File tree Expand file tree Collapse file tree 2 files changed +4
-1
lines changed Expand file tree Collapse file tree 2 files changed +4
-1
lines changed Original file line number Diff line number Diff line change @@ -33,6 +33,8 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
3333 and want to retain the pre-2.x behavior, set ` oidc_claim_scope = None ` in your subclass of ` OAuth2Validator ` .
3434* #1108 OIDC: Make the ` access_token ` available to ` get_oidc_claims ` when called from ` get_userinfo_claims ` .
3535
36+ ### Fixed
37+ * #1108 OIDC: Fix ` validate_bearer_token() ` to properly set ` request.scopes ` to the list of granted scopes.
3638
3739## [ 1.7.0] 2022-01-23
3840
Original file line number Diff line number Diff line change @@ -325,7 +325,8 @@ and defined the ``OAUTH2_PROVIDER["SCOPES"]`` in your settings in order for this
325325 you can use to decide what claims to put in to the ID token:
326326
327327 * ``request.scopes `` - the list of granted scopes.
328- * ``request.claims `` - the requested claims per OIDC's `5.5 Requesting Claims using the "claims" Request Parameter `_
328+ * ``request.claims `` - the requested claims per OIDC's `5.5 Requesting Claims using the "claims" Request Parameter `_.
329+ These must be requested by the client when making an authorization request.
329330 * ``request.user `` - the `Django User `_ object.
330331
331332.. _5.4 Requesting Claims using Scope Values : https://openid.net/specs/openid-connect-core-1_0.html#ScopeClaims
You can’t perform that action at this time.
0 commit comments