From: "Shannon Sterz" <s.sterz@proxmox.com>
To: "Arthur Bied-Charreton" <a.bied-charreton@proxmox.com>,
<pbs-devel@lists.proxmox.com>, <pve-devel@lists.proxmox.com>
Subject: Re: [PATCH proxmox-widget-toolkit v4 11/24] utils: Add OAuth2 flow handlers
Date: Thu, 23 Apr 2026 14:24:32 +0200 [thread overview]
Message-ID: <DI0J5ZQEOUR3.22625QLPFY4QZ@proxmox.com> (raw)
In-Reply-To: <20260421115957.402589-12-a.bied-charreton@proxmox.com>
On Tue Apr 21, 2026 at 1:59 PM CEST, Arthur Bied-Charreton wrote:
> Introduce the Proxmox.OAuth2 singleton supporting Google and Microsoft
> OAuth2. The flow is handled by opening a new window with the
> authorization URL, and expecting to receive the resulting authorization
> code from the redirect handler via a BroadcastChannel [0], which allows
> communication between any two browsing contexts.
>
> [0]
> https://developer.mozilla.org/en-US/docs/Web/API/BroadcastChannel
>
> Signed-off-by: Arthur Bied-Charreton <a.bied-charreton@proxmox.com>
> ---
> src/Utils.js | 91 ++++++++++++++++++++++++++++++++++++++++++++++++++++
> 1 file changed, 91 insertions(+)
>
> diff --git a/src/Utils.js b/src/Utils.js
> index 5457ffa..ceed4c8 100644
> --- a/src/Utils.js
> +++ b/src/Utils.js
> @@ -1723,6 +1723,97 @@ Ext.define('Proxmox.Utils', {
> },
> });
>
> +Ext.define('Proxmox.OAuth2', {
> + singleton: true,
> +
> + handleGoogleFlow: function (clientId, clientSecret) {
> + return this._handleFlow({
> + clientId,
> + clientSecret,
> + authUrl: 'https://accounts.google.com/o/oauth2/v2/auth',
> + tokenUrl: 'https://oauth2.googleapis.com/token',
> + scope: 'https://mail.google.com',
> + extraAuthParams: {
> + access_type: 'offline',
> + prompt: 'consent',
> + },
> + });
> + },
> +
> + handleMicrosoftFlow: function (clientId, clientSecret, tenantId) {
> + return this._handleFlow({
> + clientId,
> + clientSecret,
> + authUrl: `https://login.microsoftonline.com/${tenantId}/oauth2/v2.0/authorize`,
> + tokenUrl: `https://login.microsoftonline.com/${tenantId}/oauth2/v2.0/token`,
> + scope: 'https://outlook.office.com/SMTP.Send offline_access',
> + extraAuthParams: {
> + prompt: 'consent',
> + },
> + });
> + },
> +
> + _handleFlow: function (config) {
> + return new Promise((resolve, reject) => {
> + let redirectUri = window.location.origin;
> + let channelName = `oauth2_${crypto.randomUUID()}`;
> + let state = encodeURIComponent(JSON.stringify({ channelName }));
> +
> + let authParams = new URLSearchParams({
> + client_id: config.clientId,
> + response_type: 'code',
> + redirect_uri: redirectUri,
> + scope: config.scope,
> + state,
> + ...config.extraAuthParams,
> + });
> +
> + let authUrl = `${config.authUrl}?${authParams}`;
> +
> + // Opens OAuth2 authorization window. The app's redirect handler must
> + // extract the authorization code from the callback URL and send it via
> + // the BroadcastChannel whose name we passed along as a state parameter.
> + let channel = new BroadcastChannel(channelName);
> + let popup = window.open(authUrl);
> + if (!popup) {
> + reject(new Error(gettext('Could not open authentication window')));
> + return;
> + }
> +
> + channel.addEventListener('message', async (event) => {
> + if (popup && !popup.closed) {
> + popup.close();
> + }
> + channel.close();
> +
> + try {
> + let response = await fetch(config.tokenUrl, {
> + method: 'POST',
> + headers: {
> + 'Content-Type': 'application/x-www-form-urlencoded',
> + },
> + body: new URLSearchParams({
> + grant_type: 'authorization_code',
> + code: event.data.code,
should we check if code is set here properly? i know the sending code
always sets this in theory, but it might be safer to check here again
before triggering a request.
also if i remember correctly there was an issue with using the async
fetch api in extjs, maybe @Dominik Csapak could take a look if this is
fine here.
> + client_id: config.clientId,
> + client_secret: config.clientSecret,
> + redirect_uri: redirectUri,
> + }),
> + });
> +
> + let tokens = await response.json();
> + if (!tokens.refresh_token) {
> + reject(tokens.error_description || gettext('Token exchange failed'));
> + }
> + resolve(tokens.refresh_token);
> + } catch (error) {
> + reject(error);
> + }
> + });
> + });
> + },
> +});
> +
> Ext.define('Proxmox.Async', {
> singleton: true,
>
next prev parent reply other threads:[~2026-04-23 12:24 UTC|newest]
Thread overview: 39+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-21 11:59 [PATCH docs/manager/proxmox{,-perl-rs,-widget-toolkit,-backup} v4 00/24] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 01/24] Add oauth2 and ureq to workspace dependencies Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 02/24] notify: smtp: Introduce xoauth2 module Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 03/24] notify: smtp: Introduce state management Arthur Bied-Charreton
2026-04-23 12:24 ` Shannon Sterz
2026-04-24 7:47 ` Arthur Bied-Charreton
2026-04-24 8:04 ` Shannon Sterz
2026-04-24 8:54 ` Arthur Bied-Charreton
2026-04-24 8:59 ` Shannon Sterz
2026-04-21 11:59 ` [PATCH proxmox v4 04/24] notify: smtp: Factor out transport building logic Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 05/24] notify: smtp: Update API with OAuth2 parameters Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 06/24] notify: smtp: Infer auth method for backwards compatibility Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 07/24] notify: smtp: Add state handling logic Arthur Bied-Charreton
2026-04-23 12:24 ` Shannon Sterz
2026-04-24 7:50 ` Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 08/24] notify: smtp: Add XOAUTH2 authentication support Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-perl-rs v4 09/24] pve-rs: notify: smtp: add OAuth2 parameters to bindings Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-perl-rs v4 10/24] pve-rs: notify: Add binding for triggering state refresh Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-widget-toolkit v4 11/24] utils: Add OAuth2 flow handlers Arthur Bied-Charreton
2026-04-23 12:24 ` Shannon Sterz [this message]
2026-04-24 8:44 ` Arthur Bied-Charreton
2026-04-24 8:53 ` Shannon Sterz
2026-04-21 11:59 ` [PATCH proxmox-widget-toolkit v4 12/24] utils: oauth2: Add callback handler Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-widget-toolkit v4 13/24] notifications: Add opt-in OAuth2 support for SMTP targets Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-manager v4 14/24] notifications: smtp: api: Add XOAUTH2 parameters Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-manager v4 15/24] notifications: Add trigger-state-refresh endpoint Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-manager v4 16/24] notifications: Trigger notification target refresh in pveupdate Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-manager v4 17/24] login: Handle OAuth2 callback Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-manager v4 18/24] fix #7238: notifications: smtp: Add XOAUTH2 support Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-backup v4 19/24] notifications: Add XOAUTH2 parameters to endpoints Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-backup v4 20/24] login: Handle OAuth2 callback Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-backup v4 21/24] fix #7238: notifications: smtp: Add XOAUTH2 support Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-backup v4 22/24] daily-update: Refresh OAuth2 state for SMTP notification endpoints Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-backup v4 23/24] notifications: Add OAuth2 section to SMTP target docs Arthur Bied-Charreton
2026-04-23 12:24 ` Shannon Sterz
2026-04-24 7:59 ` Arthur Bied-Charreton
2026-04-24 8:18 ` Shannon Sterz
2026-04-24 8:46 ` Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-docs v4 24/24] notifications: Add OAuth2 section to SMTP targets docs Arthur Bied-Charreton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=DI0J5ZQEOUR3.22625QLPFY4QZ@proxmox.com \
--to=s.sterz@proxmox.com \
--cc=a.bied-charreton@proxmox.com \
--cc=pbs-devel@lists.proxmox.com \
--cc=pve-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox