fix(msteams): gate startup user allowlist resolution [AI]#79003
fix(msteams): gate startup user allowlist resolution [AI]#79003pgondhi987 merged 4 commits intoopenclaw:mainfrom
Conversation
|
Codex review: needs real behavior proof before merge. Summary Reproducibility: yes. source-reproducible: current main resolves MS Teams user allowlists through Graph at startup before applying the existing dangerous name-matching policy. A live tenant run was not performed in this read-only review. Real behavior proof Next step before merge Security Review findings
Review detailsBest possible solution: Land the narrow startup-gating fix after the contributor adds redacted real behavior proof and a single-line Unreleased changelog entry, then let maintainer review handle the protected label. Do we have a high-confidence way to reproduce the issue? Yes, source-reproducible: current main resolves MS Teams user allowlists through Graph at startup before applying the existing dangerous name-matching policy. A live tenant run was not performed in this read-only review. Is this the best way to solve the issue? Yes for the code direction: gating only user Graph lookup while keeping stable IDs and team/channel route resolution intact is the narrow maintainable fix. Merge should wait for proof and changelog cleanup. Full review comments:
Overall correctness: patch is correct What I checked:
Likely related people:
Remaining risk / open question:
Codex review notes: model gpt-5.5, reasoning high; reviewed against 95a1c915312a. |
|
Not applicable to this automation stage; changelog/release-note and external real behavior proof requirements are handled outside auto-pr stages. Quoted comment from @clawsweeper:
|
…9003) * fix: gate msteams user allowlist name resolution * addressing codex review * docs: add changelog entry for PR merge
…9003) * fix: gate msteams user allowlist name resolution * addressing codex review * docs: add changelog entry for PR merge
Summary
allowFromandgroupAllowFromGraph-backed user resolution now only runs whendangerouslyAllowNameMatchingis enabled.Change Type (select all)
Scope (select all touched areas)
Linked Issue/PR
Real behavior proof (required for external PRs)
extensions/msteams/src/monitor.lifecycle.test.ts.isDangerousNameMatchingEnabled.Root Cause (if applicable)
Regression Test Plan (if applicable)
extensions/msteams/src/monitor.lifecycle.test.tsUser-visible / Behavior Changes
MS Teams
allowFromandgroupAllowFromentries that rely on user-name or email lookup are no longer resolved at startup unlesschannels.msteams.dangerouslyAllowNameMatchingis enabled. Stable user IDs continue to work as configured.Diagram (if applicable)
Security Impact (required)
Yes/No) NoYes/No) NoYes/No) NoYes/No) NoYes/No) NoYes, explain risk + mitigation: N/ARepro + Verification
Environment
channels.msteams.allowFrom/channels.msteams.groupAllowFromwithdangerouslyAllowNameMatchingunset or enabledSteps
allowFromandgroupAllowFromentries that require Graph user lookup.dangerouslyAllowNameMatchingunset.dangerouslyAllowNameMatching: true.Expected
Actual
extensions/msteams/src/monitor.ts; regression coverage added inextensions/msteams/src/monitor.lifecycle.test.ts.Evidence
Attach at least one:
Human Verification (required)
What you personally verified (not just CI), and how:
allowFrom,groupAllowFrom, and team/channel route resolution staying active independently of user lookup.Review Conversations
If a bot review conversation is addressed by this PR, resolve that conversation yourself. Do not leave bot review conversation cleanup for maintainers.
Compatibility / Migration
Yes/No) YesYes/No) NoYes/No) NoRisks and Mitigations