Skip to content
Closed
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions permissions/new/permissions.json
Original file line number Diff line number Diff line change
Expand Up @@ -12471,8 +12471,10 @@
"POST"
],
"paths": {
"/me/dataSecurityAndGovernance/contentUploadSession": "",
"/me/dataSecurityAndGovernance/processContent": "",
"/security/dataSecurityAndGovernance/processContentAsync": "least=Application,DelegatedWork",
"/users/{userId}/dataSecurityAndGovernance/contentUploadSession": "",
"/users/{userId}/dataSecurityAndGovernance/processContent": ""
Comment on lines 12426 to 12431
Copy link

Copilot AI Mar 31, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The new /me/dataSecurityAndGovernance/contentUploadSession path is being added under a pathSet that includes Application schemeKeys and has an empty constraint string. Since /me endpoints are only callable in delegated contexts (no app-only /me), this mapping can incorrectly imply app-only access. Consider moving the /me/... paths into a Delegated-only pathSet or marking them explicitly as delegated-only via the per-path constraint (e.g., least=DelegatedWork).

Copilot uses AI. Check for mistakes.
}
}
Expand Down Expand Up @@ -12509,7 +12511,9 @@
"POST"
],
"paths": {
"/me/dataSecurityAndGovernance/contentUploadSession": "",
"/me/dataSecurityAndGovernance/processContent": "least=Application,DelegatedWork",
"/users/{userId}/dataSecurityAndGovernance/contentUploadSession": "",
Comment on lines 12466 to +12469
Copy link

Copilot AI Mar 31, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In Content.Process.User, the /me/... paths (/me/dataSecurityAndGovernance/contentUploadSession and /me/dataSecurityAndGovernance/processContent) are currently modeled in a pathSet that includes Application and even explicitly marks /me/.../processContent as least=Application,DelegatedWork. Because /me is not usable with app-only auth, please restrict these /me paths to delegated-only (separate Delegated pathSet or delegated-only constraint) so the permissions mapping doesn’t suggest unsupported app-only access.

Copilot uses AI. Check for mistakes.
"/users/{userId}/dataSecurityAndGovernance/processContent": "least=Application,DelegatedWork"
}
}
Expand Down
Loading