Otoroshi and WASM
WebAssembly (WASM) is a simple machine model and executable format with an extensive specification. It is designed to be portable, compact, and execute at or near native speeds. Otoroshi already supports the execution of WASM files by providing different plugins that can be applied on routes. These plugins are:
WasmRouteMatcher
: useful to define if a route can handle a requestWasmPreRoute
: useful to check request and extract useful stuff for the other pluginsWasmAccessValidator
: useful to control access to a route (jump to the next section to learn more about it)WasmRequestTransformer
: transform the content of an incoming request (body, headers, etc …)WasmBackend
: execute a WASM file as Otoroshi target. Useful to implement user defined logic and function at the edgeWasmResponseTransformer
: transform the content of the response produced by the targetWasmSink
: create a sink plugin to handle unmatched requestsWasmRequestHandler
: create a plugin that can handle the whole request lifecycleWasmJob
: create a job backed by a wasm function
To simplify the process of WASM creation and usage, Otoroshi provides:
- otoroshi ui integration: a full set of plugins that let you pick which WASM function to runtime at any point in a route
- otoroshi
wasmo
: a code editor in the browser that let you write your plugin inRust
,TinyGo
,Javascript
orAssembly Script
without having to think about compiling it to WASM (you can find a complete tutorial about it here)
Available tutorials
here is the list of available tutorials about wasm in Otoroshi
Wasm plugins entities
Otoroshi provides a dedicated entity for wasm plugins. Those entities makes it easy to declare a wasm plugin with specific configuration only once and use it in multiple places.
You can find wasm plugin entities at /bo/dashboard/wasm-plugins
In a wasm plugin entity, you can define the source of your wasm plugin. You can choose between
base64
: a base64 encoded wasm scriptfile
: the path to a wasm script filehttp
: the url to a wasm script filewasmo
: the name of a wasm script compiled by a Wasmo instance
then you can define the number of memory pages available for each plugin instanciation, the name of the function you want to invoke, the config. map of the VM and if you want to keep a wasm vm alive during the request lifecycle to be able to reuse it in different plugin steps
Otoroshi plugins api
the following parts illustrates the apis for the different plugins. Otoroshi uses Extism to handle content sharing between the JVM and the wasm VM. All structures are sent to/from the plugins as json strings.
for instance, if we want to write a WasmBackendCall
plugin using javascript, we could write something like
function backend_call() {
const input_str = Host.inputString(); // here we get the context passed by otoroshi as json string
const backend_call_context = JSON.parse(input_str); // and parse it
if (backend_call_context.path === '/hello') {
Host.outputString(JSON.stringify({ // now we return a json string to otoroshi with the "backend" call result
headers: {
'content-type': 'application/json'
},
body_json: {
message: `Hello ${ctx.request.query.name[0]}!`
},
status: 200,
}));
} else {
Host.outputString(JSON.stringify({ // now we return a json string to otoroshi with the "backend" call result
headers: {
'content-type': 'application/json'
},
body_json: {
error: "not found"
},
status: 404,
}));
}
return 0; // we return 0 to tell otoroshi that everything went fine
}
the following examples are written in rust. the rust macros provided by extism makes the usage of Host.inputString
and Host.outputString
useless. Remember that it’s still used under the hood and that the structures are passed as json strings.
do not forget to add the extism pdk library to your project to make it compile
- Cargo.toml
-
[package] name = "@@PLUGIN_NAME@@" version = "@@PLUGIN_VERSION@@" edition = "2021" # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html [package.metadata] wasi = false [dependencies] extism-pdk = "0.1.1" serde = "1.0.152" serde_json = "1.0.91" [lib] crate_type = ["cdylib"] path = "src/lib.rs"
- go.mod
-
module @@PLUGIN_NAME@@/@@PLUGIN_VERSION@@ go 1.19 require github.com/buger/jsonparser v1.1.1 // indirect
- package.json
-
{ "name": "@@PLUGIN_NAME@@", "version": "@@PLUGIN_VERSION@@", "devDependencies": { "esbuild": "^0.17.9" } }
WasmRouteMatcher
A route matcher is a plugin that can help the otoroshi router to select a route instance based on your own custom predicate. Basically it’s a function that returns a boolean answer.
use extism_pdk::*;
#[plugin_fn]
pub fn matches_route(Json(_context): Json<types::WasmMatchRouteContext>) -> FnResult<Json<types::WasmMatchRouteResponse>> {
///
}
#[derive(Serialize, Deserialize, Debug)]
pub struct WasmMatchRouteContext {
pub snowflake: Option<String>,
pub route: Route,
pub request: RawRequest,
pub config: Value,
pub attrs: Value,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct WasmMatchRouteResponse {
pub result: bool,
}
WasmPreRoute
A pre-route plugin can be used to short-circuit a request or enrich it (maybe extracting your own kind of auth. token, etc) a the very beginning of the request handling process, just after the routing part, when a route has bee chosen by the otoroshi router.
use extism_pdk::*;
#[plugin_fn]
pub fn pre_route(Json(_context): Json<types::WasmPreRouteContext>) -> FnResult<Json<types::WasmPreRouteResponse>> {
///
}
#[derive(Serialize, Deserialize, Debug)]
pub struct WasmPreRouteContext {
pub snowflake: Option<String>,
pub route: Route,
pub request: RawRequest,
pub config: Value,
pub global_config: Value,
pub attrs: Value,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct WasmPreRouteResponse {
pub error: bool,
pub attrs: Option<HashMap<String, String>>,
pub status: Option<u32>,
pub headers: Option<HashMap<String, String>>,
pub body_bytes: Option<Vec<u8>>,
pub body_base64: Option<String>,
pub body_json: Option<Value>,
pub body_str: Option<String>,
}
WasmAccessValidator
An access validator plugin is typically used to verify if the request can continue or must be cancelled. For instance, the otoroshi apikey plugin is an access validator that check if the current apikey provided by the client is legit and authorized on the current route.
use extism_pdk::*;
#[plugin_fn]
pub fn can_access(Json(_context): Json<types::WasmAccessValidatorContext>) -> FnResult<Json<types::WasmAccessValidatorResponse>> {
///
}
#[derive(Serialize, Deserialize)]
pub struct WasmAccessValidatorContext {
pub snowflake: Option<String>,
pub apikey: Option<Apikey>,
pub user: Option<User>,
pub request: RawRequest,
pub config: Value,
pub global_config: Value,
pub attrs: Value,
pub route: Route,
}
#[derive(Serialize, Deserialize)]
pub struct WasmAccessValidatorError {
pub message: String,
pub status: u32,
}
#[derive(Serialize, Deserialize)]
pub struct WasmAccessValidatorResponse {
pub result: bool,
pub error: Option<WasmAccessValidatorError>,
}
WasmRequestTransformer
A request transformer plugin can be used to compose or transform the request that will be sent to the backend
use extism_pdk::*;
#[plugin_fn]
pub fn transform_request(Json(_context): Json<types::WasmRequestTransformerContext>) -> FnResult<Json<types::WasmTransformerResponse>> {
///
}
#[derive(Serialize, Deserialize)]
pub struct WasmRequestTransformerContext {
pub snowflake: Option<String>,
pub raw_request: OtoroshiRequest,
pub otoroshi_request: OtoroshiRequest,
pub backend: Backend,
pub apikey: Option<Apikey>,
pub user: Option<User>,
pub request: RawRequest,
pub config: Value,
pub global_config: Value,
pub attrs: Value,
pub route: Route,
pub request_body_bytes: Option<Vec<u8>>,
}
WasmBackendCall
A backend call plugin can be used to simulate a backend behavior in otoroshi. For instance the static backend of otoroshi return the content of a file
use extism_pdk::*;
#[plugin_fn]
pub fn call_backend(Json(_context): Json<types::WasmQueryContext>) -> FnResult<Json<types::WasmQueryResponse>> {
///
}
#[derive(Serialize, Deserialize, Debug)]
pub struct WasmBackendContext {
pub snowflake: Option<String>,
pub backend: Backend,
pub apikey: Option<Apikey>,
pub user: Option<User>,
pub raw_request: RawRequest,
pub config: Value,
pub global_config: Value,
pub attrs: Value,
pub route: Route,
pub request_body_bytes: Option<Vec<u8>>,
pub request: OtoroshiRequest,
}
#[derive(Serialize, Deserialize)]
pub struct WasmBackendResponse {
pub headers: Option<HashMap<String, String>>,
pub body_bytes: Option<Vec<u8>>,
pub body_base64: Option<String>,
pub body_json: Option<Value>,
pub body_str: Option<String>,
pub status: u32,
}
WasmResponseTransformer
A response transformer plugin can be used to compose or transform the response that will be sent back to the client
use extism_pdk::*;
#[plugin_fn]
pub fn transform_response(Json(_context): Json<types::WasmResponseTransformerContext>) -> FnResult<Json<types::WasmTransformerResponse>> {
///
}
#[derive(Serialize, Deserialize)]
pub struct WasmResponseTransformerContext {
pub snowflake: Option<String>,
pub raw_response: OtoroshiResponse,
pub otoroshi_response: OtoroshiResponse,
pub apikey: Option<Apikey>,
pub user: Option<User>,
pub request: RawRequest,
pub config: Value,
pub global_config: Value,
pub attrs: Value,
pub route: Route,
pub response_body_bytes: Option<Vec<u8>>,
}
#[derive(Serialize, Deserialize)]
pub struct WasmTransformerResponse {
pub headers: HashMap<String, String>,
pub cookies: Value,
pub body_bytes: Option<Vec<u8>>,
pub body_base64: Option<String>,
pub body_json: Option<Value>,
pub body_str: Option<String>,
}
WasmSink
A sink is a kind of plugin that can be used to respond to any unmatched request before otoroshi sends back a 404 response
use extism_pdk::*;
#[plugin_fn]
pub fn sink_matches(Json(_context): Json<types::WasmSinkContext>) -> FnResult<Json<types::WasmSinkMatchesResponse>> {
///
}
#[plugin_fn]
pub fn sink_handle(Json(_context): Json<types::WasmSinkContext>) -> FnResult<Json<types::WasmSinkHandleResponse>> {
///
}
#[derive(Serialize, Deserialize)]
pub struct WasmSinkContext {
pub snowflake: Option<String>,
pub request: RawRequest,
pub config: Value,
pub global_config: Value,
pub attrs: Value,
pub origin: String,
pub status: u32,
pub message: String,
}
#[derive(Serialize, Deserialize)]
pub struct WasmSinkMatchesResponse {
pub result: bool,
}
#[derive(Serialize, Deserialize)]
pub struct WasmSinkHandleResponse {
pub status: u32,
pub headers: HashMap<String, String>,
pub body_bytes: Option<Vec<u8>>,
pub body_base64: Option<String>,
pub body_json: Option<Value>,
pub body_str: Option<String>,
}
WasmRequestHandler
A request handler is a very special kind of plugin that can bypass the otoroshi proxy engine on specific domains and completely handles the request/response lifecycle on it’s own.
use extism_pdk::*;
#[plugin_fn]
pub fn can_handle_request(Json(_context): Json<types::WasmRequestHandlerContext>) -> FnResult<Json<types::WasmSinkMatchesResponse>> {
///
}
#[plugin_fn]
pub fn handle_request(Json(_context): Json<types::WasmRequestHandlerContext>) -> FnResult<Json<types::WasmRequestHandlerResponse>> {
///
}
#[derive(Serialize, Deserialize, Debug)]
pub struct WasmRequestHandlerContext {
pub request: RawRequest
}
#[derive(Serialize, Deserialize, Debug)]
pub struct WasmRequestHandlerResponse {
pub status: u32,
pub headers: HashMap<String, String>,
pub body_bytes: Option<Vec<u8>>,
pub body_base64: Option<String>,
pub body_json: Option<Value>,
pub body_str: Option<String>,
}
WasmJob
A job is a plugin that can run periodically an do whatever you want. Typically, the kubernetes plugins of otoroshi are jobs that periodically sync stuff between otoroshi and kubernetes using the kube-api
use extism_pdk::*;
#[plugin_fn]
pub fn job_run(Json(_context): Json<types::WasmJobContext>) -> FnResult<Json<types::WasmJobResult>> {
///
}
#[derive(Serialize, Deserialize, Debug)]
pub struct WasmJobContext {
pub attrs: Value,
pub global_config: Value,
pub snowflake: Option<String>,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct WasmJobResult {
}
Common types
use serde::{Deserialize, Serialize};
use serde_json::Value;
use std::collections::HashMap;
#[derive(Serialize, Deserialize, Debug)]
pub struct Backend {
pub id: String,
pub hostname: String,
pub port: u32,
pub tls: bool,
pub weight: u32,
pub protocol: String,
pub ip_address: Option<String>,
pub predicate: Value,
pub tls_config: Value,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct Apikey {
#[serde(alias = "clientId")]
pub client_id: String,
#[serde(alias = "clientName")]
pub client_name: String,
pub metadata: HashMap<String, String>,
pub tags: Vec<String>,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct User {
pub name: String,
pub email: String,
pub profile: Value,
pub metadata: HashMap<String, String>,
pub tags: Vec<String>,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct RawRequest {
pub id: u32,
pub method: String,
pub headers: HashMap<String, String>,
pub cookies: Value,
pub tls: bool,
pub uri: String,
pub path: String,
pub version: String,
pub has_body: bool,
pub remote: String,
pub client_cert_chain: Value,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct Frontend {
pub domains: Vec<String>,
pub strict_path: Option<String>,
pub exact: bool,
pub headers: HashMap<String, String>,
pub query: HashMap<String, String>,
pub methods: Vec<String>,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct HealthCheck {
pub enabled: bool,
pub url: String,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct RouteBackend {
pub targets: Vec<Backend>,
pub root: String,
pub rewrite: bool,
pub load_balancing: Value,
pub client: Value,
pub health_check: Option<HealthCheck>,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct Route {
pub id: String,
pub name: String,
pub description: String,
pub tags: Vec<String>,
pub metadata: HashMap<String, String>,
pub enabled: bool,
pub debug_flow: bool,
pub export_reporting: bool,
pub capture: bool,
pub groups: Vec<String>,
pub frontend: Frontend,
pub backend: RouteBackend,
pub backend_ref: Option<String>,
pub plugins: Value,
}
#[derive(Serialize, Deserialize)]
pub struct OtoroshiResponse {
pub status: u32,
pub headers: HashMap<String, String>,
pub cookies: Value,
}
#[derive(Serialize, Deserialize, Debug)]
pub struct OtoroshiRequest {
pub url: String,
pub method: String,
pub headers: HashMap<String, String>,
pub version: String,
pub client_cert_chain: Value,
pub backend: Option<Backend>,
pub cookies: Value,
}
Otoroshi interop. with host functions
otoroshi provides some host function in order make wasm interact with otoroshi internals. You can
- access wasi resources
- access http resources
- access otoroshi internal state
- access otoroshi internal configuration
- access otoroshi static configuration
- access plugin scoped in-memory key/value storage
- access global in-memory key/value storage
- access plugin scoped persistent key/value storage
- access global persistent key/value storage
authorizations
all the previously listed host functions are enabled with specific authorizations to avoid security issues with third party plugins. You can enable/disable the host function from the wasm plugin entity
host functions abi
you’ll find here the raw signatures for the otoroshi host functions. we are currently in the process of writing higher level functions to hide the complexity.
every time you the the following signature: (context: u64, size: u64) -> u64
it means that otoroshi is expecting for a pointer to the call context (which is a json string) and it’s size. The return is a pointer to the response (which is a json string).
the signature (unused: u64) -> u64
means that there is no need for a params but as we technically need one (and hope to don’t need one in the future), you have to pass something like 0
as parameter.
extern "C" {
// log messages in otoroshi (log levels are 0 to 6 for trace, debug, info, warn, error, critical, max)
fn proxy_log(logLevel: i32, message: u64, size: u64) -> i32;
// trigger an otoroshi wasm event that can be exported through data exporters
fn proxy_log_event(context: u64, size: u64) -> u64;
// an http client
fn proxy_http_call(context: u64, size: u64) -> u64;
// access the current otoroshi state containing a snapshot of all otoroshi entities
fn proxy_state(context: u64) -> u64;
fn proxy_state_value(context: u64, size: u64) -> u64;
// access the current otoroshi cluster configuration
fn proxy_cluster_state(context: u64) -> u64;
fn proxy_cluster_state_value(context: u64, size: u64) -> u64;
// access the current otoroshi static configuration
fn proxy_global_config(unused: u64) -> u64;
// access the current otoroshi dynamic configuration
fn proxy_config(unused: u64) -> u64;
// access a persistent key/value store shared by every wasm plugins
fn proxy_datastore_keys(context: u64, size: u64) -> u64;
fn proxy_datastore_get(context: u64, size: u64) -> u64;
fn proxy_datastore_exists(context: u64, size: u64) -> u64;
fn proxy_datastore_pttl(context: u64, size: u64) -> u64;
fn proxy_datastore_setnx(context: u64, size: u64) -> u64;
fn proxy_datastore_del(context: u64, size: u64) -> u64;
fn proxy_datastore_incrby(context: u64, size: u64) -> u64;
fn proxy_datastore_pexpire(context: u64, size: u64) -> u64;
fn proxy_datastore_all_matching(context: u64, size: u64) -> u64;
// access a persistent key/value store for the current plugin instance only
fn proxy_plugin_datastore_keys(context: u64, size: u64) -> u64;
fn proxy_plugin_datastore_get(context: u64, size: u64) -> u64;
fn proxy_plugin_datastore_exists(context: u64, size: u64) -> u64;
fn proxy_plugin_datastore_pttl(context: u64, size: u64) -> u64;
fn proxy_plugin_datastore_setnx(context: u64, size: u64) -> u64;
fn proxy_plugin_datastore_del(context: u64, size: u64) -> u64;
fn proxy_plugin_datastore_incrby(context: u64, size: u64) -> u64;
fn proxy_plugin_datastore_pexpire(context: u64, size: u64) -> u64;
fn proxy_plugin_datastore_all_matching(context: u64, size: u64) -> u64;
// access an in memory key/value store for the current plugin instance only
fn proxy_plugin_map_set(context: u64, size: u64) -> u64;
fn proxy_plugin_map_get(context: u64, size: u64) -> u64;
fn proxy_plugin_map(unused: u64) -> u64;
// access an in memory key/value store shared by every wasm plugins
fn proxy_global_map_set(context: u64, size: u64) -> u64;
fn proxy_global_map_get(context: u64, size: u64) -> u64;
fn proxy_global_map(unused: u64) -> u64;
}
right know, when using the Wasmo, a default idiomatic implementation is provided for TinyGo
and Rust
- host.rs
-
/// logs pub fn log(level: i32, msg: String) pub fn log_event(level: i32, function: String, message: String) /// static config access api pub fn static_config() -> Option<serde_json::Map<String, serde_json::Value>> pub fn static_config_at(path: &str) -> Option<serde_json::Value> /// global config access api pub fn global_config() -> Option<serde_json::Map<String, serde_json::Value>> pub fn global_config_at(path: &str) -> Option<serde_json::Value> /// cluster config access api pub fn cluster_config() -> Option<serde_json::Map<String, serde_json::Value>> pub fn cluster_config_value(path: &str) -> Option<serde_json::Map<String, serde_json::Value>> pub fn cluster_config_at(path: &str) -> Option<serde_json::Value> //// state access api pub fn state() -> Option<serde_json::Map<String, serde_json::Value>> pub fn state_value(entity: &str, id: &str) -> Option<serde_json::Map<String, serde_json::Value>> pub fn state_at(path: &str) -> Option<serde_json::Value> //// plugin memory api pub fn plugin_mem() -> Option<HashMap<String, Vec<u8>>> pub fn plugin_mem_get(key: &str) -> Option<Vec<u8>> pub fn plugin_mem_del(key: &str) pub fn plugin_mem_set(key: &str, value: Vec<u8>) pub fn plugin_mem_set_string(key: &str, value: String) pub fn plugin_mem_get_string(key: &str) -> Option<String> pub fn plugin_mem_set_json(key: &str, value: serde_json::Value) pub fn plugin_mem_get_json(key: &str) -> Option<serde_json::Value> pub fn plugin_mem_set_bool(key: &str, value: bool) pub fn plugin_mem_get_bool(key: &str) -> Option<bool> //// shared memory api pub fn shared_mem() -> Option<HashMap<String, Vec<u8>>> pub fn shared_mem_get(key: &str) -> Option<Vec<u8>> pub fn shared_mem_del(key: &str) pub fn shared_mem_set(key: &str, value: Vec<u8>) pub fn shared_mem_set_string(key: &str, value: String) pub fn shared_mem_get_string(key: &str) -> Option<String> pub fn shared_mem_set_json(key: &str, value: serde_json::Value) pub fn shared_mem_get_json(key: &str) -> Option<serde_json::Value> pub fn shared_mem_set_bool(key: &str, value: bool) pub fn shared_mem_get_bool(key: &str) -> Option<bool> /// datastore access api pub fn datastore_set(key: &str, value: Vec<u8>, ttl: Option<u64>) pub fn datastore_setnx(key: &str, value: Vec<u8>, ttl: Option<u64>) pub fn datastore_get(key: &str) -> Option<Vec<u8>> pub fn datastore_exists(key: &str) -> bool pub fn datastore_pttl(key: &str) -> u64 pub fn datastore_del(keys: Vec<&str>) pub fn datastore_incrby(key: &str, incr: u64) -> u64 pub fn datastore_pexpire(key: &str, ttl: u64) pub fn datastore_keys(pattern: &str) -> Vec<String> pub fn datastore_all_matching(pattern: &str) -> Vec<Vec<u8>> pub fn datastore_all_matching_string(pattern: &str) -> Vec<String> pub fn datastore_all_matching_json(pattern: &str) -> Vec<serde_json::Value> /// plugin scoped datastore access api pub fn plugin_datastore_set(key: &str, value: Vec<u8>, ttl: Option<u64>) pub fn plugin_datastore_setnx(key: &str, value: Vec<u8>, ttl: Option<u64>) pub fn plugin_datastore_get(key: &str) -> Option<Vec<u8>> pub fn plugin_datastore_exists(key: &str) -> bool pub fn plugin_datastore_pttl(key: &str) -> u64 pub fn plugin_datastore_del(keys: Vec<&str>) pub fn plugin_datastore_incrby(key: &str, incr: u64) -> u64 pub fn plugin_datastore_pexpire(key: &str, ttl: u64) pub fn plugin_datastore_keys(pattern: &str) -> Vec<String> pub fn plugin_datastore_all_matching(pattern: &str) -> Vec<Vec<u8>> pub fn plugin_datastore_all_matching_string(pattern: &str) -> Vec<String> pub fn plugin_datastore_all_matching_json(pattern: &str) -> Vec<serde_json::Value> /// http client api pub fn http_call(req: OtoroshiHttpRequest) -> Option<OtoroshiHttpResponse>
- host.go
-
// PLUGIN MAP func ProxyPluginMapSet(key string, value string) func ProxyPluginMapGet(key string) []byte func ProxyPluginMap() map[string][]byte // GLOBAL PLUGIN MAP func ProxyGlobalMapSet(key string, value string) func ProxyGlobalMapGet(key string) []byte func ProxyGlobalMap() map[string][]byte // PLUGIN DATASTORE func ProxyPluginDatastoreKeys(key string) []byte func ProxyPluginDataStoreGet(key string) []byte func ProxyPluginDataStoreExists(key string) bool func ProxyPluginDataStorePttl(key string) uint64 func ProxyPluginDataStoreSetnx(value []byte) func ProxyPluginDataStoreDel(keys ...string) func ProxyPluginDataStoreIncrby(key string, incr int) func ProxyPluginDataStorePexpire(key string, pttl int64) func ProxyPluginDataStoreAllMatching(key string) []byte // PROXY DATASTORE func ProxyDatastoreKeys(key string) []byte func ProxyDataStoreGet(key string) []byte func ProxyDataStoreExists(key string) bool func ProxyDataStorePttl(key string) uint64 func ProxyDataStoreSetnx(value []byte) func ProxyDataStoreDel(keys ...string) func ProxyDataStoreIncrby(key string, incr int) func ProxyDataStorePexpire(key string, pttl int64) func ProxyDataStoreAllMatching(key string) []byte // cluster config func ClusterState() []byte func ClusterStateField(field string) []byte // proxy state func ProxyState() []byte func ProxyStateEntities(entity string) []byte func ProxyStateEntity(entity string, id string) []byte // logs func Log(logLevel LogLevel, message string) Status func LogBool(logLevel LogLevel, message bool) Status func LogLong(logLevel LogLevel, message uint64) Status func LogBytes(logLevel LogLevel, message []byte) Status func LogEvent(function string, message string, level LogLevel) Status