| 
56 | 56 | #include <windows.h>  | 
57 | 57 | #endif  | 
58 | 58 | 
 
  | 
 | 59 | +#ifdef WITH_OAUTHBEARER_OIDC  | 
 | 60 | +#include <curl/curl.h>  | 
 | 61 | +#endif  | 
 | 62 | + | 
59 | 63 | struct rd_kafka_property {  | 
60 | 64 |         rd_kafka_conf_scope_t scope;  | 
61 | 65 |         const char *name;  | 
@@ -1179,7 +1183,7 @@ static const struct rd_kafka_property rd_kafka_properties[] = {  | 
1179 | 1183 |      _UNSUPPORTED_OIDC},  | 
1180 | 1184 |     {_RK_GLOBAL, "sasl.oauthbearer.assertion.claim.jti.include", _RK_C_BOOL,  | 
1181 | 1185 |      _RK(sasl.oauthbearer.assertion.claim.jti_include),  | 
1182 |  | -     "JWT ID claim. When set to `true`a random UUID is generated. "  | 
 | 1186 | +     "JWT ID claim. When set to `true`, a random UUID is generated. "  | 
1183 | 1187 |      "Only used when `sasl.oauthbearer.method` is set to \"oidc\" and JWT "  | 
1184 | 1188 |      "assertion is needed.",  | 
1185 | 1189 |      0, 1, 0, _UNSUPPORTED_OIDC},  | 
@@ -3960,11 +3964,17 @@ const char *rd_kafka_conf_finalize(rd_kafka_type_t cltype,  | 
3960 | 3964 |         if (conf->https.ca_location && conf->https.ca_pem)  | 
3961 | 3965 |                 return "`https.ca.location` and `https.ca.pem` "  | 
3962 | 3966 |                        "are mutually exclusive";  | 
 | 3967 | + | 
3963 | 3968 |         if (conf->https.ca_location &&  | 
3964 | 3969 |             rd_strcmp(conf->https.ca_location, "probe") &&  | 
3965 | 3970 |             !rd_file_stat(conf->https.ca_location, NULL))  | 
3966 | 3971 |                 return "`https.ca.location` must be "  | 
3967 | 3972 |                        "an existing file or directory";  | 
 | 3973 | + | 
 | 3974 | +#if !CURL_AT_LEAST_VERSION(7, 77, 0)  | 
 | 3975 | +        if (conf->https.ca_pem)  | 
 | 3976 | +                return "`https.ca.pem` requires libcurl 7.77.0 or later";  | 
 | 3977 | +#endif  | 
3968 | 3978 | #endif  | 
3969 | 3979 | 
 
  | 
3970 | 3980 | 
 
  | 
 | 
0 commit comments