From: Arthur Bied-Charreton <a.bied-charreton@proxmox.com>
To: Shannon Sterz <s.sterz@proxmox.com>,
Dominik Csapak <d.csapak@proxmox.com>
Cc: pbs-devel@lists.proxmox.com, pve-devel@lists.proxmox.com
Subject: Re: [PATCH proxmox-widget-toolkit v4 11/24] utils: Add OAuth2 flow handlers
Date: Fri, 24 Apr 2026 10:44:39 +0200 [thread overview]
Message-ID: <d3blzg6ymvsvu2tyndj6ho5ensstlxvfr4fmchx34lawy26ljd@ukj4lkoeghiq> (raw)
In-Reply-To: <DI0J5ZQEOUR3.22625QLPFY4QZ@proxmox.com>
On Thu, Apr 23, 2026 at 02:24:32PM +0200, Shannon Sterz wrote:
> On Tue Apr 21, 2026 at 1:59 PM CEST, Arthur Bied-Charreton wrote:
> > Introduce the Proxmox.OAuth2 singleton supporting Google and Microsoft
> > OAuth2. The flow is handled by opening a new window with the
> > authorization URL, and expecting to receive the resulting authorization
> > code from the redirect handler via a BroadcastChannel [0], which allows
> > communication between any two browsing contexts.
> >
> > [0]
> > https://developer.mozilla.org/en-US/docs/Web/API/BroadcastChannel
> >
[...]
> > + _handleFlow: function (config) {
> > + return new Promise((resolve, reject) => {
> > + let redirectUri = window.location.origin;
> > + let channelName = `oauth2_${crypto.randomUUID()}`;
> > + let state = encodeURIComponent(JSON.stringify({ channelName }));
> > +
> > + let authParams = new URLSearchParams({
> > + client_id: config.clientId,
> > + response_type: 'code',
> > + redirect_uri: redirectUri,
> > + scope: config.scope,
> > + state,
> > + ...config.extraAuthParams,
> > + });
> > +
> > + let authUrl = `${config.authUrl}?${authParams}`;
> > +
> > + // Opens OAuth2 authorization window. The app's redirect handler must
> > + // extract the authorization code from the callback URL and send it via
> > + // the BroadcastChannel whose name we passed along as a state parameter.
> > + let channel = new BroadcastChannel(channelName);
> > + let popup = window.open(authUrl);
> > + if (!popup) {
> > + reject(new Error(gettext('Could not open authentication window')));
> > + return;
> > + }
> > +
> > + channel.addEventListener('message', async (event) => {
> > + if (popup && !popup.closed) {
> > + popup.close();
> > + }
> > + channel.close();
> > +
> > + try {
> > + let response = await fetch(config.tokenUrl, {
> > + method: 'POST',
> > + headers: {
> > + 'Content-Type': 'application/x-www-form-urlencoded',
> > + },
> > + body: new URLSearchParams({
> > + grant_type: 'authorization_code',
> > + code: event.data.code,
>
> should we check if code is set here properly? i know the sending code
> always sets this in theory, but it might be safer to check here again
> before triggering a request.
>
Yes that would indeed be cleaner, I will add a check rejecting the
promise if the code is not set.
> also if i remember correctly there was an issue with using the async
> fetch api in extjs, maybe @Dominik Csapak could take a look if this is
> fine here.
>
I had a talk with Dominik off-list, async calls are indeed often an
issue in Ext.js, because it does not detect async functions, meaning it
may treat functions defined as async the same way it would treat
synchronous ones. This can lead to issues where e.g. a function that is
expected to be sync and return a string returns a promise instead,
breaking Ext.js' handling of the return value.
This is however not an issue here, because this is only called in the
SmtpEditPanel's Authorize button handler, which is defined as async and
expected by Ext.js to be async, so it will be properly awaited.
> > + client_id: config.clientId,
> > + client_secret: config.clientSecret,
> > + redirect_uri: redirectUri,
> > + }),
> > + });
> > +
> > + let tokens = await response.json();
> > + if (!tokens.refresh_token) {
> > + reject(tokens.error_description || gettext('Token exchange failed'));
> > + }
> > + resolve(tokens.refresh_token);
> > + } catch (error) {
> > + reject(error);
> > + }
> > + });
> > + });
> > + },
> > +});
> > +
> > Ext.define('Proxmox.Async', {
> > singleton: true,
> >
>
next prev parent reply other threads:[~2026-04-24 8:45 UTC|newest]
Thread overview: 39+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-21 11:59 [PATCH docs/manager/proxmox{,-perl-rs,-widget-toolkit,-backup} v4 00/24] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 01/24] Add oauth2 and ureq to workspace dependencies Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 02/24] notify: smtp: Introduce xoauth2 module Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 03/24] notify: smtp: Introduce state management Arthur Bied-Charreton
2026-04-23 12:24 ` Shannon Sterz
2026-04-24 7:47 ` Arthur Bied-Charreton
2026-04-24 8:04 ` Shannon Sterz
2026-04-24 8:54 ` Arthur Bied-Charreton
2026-04-24 8:59 ` Shannon Sterz
2026-04-21 11:59 ` [PATCH proxmox v4 04/24] notify: smtp: Factor out transport building logic Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 05/24] notify: smtp: Update API with OAuth2 parameters Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 06/24] notify: smtp: Infer auth method for backwards compatibility Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 07/24] notify: smtp: Add state handling logic Arthur Bied-Charreton
2026-04-23 12:24 ` Shannon Sterz
2026-04-24 7:50 ` Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox v4 08/24] notify: smtp: Add XOAUTH2 authentication support Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-perl-rs v4 09/24] pve-rs: notify: smtp: add OAuth2 parameters to bindings Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-perl-rs v4 10/24] pve-rs: notify: Add binding for triggering state refresh Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-widget-toolkit v4 11/24] utils: Add OAuth2 flow handlers Arthur Bied-Charreton
2026-04-23 12:24 ` Shannon Sterz
2026-04-24 8:44 ` Arthur Bied-Charreton [this message]
2026-04-24 8:53 ` Shannon Sterz
2026-04-21 11:59 ` [PATCH proxmox-widget-toolkit v4 12/24] utils: oauth2: Add callback handler Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-widget-toolkit v4 13/24] notifications: Add opt-in OAuth2 support for SMTP targets Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-manager v4 14/24] notifications: smtp: api: Add XOAUTH2 parameters Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-manager v4 15/24] notifications: Add trigger-state-refresh endpoint Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-manager v4 16/24] notifications: Trigger notification target refresh in pveupdate Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-manager v4 17/24] login: Handle OAuth2 callback Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-manager v4 18/24] fix #7238: notifications: smtp: Add XOAUTH2 support Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-backup v4 19/24] notifications: Add XOAUTH2 parameters to endpoints Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-backup v4 20/24] login: Handle OAuth2 callback Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-backup v4 21/24] fix #7238: notifications: smtp: Add XOAUTH2 support Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-backup v4 22/24] daily-update: Refresh OAuth2 state for SMTP notification endpoints Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH proxmox-backup v4 23/24] notifications: Add OAuth2 section to SMTP target docs Arthur Bied-Charreton
2026-04-23 12:24 ` Shannon Sterz
2026-04-24 7:59 ` Arthur Bied-Charreton
2026-04-24 8:18 ` Shannon Sterz
2026-04-24 8:46 ` Arthur Bied-Charreton
2026-04-21 11:59 ` [PATCH pve-docs v4 24/24] notifications: Add OAuth2 section to SMTP targets docs Arthur Bied-Charreton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=d3blzg6ymvsvu2tyndj6ho5ensstlxvfr4fmchx34lawy26ljd@ukj4lkoeghiq \
--to=a.bied-charreton@proxmox.com \
--cc=d.csapak@proxmox.com \
--cc=pbs-devel@lists.proxmox.com \
--cc=pve-devel@lists.proxmox.com \
--cc=s.sterz@proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox