summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJonathan Huot <JonathanHuot@users.noreply.github.com>2019-11-27 23:53:20 +0100
committerGitHub <noreply@github.com>2019-11-27 23:53:20 +0100
commit02aef1e35fbf76b132b390d84f88c59efb9a98f2 (patch)
treec4cdb4213313e3c267f890dfb4b16698a2313737
parent193e3feb3df424e2aab86c92274274ffeed1a871 (diff)
parent794c9fb1305141903f4cd182d7d0aab959e86219 (diff)
downloadoauthlib-02aef1e35fbf76b132b390d84f88c59efb9a98f2.tar.gz
Merge branch 'master' into doc-custom-grant-type
-rw-r--r--CHANGELOG.rst35
-rw-r--r--oauthlib/openid/connect/core/grant_types/dispatchers.py2
2 files changed, 20 insertions, 17 deletions
diff --git a/CHANGELOG.rst b/CHANGELOG.rst
index e07ec3c..ab556f1 100644
--- a/CHANGELOG.rst
+++ b/CHANGELOG.rst
@@ -3,31 +3,34 @@ Changelog
3.1.0 (TBD)
------------------
-
OAuth2.0 Provider - Features
-* #660: OIDC add support of nonce, c_hash, at_hash fields
- - New RequestValidator.fill_id_token method
- - Deprecated RequestValidator.get_id_token method
-* #677: OIDC add UserInfo endpoint
- - New RequestValidator.get_userinfo_claims method
+
+ * #660: OIDC add support of `nonce`, `c_hash`, `at_hash fields`
+ - New `RequestValidator.fill_id_token` method
+ - Deprecated `RequestValidator.get_id_token` method
+ * #677: OIDC add `UserInfo` endpoint - New `RequestValidator.get_userinfo_claims` method
OAuth2.0 Provider - Security
-* #665: Enhance data leak to logs
- - New default to not expose request content in logs
- - New function `oauthlib.set_debug(True)`
-* #666: Disabling query parameters for POST requests
+
+ * #665: Enhance data leak to logs
+ * New default to not expose request content in logs
+ * New function `oauthlib.set_debug(True)`
+ * #666: Disabling query parameters for POST requests
OAuth2.0 Provider - Bugfixes
-* #670: Fix validate_authorization_request to return the new PKCE fields
-* #674: Fix token_type to be case-insensitive (bearer and Bearer)
+
+ * #670: Fix `validate_authorization_request` to return the new PKCE fields
+ * #674: Fix `token_type` to be case-insensitive (`bearer` and `Bearer`)
OAuth2.0 Client - Bugfixes
-* #290: Fix Authorization Code's errors processing
-* #603: BackendApplication.Client.prepare_request_body use the "scope" argument as intended.
-* #672: Fix edge case when expires_in=Null
+
+ * #290: Fix Authorization Code's errors processing
+ * #603: BackendApplication.Client.prepare_request_body use the `scope` argument as intended.
+ * #672: Fix edge case when `expires_in=Null`
OAuth1.0 Client
-* #669: Add case-insensitive headers to oauth1 BaseEndpoint
+
+ * #669: Add case-insensitive headers to oauth1 `BaseEndpoint`
3.0.2 (2019-07-04)
------------------
diff --git a/oauthlib/openid/connect/core/grant_types/dispatchers.py b/oauthlib/openid/connect/core/grant_types/dispatchers.py
index 541467a..4d880b7 100644
--- a/oauthlib/openid/connect/core/grant_types/dispatchers.py
+++ b/oauthlib/openid/connect/core/grant_types/dispatchers.py
@@ -75,7 +75,7 @@ class AuthorizationTokenGrantDispatcher(Dispatcher):
code = parameters.get('code', None)
redirect_uri = parameters.get('redirect_uri', None)
- # If code is not pressent fallback to `default_grant` wich will
+ # If code is not pressent fallback to `default_grant` which will
# raise an error for the missing `code` in `create_token_response` step.
if code:
scopes = self.request_validator.get_authorization_code_scopes(client_id, code, redirect_uri, request)