public inbox for pve-devel@lists.proxmox.com
 help / color / mirror / Atom feed
From: Arthur Bied-Charreton <a.bied-charreton@proxmox.com>
To: Lukas Wagner <l.wagner@proxmox.com>
Cc: pve-devel@lists.proxmox.com
Subject: Re: [PATCH docs/manager/proxmox{,-perl-rs,-widget-toolkit,-backup} v3 00/23] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets
Date: Tue, 21 Apr 2026 10:52:46 +0200	[thread overview]
Message-ID: <i65vtc2elw7jhhshd5e22el3hcsdfzv3auubaweosisxh2w62d@xgcxlsb4dmfw> (raw)
In-Reply-To: <DHYP5PSAP55X.3UX7N4W0MPMGQ@proxmox.com>

On Tue, Apr 21, 2026 at 10:40:57AM +0200, Lukas Wagner wrote:
> On Wed Apr 15, 2026 at 9:01 AM CEST, Arthur Bied-Charreton wrote:
> > This series adds XOAUTH2 support for SMTP notification targets in PVE
> > and PBS, motivated by Microsoft's upcoming deprecation of basic
> > authentication for SMTP [0]. Google and Microsoft are supported as
> > OAuth2 providers.
> >
> > The main challenge is the OAuth2 refresh tokens management. The
> > implementations differ from provider to provider, and for Microsoft
> > specifically, the token needs to be writable by proxmox-notify, since
> > Microsoft Exchange Online OAuth2 rotates it at every use.
> >
> > This series solves this by introducing state files. Each SMTP endpoint
> > gets its own to avoid having to lock all endpoints every time a state
> > update is made (which can be on every notification for Microsoft
> > targets). These files are managed entirely from the Rust side.
> >
> > Tokens are refreshed every time a notification is sent, and proactively
> > via pveupdate/proxmox-backup-daily-update. State file updates are
> > atomic (sys::fs::replace_file).
> >
> > Note that this is technically racy, since multiple notifications could
> > be sent at the same time from different nodes, but that is okay in
> > practice given the implementations of the providers we support:
> >
> > * Google: The token is refreshed in-place, meaning its lifetime is
> >   extended at every use without it being *actually* rotated [1], so no
> >   changes to the state file.
> > * Microsoft: The token is rotated at each request, however tokens have
> >   a fixed lifetime of 90 days, meaning the old token can still be used.
> >   Concurrent access just means we are letting the last updater win, but
> >   in both cases we end up with a valid token that can be used for
> >   subsequent exchanges [2].
> >
> 
> 
> Tested these changes through PBS (since PVE already worked flawless
> in the last versions). Worked fine, but I stumbled across a bug where
> after authorizing the OAuth2 endpoint, the `PBSAuthToken` was lost in
> the Web UI after the redirect, leading to being kicked out of the
> session. We discussed the issue off-list and Arthur already found the
> solution, which he will include in v4.
> 
> The patches itself worked well, tested them against Google.
> 
> The code also looks good to me, left some minor notes that should be
> addressed for the next version. Did not do a deep review this time,
> since most of the code was already in a very good shape in v2.
> 
> 
> Reviewed-by: Lukas Wagner <l.wagner@proxmox.com>
> 
> (through PBS):
> Tested-by: Lukas Wagner <l.wagner@proxmox.com>


I overlooked a detail in the PBS login logic which leads to OpenID 
logins and SMTP OAuth2 redirects being confused. I will explicitly 
check for the oauth2 prefix in the channelName state parameter to 
differentiate properly between the two, as well as address you other
review comments in v4.

Thanks a lot for the review! 




  reply	other threads:[~2026-04-21  8:52 UTC|newest]

Thread overview: 29+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-15  7:01 Arthur Bied-Charreton
2026-04-15  7:01 ` [PATCH proxmox v3 01/23] Add oauth2 and ureq to workspace dependencies Arthur Bied-Charreton
2026-04-21  8:12   ` Lukas Wagner
2026-04-15  7:01 ` [PATCH proxmox v3 02/23] notify: smtp: Introduce xoauth2 module Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 03/23] notify: smtp: Introduce state management Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 04/23] notify: smtp: Factor out transport building logic Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 05/23] notify: smtp: Update API with OAuth2 parameters Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 06/23] notify: smtp: Infer auth method for backwards compatibility Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 07/23] notify: smtp: Add state handling logic Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox v3 08/23] notify: smtp: Add XOAUTH2 authentication support Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-perl-rs v3 09/23] pve-rs: notify: smtp: add OAuth2 parameters to bindings Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-perl-rs v3 10/23] pve-rs: notify: Add binding for triggering state refresh Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-widget-toolkit v3 11/23] utils: Add OAuth2 flow handlers Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-widget-toolkit v3 12/23] utils: oauth2: Add callback handler Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-widget-toolkit v3 13/23] notifications: Add opt-in OAuth2 support for SMTP targets Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH pve-manager v3 14/23] notifications: smtp: api: Add XOAUTH2 parameters Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH pve-manager v3 15/23] notifications: Add trigger-state-refresh endpoint Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH pve-manager v3 16/23] notifications: Trigger notification target refresh in pveupdate Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH pve-manager v3 17/23] login: Handle OAuth2 callback Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH pve-manager v3 18/23] fix #7238: notifications: smtp: Add XOAUTH2 support Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-backup v3 19/23] notifications: Add XOAUTH2 parameters to endpoints Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-backup v3 20/23] login: Handle OAuth2 callback Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-backup v3 21/23] fix #7238: notifications: smtp: Add XOAUTH2 support Arthur Bied-Charreton
2026-04-15  7:02 ` [PATCH proxmox-backup v3 22/23] daily-update: Refresh OAuth2 state for SMTP notification endpoints Arthur Bied-Charreton
2026-04-21  8:07   ` Lukas Wagner
2026-04-15  7:02 ` [PATCH pve-docs v3 23/23] notifications: Add OAuth2 section to SMTP targets docs Arthur Bied-Charreton
2026-04-21  8:40 ` [PATCH docs/manager/proxmox{,-perl-rs,-widget-toolkit,-backup} v3 00/23] fix #7238: Add XOAUTH2 authentication support for SMTP notification targets Lukas Wagner
2026-04-21  8:52   ` Arthur Bied-Charreton [this message]
2026-04-21 12:01 ` superseded: " Arthur Bied-Charreton

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=i65vtc2elw7jhhshd5e22el3hcsdfzv3auubaweosisxh2w62d@xgcxlsb4dmfw \
    --to=a.bied-charreton@proxmox.com \
    --cc=l.wagner@proxmox.com \
    --cc=pve-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal