Skip to content

Commit bfee3b9

Browse files
committed
Add a blog post about Quarkus OIDC proxy
1 parent 1c4cc0f commit bfee3b9

24 files changed

+253
-1
lines changed

_data/authors.yaml

+8-1
Original file line numberDiff line numberDiff line change
@@ -520,4 +520,11 @@ andreatp:
520520
emailhash: "6250a4b95ad7ddcf2ba7c3f84ba47995"
521521
job_title: "Principal Software Engineer"
522522
twitter: "and_prf"
523-
bio: "Principal Software Engineer at Red Hat, working in Middleware Application Services on the Apicurio projects. Involved in the development of Microsoft's Kiota and Dylibso's Chicory."
523+
bio: "Principal Software Engineer at Red Hat, working in Middleware Application Services on the Apicurio projects. Involved in the development of Microsoft's Kiota and Dylibso's Chicory."
524+
sberyozkin:
525+
name: "Sergey Beryozkin"
526+
527+
emailhash: "7941c5788c2e02a4f7f51409afca3090"
528+
job_title: "Software Engineer"
529+
twitter: "sberyozkin"
530+
bio: "Software Engineer, working at Red Hat on Quarkus Security."

_posts/2024-04-01-oidc-proxy.adoc

+245
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,245 @@
1+
---
2+
layout: post
3+
title: 'Use OIDC Proxy to integrate OIDC service endpoints with custom ChatGPT'
4+
date: 2024-04-01
5+
tags: extension oidc security chatgpt development-tips
6+
synopsis: 'Explain how OIDC Proxy can help to integrate OIDC service endpoints with custom ChatGPT'
7+
author: sberyozkin
8+
---
9+
:imagesdir: /assets/images/posts/oidc-proxy
10+
11+
12+
== Introduction
13+
14+
https://github.com/quarkiverse/quarkus-oidc-proxy[Quarkus OIDC Proxy] is a new https://github.com/quarkiverse[Quarkiverse] extension which can help to integrate https://quarkus.io/guides/security-oidc-bearer-token-authentication[OIDC service endpoints] with external Single-page applications (SPA). SPA uses the OIDC authorization code flow itself (without relying on Quarkus) to authenticate the current user, and accesses the Quarkus OIDC service endpoint with the access token on behalf of the authenticated user.
15+
16+
This is a simple diagram which shows how this process works, copied to this post from the https://quarkus.io/guides/security-oidc-bearer-token-authentication[OIDC Bearer token guide] for your convenience:
17+
18+
image::security-bearer-token-spa.png
19+
20+
You can see that OIDC provider is used to authenticate the current user to SPA. SPA acquires ID and access tokens as part of the authorization code flow and uses the access token to access the Quarkus OIDC service endpoint.
21+
22+
SPA must know the OIDC provider connection details, including the registered OIDC application's client id, secret and other OIDC specific details required to complete the authorization code flow successfully. You must also allow an SPA specific callback URL in your registered OIDC application which may not always be acceptable.
23+
24+
https://github.com/quarkiverse/quarkus-oidc-proxy[Quarkus OIDC Proxy] emulates the OIDC provider in the diagram above. It interposes over Quarkus OIDC service endpoints and delegates to the real OIDC provider. It can help to integrate OIDC service endpoints with SPA without having to expose the internal OIDC connection details to this SPA. It relies on Quarkus OIDC to let SPA athenticate its users to OIDC and OAuth2 providers which may be technically challenging to support directly at the SPA level.
25+
26+
Another user case for OIDC Proxy is to have several frontend https://quarkus.io/guides/security-oidc-code-flow-authentication[Quarkus OIDC web-app] endpoints to authenticate users using the same OIDC proxy configuration before accessing the OIDC service endpoint.
27+
28+
So how does OIDC proxy actually work ? Sure, we'll look at it shortly, but first, let's talk about custom ChatGPT actions.
29+
30+
== Custom ChatGPT Actions
31+
32+
https://chat.openai.com[ChatGPT] has introduced https://platform.openai.com/docs/actions/introduction[Actions], which can be used to create custom ChatGPT. For example, you can augment ChatGPT by connectng it to your API endponts.
33+
34+
The key challenge is how a custom GPT can be https://platform.openai.com/docs/actions/authentication[authenticated] to access the API. The https://platform.openai.com/docs/actions/authentication/oauth[OAuth] is the best option when you need a user-specific permission to access the API, and this is what https://github.com/quarkiverse/quarkus-oidc-proxy[Quarkus OIDC Proxy] will help you to support without exposing all the OIDC/OAuth2 connection details to ChatGPT.
35+
36+
Now all is ready for creating <<Quarkus Fitness Adviser>>.
37+
38+
Please be aware that currently, custom ChatGPT actions can not be created with a free ChatGPT subscription, but only starting from the ChatGPT Plus subscription.
39+
40+
== Quarkus Fitness Adviser
41+
42+
In this section we will create `Quarkus Fitness Adviser`, a custom ChatGPT which analyzes activities recorded in Strava and other social providers which track physical exercise.
43+
44+
We'll do it by creating a https://quarkus.io/guides/security-openid-connect-providers#strava[Strava] Quarkus OIDC Service endpoint, adding OIDC proxy to it, providing an HTTPS tunnel with https://ngrok.com/[NGrok] and creating a custom ChatGPT action which uses https://github.com/quarkiverse/quarkus-oidc-proxy[Quarkus OIDC Proxy] to autenticate users to Strava and use access tokens to the OIDC service Strava endpoint to analyze the recorded activities.
45+
46+
=== Quarkus Strava Service
47+
48+
Quarkus OIDC supports https://quarkus.io/guides/security-openid-connect-providers#strava[Strava OAuth2 provider] by hiding Srava OAuth2 specific details in a single configuration line, `quarkus.oidc.provider=strava`.
49+
50+
Strava provider is mostly OAuth2 compliant but it uses HTTP query parameters to complete the authorization code flow POST token request, when using the form parameters is a usual option. It also uses a comma `,` separator when multiple scopes are requested during the initial redirect to Strava, with a space ` ` being a typical separator character.
51+
52+
Quarkus OIDC proxy can handle it because it can use the Quarkus OIDC knowledge about these details. An SPA such as a custom ChatGPT does not support these options with its OAuth authentication option.
53+
54+
We'll start by registering a new `Quarkus Fitness Adviser` application in Strava:
55+
56+
image::strava-application-registration.png
57+
58+
Note that the `Authorization Callback Domain` points to your free NGrok (or in production, the real) domain representing the domain where OIDC Proxy will be available, likely to be the same domain where your Quarkus micro-services are hosted as well. It is an important feature of OIDC Proxy as it lets OIDC provider administrators to point to a trusted domain and not a 3rd party domain.
59+
60+
After completing the application registration, and noting the generated client id and secret, we create the OIDC configuration:
61+
62+
[source,properties]
63+
----
64+
quarkus.oidc.provider=strava
65+
quarkus.oidc.application-type=service
66+
quarkus.oidc.client-id=${strava-client-id}
67+
quarkus.oidc.credentials.secret=${strava-client-secret}
68+
quarkus.oidc.authentication.extra-params.scope=profile:read_all,activity:read_all
69+
----
70+
71+
Note, by default, `quarkus.oidc.provider=strava` will enable a Quarkus OIDC `web-app` endpoint capable of supporting the authorization code flow. But this endpoint has to act as a Quarkus OIDC `service` which accepts the bearer access tokens from ChatGPT, so we add `quarkus.oidc.application-type=service`. It will be OIDC Proxy which will manage the authorization code flow instead.
72+
73+
See how the extra scopes to make the most of the https://developers.strava.com/docs/reference/[Strava API] are added to the scopes which are already enabledby `quarkus.oidc.provider=strava`, instead of overriding them, see https://quarkus.io/guides/security-openid-connect-providers#provider-scope[Provider scopes] for more information.
74+
75+
We also add the following properties:
76+
77+
[source,properties]
78+
----
79+
quarkus.rest-client.strava-client.url=https://www.strava.com/api/v3
80+
81+
quarkus.smallrye-openapi.operation-id-strategy=method
82+
quarkus.smallrye-openapi.auto-add-security=false
83+
quarkus.smallrye-openapi.servers=https://manatee-apparent-mayfly.ngrok-free.app
84+
----
85+
86+
First, we configure a Strava RESTClient to point to the base Strava API endpoint. And we tune a little bit the way an [OpenAPI document is generated by Quarkus] to have it acceptable by custom ChatGPT configuration process.
87+
88+
Lets support this configuration by the actual code.
89+
90+
Add the following Maven dependencies:
91+
92+
[source,xml]
93+
----
94+
<dependency>
95+
<groupId>io.quarkus</groupId>
96+
<artifactId>quarkus-oidc</artifactId>
97+
</dependency>
98+
<dependency>
99+
<groupId>io.quarkus</groupId>
100+
<artifactId>quarkus-oidc-token-propagation-reactive</artifactId>
101+
</dependency>
102+
<dependency>
103+
<groupId>io.quarkus</groupId>
104+
<artifactId>quarkus-resteasy-reactive</artifactId>
105+
</dependency>
106+
<dependency>
107+
<groupId>io.quarkus</groupId>
108+
<artifactId>quarkus-smallrye-openapi</artifactId>
109+
</dependency>
110+
----
111+
112+
Here is a REST client which https://quarkus.io/guides/security-openid-connect-providers#access-provider-services-with-token-propagation[propagates] Strava access tokens to Strava:
113+
114+
[source,java]
115+
----
116+
package org.acme.security.openid.connect.plugin;
117+
118+
import org.eclipse.microprofile.rest.client.inject.RegisterRestClient;
119+
120+
import io.quarkus.oidc.token.propagation.AccessToken;
121+
import io.smallrye.mutiny.Uni;
122+
import jakarta.ws.rs.GET;
123+
import jakarta.ws.rs.Path;
124+
import jakarta.ws.rs.PathParam;
125+
import jakarta.ws.rs.Produces;
126+
import jakarta.ws.rs.core.MediaType;
127+
128+
@RegisterRestClient(configKey="strava-client")
129+
@AccessToken
130+
@Path("/")
131+
public interface StravaClient {
132+
133+
@GET
134+
@Path("athlete/activities")
135+
@Produces(MediaType.APPLICATION_JSON)
136+
Uni<String> athleteActivities();
137+
138+
@GET
139+
@Path("activities/{id}")
140+
@Produces(MediaType.APPLICATION_JSON)
141+
Uni<String> athleteActivity(@PathParam("id") long activityId);
142+
143+
// Etc for other Strava API
144+
}
145+
----
146+
147+
and here is the actual service endpoint which accepts access tokens from a custom ChatGPT and uses the REST client to forward them to Strava:
148+
149+
[source,java]
150+
----
151+
package org.acme.security.openid.connect.plugin;
152+
153+
import org.eclipse.microprofile.rest.client.inject.RestClient;
154+
155+
import io.quarkus.logging.Log;
156+
import io.quarkus.oidc.UserInfo;
157+
import io.quarkus.security.Authenticated;
158+
import io.smallrye.mutiny.Uni;
159+
import jakarta.inject.Inject;
160+
import jakarta.ws.rs.GET;
161+
import jakarta.ws.rs.Path;
162+
import jakarta.ws.rs.PathParam;
163+
import jakarta.ws.rs.Produces;
164+
165+
@Path("/athlete")
166+
@Authenticated
167+
public class FitnessAdviserService {
168+
169+
@Inject
170+
UserInfo athlete;
171+
172+
@Inject
173+
@RestClient
174+
StravaClient stravaClient;
175+
176+
@GET
177+
@Produces("application/json")
178+
public Uni<String> athlete() {
179+
Log.info("Fitness adviser: athlete");
180+
return Uni.createFrom().item(athlete.getJsonObject().toString());
181+
}
182+
183+
@GET
184+
@Produces("application/json")
185+
@Path("/activities")
186+
public Uni<String> activities() {
187+
Log.info("Fitness adviser: activities");
188+
return stravaClient.athleteActivities();
189+
}
190+
191+
@GET
192+
@Produces("application/json")
193+
@Path("/activity/{id}")
194+
public Uni<String> activity(@PathParam("id") long activityId) {
195+
Log.infof("Fitness adviser: activity %d", activityId);
196+
return stravaClient.athleteActivity(activityId);
197+
}
198+
199+
// Etc for other Strava API
200+
}
201+
----
202+
203+
Not that, in order to accept the binary Strava access tokens, this endpoint is verifying them indirectly by requesting `UserInfo` from Strava, during the token authentication process. In this case `UserInfo` represents a Strava athlete profile.
204+
205+
=== OIDC Proxy
206+
207+
Now that we have created the OIDC Strava service endpoint, it is time to make easily accessible via an authorization code flow with the OIDC Proxy.
208+
All you have to do is to add
209+
210+
[source,xml]
211+
----
212+
<dependency>
213+
<groupId>io.quarkiverse.oidc-proxy</groupId>
214+
<artifactId>quarkus-oidc-proxy</artifactId>
215+
</dependency>
216+
----
217+
218+
and it will enable OIDC `/q/oidc/authorize` for accepting authentication redirects, `/q/oidc/token` for exchanging an authorization code for tokens,
219+
and other OIDC endpoints at the `/q/oidc` root path.
220+
221+
Let's update the application configuration:
222+
223+
[source,properties]
224+
----
225+
quarkus.oidc.authentication.redirect-path=/callback
226+
quarkus.oidc.authentication.force-redirect-https-scheme=true
227+
quarkus.oidc-proxy.external-redirect-uri=https://chat.openai.com/aip/g-2faf163d359505ecb63596f17baa3dfe53ea3cb9/oauth/callback
228+
quarkus.oidc-proxy.root-path=/oidc
229+
quarkus.oidc-proxy.external-client-id=external-client-id
230+
quarkus.oidc-proxy.external-client-secret=external-client-secret
231+
----
232+
233+
=== NGrok
234+
=== Custom ChatGPT
235+
236+
== Security Considerations
237+
238+
== Conclusion
239+
240+
In this post we have looked at how https://github.com/quarkiverse/quarkus-oidc-proxy[Quarkus OIDC Proxy] can help to integrate OIDC service endpoints with SPA without having to expose the internal OIDC connection details. We have built `Quarkus Fitness Adviser`, a https://platform.openai.com/docs/actions/introduction[Custom ChatGPT action] which uses OIDC proxy to authenticate users with https://quarkus.io/guides/security-openid-connect-providers#strava[Strava] and provides fitness advice by reading the user specific data from the Quarkus OIDC Strava service.
241+
242+
To learn more what Quarkus does around AI, see an innovative https://github.com/quarkiverse/quarkus-langchain4j[Quarkus LangChain4j] project which provides a top class integration between Quarkus and the https://github.com/langchain4j/langchain4j[LangChain4j] library.
243+
One possible idea to try is to use custom ChatGPT and OIDC Proxy to talk to the Quarkus OIDC service endpoint powered by https://github.com/quarkiverse/quarkus-langchain4j[Quarkus LangChain4j].
244+
245+
Enjoy Quarkus, and, as `Quarkus Fitness Adviser` recommends, enjoy the ride !
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)