Skip to main content
Service extensions are custom Go functions that you inject at specific hook points in the Orchestrator’s request processing pipeline. They use Go syntax but execute within an embedded Go runtime inside the Orchestrator process — you do not compile or build plugins. Service extension code cannot run independently outside the Orchestrator. Service extensions let you customize authentication, authorization, claims building, routing, session management, and API handling without modifying the Orchestrator itself. The Orchestrator provides 30 hook points across the request lifecycle, organized by concern in the pages below.

How Service Extensions Work

When the Orchestrator starts, it loads your Go source code and executes it through an embedded Go runtime. At each configured hook point, the Orchestrator calls your named function, passing an api parameter that provides access to the full Orchestrator interface — sessions, caches, secrets, identity providers, logging, and more. Service extension code can be delivered in two ways:
  • File reference — point to an external .go source file on disk. Preferred for production use because it supports version control, IDE tooling, and independent testing.
  • Inline code — embed Go source directly in the YAML configuration. Convenient for short, self-contained extensions.
The basic function signature follows this pattern:
package main

import (
    "net/http"
    "github.com/strata-io/service-extension/orchestrator"
)

func MyExtension(api orchestrator.Orchestrator, rw http.ResponseWriter, req *http.Request) {
    // Custom logic here
}
The exact function signature varies by hook point. Some hooks omit the rw or req parameters, some return an error. Refer to the individual hook pages below or the SDK documentation for each hook’s expected signature.

Configuration

Each service extension hook accepts a ServiceExtension object with the following structure:
someHookSE:
  funcName: MyFunction
  file: /path/to/extension.go
  metadata:
    key: value
You can provide code inline instead of referencing a file:
someHookSE:
  funcName: MyFunction
  code: |
    package main

    import (
        "net/http"
        "github.com/strata-io/service-extension/orchestrator"
    )

    func MyFunction(api orchestrator.Orchestrator, rw http.ResponseWriter, req *http.Request) {
        // custom logic
    }

Field Reference

KeyTypeDefaultRequiredDescription
funcNamestringYesName of the Go function to call
codestringOne of code or fileInline Go source code
filestringOne of code or filePath to a .go source file
metadatamapNoKey-value metadata passed to the service extension at runtime
goPathstringNoGo path for locating additional packages
allowedProtectedPackagesarray of strings[]NoProtected packages to allow (e.g., "os") — see Runtime Environment
Either code or file must be provided, but not both.

The Service Extension SDK

The Service Extension SDK is a Go module that provides typed interfaces for interacting with Orchestrator services from within your extension code.

SDK Interfaces

The api parameter passed to your extension function implements the orchestrator.Orchestrator interface, which provides access to all subsystem interfaces:
InterfaceAccess ViaPurpose
Orchestratorapi parameterMain entry point — provides access to all other interfaces
Sessionapi.Session()Read/write session attributes (GetString, SetString, GetBool, SetBool, GetInt, SetInt, GetJSON, SetJSON, Save)
Loggerapi.Logger()Structured logging with Debug, Info, Error and key-value pairs
Cacheapi.Cache()Read/write cache entries with TTL (GetBytes, SetBytes)
SecretProviderapi.SecretProvider()Retrieve secrets from configured providers (Get, GetString)
IdentityProviderapi.IdentityProvider()Trigger authentication flows (Login, IsAvailable)
AttributeProviderapi.AttributeProvider()Query user attributes from connectors (Query)
Routerapi.Router()Register custom HTTP handlers (HandleFunc)
HTTPapi.HTTP()Access HTTP clients for outbound requests (GetClient, SetClient, DefaultClient)
Appapi.App()Access current application metadata (Name)
Bundle/Assetsapi.Bundle()Access bundled static files (FS, ReadFile)
TAI/WebLogic (deprecated)api.TAI()WebSphere Trust Association Interceptor operations (NewSignedJWT)
For complete interface definitions, method signatures, and type details, see the SDK reference on pkg.go.dev.

Hook Points

The Orchestrator provides 30 service extension hook points organized by lifecycle area. Each hook is a field on the relevant configuration object. Select a hook name to see its full signature, parameters, and usage details.

API Lifecycle

HookConfig LocationPurpose
serveSEapis[].serveSEHandle custom API endpoint requests
See Custom APIs for the apis[] configuration.

Proxy App Lifecycle

These hooks are available on apps with type: proxy:
HookConfig LocationPurpose
isAuthenticatedSEapps[].policies[].authentication.isAuthenticatedSECustom authentication check
authenticateSEapps[].policies[].authentication.authenticateSECustom authentication flow
isAuthorizedSEapps[].policies[].authorization.isAuthorizedSECustom authorization logic
handleUnauthorizedSEapps[].handleUnauthorizedSECustomize the unauthorized response
loadAttrsSEapps[].loadAttrsSELoad custom attributes before request processing
createHeaderSEapps[].headers[].createHeaderSEGenerate custom header values
modifyRequestSEapps[].modifyRequestSEModify the request before proxying to the upstream
modifyResponseSEapps[].modifyResponseSEModify the response before returning to the client
isLoggedInSE / loginSEapps[].upstreamLogin.isLoggedInSE / apps[].upstreamLogin.loginSEUpstream application login automation

OIDC App Lifecycle

These hooks are available on apps with type: oidc:
HookConfig LocationPurpose
isAuthenticatedSEapps[].authentication.isAuthenticatedSECustom authentication check
authenticateSEapps[].authentication.authenticateSECustom authentication flow
authenticateSEapps[].authentication.backchannel.authenticateSEBackchannel authentication (e.g., Resource Owner Password Credentials)
isAuthorizedSEapps[].authorization.isAuthorizedSECustom authorization logic
loadAttrsSEapps[].loadAttrsSELoad custom attributes before token issuance
buildIDTokenClaimsSEapps[].buildIDTokenClaimsSECustomize ID token claims
buildAccessTokenClaimsSEapps[].buildAccessTokenClaimsSECustomize access token claims

OIDC Provider Level

HookConfig LocationPurpose
buildUserInfoClaimsSEoidcProvider.buildUserInfoClaimsSECustomize the UserInfo endpoint response

SAML App Lifecycle

These hooks are available on apps with type: saml:
HookConfig LocationPurpose
isAuthenticatedSEapps[].authentication.isAuthenticatedSECustom authentication check (cannot be used with idps)
authenticateSEapps[].authentication.authenticateSECustom authentication flow (cannot be used with idps)
isAuthorizedSEapps[].authorization.isAuthorizedSECustom authorization logic
loadAttrsSEapps[].loadAttrsSELoad custom attributes before assertion building
buildClaimsSEapps[].buildClaimsSECustomize SAML assertion claims
buildRelayStateSEapps[].idpInitiatedLogin.buildRelayStateSEBuild custom RelayState for IdP-initiated login

LDAP Provider Lifecycle

These hooks are available on the ldapProvider configuration:
HookConfig LocationPurpose
searchSEldapProvider.search.searchSEHandle LDAP search operations
authenticateSEldapProvider.authentication.methods.simple.authenticateSEAuthenticate via simple LDAP bind
getHashedCredentialsSEldapProvider.authentication.methods.sasl.mechanisms.gssspnego.ntlm.getHashedCredentialsSERetrieve hashed credentials for NTLM authentication

Session Lifecycle

HookConfig LocationPurpose
evalIdleTimeoutSEsession.lifetime.evalIdleTimeoutSEDynamically evaluate session idle timeout
evalMaxLifetimeSEsession.lifetime.evalMaxLifetimeSEDynamically evaluate session max lifetime

Single Logout

HookConfig LocationPurpose
postLogoutSEsingleLogout.postLogout.postLogoutSECustom behavior after single logout completes

Writing a Service Extension

The following example shows a LoadCustomAttrs function that queries an attribute provider for user attributes and stores the results in the session:
package main

import (
    "net/http"
    "github.com/strata-io/service-extension/orchestrator"
)

func LoadCustomAttrs(api orchestrator.Orchestrator, rw http.ResponseWriter, req *http.Request) error {
    log := api.Logger()

    attrProvider, err := api.AttributeProvider("ldap")
    if err != nil {
        log.Error("se", "failed to get attribute provider", "error", err.Error())
        return err
    }

    attrs, err := attrProvider.Query("", []string{"mail", "displayName", "memberOf"})
    if err != nil {
        log.Error("se", "failed to query attributes", "error", err.Error())
        return err
    }

    session, err := api.Session()
    if err != nil {
        log.Error("se", "failed to get session", "error", err.Error())
        return err
    }

    session.SetString("email", attrs["mail"])
    session.SetString("displayName", attrs["displayName"])
    session.SetJSON("groups", attrs["memberOf"])

    if err := session.Save(); err != nil {
        log.Error("se", "failed to save session", "error", err.Error())
        return err
    }

    return nil
}
Reference the extension from your YAML configuration:
apps:
  - name: my-app
    type: proxy
    upstream: https://backend.example.com
    loadAttrsSE:
      funcName: LoadCustomAttrs
      file: /etc/maverics/extensions/load-attrs.go
Use file for production deployments — it keeps extension code in version control and enables IDE support. Use inline code for short, self-contained extensions where a separate file adds unnecessary overhead.

Runtime Environment

Service extension code runs through the Orchestrator’s embedded Go runtime. Code is interpreted at runtime — there is no compile step.

Available Packages

By default, service extensions have access to:
  • Go standard library (except os, which is restricted by default)
  • Service Extension SDK — packages under service-extension/ providing access to Orchestrator services:
    • orchestrator — access to the Orchestrator instance (session, cache, secrets, connectors, router)
    • session — read and write session attributes
    • cache — read and write cache entries
    • secret — retrieve secrets from configured secret providers
    • log — structured logging
    • router — request routing
    • idfabric — identity fabric integration
    • tai — WebSphere Trust Association Interceptor (deprecated)
    • weblogic — WebLogic integration
  • Third-party libraries — LDAP, JWT, UUID, AWS SDK, HTML parser, NTLM, secp256k1

Protected Packages

The os package is restricted by default to prevent file system and process access. To opt in, add it to allowedProtectedPackages:
someHookSE:
  funcName: ReadConfig
  file: /path/to/extension.go
  allowedProtectedPackages:
    - os

Best Practices

Error Handling

Always check and handle errors returned by SDK methods. Log errors with sufficient context to diagnose issues in production. A panicking extension can disrupt the Orchestrator’s request processing for the affected hook point.
attrs, err := api.AttributeProvider("ldap").Query("", []string{"mail"})
if err != nil {
    api.Logger().Error("se", "attribute query failed", "provider", "ldap", "error", err.Error())
    return
}

Logging

Use the SDK logger (api.Logger()) instead of fmt.Println or the standard log package. The SDK logger integrates with the Orchestrator’s structured logging pipeline and supports key-value pairs for searchable log entries.
log := api.Logger()
log.Info("se", "processing request", "app", api.App().Name(), "user", email)

Secrets Management

Use api.SecretProvider() to retrieve secrets at runtime from configured providers (Vault, AWS Secrets Manager, Azure Key Vault, etc.). Never hardcode credentials, API keys, or certificates in extension code.
apiKey, err := api.SecretProvider().GetString("my-api-key")
if err != nil {
    api.Logger().Error("se", "failed to retrieve API key", "error", err.Error())
    return
}

Performance

Keep extensions lightweight, especially in hot-path hooks like modifyRequestSE and modifyResponseSE that execute on every proxied request. Use api.Cache() for expensive lookups to avoid redundant calls to external systems.

Statelessness

Do not rely on global variables or package-level state between requests. The Orchestrator may run multiple instances, and the runtime does not guarantee state persistence across configuration reloads. Use api.Session() for request-scoped state and api.Cache() for cross-request state.

Testing and Deployment

Follow a staged workflow to minimize risk when deploying service extensions:
  1. Develop locally — write and test your extension code against the SDK interfaces. Use Go tooling (formatting, linting, type checking) during development even though extensions run interpreted.
  2. Deploy to staging — deploy the extension to a non-production Orchestrator instance connected to test identity providers and backend services.
Static analysis limitations: Because service extensions execute inside the Orchestrator’s embedded runtime with injected SDK interfaces, standard static code analysis tools (SAST, linters with security rules) may not produce meaningful results. The most effective way to validate security behavior is to deploy your extension to a test environment and exercise the actual authentication, authorization, and data-handling scenarios your extension participates in.
  1. Verify behavior — use structured logging (api.Logger()) to trace extension execution. Check Orchestrator logs for errors, unexpected behavior, or performance issues.
  2. Promote to production — after verifying correct behavior in staging, deploy the extension to production. Monitor Orchestrator logs after deployment for errors from extension code.
Service extensions execute custom user-authored code within the Orchestrator process. You are responsible for the correctness, security, and performance of your extension code. Strata provides the Service Extension SDK and runtime environment but does not audit, review, or warranty custom extension logic.