Skip to content

Commit 5619752

Browse files
committed
Docs touch-up.
1 parent 302c686 commit 5619752

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

CHANGELOG.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
3333
and want to retain the pre-2.x behavior, set `oidc_claim_scope = None` in your subclass of `OAuth2Validator`.
3434
* #1108 OIDC: Make the `access_token` available to `get_oidc_claims` when called from `get_userinfo_claims`.
3535

36+
### Fixed
37+
* #1108 OIDC: Fix `validate_bearer_token()` to properly set `request.scopes` to the list of granted scopes.
3638

3739
## [1.7.0] 2022-01-23
3840

docs/oidc.rst

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -325,7 +325,8 @@ and defined the ``OAUTH2_PROVIDER["SCOPES"]`` in your settings in order for this
325325
you can use to decide what claims to put in to the ID token:
326326

327327
* ``request.scopes`` - the list of granted scopes.
328-
* ``request.claims`` - the requested claims per OIDC's `5.5 Requesting Claims using the "claims" Request Parameter`_
328+
* ``request.claims`` - the requested claims per OIDC's `5.5 Requesting Claims using the "claims" Request Parameter`_.
329+
These must be requested by the client when making an authorization request.
329330
* ``request.user`` - the `Django User`_ object.
330331

331332
.. _5.4 Requesting Claims using Scope Values: https://openid.net/specs/openid-connect-core-1_0.html#ScopeClaims

0 commit comments

Comments
 (0)