2020-11-25 13:01:53 +02:00
|
|
|
// Package session provides functions for sessions of incoming requests.
|
2020-12-04 03:36:16 +02:00
|
|
|
package session // import "github.com/xtls/xray-core/common/session"
|
2020-11-25 13:01:53 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"math/rand"
|
|
|
|
|
2020-12-04 03:36:16 +02:00
|
|
|
"github.com/xtls/xray-core/common/errors"
|
|
|
|
"github.com/xtls/xray-core/common/net"
|
|
|
|
"github.com/xtls/xray-core/common/protocol"
|
2020-12-05 13:58:10 +02:00
|
|
|
"github.com/xtls/xray-core/common/signal"
|
2020-11-25 13:01:53 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// ID of a session.
|
|
|
|
type ID uint32
|
|
|
|
|
|
|
|
// NewID generates a new ID. The generated ID is high likely to be unique, but not cryptographically secure.
|
|
|
|
// The generated ID will never be 0.
|
|
|
|
func NewID() ID {
|
|
|
|
for {
|
|
|
|
id := ID(rand.Uint32())
|
|
|
|
if id != 0 {
|
|
|
|
return id
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ExportIDToError transfers session.ID into an error object, for logging purpose.
|
|
|
|
// This can be used with error.WriteToLog().
|
|
|
|
func ExportIDToError(ctx context.Context) errors.ExportOption {
|
|
|
|
id := IDFromContext(ctx)
|
|
|
|
return func(h *errors.ExportOptionHolder) {
|
|
|
|
h.SessionID = uint32(id)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Inbound is the metadata of an inbound connection.
|
|
|
|
type Inbound struct {
|
|
|
|
// Source address of the inbound connection.
|
|
|
|
Source net.Destination
|
2021-10-12 19:49:05 +03:00
|
|
|
// Gateway address.
|
2020-11-25 13:01:53 +02:00
|
|
|
Gateway net.Destination
|
|
|
|
// Tag of the inbound proxy that handles the connection.
|
|
|
|
Tag string
|
|
|
|
// User is the user that authencates for the inbound. May be nil if the protocol allows anounymous traffic.
|
|
|
|
User *protocol.MemoryUser
|
2020-12-05 13:58:10 +02:00
|
|
|
// Conn is actually internet.Connection. May be nil.
|
2020-12-04 03:36:16 +02:00
|
|
|
Conn net.Conn
|
2020-12-05 13:58:10 +02:00
|
|
|
// Timer of the inbound buf copier. May be nil.
|
|
|
|
Timer *signal.ActivityTimer
|
2020-11-25 13:01:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Outbound is the metadata of an outbound connection.
|
|
|
|
type Outbound struct {
|
|
|
|
// Target address of the outbound connection.
|
2021-09-16 10:05:48 +03:00
|
|
|
Target net.Destination
|
|
|
|
RouteTarget net.Destination
|
2020-11-25 13:01:53 +02:00
|
|
|
// Gateway address
|
|
|
|
Gateway net.Address
|
|
|
|
}
|
|
|
|
|
|
|
|
// SniffingRequest controls the behavior of content sniffing.
|
|
|
|
type SniffingRequest struct {
|
2021-01-21 22:50:09 +02:00
|
|
|
ExcludeForDomain []string
|
2020-11-25 13:01:53 +02:00
|
|
|
OverrideDestinationForProtocol []string
|
|
|
|
Enabled bool
|
2021-03-07 06:39:50 +02:00
|
|
|
MetadataOnly bool
|
2021-09-16 10:05:48 +03:00
|
|
|
RouteOnly bool
|
2020-11-25 13:01:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Content is the metadata of the connection content.
|
|
|
|
type Content struct {
|
|
|
|
// Protocol of current content.
|
|
|
|
Protocol string
|
|
|
|
|
|
|
|
SniffingRequest SniffingRequest
|
|
|
|
|
|
|
|
Attributes map[string]string
|
|
|
|
|
2021-10-16 16:02:51 +03:00
|
|
|
SkipDNSResolve bool
|
2020-11-25 13:01:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Sockopt is the settings for socket connection.
|
|
|
|
type Sockopt struct {
|
|
|
|
// Mark of the socket connection.
|
|
|
|
Mark int32
|
|
|
|
}
|
|
|
|
|
2022-02-03 02:57:32 +02:00
|
|
|
// SetAttribute attaches additional string attributes to content.
|
2020-11-25 13:01:53 +02:00
|
|
|
func (c *Content) SetAttribute(name string, value string) {
|
|
|
|
if c.Attributes == nil {
|
|
|
|
c.Attributes = make(map[string]string)
|
|
|
|
}
|
|
|
|
c.Attributes[name] = value
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attribute retrieves additional string attributes from content.
|
|
|
|
func (c *Content) Attribute(name string) string {
|
|
|
|
if c.Attributes == nil {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
return c.Attributes[name]
|
|
|
|
}
|