Skip to content

Commit 26d990a

Browse files
committed
Better documentation
1 parent 1db144c commit 26d990a

File tree

4 files changed

+5
-2
lines changed

4 files changed

+5
-2
lines changed

CONFIGURATION.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ sasl.oauthbearer.assertion.claim.jti.include | * | true, false | f
121121
sasl.oauthbearer.assertion.claim.nbf.seconds | * | 0 .. 2147483647 | 60 | low | Assertion not before time in seconds. Only used when `sasl.oauthbearer.method` is set to "oidc" and JWT assertion is needed. <br>*Type: integer*
122122
sasl.oauthbearer.assertion.claim.sub | * | | | low | JWT subject claim. Only used when `sasl.oauthbearer.method` is set to "oidc" and JWT assertion is needed. <br>*Type: string*
123123
sasl.oauthbearer.assertion.jwt.template.file | * | | | low | Path to the JWT template file. Only used when `sasl.oauthbearer.method` is set to "oidc" and JWT assertion is needed. <br>*Type: string*
124-
sasl.oauthbearer.metadata.authentication.type | * | none, azure_imds | none | low | Type of metadata based authentication to use for OAUTHBEARER/OIDC `azure_imds` authenticates using the Azure IMDS endpoint. Sets a default value for `sasl.oauthbearer.token.endpoint.url` if missing. Configuration values specific of chosen authentication type can be passed through `sasl.oauthbearer.config`. <br>*Type: enum value*
124+
sasl.oauthbearer.metadata.authentication.type | * | none, azure_imds | none | low | Type of metadata-based authentication to use for OAUTHBEARER/OIDC `azure_imds` authenticates using the Azure IMDS endpoint. Sets a default value for `sasl.oauthbearer.token.endpoint.url` if missing. Configuration values specific of chosen authentication type can be passed through `sasl.oauthbearer.config`. <br>*Type: enum value*
125125
plugin.library.paths | * | | | low | List of plugin libraries to load (; separated). The library search path is platform dependent (see dlopen(3) for Unix and LoadLibrary() for Windows). If no filename extension is specified the platform-specific extension (such as .dll or .so) will be appended automatically. <br>*Type: string*
126126
interceptors | * | | | low | Interceptors added through rd_kafka_conf_interceptor_add_..() and any configuration handled by interceptors. <br>*Type: see dedicated API*
127127
group.id | C | | | high | Client group id string. All clients sharing the same group.id belong to the same group. <br>*Type: string*

src/rdhttp.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -276,6 +276,8 @@ static void rd_http_ssl_configure(rd_kafka_t *rk, CURL *hreq_curl) {
276276
* otherwise return rd_false.
277277
*
278278
* @locality Any thread.
279+
* @locks None.
280+
* @locks_acquired None.
279281
*/
280282
static rd_bool_t rd_http_is_failure_temporary(int error_code) {
281283
switch (error_code) {

src/rdkafka_conf.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1213,7 +1213,7 @@ static const struct rd_kafka_property rd_kafka_properties[] = {
12131213
"sasl.oauthbearer.metadata.authentication.type",
12141214
_RK_C_S2I,
12151215
_RK(sasl.oauthbearer.metadata_authentication.type),
1216-
"Type of metadata based authentication to use for OAUTHBEARER/OIDC "
1216+
"Type of metadata-based authentication to use for OAUTHBEARER/OIDC "
12171217
"`azure_imds` authenticates using the Azure IMDS endpoint. "
12181218
"Sets a default value for `sasl.oauthbearer.token.endpoint.url` if "
12191219
"missing. "

tests/0126-oauthbearer_oidc.c

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -467,6 +467,7 @@ static rd_kafka_conf_t *oidc_configuration_metadata_authentication(
467467
return conf;
468468
}
469469

470+
/* Test metadata-based authentication cases against Trivup. */
470471
void do_test_produce_consumer_with_OIDC_metadata_authentication(
471472
rd_kafka_conf_t *conf) {
472473
rd_kafka_conf_t *metadata_authentication_conf;

0 commit comments

Comments
 (0)