From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [IPv6:2a01:7e0:0:424::9]) by lore.proxmox.com (Postfix) with ESMTPS id DFFB01FF138 for ; Wed, 04 Feb 2026 17:14:55 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 154601A82B; Wed, 4 Feb 2026 17:14:38 +0100 (CET) From: Arthur Bied-Charreton To: pve-devel@lists.proxmox.com Subject: [PATCH proxmox 3/5] notify: Update Endpoint trait and Bus to use State Date: Wed, 4 Feb 2026 17:13:42 +0100 Message-ID: <20260204161354.458814-4-a.bied-charreton@proxmox.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20260204161354.458814-1-a.bied-charreton@proxmox.com> References: <20260204161354.458814-1-a.bied-charreton@proxmox.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 AWL -0.140 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment KAM_LAZY_DOMAIN_SECURITY 1 Sending domain does not have any anti-forgery methods RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_RPBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_SAFE_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RDNS_NONE 0.793 Delivered to internal network by a host with no rDNS SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_NONE 0.001 SPF: sender does not publish an SPF Record Message-ID-Hash: ROJ3DRRZCITUJB36M5P3H634CVCG6TID X-Message-ID-Hash: ROJ3DRRZCITUJB36M5P3H634CVCG6TID X-MailFrom: abied-charreton@jett.proxmox.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.10 Precedence: list List-Id: Proxmox VE development discussion List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: This lays the groundwork for handling OAuth2 state in proxmox-notify by updating the crate's internal API to pass around a mutable State struct. The state can be updated by its consumers and will be persisted afterwards, much like the Config struct, with the difference that it is fully internal to the crate. External consumers of the API do not need to know/care about it. Signed-off-by: Arthur Bied-Charreton --- proxmox-notify/src/api/common.rs | 70 +++++++++++++++++++++--- proxmox-notify/src/endpoints/gotify.rs | 4 +- proxmox-notify/src/endpoints/sendmail.rs | 4 +- proxmox-notify/src/endpoints/smtp.rs | 17 +++++- proxmox-notify/src/endpoints/webhook.rs | 4 +- proxmox-notify/src/lib.rs | 42 +++++++++----- 6 files changed, 113 insertions(+), 28 deletions(-) diff --git a/proxmox-notify/src/api/common.rs b/proxmox-notify/src/api/common.rs index fa2356e2..3483be9a 100644 --- a/proxmox-notify/src/api/common.rs +++ b/proxmox-notify/src/api/common.rs @@ -1,7 +1,52 @@ use proxmox_http_error::HttpError; use super::http_err; -use crate::{Bus, Config, Notification}; +use crate::{context::context, Bus, Config, Notification, State}; + +use tracing::error; + +fn get_state() -> State { + let path_str = context().state_file_path(); + let path = std::path::Path::new(path_str); + + match path.exists() { + true => match State::from_path(path) { + Ok(s) => s, + Err(e) => { + // We don't want to block notifications on all endpoints only + // because the stateful ones are broken. + error!("could not instantiate state from {path_str}: {e}",); + State::default() + } + }, + false => State::default(), + } +} + +fn persist_state(state: &State) { + let path_str = context().state_file_path(); + + if let Err(e) = state.persist(path_str) { + error!("could not persist state at '{path_str}': {e}"); + } +} + +pub fn refresh_targets(config: &Config) -> Result<(), HttpError> { + let bus = Bus::from_config(config).map_err(|err| { + http_err!( + INTERNAL_SERVER_ERROR, + "Could not instantiate notification bus: {err}" + ) + })?; + + let mut state = get_state(); + + bus.refresh_targets(&mut state); + + persist_state(&state); + + Ok(()) +} /// Send a notification to a given target. /// @@ -15,7 +60,11 @@ pub fn send(config: &Config, notification: &Notification) -> Result<(), HttpErro ) })?; - bus.send(notification); + let mut state = get_state(); + + bus.send(notification, &mut state); + + persist_state(&state); Ok(()) } @@ -32,12 +81,17 @@ pub fn test_target(config: &Config, endpoint: &str) -> Result<(), HttpError> { ) })?; - bus.test_target(endpoint).map_err(|err| match err { - crate::Error::TargetDoesNotExist(endpoint) => { - http_err!(NOT_FOUND, "endpoint '{endpoint}' does not exist") - } - _ => http_err!(INTERNAL_SERVER_ERROR, "Could not test target: {err}"), - })?; + let mut state = get_state(); + + bus.test_target(endpoint, &mut state) + .map_err(|err| match err { + crate::Error::TargetDoesNotExist(endpoint) => { + http_err!(NOT_FOUND, "endpoint '{endpoint}' does not exist") + } + _ => http_err!(INTERNAL_SERVER_ERROR, "Could not test target: {err}"), + })?; + + persist_state(&state); Ok(()) } diff --git a/proxmox-notify/src/endpoints/gotify.rs b/proxmox-notify/src/endpoints/gotify.rs index 3e12a60e..5f48fc0a 100644 --- a/proxmox-notify/src/endpoints/gotify.rs +++ b/proxmox-notify/src/endpoints/gotify.rs @@ -12,7 +12,7 @@ use proxmox_schema::{api, Updater}; use crate::context::context; use crate::renderer::TemplateType; use crate::schema::ENTITY_NAME_SCHEMA; -use crate::{renderer, Content, Endpoint, Error, Notification, Origin, Severity}; +use crate::{renderer, Content, Endpoint, Error, Notification, Origin, Severity, State}; const HTTP_TIMEOUT: Duration = Duration::from_secs(10); @@ -96,7 +96,7 @@ pub enum DeleteableGotifyProperty { } impl Endpoint for GotifyEndpoint { - fn send(&self, notification: &Notification) -> Result<(), Error> { + fn send(&self, notification: &Notification, _: &mut State) -> Result<(), Error> { let (title, message) = match ¬ification.content { Content::Template { template_name, diff --git a/proxmox-notify/src/endpoints/sendmail.rs b/proxmox-notify/src/endpoints/sendmail.rs index 70b0f111..d95a6872 100644 --- a/proxmox-notify/src/endpoints/sendmail.rs +++ b/proxmox-notify/src/endpoints/sendmail.rs @@ -4,10 +4,10 @@ use serde::{Deserialize, Serialize}; use proxmox_schema::api_types::COMMENT_SCHEMA; use proxmox_schema::{api, Updater}; -use crate::context; use crate::endpoints::common::mail; use crate::renderer::TemplateType; use crate::schema::{EMAIL_SCHEMA, ENTITY_NAME_SCHEMA, USER_SCHEMA}; +use crate::{context, State}; use crate::{renderer, Content, Endpoint, Error, Notification, Origin}; pub(crate) const SENDMAIL_TYPENAME: &str = "sendmail"; @@ -104,7 +104,7 @@ pub struct SendmailEndpoint { } impl Endpoint for SendmailEndpoint { - fn send(&self, notification: &Notification) -> Result<(), Error> { + fn send(&self, notification: &Notification, _: &mut State) -> Result<(), Error> { let recipients = mail::get_recipients( self.config.mailto.as_slice(), self.config.mailto_user.as_slice(), diff --git a/proxmox-notify/src/endpoints/smtp.rs b/proxmox-notify/src/endpoints/smtp.rs index c888dee7..69c4048c 100644 --- a/proxmox-notify/src/endpoints/smtp.rs +++ b/proxmox-notify/src/endpoints/smtp.rs @@ -15,6 +15,7 @@ use crate::endpoints::common::mail; use crate::renderer::TemplateType; use crate::schema::{EMAIL_SCHEMA, ENTITY_NAME_SCHEMA, USER_SCHEMA}; use crate::{renderer, Content, Endpoint, Error, Notification, Origin}; +use crate::{xoauth2, EndpointState, State}; pub(crate) const SMTP_TYPENAME: &str = "smtp"; @@ -136,6 +137,16 @@ pub enum DeleteableSmtpProperty { Username, } +#[derive(Serialize, Deserialize, Clone, Debug, Default)] +#[serde(rename_all = "kebab-case")] +pub struct SmtpState { + #[serde(skip_serializing_if = "Option::is_none")] + pub oauth2_refresh_token: Option, + pub last_refreshed: u64, +} + +impl EndpointState for SmtpState {} + #[api] #[derive(Serialize, Deserialize, Clone, Updater, Debug)] #[serde(rename_all = "kebab-case")] @@ -158,7 +169,9 @@ pub struct SmtpEndpoint { } impl Endpoint for SmtpEndpoint { - fn send(&self, notification: &Notification) -> Result<(), Error> { + fn send(&self, notification: &Notification, state: &mut State) -> Result<(), Error> { + let mut endpoint_state = state.get_or_default::(self.name())?; + let tls_parameters = TlsParameters::new(self.config.server.clone()) .map_err(|err| Error::NotifyFailed(self.name().into(), Box::new(err)))?; @@ -272,6 +285,8 @@ impl Endpoint for SmtpEndpoint { .send(&email) .map_err(|err| Error::NotifyFailed(self.name().into(), err.into()))?; + state.set(self.name(), &endpoint_state)?; + Ok(()) } diff --git a/proxmox-notify/src/endpoints/webhook.rs b/proxmox-notify/src/endpoints/webhook.rs index 0167efcf..ce5bddf4 100644 --- a/proxmox-notify/src/endpoints/webhook.rs +++ b/proxmox-notify/src/endpoints/webhook.rs @@ -27,7 +27,7 @@ use proxmox_schema::{api, ApiStringFormat, ApiType, Schema, StringSchema, Update use crate::context::context; use crate::renderer::TemplateType; use crate::schema::ENTITY_NAME_SCHEMA; -use crate::{renderer, Content, Endpoint, Error, Notification, Origin}; +use crate::{renderer, Content, Endpoint, Error, Notification, Origin, State}; /// This will be used as a section type in the public/private configuration file. pub(crate) const WEBHOOK_TYPENAME: &str = "webhook"; @@ -240,7 +240,7 @@ pub const KEY_AND_BASE64_VALUE_SCHEMA: Schema = impl Endpoint for WebhookEndpoint { /// Send a notification to a webhook endpoint. - fn send(&self, notification: &Notification) -> Result<(), Error> { + fn send(&self, notification: &Notification, _: &mut State) -> Result<(), Error> { let request = self.build_request(notification)?; self.create_client()? diff --git a/proxmox-notify/src/lib.rs b/proxmox-notify/src/lib.rs index a40342cc..3bd83ce4 100644 --- a/proxmox-notify/src/lib.rs +++ b/proxmox-notify/src/lib.rs @@ -152,13 +152,18 @@ pub enum Origin { /// Notification endpoint trait, implemented by all endpoint plugins pub trait Endpoint { /// Send a documentation - fn send(&self, notification: &Notification) -> Result<(), Error>; + fn send(&self, notification: &Notification, state: &mut State) -> Result<(), Error>; /// The name/identifier for this endpoint fn name(&self) -> &str; /// Check if the endpoint is disabled fn disabled(&self) -> bool; + + /// Refresh the endpoint's state if required. + fn refresh_state(&self, _: &mut State) -> Result { + Ok(false) + } } #[derive(Debug, Clone, Serialize, Deserialize)] @@ -599,7 +604,7 @@ impl Bus { /// the notification. /// /// Any errors will not be returned but only logged. - pub fn send(&self, notification: &Notification) { + pub fn send(&self, notification: &Notification, state: &mut State) { let targets = matcher::check_matches(self.matchers.as_slice(), notification); for target in targets { @@ -612,7 +617,7 @@ impl Bus { continue; } - match endpoint.send(notification) { + match endpoint.send(notification, state) { Ok(_) => { info!("notified via target `{name}`"); } @@ -631,7 +636,7 @@ impl Bus { /// /// In contrast to the `send` function, this function will return /// any errors to the caller. - pub fn test_target(&self, target: &str) -> Result<(), Error> { + pub fn test_target(&self, target: &str, state: &mut State) -> Result<(), Error> { let notification = Notification { metadata: Metadata { severity: Severity::Info, @@ -647,13 +652,21 @@ impl Bus { }; if let Some(endpoint) = self.endpoints.get(target) { - endpoint.send(¬ification)?; + endpoint.send(¬ification, state)?; } else { return Err(Error::TargetDoesNotExist(target.to_string())); } Ok(()) } + + pub fn refresh_targets(&self, state: &mut State) { + for (name, endpoint) in &self.endpoints { + if let Err(e) = endpoint.refresh_state(state) { + error!("could not refresh state for endpoint '{name}': {e}"); + } + } + } } #[cfg(test)] @@ -671,7 +684,7 @@ mod tests { } impl Endpoint for MockEndpoint { - fn send(&self, message: &Notification) -> Result<(), Error> { + fn send(&self, message: &Notification, _: &mut State) -> Result<(), Error> { self.messages.borrow_mut().push(message.clone()); Ok(()) @@ -714,12 +727,15 @@ mod tests { bus.add_matcher(matcher); // Send directly to endpoint - bus.send(&Notification::from_template( - Severity::Info, - "test", - Default::default(), - Default::default(), - )); + bus.send( + &Notification::from_template( + Severity::Info, + "test", + Default::default(), + Default::default(), + ), + &mut State::default(), + ); let messages = mock.messages(); assert_eq!(messages.len(), 1); @@ -758,7 +774,7 @@ mod tests { Default::default(), ); - bus.send(¬ification); + bus.send(¬ification, &mut State::default()); }; send_with_severity(Severity::Info); -- 2.47.3