From: "Lukas Wagner" <l.wagner@proxmox.com>
To: "Arthur Bied-Charreton" <a.bied-charreton@proxmox.com>,
<pve-devel@lists.proxmox.com>
Subject: Re: [PATCH proxmox 6/7] notify (smtp): Add XOAUTH2 authentication support
Date: Mon, 23 Mar 2026 13:26:12 +0100 [thread overview]
Message-ID: <DHA5SDHELZJS.31C3A00NUPVJW@proxmox.com> (raw)
In-Reply-To: <20260213160415.609868-7-a.bied-charreton@proxmox.com>
On Fri Feb 13, 2026 at 5:04 PM CET, Arthur Bied-Charreton wrote:
> Extend the transport building logic to authenticate via XOAUTH2 if
> configured, and manage the related state updates.
>
> Signed-off-by: Arthur Bied-Charreton <a.bied-charreton@proxmox.com>
> ---
> proxmox-notify/src/endpoints/smtp.rs | 81 +++++++++++++++++++++++-----
> proxmox-notify/src/lib.rs | 4 +-
> 2 files changed, 70 insertions(+), 15 deletions(-)
>
> diff --git a/proxmox-notify/src/endpoints/smtp.rs b/proxmox-notify/src/endpoints/smtp.rs
> index 244799fd..4364bd11 100644
> --- a/proxmox-notify/src/endpoints/smtp.rs
> +++ b/proxmox-notify/src/endpoints/smtp.rs
> @@ -202,7 +202,7 @@ pub struct SmtpPrivateConfig {
> pub oauth2_client_secret: Option<String>,
> }
>
> -/// A sendmail notification endpoint.
> +/// A SMTP notification endpoint.
> pub struct SmtpEndpoint {
> pub config: SmtpConfig,
> pub private_config: SmtpPrivateConfig,
> @@ -246,22 +246,79 @@ impl SmtpEndpoint {
> }
> }
>
> + /// Infer the auth method based on the presence of a password field in the private config.
> + ///
> + /// This is required for backwards compatibility for configs created before the `auth_method`
> + /// field was added, i.e., the presence of a password implicitly meant plain authentication
> + /// was to be used.
> + fn auth_method(&self) -> Option<SmtpAuthMethod> {
> + self.config.auth_method.or_else(|| {
> + if self.private_config.password.is_some() {
> + Some(SmtpAuthMethod::Plain)
> + } else {
> + None
> + }
> + })
> + }
> +
> + /// Build an [`SmtpTransport`].
> + ///
> + /// If OAuth2 authentication is configured, this method will additionally load,
> + /// update and store the OAuth2-related state for this endpoint.
> fn build_transport(&self, tls: Tls, port: u16) -> Result<SmtpTransport, Error> {
> - let mut transport_builder = SmtpTransport::builder_dangerous(&self.config.server)
> + let transport_builder = SmtpTransport::builder_dangerous(&self.config.server)
> .tls(tls)
> .port(port)
> .timeout(Some(Duration::from_secs(SMTP_TIMEOUT.into())));
>
> - if let Some(username) = self.config.username.as_deref() {
> - if let Some(password) = self.private_config.password.as_deref() {
> - transport_builder = transport_builder.credentials((username, password).into());
> - } else {
> - return Err(Error::NotifyFailed(
> - self.name().into(),
> - Box::new(Error::Generic(
> - "username is set but no password was provided".to_owned(),
> - )),
> - ));
> + let transport_builder = match &self.auth_method() {
> + None => transport_builder,
> + Some(SmtpAuthMethod::Plain) => match (
> + self.config.username.as_deref(),
> + self.private_config.password.as_deref(),
> + ) {
> + (Some(username), Some(password)) => {
> + transport_builder.credentials((username, password).into())
> + }
> + (Some(_), None) => {
> + return Err(Error::NotifyFailed(
> + self.name().into(),
> + Box::new(Error::Generic(
> + "username is set but no password was provided".to_owned(),
> + )),
> + ))
> + }
> + _ => transport_builder,
> + },
> + Some(method) => {
> + let state = State::load(self.name())?;
> +
> + let refresh_token =
> + state
> + .oauth2_refresh_token
> + .clone()
> + .ok_or(Error::NotifyFailed(
> + self.name().into(),
> + Box::new(Error::Generic("no refresh token found".into())),
> + ))?;
> + let token_exchange_result = self.get_access_token(&refresh_token, method)?;
> +
> + state
> + .set_oauth2_refresh_token(Some(
> + token_exchange_result
> + .refresh_token
> + .map(|t| t.into_secret())
> + .unwrap_or_else(|| refresh_token),
> + ))
> + .set_last_refreshed(proxmox_time::epoch_i64())
> + .store(self.name())?;
> +
> + transport_builder
> + .credentials(Credentials::new(
> + self.config.from_address.to_owned(),
> + token_exchange_result.access_token.into_secret(),
> + ))
> + .authentication(vec![Mechanism::Xoauth2])
> }
> };
>
> diff --git a/proxmox-notify/src/lib.rs b/proxmox-notify/src/lib.rs
> index c1a5e535..996393c2 100644
> --- a/proxmox-notify/src/lib.rs
> +++ b/proxmox-notify/src/lib.rs
> @@ -557,9 +557,7 @@ impl Bus {
> }
>
> match endpoint.send(notification) {
> - Ok(_) => {
> - info!("notified via target `{name}`");
> - }
> + Ok(_) => info!("notified via target `{name}`"),
Unrelated change, if this the result of a `cargo fmt`, maybe move to a
separate commit at the start of the series?
> Err(e) => {
> // Only log on errors, do not propagate fail to the caller.
> error!("could not notify via target `{name}`: {e}");
next prev parent reply other threads:[~2026-03-23 12:26 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-13 16:03 [PATCH cluster/docs/manager/proxmox{,-perl-rs,-widget-toolkit} 00/17] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets Arthur Bied-Charreton
2026-02-13 16:03 ` [PATCH proxmox 1/7] notify (smtp): Introduce xoauth2 module Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 2/7] notify (smtp): Introduce state module Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-03-23 16:32 ` Arthur Bied-Charreton
2026-03-24 8:50 ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 3/7] notify (smtp): Factor out transport building logic into own function Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 4/7] notify (smtp): Update API with OAuth2 parameters Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 5/7] notify (smtp): Add state handling logic Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-02-13 16:04 ` [PATCH proxmox 6/7] notify (smtp): Add XOAUTH2 authentication support Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner [this message]
2026-02-13 16:04 ` [PATCH proxmox 7/7] notify (smtp): Add logging and state-related error types Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-02-13 16:04 ` [PATCH proxmox-perl-rs 1/1] notify (smtp): add oauth2 parameters to bindings Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-03-23 16:44 ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox-widget-toolkit 1/2] utils: Add OAuth2 flow handlers Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-02-13 16:04 ` [PATCH proxmox-widget-toolkit 2/2] notifications: Add opt-in OAuth2 support for SMTP targets Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-03-23 16:49 ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-manager 1/5] notifications: Add OAuth2 parameters to schema and add/update endpoints Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-02-13 16:04 ` [PATCH pve-manager 2/5] notifications: Add trigger-state-refresh endpoint Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-02-13 16:04 ` [PATCH pve-manager 3/5] notifications: Trigger notification target refresh in pveupdate Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-manager 4/5] notifications: Handle OAuth2 callback in login handler Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-manager 5/5] notifications: Opt into OAuth2 authentication Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-cluster 1/1] notifications: Add refresh_targets subroutine to PVE::Notify Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-03-23 16:54 ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-docs 1/1] notifications: Add section about OAuth2 to SMTP targets docs Arthur Bied-Charreton
2026-03-23 12:25 ` [PATCH cluster/docs/manager/proxmox{,-perl-rs,-widget-toolkit} 00/17] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets Lukas Wagner
2026-03-25 13:16 ` superseded: " Arthur Bied-Charreton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=DHA5SDHELZJS.31C3A00NUPVJW@proxmox.com \
--to=l.wagner@proxmox.com \
--cc=a.bied-charreton@proxmox.com \
--cc=pve-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox