CONFIG>")
 
-if (NOT WIN32)
-# https://github.com/boostorg/process/issues/51
-  set( PATCH_FILE ${CMAKE_CURRENT_SOURCE_DIR}/patches)
-  ExternalProject_Add_Step( ${EXTERN} patches
-      ALWAYS 0
-      DEPENDEES download
-      DEPENDERS patch
-      DEPENDS ${PATCH_FILE}
-      BYPRODUCTS ${SOURCE_DIR}/boost/process/detail/posix/is_running.hpp
-      COMMAND ${Patch_EXECUTABLE} -u -N -p1 < ${PATCH_FILE}
-  )
-endif()
-
 function(ADD_BOOST_LIBRARY)
   set(options)
   set(oneValueArgs)
@@ -98,7 +85,7 @@ function(ADD_BOOST_LIBRARY)
 
   set(args_NAME ${ARGV0})
 
-  if (NOT DEFINED args_LIBRARIES OR args_LIBRARIES STREQUAL "")
+  if (NOT DEFINED args_LIBRARIES)
     set(args_LIBRARIES ${args_NAME})
   endif()
 
@@ -137,3 +124,28 @@ add_boost_library(filesystem DEPENDENCIES Boost::system 
Boost::boost)
 add_boost_library(log DEPENDENCIES Boost::thread Boost::filesystem 
Boost::boost)
 add_boost_library(log_setup DEPENDENCIES Boost::log)
 add_boost_library(chrono DEPENDENCIES Boost::chrono)
+add_boost_library(stacktrace LIBRARIES "" DEPENDENCIES Boost::boost)
+add_boost_library(asio LIBRARIES "" DEPENDENCIES Boost::boost)
+add_boost_library(process LIBRARIES "" DEPENDENCIES Boost::system)
+
+target_compile_definitions(boost_stacktrace INTERFACE
+  BOOST_STACKTRACE_GNU_SOURCE_NOT_REQUIRED
+)
+
+target_compile_definitions(boost_asio INTERFACE
+    BOOST_ASIO_HAS_MOVE
+)
+
+if(WIN32)
+  target_compile_definitions(boost INTERFACE
+    # Required for Boost.WinAPI
+    _WIN32_WINNT=0x06020000
+  )
+endif()
+
+if(MSVC)
+  target_compile_options(boost_process INTERFACE
+       /wd4267
+    /wd4244
+       )
+endif()
diff --git a/dependencies/boost/patches b/dependencies/boost/patches
deleted file mode 100644
index 21bef7f..0000000
--- a/dependencies/boost/patches
+++ /dev/null
@@ -1,16 +0,0 @@
---- a/src/boost/process/detail/posix/is_running.hpp
-+++ b/src/boost/process/detail/posix/is_running.hpp
-@@ -16,8 +16,11 @@ namespace boost { namespace process { namespace detail { 
namespace posix {
- // Use the "stopped" state (WIFSTOPPED) to indicate "not terminated".
- // This bit arrangement of status codes is not guaranteed by POSIX, but 
(according to comments in
- // the glibc <bits/waitstatus.h> header) is the same across systems in 
practice.
--constexpr int still_active = 0x7F;
--static_assert(!WIFEXITED(still_active) && !WIFSIGNALED(still_active), 
"Internal Error");
-+constexpr int still_active = 0x017f;
-+static_assert(WIFSTOPPED(still_active), "Expected still_active to indicate 
WIFSTOPPED");
-+static_assert(!WIFEXITED(still_active), "Expected still_active to not 
indicate WIFEXITED");
-+static_assert(!WIFSIGNALED(still_active), "Expected still_active to not 
indicate WIFSIGNALED");
-+static_assert(!WIFCONTINUED(still_active), "Expected still_active to not 
indicate WIFCONTINUED");
-
- inline bool is_running(int code)
- {
diff --git a/dependencies/gtest/CMakeLists.txt 
b/dependencies/gtest/CMakeLists.txt
index 4d5c10a..4cca1e7 100644
--- a/dependencies/gtest/CMakeLists.txt
+++ b/dependencies/gtest/CMakeLists.txt
@@ -13,9 +13,9 @@
 # See the License for the specific language governing permissions and
 # limitations under the License.
 
-project( gtest VERSION 1.8.1 LANGUAGES NONE )
+project( gtest VERSION 1.10.0 LANGUAGES NONE )
 
-set( SHA256 927827c183d01734cc5cfef85e0ff3f5a92ffe6188e0d18e909c5efebf28a0c7 )
+set( SHA256 94c634d499558a76fa649edb13721dce6e98fb1e7018dfaeba3cd7a083945e91 )
 
 include(ExternalProject)
 ExternalProject_Add( ${PROJECT_NAME}-extern
diff --git a/dependencies/sqlite/CMakeLists.txt 
b/dependencies/sqlite/CMakeLists.txt
index 5f4442e..8f23c71 100644
--- a/dependencies/sqlite/CMakeLists.txt
+++ b/dependencies/sqlite/CMakeLists.txt
@@ -13,9 +13,9 @@
 # See the License for the specific language governing permissions and
 # limitations under the License.
 
-project( sqlite VERSION 3280000 LANGUAGES NONE )
+project( sqlite VERSION 3300100 LANGUAGES NONE )
 
-set( SHA256 d02fc4e95cfef672b45052e221617a050b7f2e20103661cda88387349a9b1327 )
+set( SHA256 adf051d4c10781ea5cfabbbc4a2577b6ceca68590d23b58b8260a8e24cc5f081 )
 
 
 set( EXTERN ${PROJECT_NAME}-extern )
diff --git a/tests/cpp/security/CredentialGenerator.hpp 
b/tests/cpp/security/CredentialGenerator.hpp
index ea1232e..d324bda 100644
--- a/tests/cpp/security/CredentialGenerator.hpp
+++ b/tests/cpp/security/CredentialGenerator.hpp
@@ -234,11 +234,11 @@ class CredentialGenerator {
 
   virtual void getAllowedCredentialsForOps(opCodeList& opCodes,
                                            std::shared_ptr<Properties>& p,
-                                           stringList* regionNames = nullptr);
+                                           stringList* regionNames);
 
-  virtual void getDisallowedCredentialsForOps(
-      opCodeList& opCodes, std::shared_ptr<Properties>& p,
-      stringList* regionNames = nullptr);
+  virtual void getDisallowedCredentialsForOps(opCodeList& opCodes,
+                                              std::shared_ptr<Properties>& p,
+                                              stringList* regionNames);
 
   static registeredClassMap& getRegisterdSchemes() {
     if (generators().size() == 0) {
diff --git a/tests/cpp/security/DummyCredentialGenerator.hpp 
b/tests/cpp/security/DummyCredentialGenerator.hpp
index 0d59c18..9d06ecf 100644
--- a/tests/cpp/security/DummyCredentialGenerator.hpp
+++ b/tests/cpp/security/DummyCredentialGenerator.hpp
@@ -36,7 +36,7 @@ class DummyCredentialGenerator : public CredentialGenerator {
     ;
   };
 
-  std::string getInitArgs(std::string workingDir, bool userMode) {
+  std::string getInitArgs(std::string workingDir, bool userMode) override {
     std::string additionalArgs;
     char* buildDir = ACE_OS::getenv("BUILDDIR");
     if (buildDir && workingDir.length() == 0) {
@@ -56,21 +56,24 @@ class DummyCredentialGenerator : public CredentialGenerator 
{
     return additionalArgs;
   }
 
-  std::string getClientAuthInitLoaderFactory() {
+  std::string getClientAuthInitLoaderFactory() override {
     return "createUserPasswordAuthInitInstance";
   }
-  std::string getClientAuthInitLoaderLibrary() { return "securityImpl"; }
-  std::string getClientAuthenticator() {
+  std::string getClientAuthInitLoaderLibrary() override {
+    return "securityImpl";
+  }
+
+  std::string getClientAuthenticator() override {
     return "javaobject.DummyAuthenticator.create";
   }
-  std::string getClientAuthorizer() {
+  std::string getClientAuthorizer() override {
     return "javaobject.XmlAuthorization.create";
   }
-  std::string getClientDummyAuthorizer() {
+  std::string getClientDummyAuthorizer() override {
     return "javaobject.DummyAuthorization.create";
   }
 
-  void getValidCredentials(std::shared_ptr<Properties>& p) {
+  void getValidCredentials(std::shared_ptr<Properties>& p) override {
     p->insert("security-username", "user1");
     p->insert("security-password", "user1");
     FWKDEBUG("inserted valid security-username "
@@ -78,7 +81,7 @@ class DummyCredentialGenerator : public CredentialGenerator {
              << p->find("security-password")->value().c_str());
   }
 
-  void getInvalidCredentials(std::shared_ptr<Properties>& p) {
+  void getInvalidCredentials(std::shared_ptr<Properties>& p) override {
     p->insert("security-username", "1user");
     p->insert("security-password", "user1");
     FWKDEBUG("inserted invalid security-username "
@@ -88,14 +91,14 @@ class DummyCredentialGenerator : public CredentialGenerator 
{
 
   void getAllowedCredentialsForOps(opCodeList& opCodes,
                                    std::shared_ptr<Properties>& p,
-                                   stringList* regionNames = nullptr) {
+                                   stringList* regionNames) override {
     XmlAuthzCredentialGenerator authz(id());
     authz.getAllowedCredentials(opCodes, p, regionNames);
   }
 
   void getDisallowedCredentialsForOps(opCodeList& opCodes,
                                       std::shared_ptr<Properties>& p,
-                                      stringList* regionNames = nullptr) {
+                                      stringList* regionNames) override {
     XmlAuthzCredentialGenerator authz(id());
     authz.getDisallowedCredentials(opCodes, p, regionNames);
   }
diff --git a/tests/cpp/security/DummyCredentialGenerator2.hpp 
b/tests/cpp/security/DummyCredentialGenerator2.hpp
index 4ebbc2a..afe33cb 100644
--- a/tests/cpp/security/DummyCredentialGenerator2.hpp
+++ b/tests/cpp/security/DummyCredentialGenerator2.hpp
@@ -31,12 +31,9 @@ namespace security {
 
 class DummyCredentialGenerator2 : public CredentialGenerator {
  public:
-  DummyCredentialGenerator2() : CredentialGenerator(ID_DUMMY2, "DUMMY2") {
-    ;
-    ;
-  };
+  DummyCredentialGenerator2() : CredentialGenerator(ID_DUMMY2, "DUMMY2") {}
 
-  std::string getInitArgs(std::string workingDir, bool userMode) {
+  std::string getInitArgs(std::string workingDir, bool userMode) override {
     std::string additionalArgs;
     char* buildDir = ACE_OS::getenv("BUILDDIR");
     if (buildDir && workingDir.length() == 0) {
@@ -55,21 +52,24 @@ class DummyCredentialGenerator2 : public 
CredentialGenerator {
     return additionalArgs;
   }
 
-  std::string getClientAuthInitLoaderFactory() {
+  std::string getClientAuthInitLoaderFactory() override {
     return "createUserPasswordAuthInitInstance";
   }
-  std::string getClientAuthInitLoaderLibrary() { return "securityImpl"; }
-  std::string getClientAuthenticator() {
+  std::string getClientAuthInitLoaderLibrary() override {
+    return "securityImpl";
+  }
+
+  std::string getClientAuthenticator() override {
     return "javaobject.DummyAuthenticator.create";
   }
-  std::string getClientAuthorizer() {
+  std::string getClientAuthorizer() override {
     return "javaobject.DummyAuthorization2.create";
   }
-  std::string getClientDummyAuthorizer() {
+  std::string getClientDummyAuthorizer() override {
     return "javaobject.DummyAuthorization.create";
   }
 
-  void getValidCredentials(std::shared_ptr<Properties>& p) {
+  void getValidCredentials(std::shared_ptr<Properties>& p) override {
     p->insert("security-username", "user1");
     p->insert("security-password", "user1");
     FWKDEBUG("inserted valid security-username "
@@ -77,7 +77,7 @@ class DummyCredentialGenerator2 : public CredentialGenerator {
              << p->find("security-password")->value().c_str());
   }
 
-  void getInvalidCredentials(std::shared_ptr<Properties>& p) {
+  void getInvalidCredentials(std::shared_ptr<Properties>& p) override {
     p->insert("security-username", "1user");
     p->insert("security-password", "user1");
     FWKDEBUG("inserted invalid security-username "
@@ -87,14 +87,14 @@ class DummyCredentialGenerator2 : public 
CredentialGenerator {
 
   void getAllowedCredentialsForOps(opCodeList& opCodes,
                                    std::shared_ptr<Properties>& p,
-                                   stringList* regionNames = nullptr) {
+                                   stringList* regionNames) override {
     XmlAuthzCredentialGenerator authz(id());
     authz.getAllowedCredentials(opCodes, p, regionNames);
   }
 
   void getDisallowedCredentialsForOps(opCodeList& opCodes,
                                       std::shared_ptr<Properties>& p,
-                                      stringList* regionNames = nullptr) {
+                                      stringList* regionNames) override {
     XmlAuthzCredentialGenerator authz(id());
     authz.getDisallowedCredentials(opCodes, p, regionNames);
   }
diff --git a/tests/cpp/security/DummyCredentialGenerator3.hpp 
b/tests/cpp/security/DummyCredentialGenerator3.hpp
index b5847d1..6e448de 100644
--- a/tests/cpp/security/DummyCredentialGenerator3.hpp
+++ b/tests/cpp/security/DummyCredentialGenerator3.hpp
@@ -31,12 +31,9 @@ namespace security {
 
 class DummyCredentialGenerator3 : public CredentialGenerator {
  public:
-  DummyCredentialGenerator3() : CredentialGenerator(ID_DUMMY3, "DUMMY3") {
-    ;
-    ;
-  };
+  DummyCredentialGenerator3() : CredentialGenerator(ID_DUMMY3, "DUMMY3") {}
 
-  std::string getInitArgs(std::string workingDir, bool userMode) {
+  std::string getInitArgs(std::string workingDir, bool userMode) override {
     std::string additionalArgs;
     char* buildDir = ACE_OS::getenv("BUILDDIR");
     if (buildDir && workingDir.length() == 0) {
@@ -55,21 +52,24 @@ class DummyCredentialGenerator3 : public 
CredentialGenerator {
     return additionalArgs;
   }
 
-  std::string getClientAuthInitLoaderFactory() {
+  std::string getClientAuthInitLoaderFactory() override {
     return "createUserPasswordAuthInitInstance";
   }
-  std::string getClientAuthInitLoaderLibrary() { return "securityImpl"; }
-  std::string getClientAuthenticator() {
+  std::string getClientAuthInitLoaderLibrary() override {
+    return "securityImpl";
+  }
+
+  std::string getClientAuthenticator() override {
     return "javaobject.DummyAuthenticator.create";
   }
-  std::string getClientAuthorizer() {
+  std::string getClientAuthorizer() override {
     return "javaobject.DummyAuthorization3.create";
   }
-  std::string getClientDummyAuthorizer() {
+  std::string getClientDummyAuthorizer() override {
     return "javaobject.DummyAuthorization.create";
   }
 
-  void getValidCredentials(std::shared_ptr<Properties>& p) {
+  void getValidCredentials(std::shared_ptr<Properties>& p) override {
     p->insert("security-username", "user1");
     p->insert("security-password", "user1");
     FWKDEBUG("inserted valid security-username "
@@ -77,7 +77,7 @@ class DummyCredentialGenerator3 : public CredentialGenerator {
              << p->find("security-password")->value().c_str());
   }
 
-  void getInvalidCredentials(std::shared_ptr<Properties>& p) {
+  void getInvalidCredentials(std::shared_ptr<Properties>& p) override {
     p->insert("security-username", "1user");
     p->insert("security-password", "user1");
     FWKDEBUG("inserted invalid security-username "
@@ -87,14 +87,14 @@ class DummyCredentialGenerator3 : public 
CredentialGenerator {
 
   void getAllowedCredentialsForOps(opCodeList& opCodes,
                                    std::shared_ptr<Properties>& p,
-                                   stringList* regionNames = nullptr) {
+                                   stringList* regionNames) override {
     XmlAuthzCredentialGenerator authz(id());
     authz.getAllowedCredentials(opCodes, p, regionNames);
   }
 
   void getDisallowedCredentialsForOps(opCodeList& opCodes,
                                       std::shared_ptr<Properties>& p,
-                                      stringList* regionNames = nullptr) {
+                                      stringList* regionNames) override {
     XmlAuthzCredentialGenerator authz(id());
     authz.getDisallowedCredentials(opCodes, p, regionNames);
   }
diff --git a/tests/cpp/security/LdapUserCredentialGenerator.hpp 
b/tests/cpp/security/LdapUserCredentialGenerator.hpp
index fd795b6..97d8430 100644
--- a/tests/cpp/security/LdapUserCredentialGenerator.hpp
+++ b/tests/cpp/security/LdapUserCredentialGenerator.hpp
@@ -34,10 +34,7 @@ namespace security {
 
 class LdapUserCredentialGenerator : public CredentialGenerator {
  public:
-  LdapUserCredentialGenerator() : CredentialGenerator(ID_LDAP, "LDAP") {
-    ;
-    ;
-  };
+  LdapUserCredentialGenerator() : CredentialGenerator(ID_LDAP, "LDAP") {}
 
   std::string getInitArgs(std::string workingDir, bool) override {
     std::string additionalArgs;
@@ -102,14 +99,14 @@ class LdapUserCredentialGenerator : public 
CredentialGenerator {
 
   void getAllowedCredentialsForOps(opCodeList& opCodes,
                                    std::shared_ptr<Properties>& p,
-                                   stringList* regionNames = nullptr) override 
{
+                                   stringList* regionNames) override {
     XmlAuthzCredentialGenerator authz(id());
     authz.getAllowedCredentials(opCodes, p, regionNames);
   }
 
-  void getDisallowedCredentialsForOps(
-      opCodeList& opCodes, std::shared_ptr<Properties>& p,
-      stringList* regionNames = nullptr) override {
+  void getDisallowedCredentialsForOps(opCodeList& opCodes,
+                                      std::shared_ptr<Properties>& p,
+                                      stringList* regionNames) override {
     XmlAuthzCredentialGenerator authz(id());
     authz.getDisallowedCredentials(opCodes, p, regionNames);
   }
diff --git a/tests/cpp/security/NoopCredentialGenerator.hpp 
b/tests/cpp/security/NoopCredentialGenerator.hpp
index 6459d95..59e50cf 100644
--- a/tests/cpp/security/NoopCredentialGenerator.hpp
+++ b/tests/cpp/security/NoopCredentialGenerator.hpp
@@ -30,10 +30,7 @@ namespace security {
 
 class NoopCredentialGenerator : public CredentialGenerator {
  public:
-  NoopCredentialGenerator() : CredentialGenerator(ID_NOOP, "NOOP") {
-    ;
-    ;
-  };
+  NoopCredentialGenerator() : CredentialGenerator(ID_NOOP, "NOOP") {}
 
   std::string getInitArgs(std::string workingDir, bool) override {
     std::string additionalArgs;
diff --git a/tests/cpp/security/PkcsCredentialGenerator.hpp 
b/tests/cpp/security/PkcsCredentialGenerator.hpp
index efb3717..5c87c4f 100644
--- a/tests/cpp/security/PkcsCredentialGenerator.hpp
+++ b/tests/cpp/security/PkcsCredentialGenerator.hpp
@@ -135,16 +135,16 @@ class PKCSCredentialGenerator : public 
CredentialGenerator {
 
   void getAllowedCredentialsForOps(opCodeList& opCodes,
                                    std::shared_ptr<Properties>& p,
-                                   stringList* regionNames = nullptr) override 
{
+                                   stringList* regionNames) override {
     XmlAuthzCredentialGenerator authz(id());
     authz.getAllowedCredentials(opCodes, p, regionNames);
     const char* username = p->find("security-alias")->value().c_str();
     insertKeyStorePath(p, username);
   }
 
-  void getDisallowedCredentialsForOps(
-      opCodeList& opCodes, std::shared_ptr<Properties>& p,
-      stringList* regionNames = nullptr) override {
+  void getDisallowedCredentialsForOps(opCodeList& opCodes,
+                                      std::shared_ptr<Properties>& p,
+                                      stringList* regionNames) override {
     XmlAuthzCredentialGenerator authz(id());
     authz.getDisallowedCredentials(opCodes, p, regionNames);
     const char* username = p->find("security-alias")->value().c_str();

Reply via email to