+2
-2
src/http/handle_oauth_login.rs
+2
-2
src/http/handle_oauth_login.rs
···
159
159
state,
160
160
nonce,
161
161
code_challenge,
162
-
scope: "atproto transition:generic".to_string(),
162
+
scope: "atproto account:email repo:community.lexicon.badge.award".to_string(),
163
163
};
164
164
165
165
let authorization_server = match pds_resources(&web_context.http_client, pds).await {
···
389
389
state: state.clone(),
390
390
nonce,
391
391
code_challenge,
392
-
scope: "atproto:atproto atproto:transition:generic".to_string(),
392
+
scope: "openid profile email atproto account:email repo:community.lexicon.badge.award".to_string(),
393
393
};
394
394
395
395
let dummy_key_data = generate_key(KeyType::P256Private).expect("this can't fail");