@@ -266,7 +266,6 @@ def save_authorization_code(self, client_id, code, request, *args, **kwargs):
266
266
- the redirect URI used (``request.redirect_uri``)
267
267
- a resource owner / user (``request.user``)
268
268
- the authorized scopes (``request.scopes``)
269
- - the client state, if given (``code.get('state')``)
270
269
271
270
To support PKCE, you MUST associate the code with:
272
271
- Code Challenge (``request.code_challenge``) and
@@ -277,10 +276,6 @@ def save_authorization_code(self, client_id, code, request, *args, **kwargs):
277
276
278
277
``{'code': 'sdf345jsdf0934f'}``
279
278
280
- It may also have a ``state`` key containing a nonce for the client, if it
281
- chose to send one. That value should be saved and used in
282
- ``.validate_code``.
283
-
284
279
It may also have a ``claims`` parameter which, when present, will be a dict
285
280
deserialized from JSON as described at
286
281
http://openid.net/specs/openid-connect-core-1_0.html#ClaimsParameter
@@ -352,7 +347,7 @@ def save_bearer_token(self, token, request, *args, **kwargs):
352
347
'expires_in': 3600,
353
348
'scope': 'string of space separated authorized scopes',
354
349
'refresh_token': '23sdf876234', # if issued
355
- 'state': 'given_by_client', # if supplied by client
350
+ 'state': 'given_by_client', # if supplied by client (implicit ONLY)
356
351
}
357
352
358
353
Note that while "scope" is a string-separated list of authorized scopes,
@@ -559,7 +554,6 @@ def validate_code(self, client_id, code, client, request, *args, **kwargs):
559
554
with the code in 'save_authorization_code':
560
555
561
556
- request.user
562
- - request.state (if given)
563
557
- request.scopes
564
558
- request.claims (if given)
565
559
OBS! The request.user attribute should be set to the resource owner
0 commit comments