|
56 | 56 | #include <windows.h> |
57 | 57 | #endif |
58 | 58 |
|
| 59 | +#ifdef WITH_OAUTHBEARER_OIDC |
| 60 | +#include <curl/curl.h> |
| 61 | +#endif |
| 62 | + |
59 | 63 | struct rd_kafka_property { |
60 | 64 | rd_kafka_conf_scope_t scope; |
61 | 65 | const char *name; |
@@ -1179,7 +1183,7 @@ static const struct rd_kafka_property rd_kafka_properties[] = { |
1179 | 1183 | _UNSUPPORTED_OIDC}, |
1180 | 1184 | {_RK_GLOBAL, "sasl.oauthbearer.assertion.claim.jti.include", _RK_C_BOOL, |
1181 | 1185 | _RK(sasl.oauthbearer.assertion.claim.jti_include), |
1182 | | - "JWT ID claim. When set to `true`a random UUID is generated. " |
| 1186 | + "JWT ID claim. When set to `true`, a random UUID is generated. " |
1183 | 1187 | "Only used when `sasl.oauthbearer.method` is set to \"oidc\" and JWT " |
1184 | 1188 | "assertion is needed.", |
1185 | 1189 | 0, 1, 0, _UNSUPPORTED_OIDC}, |
@@ -3960,11 +3964,17 @@ const char *rd_kafka_conf_finalize(rd_kafka_type_t cltype, |
3960 | 3964 | if (conf->https.ca_location && conf->https.ca_pem) |
3961 | 3965 | return "`https.ca.location` and `https.ca.pem` " |
3962 | 3966 | "are mutually exclusive"; |
| 3967 | + |
3963 | 3968 | if (conf->https.ca_location && |
3964 | 3969 | rd_strcmp(conf->https.ca_location, "probe") && |
3965 | 3970 | !rd_file_stat(conf->https.ca_location, NULL)) |
3966 | 3971 | return "`https.ca.location` must be " |
3967 | 3972 | "an existing file or directory"; |
| 3973 | + |
| 3974 | +#if !CURL_AT_LEAST_VERSION(7, 77, 0) |
| 3975 | + if (conf->https.ca_pem) |
| 3976 | + return "`https.ca.pem` requires libcurl 7.77.0 or later"; |
| 3977 | +#endif |
3968 | 3978 | #endif |
3969 | 3979 |
|
3970 | 3980 |
|
|
0 commit comments