β οΈ This is the instructions for the latest SNAPSHOT version (main branch). Please, see the latest released documentation if you are looking for instructions.
Quarkus' extension for generation of Rest Clients based on OpenAPI specification files.
This extension is based on the OpenAPI Generator Tool. Please consider donation to help them maintain the project: https://opencollective.com/openapi_generator/donate
Add the following dependency to your project's pom.xml
file:
<dependency>
<groupId>io.quarkiverse.openapi.generator</groupId>
<artifactId>quarkus-openapi-generator</artifactId>
<version>1.0.0-SNAPSHOT</version>
</dependency>
You will also need to add or update the quarkus-maven-plugin
configuration with the following:
β οΈ You probably already have this configuration if you created your application with the Quarkus Starter. That said, double-check your configuration not to add anotherplugin
entry.
<plugin>
<groupId>io.quarkus</groupId>
<artifactId>quarkus-maven-plugin</artifactId>
<extensions>true</extensions>
<executions>
<execution>
<goals>
<goal>build</goal>
<goal>generate-code</goal>
<goal>generate-code-tests</goal>
</goals>
</execution>
</executions>
</plugin>
Now, create the directory openapi
under your src/main/
path and add the OpenAPI spec files there. We support JSON, YAML and YML extensions.
To fine tune the configuration for each spec file, add the following entry to your properties file. In this example, our spec file is in src/main/openapi/petstore.json
:
quarkus.openapi-generator.codegen.spec.petstore_json.base-package=org.acme.openapi
If a base package name is not provided, it will be used the default org.openapi.quarkus.<filename>
. For example, org.openapi.quarkus.petstore_json
.
Note that the file name is used to configure the specific information for each spec. We follow the Environment Variables Mapping Rules from Microprofile Configuration to sanitize the OpenAPI spec filename. Any non-alphabetic characters are replaced by an underscore _
.
Run mvn compile
to generate your classes in target/generated-sources/open-api-json
path:
- org.acme.openapi
- api
- PetApi.java
- StoreApi.java
- UserApi.java
- model
- Address.java
- Category.java
- Customer.java
- ModelApiResponse.java
- Order.java
- Pet.java
- Tag.java
- User.java
You can reference the generated code in your project, for example:
import javax.inject.Inject;
import javax.ws.rs.GET;
import javax.ws.rs.Path;
import javax.ws.rs.Produces;
import javax.ws.rs.core.MediaType;
import org.acme.openapi.api.PetApi;
import org.eclipse.microprofile.rest.client.inject.RestClient;
import org.jboss.resteasy.annotations.jaxrs.PathParam;
@Produces(MediaType.APPLICATION_JSON)
@Path("/petstore")
public class PetResource {
@RestClient
@Inject
PetApi petApi;
}
See the integration-tests module for more information of how to use this extension. Please be advised that the extension is on experimental, early development stage.
Since the most part of this extension work is in the generate-code
execution phase of the Quarkus Maven's plugin, the log configuration must be set in the Maven context. When building your project, add -Dorg.slf4j.simpleLogger.log.org.openapitools=off
to the mvn
command to reduce the internal generator noise. For example:
mvn clean install -Dorg.slf4j.simpleLogger.log.org.openapitools=off
For more information, see the Maven Logging Configuration guide.
If your OpenAPI specification file has securitySchemes
definitions, the inner generator
will register ClientRequestFilter
s providers for you to
implement the given authentication mechanism.
To provide the credentials for your application, you can use the Quarkus configuration support. The configuration key is composed using this
pattern: [base_package].security.auth.[security_scheme_name]/[auth_property_name]
. Where:
base_package
is the package name you gave when configuring the code generation usingquarkus.openapi-generator.codegen.spec.[open_api_file].base-package
property.security_scheme_name
is the name of the security scheme object definition in the OpenAPI file. Given the following excerpt, we haveapi_key
andbasic_auth
security schemes:
{
"securitySchemes": {
"api_key": {
"type": "apiKey",
"name": "api_key",
"in": "header"
},
"basic_auth": {
"type": "http",
"scheme": "basic"
}
}
}
auth_property_name
varies depending on the authentication provider. For example, for Basic Authentication we haveusername
andpassword
. See the following sections for more details.
Tip: on production environments you will likely to use HashiCorp Vault or Kubernetes Secrets to provide this information for your application.
For Basic HTTP Authentication, these are the supported configurations:
Description | Property Key | Example |
---|---|---|
Username credentials | [base_package].security.auth.[security_scheme_name]/username |
org.acme.openapi.security.auth.basic_auth/username |
Password credentials | [base_package].security.auth.[security_scheme_name]/password |
org.acme.openapi.security.auth.basic_auth/password |
For Bearer Token Authentication, these are the supported configurations:
Description | Property Key | Example |
---|---|---|
Bearer Token | [base_package].security.auth.[security_scheme_name]/bearer-token |
org.acme.openapi.security.auth.bearer/bearer-token |
Similarly to bearer token, the API Key Authentication also has the token entry key property:
Description | Property Key | Example |
---|---|---|
API Key | [base_package].security.auth.[security_scheme_name]/api-key |
org.acme.openapi.security.auth.apikey/api-key |
The API Key scheme has an additional property that requires where to add the API key in the request token: header, cookie or query. The inner provider takes care of that for you.
The extension will generate a ClientRequestFilter
capable to add OAuth2 authentication capabilities to the OpenAPI operations that require it. This means that you can use
the Quarkus OIDC Extension configuration to define your authentication flow.
The generated code creates a named OidcClient
for each Security Scheme listed in the OpenAPI specification files. For example, given
the following excerpt:
{
"securitySchemes": {
"petstore_auth": {
"type": "oauth2",
"flows": {
"implicit": {
"authorizationUrl": "https://petstore3.swagger.io/oauth/authorize",
"scopes": {
"write:pets": "modify pets in your account",
"read:pets": "read your pets"
}
}
}
}
}
}
You can configure this OidcClient
as:
quarkus.oidc-client.petstore_auth.auth-server-url=https://petstore3.swagger.io/oauth/authorize
quarkus.oidc-client.petstore_auth.discovery-enabled=false
quarkus.oidc-client.petstore_auth.token-path=/tokens
quarkus.oidc-client.petstore_auth.credentials.secret=secret
quarkus.oidc-client.petstore_auth.grant.type=password
quarkus.oidc-client.petstore_auth.grant-options.password.username=alice
quarkus.oidc-client.petstore_auth.grant-options.password.password=alice
quarkus.oidc-client.petstore_auth.client-id=petstore-app
The configuration suffix quarkus.oidc-client.petstore_auth
is exclusive for the schema defined in the specification file.
For this to work you must add Quarkus OIDC Client Filter Extension to your project:
<dependency>
<groupId>io.quarkus</groupId>
<artifactId>quarkus-oidc-client-filter</artifactId>
</dependency>
You can define the CircuitBreaker annotation from MicroProfile Fault Tolerance
in your generated classes by setting the desired configuration in application.properties
.
Let's say you have the following OpenAPI definition:
{
"openapi": "3.0.3",
"info": {
"title": "Simple API",
"version": "1.0.0-SNAPSHOT"
},
"paths": {
"/hello": {
"get": {
"responses": {
"200": {
"description": "OK",
"content": {
"text/plain": {
"schema": {
"type": "string"
}
}
}
}
}
}
},
"/bye": {
"get": {
"responses": {
"200": {
"description": "OK",
"content": {
"text/plain": {
"schema": {
"type": "string"
}
}
}
}
}
}
}
}
}
And you want to configure Circuit Breaker for the /bye
endpoint, you can do it in the following way:
Add the SmallRye Fault Tolerance extension to your project's pom.xml
file:
<dependency>
<groupId>io.quarkus</groupId>
<artifactId>quarkus-smallrye-fault-tolerance</artifactId>
</dependency>
Assuming your Open API spec file is in src/main/openapi/simple-openapi.json
, add the following configuration to your application.properties
file:
# Note that the file name must have only alphabetic characters or underscores (_).
quarkus.openapi-generator.codegen.spec.simple_openapi_json.base-package=org.acme.openapi.simple
# Enables the CircuitBreaker extension for the byeGet method from the DefaultApi class
org.acme.openapi.simple.api.DefaultApi/byeGet/CircuitBreaker/enabled=true
With the above configuration, your Rest Clients will be created with a code similar to the following:
package org.acme.openapi.simple.api;
import org.eclipse.microprofile.rest.client.inject.RegisterRestClient;
import java.io.InputStream;
import java.io.OutputStream;
import java.util.List;
import java.util.Map;
import javax.ws.rs.*;
import javax.ws.rs.core.Response;
import javax.ws.rs.core.MediaType;
@Path("")
@RegisterRestClient(baseUri="http://localhost/", configKey="simple-openapi_json")
public interface DefaultApi {
@GET
@Path("/bye")
@Produces({ "text/plain" })
@org.eclipse.microprofile.faulttolerance.CircuitBreaker
public String byeGet();
@GET
@Path("/hello")
@Produces({ "text/plain" })
public String helloGet();
}
You can also override the default Circuit Breaker configuration by setting the properties
in application.properties
just as you would for a traditional MicroProfile application:
org.acme.openapi.simple.api.DefaultApi/byeGet/CircuitBreaker/failOn=java.lang.IllegalArgumentException,java.lang.NullPointerException
org.acme.openapi.simple.api.DefaultApi/byeGet/CircuitBreaker/skipOn=java.lang.NumberFormatException
org.acme.openapi.simple.api.DefaultApi/byeGet/CircuitBreaker/delay=33
org.acme.openapi.simple.api.DefaultApi/byeGet/CircuitBreaker/delayUnit=MILLIS
org.acme.openapi.simple.api.DefaultApi/byeGet/CircuitBreaker/requestVolumeThreshold=42
org.acme.openapi.simple.api.DefaultApi/byeGet/CircuitBreaker/failureRatio=3.14
org.acme.openapi.simple.api.DefaultApi/byeGet/CircuitBreaker/successThreshold=22
The rest client also supports request with mime-type multipart/form-data and, if the schema of the request body is known in advance, we can also automatically generate the models of the request bodies.
You need to add the following additional dependency to your pom.xml
:
<dependency>
<groupId>io.quarkus</groupId>
<artifactId>quarkus-resteasy-multipart</artifactId>
</dependency>
For any multipart/form-data operation a model for the request body will be generated. Each part of the multipart is a field in this model that is annotated with the following annotations:
javax.ws.rs.FormParam
, where the value parameter denotes the part name,org.jboss.resteasy.annotations.providers.multipart.PartType
, where the parameter is the jax-rs MediaType of the part (see below for details),- and, if the part contains a file,
org.jboss.resteasy.annotations.providers.multipart.PartFilename
, with a generated default parameter that will be passed as the fileName sub-header in the Content-Disposition header of the part.
For example, the model for a request that requires a file, a string and some complex object will look like this:
public class MultipartBody {
@FormParam("file")
@PartType(MediaType.APPLICATION_OCTET_STREAM)
@PartFilename("defaultFileName")
public File file;
@FormParam("fileName")
@PartType(MediaType.TEXT_PLAIN)
public String fileName;
@FormParam("someObject")
@PartType(MediaType.APPLICATION_JSON)
public MyComplexObject someObject;
}
Then in the client the org.jboss.resteasy.annotations.providers.multipart.MultipartForm
annotation is added in front of the multipart parameter:
@Path("/echo")
@RegisterRestClient(baseUri="http://my.endpoint.com/api/v1", configKey="multipart-requests_yml")
public interface MultipartService {
@POST
@Consumes(MediaType.MULTIPART_FORM_DATA)
@Produces(MediaType.TEXT_PLAIN)
String sendMultipartData(@MultipartForm MultipartBody data);
}
See Quarkus - Using the REST Client with Multipart and the RESTEasy JAX-RS specifications for more details.
Importantly, if some multipart request bodies contain complex objects (i.e. non-primitives) you need to explicitly tell the Open API generator to create models for these objects by setting
the skip-form-model
property corresponding to your spec in the application.properties
to false
, e.g.:
quarkus.openapi-generator.codegen.spec.my_multipart_requests_yml.skip-form-model=false
The OAS 3.0 specifies the following default content-types for a multipart:
- If the property is a primitive, or an array of primitive values, the default Content-Type is
text/plain
- If the property is complex, or an array of complex values, the default Content-Type is
application/json
- If the property is a
type: string
withformat: binary
orformat: base64
(aka a file object), the default Content-Type isapplication/octet-stream
A different content-type may be defined in your api spec, but this is not yet supported in the code generation. Also, this "annotation-oriented" approach of RestEasy (i.e. using @MultipartForm
to
denote the multipart body parameter) does not seem to properly support the unmarshalling of arrays of the same type (e.g. array of files), in these cases it uses Content-Type equal
to application/json
.
Having the files in the src/main/openapi
directory will generate the REST stubs by default. Alternatively, you can implement
the io.quarkiverse.openapi.generator.deployment.codegen.OpenApiSpecInputProvider
interface to provide a list of InputStream
s of OpenAPI specification files. This is useful in scenarios where you want to dynamically generate the client code without having the target spec file
saved locally in your project.
See the example implementation here
The domain objects are classes generated in the model
package. These classes might have deprecated attributes in the Open API specification
file. By default, these attributes are generated. You can fine tune this behavior if the deprecated attributes should not be generated.
Use the property key <base_package>.model.MyClass.generateDeprecated=false
to disable the deprecated attributes in the given model. For example org.acme.weather.Country.generatedDeprecated=false
.
These are the known limitations of this pre-release version:
- No reactive support
- Only Jackson support
We will work in the next few releases to address these use cases, until there please provide feedback for the current state of this extension. We also love contributions β€οΈ
Thanks goes to these wonderful people (emoji key):
Ricardo Zanini π» π§ |
Helber Belmiro π π» |
George Gastaldi π» π |
Rishi Kumar Ray π |
Francisco Javier Tirado Sarti π» |
Orbifoldt π» |
antssilva96 π» |
This project follows the all-contributors specification. Contributions of any kind welcome!