public inbox for pve-devel@lists.proxmox.com
 help / color / mirror / Atom feed
From: "Lukas Wagner" <l.wagner@proxmox.com>
To: "Arthur Bied-Charreton" <a.bied-charreton@proxmox.com>,
	<pve-devel@lists.proxmox.com>
Subject: Re: [PATCH docs/manager/proxmox{,-perl-rs,-widget-toolkit,-backup} v3 00/23] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets
Date: Tue, 21 Apr 2026 10:40:57 +0200	[thread overview]
Message-ID: <DHYP5PSAP55X.3UX7N4W0MPMGQ@proxmox.com> (raw)
In-Reply-To: <20260415070220.100306-1-a.bied-charreton@proxmox.com>

On Wed Apr 15, 2026 at 9:01 AM CEST, Arthur Bied-Charreton wrote:
> This series adds XOAUTH2 support for SMTP notification targets in PVE
> and PBS, motivated by Microsoft's upcoming deprecation of basic
> authentication for SMTP [0]. Google and Microsoft are supported as
> OAuth2 providers.
>
> The main challenge is the OAuth2 refresh tokens management. The
> implementations differ from provider to provider, and for Microsoft
> specifically, the token needs to be writable by proxmox-notify, since
> Microsoft Exchange Online OAuth2 rotates it at every use.
>
> This series solves this by introducing state files. Each SMTP endpoint
> gets its own to avoid having to lock all endpoints every time a state
> update is made (which can be on every notification for Microsoft
> targets). These files are managed entirely from the Rust side.
>
> Tokens are refreshed every time a notification is sent, and proactively
> via pveupdate/proxmox-backup-daily-update. State file updates are
> atomic (sys::fs::replace_file).
>
> Note that this is technically racy, since multiple notifications could
> be sent at the same time from different nodes, but that is okay in
> practice given the implementations of the providers we support:
>
> * Google: The token is refreshed in-place, meaning its lifetime is
>   extended at every use without it being *actually* rotated [1], so no
>   changes to the state file.
> * Microsoft: The token is rotated at each request, however tokens have
>   a fixed lifetime of 90 days, meaning the old token can still be used.
>   Concurrent access just means we are letting the last updater win, but
>   in both cases we end up with a valid token that can be used for
>   subsequent exchanges [2].
>


Tested these changes through PBS (since PVE already worked flawless
in the last versions). Worked fine, but I stumbled across a bug where
after authorizing the OAuth2 endpoint, the `PBSAuthToken` was lost in
the Web UI after the redirect, leading to being kicked out of the
session. We discussed the issue off-list and Arthur already found the
solution, which he will include in v4.

The patches itself worked well, tested them against Google.

The code also looks good to me, left some minor notes that should be
addressed for the next version. Did not do a deep review this time,
since most of the code was already in a very good shape in v2.


Reviewed-by: Lukas Wagner <l.wagner@proxmox.com>

(through PBS):
Tested-by: Lukas Wagner <l.wagner@proxmox.com>




  parent reply	other threads:[~2026-04-21  8:41 UTC|newest]

Thread overview: 29+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-15  7:01 Arthur Bied-Charreton
2026-04-15  7:01 ` [PATCH proxmox v3 01/23] Add oauth2 and ureq to workspace dependencies Arthur Bied-Charreton
2026-04-21  8:12   ` Lukas Wagner
2026-04-15  7:01 ` [PATCH proxmox v3 02/23] notify: smtp: Introduce xoauth2 module Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 03/23] notify: smtp: Introduce state management Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 04/23] notify: smtp: Factor out transport building logic Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 05/23] notify: smtp: Update API with OAuth2 parameters Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 06/23] notify: smtp: Infer auth method for backwards compatibility Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 07/23] notify: smtp: Add state handling logic Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 08/23] notify: smtp: Add XOAUTH2 authentication support Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-perl-rs v3 09/23] pve-rs: notify: smtp: add OAuth2 parameters to bindings Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-perl-rs v3 10/23] pve-rs: notify: Add binding for triggering state refresh Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-widget-toolkit v3 11/23] utils: Add OAuth2 flow handlers Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-widget-toolkit v3 12/23] utils: oauth2: Add callback handler Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-widget-toolkit v3 13/23] notifications: Add opt-in OAuth2 support for SMTP targets Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH pve-manager v3 14/23] notifications: smtp: api: Add XOAUTH2 parameters Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH pve-manager v3 15/23] notifications: Add trigger-state-refresh endpoint Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH pve-manager v3 16/23] notifications: Trigger notification target refresh in pveupdate Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH pve-manager v3 17/23] login: Handle OAuth2 callback Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH pve-manager v3 18/23] fix #7238: notifications: smtp: Add XOAUTH2 support Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-backup v3 19/23] notifications: Add XOAUTH2 parameters to endpoints Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-backup v3 20/23] login: Handle OAuth2 callback Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-backup v3 21/23] fix #7238: notifications: smtp: Add XOAUTH2 support Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-backup v3 22/23] daily-update: Refresh OAuth2 state for SMTP notification endpoints Arthur Bied-Charreton
2026-04-21  8:07   ` Lukas Wagner
2026-04-15  7:02 ` [PATCH pve-docs v3 23/23] notifications: Add OAuth2 section to SMTP targets docs Arthur Bied-Charreton
2026-04-21  8:40 ` Lukas Wagner [this message]
2026-04-21  8:52   ` [PATCH docs/manager/proxmox{,-perl-rs,-widget-toolkit,-backup} v3 00/23] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets Arthur Bied-Charreton
2026-04-21 12:01 ` superseded: " Arthur Bied-Charreton

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=DHYP5PSAP55X.3UX7N4W0MPMGQ@proxmox.com \
    --to=l.wagner@proxmox.com \
    --cc=a.bied-charreton@proxmox.com \
    --cc=pve-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal