all lists on lists.proxmox.com
 help / color / mirror / Atom feed
From: "Lukas Wagner" <l.wagner@proxmox.com>
To: "Arthur Bied-Charreton" <a.bied-charreton@proxmox.com>,
	<pve-devel@lists.proxmox.com>
Subject: Re: [PATCH proxmox 2/7] notify (smtp): Introduce state module
Date: Mon, 23 Mar 2026 13:26:05 +0100	[thread overview]
Message-ID: <DHA5SAKGQAN1.BVWSK7UCNBR8@proxmox.com> (raw)
In-Reply-To: <20260213160415.609868-3-a.bied-charreton@proxmox.com>

Hi Arthur!

Generally we'd write the commit subject rather like this:

 "notify: smtp: ...."

 instead of

 "notify (smtp): ..."

 (but not a big deal IMO, just mentioning it)


On Fri Feb 13, 2026 at 5:04 PM CET, Arthur Bied-Charreton wrote:
> The state module exports a new struct with associated functionality for
> loading, updating, and persisting the state for SMTP endpoints with
> OAuth2 configured as authentication method.
>
> The path to the state files, as well as their create options, are
> retrieved through new Context methods to allow portability between PVE
> and PBS.
>
> Signed-off-by: Arthur Bied-Charreton <a.bied-charreton@proxmox.com>
> ---
>  proxmox-notify/src/context/mod.rs          |  6 ++
>  proxmox-notify/src/context/pbs.rs          |  8 +++
>  proxmox-notify/src/context/pve.rs          |  8 +++
>  proxmox-notify/src/context/test.rs         |  8 +++
>  proxmox-notify/src/endpoints/smtp.rs       |  3 +
>  proxmox-notify/src/endpoints/smtp/state.rs | 67 ++++++++++++++++++++++
>  6 files changed, 100 insertions(+)
>  create mode 100644 proxmox-notify/src/endpoints/smtp/state.rs
>
> diff --git a/proxmox-notify/src/context/mod.rs b/proxmox-notify/src/context/mod.rs
> index 8b6e2c43..492442f9 100644
> --- a/proxmox-notify/src/context/mod.rs
> +++ b/proxmox-notify/src/context/mod.rs
> @@ -1,6 +1,8 @@
>  use std::fmt::Debug;
>  use std::sync::Mutex;
>  
> +use proxmox_sys::fs::CreateOptions;
> +
>  use crate::renderer::TemplateSource;
>  use crate::Error;
>  
> @@ -32,6 +34,10 @@ pub trait Context: Send + Sync + Debug {
>          namespace: Option<&str>,
>          source: TemplateSource,
>      ) -> Result<Option<String>, Error>;
> +    /// Return the path to the state file for this context.
> +    fn state_file_path(&self, name: &str) -> String;

I think this should rather return a PathBuf. And rename `name` ->
`endpoint_name`?

> +    /// Create options to be used when writing files containing secrets.
> +    fn secret_create_options(&self) -> CreateOptions;

Due to CreateOptions being part of the `Context` trait now, we need to
pull in proxmox-sys unconditionally:

diff --git i/proxmox-notify/Cargo.toml w/proxmox-notify/Cargo.toml
index d816c695..35d5b8cb 100644
--- i/proxmox-notify/Cargo.toml
+++ w/proxmox-notify/Cargo.toml
@@ -36,17 +36,15 @@ proxmox-schema = { workspace = true, features = ["api-macro", "api-types"] }
 proxmox-section-config = { workspace = true }
 proxmox-serde.workspace = true
 proxmox-sendmail = { workspace = true, optional = true }
-proxmox-sys = { workspace = true, optional = true }
+proxmox-sys = { workspace = true }
 proxmox-time.workspace = true
 proxmox-uuid = { workspace = true, features = ["serde"] }
 nix.workspace = true
 
 [features]
 default = ["sendmail", "gotify", "smtp", "webhook"]
-mail-forwarder = ["dep:mail-parser", "dep:proxmox-sys", "proxmox-sendmail/mail-forwarder"]
-sendmail = ["dep:proxmox-sys", "dep:proxmox-sendmail"]
+mail-forwarder = ["dep:mail-parser", "proxmox-sendmail/mail-forwarder"]
+sendmail = ["dep:proxmox-sendmail"]
 gotify = ["dep:proxmox-http", "dep:http"]
-pve-context = ["dep:proxmox-sys"]
-pbs-context = ["dep:proxmox-sys"]
-smtp = ["dep:lettre", "dep:oauth2", "dep:ureq", "dep:http", "dep:proxmox-sys"]
+smtp = ["dep:lettre", "dep:oauth2", "dep:ureq", "dep:http"]
 webhook = ["dep:http", "dep:percent-encoding", "dep:proxmox-base64", "dep:proxmox-http"]



>  }
>  
>  #[cfg(not(test))]
> diff --git a/proxmox-notify/src/context/pbs.rs b/proxmox-notify/src/context/pbs.rs
> index 3e5da59c..4f93b45d 100644
> --- a/proxmox-notify/src/context/pbs.rs
> +++ b/proxmox-notify/src/context/pbs.rs
> @@ -125,6 +125,14 @@ impl Context for PBSContext {
>              .map_err(|err| Error::Generic(format!("could not load template: {err}")))?;
>          Ok(template_string)
>      }
> +
> +    fn state_file_path(&self, name: &str) -> String {
> +        format!("/var/lib/proxmox-backup/priv/notifications/{name}.json")
> +    }
> +
> +    fn secret_create_options(&self) -> proxmox_sys::fs::CreateOptions {
> +        proxmox_sys::fs::CreateOptions::new().perm(nix::sys::stat::Mode::from_bits_truncate(0o600))

(1) In the trait impl, you could get the appropriate CreateOptions via
proxmox-product-config...

> +    }
>  }
>  
>  #[cfg(test)]
> diff --git a/proxmox-notify/src/context/pve.rs b/proxmox-notify/src/context/pve.rs
> index a97cce26..e30f7b49 100644
> --- a/proxmox-notify/src/context/pve.rs
> +++ b/proxmox-notify/src/context/pve.rs
> @@ -74,6 +74,14 @@ impl Context for PVEContext {
>              .map_err(|err| Error::Generic(format!("could not load template: {err}")))?;
>          Ok(template_string)
>      }
> +
> +    fn state_file_path(&self, name: &str) -> String {
> +        format!("/etc/pve/priv/notifications/{name}.json")

I think `state` should be somewhere in the path -- so maybe one of

  - priv/notification-endpoint-state/{name}.json
  - priv/notification-state/{name}.json
  - priv/notifications/state-{name}.json

> +    }
> +
> +    fn secret_create_options(&self) -> proxmox_sys::fs::CreateOptions {
> +        proxmox_sys::fs::CreateOptions::new().perm(nix::sys::stat::Mode::from_bits_truncate(0o600))

(2) ... here as well, but you probably need to initialize
proxmox-product-config in the proxmox-perl-rs bindings with the correct
UIDs.

> +    }
>  }
>  
>  pub static PVE_CONTEXT: PVEContext = PVEContext;
> diff --git a/proxmox-notify/src/context/test.rs b/proxmox-notify/src/context/test.rs
> index 2c236b4c..7e29d36a 100644
> --- a/proxmox-notify/src/context/test.rs
> +++ b/proxmox-notify/src/context/test.rs
> @@ -40,4 +40,12 @@ impl Context for TestContext {
>      ) -> Result<Option<String>, Error> {
>          Ok(Some(String::new()))
>      }
> +
> +    fn state_file_path(&self, name: &str) -> String {
> +        format!("/tmp/notifications/{name}.json")
> +    }
> +
> +    fn secret_create_options(&self) -> proxmox_sys::fs::CreateOptions {
> +        proxmox_sys::fs::CreateOptions::new().perm(nix::sys::stat::Mode::from_bits_truncate(0o755))
> +    }
>  }
> diff --git a/proxmox-notify/src/endpoints/smtp.rs b/proxmox-notify/src/endpoints/smtp.rs
> index 277b70f4..699ed1c6 100644
> --- a/proxmox-notify/src/endpoints/smtp.rs
> +++ b/proxmox-notify/src/endpoints/smtp.rs
> @@ -23,8 +23,11 @@ const SMTP_SUBMISSION_STARTTLS_PORT: u16 = 587;
>  const SMTP_SUBMISSION_TLS_PORT: u16 = 465;
>  const SMTP_TIMEOUT: u16 = 5;
>  
> +mod state;
>  mod xoauth2;
>  
> +pub(crate) use state::State;
> +
>  #[api]
>  #[derive(Debug, Serialize, Deserialize, Default, Clone, Copy)]
>  #[serde(rename_all = "kebab-case")]
> diff --git a/proxmox-notify/src/endpoints/smtp/state.rs b/proxmox-notify/src/endpoints/smtp/state.rs
> new file mode 100644
> index 00000000..60bef590
> --- /dev/null
> +++ b/proxmox-notify/src/endpoints/smtp/state.rs
> @@ -0,0 +1,67 @@
> +use serde::{Deserialize, Serialize};
> +
> +use crate::{context::context, Error};
> +
> +#[derive(Serialize, Deserialize, Clone, Debug, Default)]
> +#[serde(rename_all = "kebab-case")]
> +pub(crate) struct State {
> +    #[serde(skip_serializing_if = "Option::is_none")]
> +    pub oauth2_refresh_token: Option<String>,
> +    pub last_refreshed: i64,
> +}
> +
> +impl State {
> +    /// Instantiate a new [`State`].
> +    pub(crate) fn new(oauth2_refresh_token: Option<String>) -> Self {
> +        Self {
> +            oauth2_refresh_token,
> +            last_refreshed: proxmox_time::epoch_i64(),
> +        }
> +    }
> +
> +    /// Load the state for the endpoint identified by `name`, instantiating a default object
> +    /// if no state exists.
> +    ///
> +    /// # Errors
> +    /// An [`Error`] is returned if deserialization of the state object fails.
> +    pub(crate) fn load(name: &str) -> Result<State, Error> {
> +        match proxmox_sys::fs::file_get_optional_contents(context().state_file_path(name))
> +            .map_err(|e| Error::ConfigDeserialization(e.into()))?
> +        {
> +            Some(bytes) => {
> +                serde_json::from_slice(&bytes).map_err(|e| Error::ConfigDeserialization(e.into()))
> +            }
> +            None => Ok(State::default()),
> +        }
> +    }
> +
> +    /// Persist the state for the endpoint identified by `name`.
> +    ///
> +    /// # Errors
> +    /// An [`Error`] is returned if serialization of the state object, or the final write, fail.
> +    pub(crate) fn store(self, name: &str) -> Result<(), Error> {
> +        let path = context().state_file_path(name);
> +        let parent = std::path::Path::new(&path).parent().unwrap();
> +
> +        proxmox_sys::fs::ensure_dir_exists(parent, &context().secret_create_options(), false)
> +            .map_err(|e| Error::ConfigSerialization(e.into()))?;

I'm getting a "bad permissions on "/etc/pve/priv/notifications" (0o700
!= 0o600)" error in the system/task logs when the token is refreshed.
The CreateOptions provided by the context are 0o600, but I think pmxcfs
automatically enforces the x-bit on directories, leading to 0o700 perms
on the '/etc/pve/priv/notifications/' directory, which ultimately gives
us this error. I think you either have to add a separate trait method
for the directory permissions/CreateOptions, or add the x-bit to the
existing CreateOptions yourself here at the callsite.

> +
> +        let s = serde_json::to_string_pretty(&self)
> +            .map_err(|e| Error::ConfigSerialization(e.into()))?;
> +
> +        proxmox_sys::fs::replace_file(path, s.as_bytes(), context().secret_create_options(), true)
> +            .map_err(|e| Error::ConfigSerialization(e.into()))
> +    }
> +
> +    /// Set `last_refreshed`.
> +    pub(crate) fn set_last_refreshed(mut self, last_refreshed: i64) -> Self {
> +        self.last_refreshed = last_refreshed;
> +        self
> +    }
> +
> +    /// Set `oauth2_refresh_token`.
> +    pub(crate) fn set_oauth2_refresh_token(mut self, oauth2_refresh_token: Option<String>) -> Self {
> +        self.oauth2_refresh_token = oauth2_refresh_token;
> +        self
> +    }
> +}





  reply	other threads:[~2026-03-23 12:26 UTC|newest]

Thread overview: 35+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-02-13 16:03 [PATCH cluster/docs/manager/proxmox{,-perl-rs,-widget-toolkit} 00/17] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets Arthur Bied-Charreton
2026-02-13 16:03 ` [PATCH proxmox 1/7] notify (smtp): Introduce xoauth2 module Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 2/7] notify (smtp): Introduce state module Arthur Bied-Charreton
2026-03-23 12:26   ` Lukas Wagner [this message]
2026-03-23 16:32     ` Arthur Bied-Charreton
2026-03-24  8:50     ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 3/7] notify (smtp): Factor out transport building logic into own function Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 4/7] notify (smtp): Update API with OAuth2 parameters Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 5/7] notify (smtp): Add state handling logic Arthur Bied-Charreton
2026-03-23 12:26   ` Lukas Wagner
2026-02-13 16:04 ` [PATCH proxmox 6/7] notify (smtp): Add XOAUTH2 authentication support Arthur Bied-Charreton
2026-03-23 12:26   ` Lukas Wagner
2026-02-13 16:04 ` [PATCH proxmox 7/7] notify (smtp): Add logging and state-related error types Arthur Bied-Charreton
2026-03-23 12:26   ` Lukas Wagner
2026-02-13 16:04 ` [PATCH proxmox-perl-rs 1/1] notify (smtp): add oauth2 parameters to bindings Arthur Bied-Charreton
2026-03-23 12:26   ` Lukas Wagner
2026-03-23 16:44     ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox-widget-toolkit 1/2] utils: Add OAuth2 flow handlers Arthur Bied-Charreton
2026-03-23 12:26   ` Lukas Wagner
2026-02-13 16:04 ` [PATCH proxmox-widget-toolkit 2/2] notifications: Add opt-in OAuth2 support for SMTP targets Arthur Bied-Charreton
2026-03-23 12:26   ` Lukas Wagner
2026-03-23 16:49     ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-manager 1/5] notifications: Add OAuth2 parameters to schema and add/update endpoints Arthur Bied-Charreton
2026-03-23 12:26   ` Lukas Wagner
2026-02-13 16:04 ` [PATCH pve-manager 2/5] notifications: Add trigger-state-refresh endpoint Arthur Bied-Charreton
2026-03-23 12:26   ` Lukas Wagner
2026-02-13 16:04 ` [PATCH pve-manager 3/5] notifications: Trigger notification target refresh in pveupdate Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-manager 4/5] notifications: Handle OAuth2 callback in login handler Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-manager 5/5] notifications: Opt into OAuth2 authentication Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-cluster 1/1] notifications: Add refresh_targets subroutine to PVE::Notify Arthur Bied-Charreton
2026-03-23 12:26   ` Lukas Wagner
2026-03-23 16:54     ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-docs 1/1] notifications: Add section about OAuth2 to SMTP targets docs Arthur Bied-Charreton
2026-03-23 12:25 ` [PATCH cluster/docs/manager/proxmox{,-perl-rs,-widget-toolkit} 00/17] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets Lukas Wagner
2026-03-25 13:16 ` superseded: " Arthur Bied-Charreton

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=DHA5SAKGQAN1.BVWSK7UCNBR8@proxmox.com \
    --to=l.wagner@proxmox.com \
    --cc=a.bied-charreton@proxmox.com \
    --cc=pve-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal