Skip to content

Weekly Permissions sync 2026-03-31#1485

Open
marabooy wants to merge 1 commit intomasterfrom
permissions-update/2026-03-31
Open

Weekly Permissions sync 2026-03-31#1485
marabooy wants to merge 1 commit intomasterfrom
permissions-update/2026-03-31

Conversation

@marabooy
Copy link
Copy Markdown
Contributor

Weekly Permissions sync 2026-03-31

@marabooy marabooy requested a review from a team as a code owner March 31, 2026 00:30
Copilot AI review requested due to automatic review settings March 31, 2026 00:30
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Weekly permissions sync updating the permissions-to-API-path mapping for Data Security & Governance content processing endpoints.

Changes:

  • Added /me/.../contentUploadSession paths under existing Content.Process.* permissions.
  • Added /users/{userId}/.../contentUploadSession paths under existing Content.Process.* permissions.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines 12473 to 12478
"paths": {
"/me/dataSecurityAndGovernance/contentUploadSession": "",
"/me/dataSecurityAndGovernance/processContent": "",
"/security/dataSecurityAndGovernance/processContentAsync": "least=Application,DelegatedWork",
"/users/{userId}/dataSecurityAndGovernance/contentUploadSession": "",
"/users/{userId}/dataSecurityAndGovernance/processContent": ""
Copy link

Copilot AI Mar 31, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The new /me/dataSecurityAndGovernance/contentUploadSession path is being added under a pathSet that includes Application schemeKeys and has an empty constraint string. Since /me endpoints are only callable in delegated contexts (no app-only /me), this mapping can incorrectly imply app-only access. Consider moving the /me/... paths into a Delegated-only pathSet or marking them explicitly as delegated-only via the per-path constraint (e.g., least=DelegatedWork).

Copilot uses AI. Check for mistakes.
Comment on lines 12513 to +12516
"paths": {
"/me/dataSecurityAndGovernance/contentUploadSession": "",
"/me/dataSecurityAndGovernance/processContent": "least=Application,DelegatedWork",
"/users/{userId}/dataSecurityAndGovernance/contentUploadSession": "",
Copy link

Copilot AI Mar 31, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In Content.Process.User, the /me/... paths (/me/dataSecurityAndGovernance/contentUploadSession and /me/dataSecurityAndGovernance/processContent) are currently modeled in a pathSet that includes Application and even explicitly marks /me/.../processContent as least=Application,DelegatedWork. Because /me is not usable with app-only auth, please restrict these /me paths to delegated-only (separate Delegated pathSet or delegated-only constraint) so the permissions mapping doesn’t suggest unsupported app-only access.

Copilot uses AI. Check for mistakes.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants