|
| 1 | +--- |
| 2 | +layout: post |
| 3 | +title: 'Use OIDC Proxy to integrate OIDC service endpoints with custom ChatGPT' |
| 4 | +date: 2024-04-01 |
| 5 | +tags: extension oidc security chatgpt development-tips |
| 6 | +synopsis: 'Explain how OIDC Proxy can help to integrate OIDC service endpoints with custom ChatGPT' |
| 7 | +author: sberyozkin |
| 8 | +--- |
| 9 | +:imagesdir: /assets/images/posts/oidc-proxy |
| 10 | + |
| 11 | + |
| 12 | +== Introduction |
| 13 | + |
| 14 | +https://github.com/quarkiverse/quarkus-oidc-proxy[Quarkus OIDC Proxy] is a new https://github.com/quarkiverse[Quarkiverse] extension which can help to integrate https://quarkus.io/guides/security-oidc-bearer-token-authentication[OIDC service endpoints] with external Single-page applications (SPA). SPA uses the OIDC authorization code flow itself (without relying on Quarkus) to authenticate the current user, and accesses the Quarkus OIDC service endpoint with the access token on behalf of the authenticated user. |
| 15 | + |
| 16 | +This is a simple diagram which shows how this process works, copied to this post from the https://quarkus.io/guides/security-oidc-bearer-token-authentication[OIDC Bearer token guide] for your convenience: |
| 17 | + |
| 18 | +image::security-bearer-token-spa.png |
| 19 | + |
| 20 | +You can see that OIDC provider is used to authenticate the current user to SPA. SPA acquires ID and access tokens as part of the authorization code flow and uses the access token to access the Quarkus OIDC service endpoint. |
| 21 | + |
| 22 | +SPA must know the OIDC provider connection details, including the registered OIDC application's client id, secret and other OIDC specific details required to complete the authorization code flow successfully. You must also allow an SPA specific callback URL in your registered OIDC application which may not always be acceptable. |
| 23 | + |
| 24 | +https://github.com/quarkiverse/quarkus-oidc-proxy[Quarkus OIDC Proxy] emulates the OIDC provider in the diagram above. It interposes over Quarkus OIDC service endpoints and delegates to the real OIDC provider. It can help to integrate OIDC service endpoints with SPA without having to expose the internal OIDC connection details to this SPA. It relies on Quarkus OIDC to let SPA athenticate its users to OIDC and OAuth2 providers which may be technically challenging to support directly at the SPA level. |
| 25 | + |
| 26 | +Another user case for OIDC Proxy is to have several frontend https://quarkus.io/guides/security-oidc-code-flow-authentication[Quarkus OIDC web-app] endpoints to authenticate users using the same OIDC proxy configuration before accessing the OIDC service endpoint. |
| 27 | + |
| 28 | +So how does OIDC proxy actually work ? Sure, we'll look at it shortly, but first, let's talk about custom ChatGPT actions. |
| 29 | + |
| 30 | +== Custom ChatGPT Actions |
| 31 | + |
| 32 | +https://chat.openai.com[ChatGPT] has introduced https://platform.openai.com/docs/actions/introduction[Actions], which can be used to create custom ChatGPT. For example, you can augment ChatGPT by connectng it to your API endponts. |
| 33 | + |
| 34 | +The key challenge is how a custom GPT can be https://platform.openai.com/docs/actions/authentication[authenticated] to access the API. The https://platform.openai.com/docs/actions/authentication/oauth[OAuth] is the best option when you need a user-specific permission to access the API, and this is what https://github.com/quarkiverse/quarkus-oidc-proxy[Quarkus OIDC Proxy] will help you to support without exposing all the OIDC/OAuth2 connection details to ChatGPT. |
| 35 | + |
| 36 | +Now all is ready for creating <<Quarkus Fitness Adviser>>. |
| 37 | + |
| 38 | +Please be aware that currently, custom ChatGPT actions can not be created with a free ChatGPT subscription, but only starting from the ChatGPT Plus subscription. |
| 39 | + |
| 40 | +== Quarkus Fitness Adviser |
| 41 | + |
| 42 | +In this section we will create `Quarkus Fitness Adviser`, a custom ChatGPT which analyzes activities recorded in Strava and other social providers which track physical exercise. |
| 43 | + |
| 44 | +We'll do it by creating a https://quarkus.io/guides/security-openid-connect-providers#strava[Strava] Quarkus OIDC Service endpoint, adding OIDC proxy to it, providing an HTTPS tunnel with https://ngrok.com/[NGrok] and creating a custom ChatGPT action which uses https://github.com/quarkiverse/quarkus-oidc-proxy[Quarkus OIDC Proxy] to autenticate users to Strava and use access tokens to the OIDC service Strava endpoint to analyze the recorded activities. |
| 45 | + |
| 46 | +=== Quarkus Strava Service |
| 47 | + |
| 48 | +Quarkus OIDC supports https://quarkus.io/guides/security-openid-connect-providers#strava[Strava OAuth2 provider] by hiding Srava OAuth2 specific details in a single configuration line, `quarkus.oidc.provider=strava`. |
| 49 | + |
| 50 | +Strava provider is mostly OAuth2 compliant but it uses HTTP query parameters to complete the authorization code flow POST token request, when using the form parameters is a usual option. It also uses a comma `,` separator when multiple scopes are requested during the initial redirect to Strava, with a space ` ` being a typical separator character. |
| 51 | + |
| 52 | +Quarkus OIDC proxy can handle it because it can use the Quarkus OIDC knowledge about these details. An SPA such as a custom ChatGPT does not support these options with its OAuth authentication option. |
| 53 | + |
| 54 | +We'll start by registering a new `Quarkus Fitness Adviser` application in Strava: |
| 55 | + |
| 56 | +image::strava-application-registration.png |
| 57 | + |
| 58 | +Note that the `Authorization Callback Domain` points to your free NGrok (or in production, the real) domain representing the domain where OIDC Proxy will be available, likely to be the same domain where your Quarkus micro-services are hosted as well. It is an important feature of OIDC Proxy as it lets OIDC provider administrators to point to a trusted domain and not a 3rd party domain. |
| 59 | + |
| 60 | +After completing the application registration, and noting the generated client id and secret, we create the OIDC configuration: |
| 61 | + |
| 62 | +[source,properties] |
| 63 | +---- |
| 64 | +quarkus.oidc.provider=strava |
| 65 | +quarkus.oidc.application-type=service |
| 66 | +quarkus.oidc.client-id=${strava-client-id} |
| 67 | +quarkus.oidc.credentials.secret=${strava-client-secret} |
| 68 | +quarkus.oidc.authentication.extra-params.scope=profile:read_all,activity:read_all |
| 69 | +---- |
| 70 | + |
| 71 | +Note, by default, `quarkus.oidc.provider=strava` will enable a Quarkus OIDC `web-app` endpoint capable of supporting the authorization code flow. But this endpoint has to act as a Quarkus OIDC `service` which accepts the bearer access tokens from ChatGPT, so we add `quarkus.oidc.application-type=service`. It will be OIDC Proxy which will manage the authorization code flow instead. |
| 72 | + |
| 73 | +See how the extra scopes to make the most of the https://developers.strava.com/docs/reference/[Strava API] are added to the scopes which are already enabledby `quarkus.oidc.provider=strava`, instead of overriding them, see https://quarkus.io/guides/security-openid-connect-providers#provider-scope[Provider scopes] for more information. |
| 74 | + |
| 75 | +We also add the following properties: |
| 76 | + |
| 77 | +[source,properties] |
| 78 | +---- |
| 79 | +quarkus.rest-client.strava-client.url=https://www.strava.com/api/v3 |
| 80 | +
|
| 81 | +quarkus.smallrye-openapi.operation-id-strategy=method |
| 82 | +quarkus.smallrye-openapi.auto-add-security=false |
| 83 | +quarkus.smallrye-openapi.servers=https://manatee-apparent-mayfly.ngrok-free.app |
| 84 | +---- |
| 85 | + |
| 86 | +First, we configure a Strava RESTClient to point to the base Strava API endpoint. And we tune a little bit the way an [OpenAPI document is generated by Quarkus] to have it acceptable by custom ChatGPT configuration process. |
| 87 | + |
| 88 | +Lets support this configuration by the actual code. |
| 89 | + |
| 90 | +Add the following Maven dependencies: |
| 91 | + |
| 92 | +[source,xml] |
| 93 | +---- |
| 94 | +<dependency> |
| 95 | + <groupId>io.quarkus</groupId> |
| 96 | + <artifactId>quarkus-oidc</artifactId> |
| 97 | +</dependency> |
| 98 | +<dependency> |
| 99 | + <groupId>io.quarkus</groupId> |
| 100 | + <artifactId>quarkus-oidc-token-propagation-reactive</artifactId> |
| 101 | +</dependency> |
| 102 | +<dependency> |
| 103 | + <groupId>io.quarkus</groupId> |
| 104 | + <artifactId>quarkus-resteasy-reactive</artifactId> |
| 105 | +</dependency> |
| 106 | +<dependency> |
| 107 | + <groupId>io.quarkus</groupId> |
| 108 | + <artifactId>quarkus-smallrye-openapi</artifactId> |
| 109 | +</dependency> |
| 110 | +---- |
| 111 | + |
| 112 | +Here is a REST client which https://quarkus.io/guides/security-openid-connect-providers#access-provider-services-with-token-propagation[propagates] Strava access tokens to Strava: |
| 113 | + |
| 114 | +[source,java] |
| 115 | +---- |
| 116 | +package org.acme.security.openid.connect.plugin; |
| 117 | +
|
| 118 | +import org.eclipse.microprofile.rest.client.inject.RegisterRestClient; |
| 119 | +
|
| 120 | +import io.quarkus.oidc.token.propagation.AccessToken; |
| 121 | +import io.smallrye.mutiny.Uni; |
| 122 | +import jakarta.ws.rs.GET; |
| 123 | +import jakarta.ws.rs.Path; |
| 124 | +import jakarta.ws.rs.PathParam; |
| 125 | +import jakarta.ws.rs.Produces; |
| 126 | +import jakarta.ws.rs.core.MediaType; |
| 127 | +
|
| 128 | +@RegisterRestClient(configKey="strava-client") |
| 129 | +@AccessToken |
| 130 | +@Path("/") |
| 131 | +public interface StravaClient { |
| 132 | +
|
| 133 | + @GET |
| 134 | + @Path("athlete/activities") |
| 135 | + @Produces(MediaType.APPLICATION_JSON) |
| 136 | + Uni<String> athleteActivities(); |
| 137 | +
|
| 138 | + @GET |
| 139 | + @Path("activities/{id}") |
| 140 | + @Produces(MediaType.APPLICATION_JSON) |
| 141 | + Uni<String> athleteActivity(@PathParam("id") long activityId); |
| 142 | +
|
| 143 | + // Etc for other Strava API |
| 144 | +} |
| 145 | +---- |
| 146 | + |
| 147 | +and here is the actual service endpoint which accepts access tokens from a custom ChatGPT and uses the REST client to forward them to Strava: |
| 148 | + |
| 149 | +[source,java] |
| 150 | +---- |
| 151 | +package org.acme.security.openid.connect.plugin; |
| 152 | +
|
| 153 | +import org.eclipse.microprofile.rest.client.inject.RestClient; |
| 154 | +
|
| 155 | +import io.quarkus.logging.Log; |
| 156 | +import io.quarkus.oidc.UserInfo; |
| 157 | +import io.quarkus.security.Authenticated; |
| 158 | +import io.smallrye.mutiny.Uni; |
| 159 | +import jakarta.inject.Inject; |
| 160 | +import jakarta.ws.rs.GET; |
| 161 | +import jakarta.ws.rs.Path; |
| 162 | +import jakarta.ws.rs.PathParam; |
| 163 | +import jakarta.ws.rs.Produces; |
| 164 | +
|
| 165 | +@Path("/athlete") |
| 166 | +@Authenticated |
| 167 | +public class FitnessAdviserService { |
| 168 | +
|
| 169 | + @Inject |
| 170 | + UserInfo athlete; |
| 171 | +
|
| 172 | + @Inject |
| 173 | + @RestClient |
| 174 | + StravaClient stravaClient; |
| 175 | +
|
| 176 | + @GET |
| 177 | + @Produces("application/json") |
| 178 | + public Uni<String> athlete() { |
| 179 | + Log.info("Fitness adviser: athlete"); |
| 180 | + return Uni.createFrom().item(athlete.getJsonObject().toString()); |
| 181 | + } |
| 182 | +
|
| 183 | + @GET |
| 184 | + @Produces("application/json") |
| 185 | + @Path("/activities") |
| 186 | + public Uni<String> activities() { |
| 187 | + Log.info("Fitness adviser: activities"); |
| 188 | + return stravaClient.athleteActivities(); |
| 189 | + } |
| 190 | +
|
| 191 | + @GET |
| 192 | + @Produces("application/json") |
| 193 | + @Path("/activity/{id}") |
| 194 | + public Uni<String> activity(@PathParam("id") long activityId) { |
| 195 | + Log.infof("Fitness adviser: activity %d", activityId); |
| 196 | + return stravaClient.athleteActivity(activityId); |
| 197 | + } |
| 198 | +
|
| 199 | + // Etc for other Strava API |
| 200 | +} |
| 201 | +---- |
| 202 | + |
| 203 | +Not that, in order to accept the binary Strava access tokens, this endpoint is verifying them indirectly by requesting `UserInfo` from Strava, during the token authentication process. In this case `UserInfo` represents a Strava athlete profile. |
| 204 | + |
| 205 | +=== OIDC Proxy |
| 206 | + |
| 207 | +Now that we have created the OIDC Strava service endpoint, it is time to make easily accessible via an authorization code flow with the OIDC Proxy. |
| 208 | +All you have to do is to add |
| 209 | + |
| 210 | +[source,xml] |
| 211 | +---- |
| 212 | +<dependency> |
| 213 | + <groupId>io.quarkiverse.oidc-proxy</groupId> |
| 214 | + <artifactId>quarkus-oidc-proxy</artifactId> |
| 215 | +</dependency> |
| 216 | +---- |
| 217 | + |
| 218 | +and it will enable OIDC `/q/oidc/authorize` for accepting authentication redirects, `/q/oidc/token` for exchanging an authorization code for tokens, |
| 219 | +and other OIDC endpoints at the `/q/oidc` root path. |
| 220 | + |
| 221 | +Let's update the application configuration: |
| 222 | + |
| 223 | +[source,properties] |
| 224 | +---- |
| 225 | +quarkus.oidc.authentication.redirect-path=/callback |
| 226 | +quarkus.oidc.authentication.force-redirect-https-scheme=true |
| 227 | +quarkus.oidc-proxy.external-redirect-uri=https://chat.openai.com/aip/g-2faf163d359505ecb63596f17baa3dfe53ea3cb9/oauth/callback |
| 228 | +quarkus.oidc-proxy.root-path=/oidc |
| 229 | +quarkus.oidc-proxy.external-client-id=external-client-id |
| 230 | +quarkus.oidc-proxy.external-client-secret=external-client-secret |
| 231 | +---- |
| 232 | + |
| 233 | +=== NGrok |
| 234 | +=== Custom ChatGPT |
| 235 | + |
| 236 | +== Security Considerations |
| 237 | + |
| 238 | +== Conclusion |
| 239 | + |
| 240 | +In this post we have looked at how https://github.com/quarkiverse/quarkus-oidc-proxy[Quarkus OIDC Proxy] can help to integrate OIDC service endpoints with SPA without having to expose the internal OIDC connection details. We have built `Quarkus Fitness Adviser`, a https://platform.openai.com/docs/actions/introduction[Custom ChatGPT action] which uses OIDC proxy to authenticate users with https://quarkus.io/guides/security-openid-connect-providers#strava[Strava] and provides fitness advice by reading the user specific data from the Quarkus OIDC Strava service. |
| 241 | + |
| 242 | +To learn more what Quarkus does around AI, see an innovative https://github.com/quarkiverse/quarkus-langchain4j[Quarkus LangChain4j] project which provides a top class integration between Quarkus and the https://github.com/langchain4j/langchain4j[LangChain4j] library. |
| 243 | +One possible idea to try is to use custom ChatGPT and OIDC Proxy to talk to the Quarkus OIDC service endpoint powered by https://github.com/quarkiverse/quarkus-langchain4j[Quarkus LangChain4j]. |
| 244 | + |
| 245 | +Enjoy Quarkus, and, as `Quarkus Fitness Adviser` recommends, enjoy the ride ! |
0 commit comments