From: "Lukas Wagner" <l.wagner@proxmox.com>
To: "Arthur Bied-Charreton" <a.bied-charreton@proxmox.com>,
<pve-devel@lists.proxmox.com>
Subject: Re: [PATCH proxmox 7/7] notify (smtp): Add logging and state-related error types
Date: Mon, 23 Mar 2026 13:26:17 +0100 [thread overview]
Message-ID: <DHA5SG4PKWDA.TK5JUB0UUSRD@proxmox.com> (raw)
In-Reply-To: <20260213160415.609868-8-a.bied-charreton@proxmox.com>
On Fri Feb 13, 2026 at 5:04 PM CET, Arthur Bied-Charreton wrote:
> Log load/store events in SMTP state management, and add error types to make errors clearer (previously used Config(De)?Serialization errors, which led to confusing error messages for state-related errors)
Commit message should be properly wrapped :)
Also, I think this commit should be split, the error-part and the
logging part rather seem to be separate things. Both could also be
probably folded into previous commits (e.g. add the persistence errors
when you introduce the state handling), but no hard feelings about that,
I'm also fine with having this in a separate commit.
>
> Also add logs for OAuth2 token exchange events.
>
> Signed-off-by: Arthur Bied-Charreton <a.bied-charreton@proxmox.com>
> ---
> proxmox-notify/src/endpoints/smtp.rs | 12 +++++++++++
> proxmox-notify/src/endpoints/smtp/state.rs | 25 +++++++++++++++-------
> proxmox-notify/src/lib.rs | 12 +++++++++++
> 3 files changed, 41 insertions(+), 8 deletions(-)
>
> diff --git a/proxmox-notify/src/endpoints/smtp.rs b/proxmox-notify/src/endpoints/smtp.rs
> index 4364bd11..0ae1ac9f 100644
> --- a/proxmox-notify/src/endpoints/smtp.rs
> +++ b/proxmox-notify/src/endpoints/smtp.rs
> @@ -12,6 +12,7 @@ use oauth2::{ClientId, ClientSecret, RefreshToken};
>
> use proxmox_schema::api_types::COMMENT_SCHEMA;
> use proxmox_schema::{api, Updater};
> +use tracing::info;
nit: usually we try to group imports like:
- std
- 3rd party crates
- our on crates
- crate-level imports
>
> use crate::context::context;
> use crate::endpoints::common::mail;
> @@ -301,6 +302,12 @@ impl SmtpEndpoint {
> self.name().into(),
> Box::new(Error::Generic("no refresh token found".into())),
> ))?;
> +
> + info!(
> + "requesting OAuth2 access token for endpoint '{}'",
> + self.config.name
> + );
> +
Seeing this in practise, I think I'd rather use debug! here... Could be
considered a bit noisy otherwise, as this line would appear e.g. in task
logs for backup jobs.
> let token_exchange_result = self.get_access_token(&refresh_token, method)?;
>
> state
> @@ -313,6 +320,11 @@ impl SmtpEndpoint {
> .set_last_refreshed(proxmox_time::epoch_i64())
> .store(self.name())?;
>
> + info!(
> + "OAuth2 token exchange successful for endpoint '{}'",
> + self.config.name
> + );
> +
Same here
> transport_builder
> .credentials(Credentials::new(
> self.config.from_address.to_owned(),
> diff --git a/proxmox-notify/src/endpoints/smtp/state.rs b/proxmox-notify/src/endpoints/smtp/state.rs
> index 60bef590..45d0db93 100644
> --- a/proxmox-notify/src/endpoints/smtp/state.rs
> +++ b/proxmox-notify/src/endpoints/smtp/state.rs
> @@ -1,4 +1,5 @@
> use serde::{Deserialize, Serialize};
> +use tracing::debug;
>
> use crate::{context::context, Error};
>
> @@ -25,13 +26,19 @@ impl State {
> /// # Errors
> /// An [`Error`] is returned if deserialization of the state object fails.
> pub(crate) fn load(name: &str) -> Result<State, Error> {
> - match proxmox_sys::fs::file_get_optional_contents(context().state_file_path(name))
> - .map_err(|e| Error::ConfigDeserialization(e.into()))?
> + let path = context().state_file_path(name);
> +
> + match proxmox_sys::fs::file_get_optional_contents(&path)
> + .map_err(|e| Error::StateRetrieval(path.to_owned(), e.into()))?
> {
> Some(bytes) => {
> - serde_json::from_slice(&bytes).map_err(|e| Error::ConfigDeserialization(e.into()))
> + debug!("loaded state file for endpoint '{name}' from {path}");
> + serde_json::from_slice(&bytes).map_err(|e| Error::StateRetrieval(path, e.into()))
> + }
> + None => {
> + debug!("no existing state file found for endpoint '{name}' at {path}, creating empty state");
> + Ok(State::default())
> }
> - None => Ok(State::default()),
> }
> }
>
> @@ -43,14 +50,16 @@ impl State {
> let path = context().state_file_path(name);
> let parent = std::path::Path::new(&path).parent().unwrap();
>
> + debug!("attempting to persist state for endpoint '{name}' at {path}");
> +
> proxmox_sys::fs::ensure_dir_exists(parent, &context().secret_create_options(), false)
> - .map_err(|e| Error::ConfigSerialization(e.into()))?;
> + .map_err(|e| Error::StatePersistence(path.to_owned(), e.into()))?;
>
> let s = serde_json::to_string_pretty(&self)
> - .map_err(|e| Error::ConfigSerialization(e.into()))?;
> + .map_err(|e| Error::StatePersistence(path.to_owned(), e.into()))?;
>
> - proxmox_sys::fs::replace_file(path, s.as_bytes(), context().secret_create_options(), true)
> - .map_err(|e| Error::ConfigSerialization(e.into()))
> + proxmox_sys::fs::replace_file(&path, s.as_bytes(), context().secret_create_options(), true)
> + .map_err(|e| Error::StatePersistence(path, e.into()))
> }
>
> /// Set `last_refreshed`.
> diff --git a/proxmox-notify/src/lib.rs b/proxmox-notify/src/lib.rs
> index 996393c2..37237fc0 100644
> --- a/proxmox-notify/src/lib.rs
> +++ b/proxmox-notify/src/lib.rs
> @@ -41,6 +41,10 @@ pub enum Error {
> FilterFailed(String),
> /// The notification's template string could not be rendered
> RenderError(Box<dyn StdError + Send + Sync>),
> + /// The state for an endpoint could not be persisted
> + StatePersistence(String, Box<dyn StdError + Send + Sync>),
> + /// The state for an endpoint could not be retrieved
> + StateRetrieval(String, Box<dyn StdError + Send + Sync>),
> /// Generic error for anything else
> Generic(String),
> }
> @@ -70,6 +74,12 @@ impl Display for Error {
> Error::FilterFailed(message) => {
> write!(f, "could not apply filter: {message}")
> }
> + Error::StatePersistence(path, err) => {
> + write!(f, "could not persist state at {path}: {err}")
> + }
> + Error::StateRetrieval(path, err) => {
> + write!(f, "could not retrieve state from {path}: {err}")
> + }
> Error::RenderError(err) => write!(f, "could not render notification template: {err}"),
> Error::Generic(message) => f.write_str(message),
> }
> @@ -86,6 +96,8 @@ impl StdError for Error {
> Error::TargetTestFailed(errs) => Some(&*errs[0]),
> Error::FilterFailed(_) => None,
> Error::RenderError(err) => Some(&**err),
> + Error::StatePersistence(_, err) => Some(&**err),
> + Error::StateRetrieval(_, err) => Some(&**err),
> Error::Generic(_) => None,
> }
> }
next prev parent reply other threads:[~2026-03-23 12:27 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-13 16:03 [PATCH cluster/docs/manager/proxmox{,-perl-rs,-widget-toolkit} 00/17] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets Arthur Bied-Charreton
2026-02-13 16:03 ` [PATCH proxmox 1/7] notify (smtp): Introduce xoauth2 module Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 2/7] notify (smtp): Introduce state module Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-03-23 16:32 ` Arthur Bied-Charreton
2026-03-24 8:50 ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 3/7] notify (smtp): Factor out transport building logic into own function Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 4/7] notify (smtp): Update API with OAuth2 parameters Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox 5/7] notify (smtp): Add state handling logic Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-02-13 16:04 ` [PATCH proxmox 6/7] notify (smtp): Add XOAUTH2 authentication support Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-02-13 16:04 ` [PATCH proxmox 7/7] notify (smtp): Add logging and state-related error types Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner [this message]
2026-02-13 16:04 ` [PATCH proxmox-perl-rs 1/1] notify (smtp): add oauth2 parameters to bindings Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-03-23 16:44 ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH proxmox-widget-toolkit 1/2] utils: Add OAuth2 flow handlers Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-02-13 16:04 ` [PATCH proxmox-widget-toolkit 2/2] notifications: Add opt-in OAuth2 support for SMTP targets Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-03-23 16:49 ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-manager 1/5] notifications: Add OAuth2 parameters to schema and add/update endpoints Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-02-13 16:04 ` [PATCH pve-manager 2/5] notifications: Add trigger-state-refresh endpoint Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-02-13 16:04 ` [PATCH pve-manager 3/5] notifications: Trigger notification target refresh in pveupdate Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-manager 4/5] notifications: Handle OAuth2 callback in login handler Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-manager 5/5] notifications: Opt into OAuth2 authentication Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-cluster 1/1] notifications: Add refresh_targets subroutine to PVE::Notify Arthur Bied-Charreton
2026-03-23 12:26 ` Lukas Wagner
2026-03-23 16:54 ` Arthur Bied-Charreton
2026-02-13 16:04 ` [PATCH pve-docs 1/1] notifications: Add section about OAuth2 to SMTP targets docs Arthur Bied-Charreton
2026-03-23 12:25 ` [PATCH cluster/docs/manager/proxmox{,-perl-rs,-widget-toolkit} 00/17] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets Lukas Wagner
2026-03-25 13:16 ` superseded: " Arthur Bied-Charreton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=DHA5SG4PKWDA.TK5JUB0UUSRD@proxmox.com \
--to=l.wagner@proxmox.com \
--cc=a.bied-charreton@proxmox.com \
--cc=pve-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox