From 3bc563955fe0755b94e35822e60aaa49a6917945 Mon Sep 17 00:00:00 2001 From: bivashy Date: Wed, 1 Oct 2025 02:40:12 +0500 Subject: [PATCH] Initial working implementation of HLS proxy --- .env | 2 + .gitattributes | 2 + .gitignore | 33 ++ .mvn/wrapper/maven-wrapper.properties | 3 + Dockerfile.prod | 50 +++ bin/pom.xml | 78 +++++ compose.yml | 20 ++ mvnw | 295 ++++++++++++++++++ mvnw.cmd | 189 +++++++++++ pom.xml | 120 +++++++ .../hls/proxy/HlsProxyApplication.java | 13 + .../backend/hls/proxy/config/CacheConfig.java | 18 ++ .../hls/proxy/config/ParserConfig.java | 22 ++ .../backend/hls/proxy/config/RedisConfig.java | 24 ++ .../hls/proxy/config/RetrieverConfig.java | 20 ++ .../hls/proxy/controller/ProxyController.java | 30 ++ .../controller/ProxyServeController.java | 118 +++++++ .../proxy/exception/FetchFailException.java | 17 + .../exception/PlaylistParseException.java | 7 + .../com/backend/hls/proxy/model/Link.java | 40 +++ .../backend/hls/proxy/model/RangeRequest.java | 74 +++++ .../hls/proxy/model/SimpleResponse.java | 22 ++ .../hls/proxy/repository/LinkRepository.java | 13 + .../hls/proxy/service/FetchService.java | 107 +++++++ .../proxy/service/PlaylistParseService.java | 52 +++ .../proxy/service/PlaylistProxyService.java | 170 ++++++++++ .../hls/proxy/service/URLForwardService.java | 39 +++ src/main/resources/application.properties | 3 + .../hls/proxy/HlsProxyApplicationTests.java | 13 + 29 files changed, 1594 insertions(+) create mode 100644 .env create mode 100644 .gitattributes create mode 100644 .gitignore create mode 100644 .mvn/wrapper/maven-wrapper.properties create mode 100644 Dockerfile.prod create mode 100644 bin/pom.xml create mode 100644 compose.yml create mode 100755 mvnw create mode 100644 mvnw.cmd create mode 100644 pom.xml create mode 100644 src/main/java/com/backend/hls/proxy/HlsProxyApplication.java create mode 100644 src/main/java/com/backend/hls/proxy/config/CacheConfig.java create mode 100644 src/main/java/com/backend/hls/proxy/config/ParserConfig.java create mode 100644 src/main/java/com/backend/hls/proxy/config/RedisConfig.java create mode 100644 src/main/java/com/backend/hls/proxy/config/RetrieverConfig.java create mode 100644 src/main/java/com/backend/hls/proxy/controller/ProxyController.java create mode 100644 src/main/java/com/backend/hls/proxy/controller/ProxyServeController.java create mode 100644 src/main/java/com/backend/hls/proxy/exception/FetchFailException.java create mode 100644 src/main/java/com/backend/hls/proxy/exception/PlaylistParseException.java create mode 100644 src/main/java/com/backend/hls/proxy/model/Link.java create mode 100644 src/main/java/com/backend/hls/proxy/model/RangeRequest.java create mode 100644 src/main/java/com/backend/hls/proxy/model/SimpleResponse.java create mode 100644 src/main/java/com/backend/hls/proxy/repository/LinkRepository.java create mode 100644 src/main/java/com/backend/hls/proxy/service/FetchService.java create mode 100644 src/main/java/com/backend/hls/proxy/service/PlaylistParseService.java create mode 100644 src/main/java/com/backend/hls/proxy/service/PlaylistProxyService.java create mode 100644 src/main/java/com/backend/hls/proxy/service/URLForwardService.java create mode 100644 src/main/resources/application.properties create mode 100644 src/test/java/com/backend/hls/proxy/HlsProxyApplicationTests.java diff --git a/.env b/.env new file mode 100644 index 0000000..47289e6 --- /dev/null +++ b/.env @@ -0,0 +1,2 @@ +EUREKA_SCHEMA=http +EUREKA_HOST=anyame-vue-bff:8080 diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 0000000..3b41682 --- /dev/null +++ b/.gitattributes @@ -0,0 +1,2 @@ +/mvnw text eol=lf +*.cmd text eol=crlf diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..667aaef --- /dev/null +++ b/.gitignore @@ -0,0 +1,33 @@ +HELP.md +target/ +.mvn/wrapper/maven-wrapper.jar +!**/src/main/**/target/ +!**/src/test/**/target/ + +### STS ### +.apt_generated +.classpath +.factorypath +.project +.settings +.springBeans +.sts4-cache + +### IntelliJ IDEA ### +.idea +*.iws +*.iml +*.ipr + +### NetBeans ### +/nbproject/private/ +/nbbuild/ +/dist/ +/nbdist/ +/.nb-gradle/ +build/ +!**/src/main/**/build/ +!**/src/test/**/build/ + +### VS Code ### +.vscode/ diff --git a/.mvn/wrapper/maven-wrapper.properties b/.mvn/wrapper/maven-wrapper.properties new file mode 100644 index 0000000..c0bcafe --- /dev/null +++ b/.mvn/wrapper/maven-wrapper.properties @@ -0,0 +1,3 @@ +wrapperVersion=3.3.4 +distributionType=only-script +distributionUrl=https://repo.maven.apache.org/maven2/org/apache/maven/apache-maven/3.9.11/apache-maven-3.9.11-bin.zip diff --git a/Dockerfile.prod b/Dockerfile.prod new file mode 100644 index 0000000..f4eb52d --- /dev/null +++ b/Dockerfile.prod @@ -0,0 +1,50 @@ +# Build +FROM maven:3.9.6-eclipse-temurin-21 AS builder +WORKDIR /workspace +COPY pom.xml . +RUN --mount=type=cache,target=/root/.m2 mvn dependency:go-offline -B +COPY src ./src +RUN --mount=type=cache,target=/root/.m2 mvn clean package -DskipTests + +# Create optimized runtime +FROM eclipse-temurin:21 AS app-build +ENV RELEASE=21 + +WORKDIR /opt/build +COPY --from=builder /workspace/target/*.jar ./application.jar + +RUN java -Djarmode=layertools -jar application.jar extract +RUN $JAVA_HOME/bin/jlink \ + --add-modules $(jdeps --ignore-missing-deps -q -recursive --multi-release ${RELEASE} --print-module-deps -cp 'dependencies/BOOT-INF/lib/*' application.jar),jdk.crypto.ec,jdk.security.auth,jdk.crypto.cryptoki \ + --strip-debug \ + --no-man-pages \ + --no-header-files \ + --compress=2 \ + --output jdk + +# Run +FROM debian:bookworm-slim + +ARG BUILD_PATH=/opt/build +ENV JAVA_HOME=/opt/jdk +ENV PATH="${JAVA_HOME}/bin:${PATH}" + +RUN groupadd --gid 1000 spring-app \ + && useradd --uid 1000 --gid spring-app --shell /bin/bash --create-home spring-app + +RUN apt-get update && \ + apt-get install -y --no-install-recommends ca-certificates && \ + rm -rf /var/lib/apt/lists/* + +USER spring-app:spring-app +WORKDIR /opt/workspace + +COPY --from=app-build $BUILD_PATH/jdk $JAVA_HOME +COPY --from=app-build $BUILD_PATH/spring-boot-loader/ ./ +COPY --from=app-build $BUILD_PATH/dependencies/ ./ +COPY --from=app-build $BUILD_PATH/snapshot-dependencies/ ./ +COPY --from=app-build $BUILD_PATH/application/ ./ + +EXPOSE 8080/tcp +ENTRYPOINT ["java", "org.springframework.boot.loader.launch.JarLauncher"] + diff --git a/bin/pom.xml b/bin/pom.xml new file mode 100644 index 0000000..115e774 --- /dev/null +++ b/bin/pom.xml @@ -0,0 +1,78 @@ + + + 4.0.0 + + org.springframework.boot + spring-boot-starter-parent + 3.5.6 + + + com.backend.hls.proxy + hls-proxy + 0.0.1-SNAPSHOT + hls-proxy + HLS Proxy with prefetching + + + + + + + + + + + + + + + 21 + 2025.0.0 + + + + org.springframework.boot + spring-boot-starter-data-redis + + + org.springframework.boot + spring-boot-starter-data-rest + + + org.springframework.boot + spring-boot-starter-web + + + org.springframework.cloud + spring-cloud-starter-netflix-eureka-client + + + + org.springframework.boot + spring-boot-starter-test + test + + + + + + org.springframework.cloud + spring-cloud-dependencies + ${spring-cloud.version} + pom + import + + + + + + + + org.springframework.boot + spring-boot-maven-plugin + + + + + diff --git a/compose.yml b/compose.yml new file mode 100644 index 0000000..03059da --- /dev/null +++ b/compose.yml @@ -0,0 +1,20 @@ +services: + redis: + image: redis:alpine + networks: + - anyame-shared + + hls-proxy: + image: hls-proxy:latest + env_file: .env + ports: + - 8082:8080 + networks: + - anyame-shared + - elk-network + +networks: + anyame-shared: + external: true + elk-network: + external: true diff --git a/mvnw b/mvnw new file mode 100755 index 0000000..bd8896b --- /dev/null +++ b/mvnw @@ -0,0 +1,295 @@ +#!/bin/sh +# ---------------------------------------------------------------------------- +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. +# ---------------------------------------------------------------------------- + +# ---------------------------------------------------------------------------- +# Apache Maven Wrapper startup batch script, version 3.3.4 +# +# Optional ENV vars +# ----------------- +# JAVA_HOME - location of a JDK home dir, required when download maven via java source +# MVNW_REPOURL - repo url base for downloading maven distribution +# MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven +# MVNW_VERBOSE - true: enable verbose log; debug: trace the mvnw script; others: silence the output +# ---------------------------------------------------------------------------- + +set -euf +[ "${MVNW_VERBOSE-}" != debug ] || set -x + +# OS specific support. +native_path() { printf %s\\n "$1"; } +case "$(uname)" in +CYGWIN* | MINGW*) + [ -z "${JAVA_HOME-}" ] || JAVA_HOME="$(cygpath --unix "$JAVA_HOME")" + native_path() { cygpath --path --windows "$1"; } + ;; +esac + +# set JAVACMD and JAVACCMD +set_java_home() { + # For Cygwin and MinGW, ensure paths are in Unix format before anything is touched + if [ -n "${JAVA_HOME-}" ]; then + if [ -x "$JAVA_HOME/jre/sh/java" ]; then + # IBM's JDK on AIX uses strange locations for the executables + JAVACMD="$JAVA_HOME/jre/sh/java" + JAVACCMD="$JAVA_HOME/jre/sh/javac" + else + JAVACMD="$JAVA_HOME/bin/java" + JAVACCMD="$JAVA_HOME/bin/javac" + + if [ ! -x "$JAVACMD" ] || [ ! -x "$JAVACCMD" ]; then + echo "The JAVA_HOME environment variable is not defined correctly, so mvnw cannot run." >&2 + echo "JAVA_HOME is set to \"$JAVA_HOME\", but \"\$JAVA_HOME/bin/java\" or \"\$JAVA_HOME/bin/javac\" does not exist." >&2 + return 1 + fi + fi + else + JAVACMD="$( + 'set' +e + 'unset' -f command 2>/dev/null + 'command' -v java + )" || : + JAVACCMD="$( + 'set' +e + 'unset' -f command 2>/dev/null + 'command' -v javac + )" || : + + if [ ! -x "${JAVACMD-}" ] || [ ! -x "${JAVACCMD-}" ]; then + echo "The java/javac command does not exist in PATH nor is JAVA_HOME set, so mvnw cannot run." >&2 + return 1 + fi + fi +} + +# hash string like Java String::hashCode +hash_string() { + str="${1:-}" h=0 + while [ -n "$str" ]; do + char="${str%"${str#?}"}" + h=$(((h * 31 + $(LC_CTYPE=C printf %d "'$char")) % 4294967296)) + str="${str#?}" + done + printf %x\\n $h +} + +verbose() { :; } +[ "${MVNW_VERBOSE-}" != true ] || verbose() { printf %s\\n "${1-}"; } + +die() { + printf %s\\n "$1" >&2 + exit 1 +} + +trim() { + # MWRAPPER-139: + # Trims trailing and leading whitespace, carriage returns, tabs, and linefeeds. + # Needed for removing poorly interpreted newline sequences when running in more + # exotic environments such as mingw bash on Windows. + printf "%s" "${1}" | tr -d '[:space:]' +} + +scriptDir="$(dirname "$0")" +scriptName="$(basename "$0")" + +# parse distributionUrl and optional distributionSha256Sum, requires .mvn/wrapper/maven-wrapper.properties +while IFS="=" read -r key value; do + case "${key-}" in + distributionUrl) distributionUrl=$(trim "${value-}") ;; + distributionSha256Sum) distributionSha256Sum=$(trim "${value-}") ;; + esac +done <"$scriptDir/.mvn/wrapper/maven-wrapper.properties" +[ -n "${distributionUrl-}" ] || die "cannot read distributionUrl property in $scriptDir/.mvn/wrapper/maven-wrapper.properties" + +case "${distributionUrl##*/}" in +maven-mvnd-*bin.*) + MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ + case "${PROCESSOR_ARCHITECTURE-}${PROCESSOR_ARCHITEW6432-}:$(uname -a)" in + *AMD64:CYGWIN* | *AMD64:MINGW*) distributionPlatform=windows-amd64 ;; + :Darwin*x86_64) distributionPlatform=darwin-amd64 ;; + :Darwin*arm64) distributionPlatform=darwin-aarch64 ;; + :Linux*x86_64*) distributionPlatform=linux-amd64 ;; + *) + echo "Cannot detect native platform for mvnd on $(uname)-$(uname -m), use pure java version" >&2 + distributionPlatform=linux-amd64 + ;; + esac + distributionUrl="${distributionUrl%-bin.*}-$distributionPlatform.zip" + ;; +maven-mvnd-*) MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ ;; +*) MVN_CMD="mvn${scriptName#mvnw}" _MVNW_REPO_PATTERN=/org/apache/maven/ ;; +esac + +# apply MVNW_REPOURL and calculate MAVEN_HOME +# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-,maven-mvnd--}/ +[ -z "${MVNW_REPOURL-}" ] || distributionUrl="$MVNW_REPOURL$_MVNW_REPO_PATTERN${distributionUrl#*"$_MVNW_REPO_PATTERN"}" +distributionUrlName="${distributionUrl##*/}" +distributionUrlNameMain="${distributionUrlName%.*}" +distributionUrlNameMain="${distributionUrlNameMain%-bin}" +MAVEN_USER_HOME="${MAVEN_USER_HOME:-${HOME}/.m2}" +MAVEN_HOME="${MAVEN_USER_HOME}/wrapper/dists/${distributionUrlNameMain-}/$(hash_string "$distributionUrl")" + +exec_maven() { + unset MVNW_VERBOSE MVNW_USERNAME MVNW_PASSWORD MVNW_REPOURL || : + exec "$MAVEN_HOME/bin/$MVN_CMD" "$@" || die "cannot exec $MAVEN_HOME/bin/$MVN_CMD" +} + +if [ -d "$MAVEN_HOME" ]; then + verbose "found existing MAVEN_HOME at $MAVEN_HOME" + exec_maven "$@" +fi + +case "${distributionUrl-}" in +*?-bin.zip | *?maven-mvnd-?*-?*.zip) ;; +*) die "distributionUrl is not valid, must match *-bin.zip or maven-mvnd-*.zip, but found '${distributionUrl-}'" ;; +esac + +# prepare tmp dir +if TMP_DOWNLOAD_DIR="$(mktemp -d)" && [ -d "$TMP_DOWNLOAD_DIR" ]; then + clean() { rm -rf -- "$TMP_DOWNLOAD_DIR"; } + trap clean HUP INT TERM EXIT +else + die "cannot create temp dir" +fi + +mkdir -p -- "${MAVEN_HOME%/*}" + +# Download and Install Apache Maven +verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." +verbose "Downloading from: $distributionUrl" +verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" + +# select .zip or .tar.gz +if ! command -v unzip >/dev/null; then + distributionUrl="${distributionUrl%.zip}.tar.gz" + distributionUrlName="${distributionUrl##*/}" +fi + +# verbose opt +__MVNW_QUIET_WGET=--quiet __MVNW_QUIET_CURL=--silent __MVNW_QUIET_UNZIP=-q __MVNW_QUIET_TAR='' +[ "${MVNW_VERBOSE-}" != true ] || __MVNW_QUIET_WGET='' __MVNW_QUIET_CURL='' __MVNW_QUIET_UNZIP='' __MVNW_QUIET_TAR=v + +# normalize http auth +case "${MVNW_PASSWORD:+has-password}" in +'') MVNW_USERNAME='' MVNW_PASSWORD='' ;; +has-password) [ -n "${MVNW_USERNAME-}" ] || MVNW_USERNAME='' MVNW_PASSWORD='' ;; +esac + +if [ -z "${MVNW_USERNAME-}" ] && command -v wget >/dev/null; then + verbose "Found wget ... using wget" + wget ${__MVNW_QUIET_WGET:+"$__MVNW_QUIET_WGET"} "$distributionUrl" -O "$TMP_DOWNLOAD_DIR/$distributionUrlName" || die "wget: Failed to fetch $distributionUrl" +elif [ -z "${MVNW_USERNAME-}" ] && command -v curl >/dev/null; then + verbose "Found curl ... using curl" + curl ${__MVNW_QUIET_CURL:+"$__MVNW_QUIET_CURL"} -f -L -o "$TMP_DOWNLOAD_DIR/$distributionUrlName" "$distributionUrl" || die "curl: Failed to fetch $distributionUrl" +elif set_java_home; then + verbose "Falling back to use Java to download" + javaSource="$TMP_DOWNLOAD_DIR/Downloader.java" + targetZip="$TMP_DOWNLOAD_DIR/$distributionUrlName" + cat >"$javaSource" <<-END + public class Downloader extends java.net.Authenticator + { + protected java.net.PasswordAuthentication getPasswordAuthentication() + { + return new java.net.PasswordAuthentication( System.getenv( "MVNW_USERNAME" ), System.getenv( "MVNW_PASSWORD" ).toCharArray() ); + } + public static void main( String[] args ) throws Exception + { + setDefault( new Downloader() ); + java.nio.file.Files.copy( java.net.URI.create( args[0] ).toURL().openStream(), java.nio.file.Paths.get( args[1] ).toAbsolutePath().normalize() ); + } + } + END + # For Cygwin/MinGW, switch paths to Windows format before running javac and java + verbose " - Compiling Downloader.java ..." + "$(native_path "$JAVACCMD")" "$(native_path "$javaSource")" || die "Failed to compile Downloader.java" + verbose " - Running Downloader.java ..." + "$(native_path "$JAVACMD")" -cp "$(native_path "$TMP_DOWNLOAD_DIR")" Downloader "$distributionUrl" "$(native_path "$targetZip")" +fi + +# If specified, validate the SHA-256 sum of the Maven distribution zip file +if [ -n "${distributionSha256Sum-}" ]; then + distributionSha256Result=false + if [ "$MVN_CMD" = mvnd.sh ]; then + echo "Checksum validation is not supported for maven-mvnd." >&2 + echo "Please disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2 + exit 1 + elif command -v sha256sum >/dev/null; then + if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | sha256sum -c - >/dev/null 2>&1; then + distributionSha256Result=true + fi + elif command -v shasum >/dev/null; then + if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | shasum -a 256 -c >/dev/null 2>&1; then + distributionSha256Result=true + fi + else + echo "Checksum validation was requested but neither 'sha256sum' or 'shasum' are available." >&2 + echo "Please install either command, or disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2 + exit 1 + fi + if [ $distributionSha256Result = false ]; then + echo "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised." >&2 + echo "If you updated your Maven version, you need to update the specified distributionSha256Sum property." >&2 + exit 1 + fi +fi + +# unzip and move +if command -v unzip >/dev/null; then + unzip ${__MVNW_QUIET_UNZIP:+"$__MVNW_QUIET_UNZIP"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -d "$TMP_DOWNLOAD_DIR" || die "failed to unzip" +else + tar xzf${__MVNW_QUIET_TAR:+"$__MVNW_QUIET_TAR"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -C "$TMP_DOWNLOAD_DIR" || die "failed to untar" +fi + +# Find the actual extracted directory name (handles snapshots where filename != directory name) +actualDistributionDir="" + +# First try the expected directory name (for regular distributions) +if [ -d "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" ]; then + if [ -f "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain/bin/$MVN_CMD" ]; then + actualDistributionDir="$distributionUrlNameMain" + fi +fi + +# If not found, search for any directory with the Maven executable (for snapshots) +if [ -z "$actualDistributionDir" ]; then + # enable globbing to iterate over items + set +f + for dir in "$TMP_DOWNLOAD_DIR"/*; do + if [ -d "$dir" ]; then + if [ -f "$dir/bin/$MVN_CMD" ]; then + actualDistributionDir="$(basename "$dir")" + break + fi + fi + done + set -f +fi + +if [ -z "$actualDistributionDir" ]; then + verbose "Contents of $TMP_DOWNLOAD_DIR:" + verbose "$(ls -la "$TMP_DOWNLOAD_DIR")" + die "Could not find Maven distribution directory in extracted archive" +fi + +verbose "Found extracted Maven distribution directory: $actualDistributionDir" +printf %s\\n "$distributionUrl" >"$TMP_DOWNLOAD_DIR/$actualDistributionDir/mvnw.url" +mv -- "$TMP_DOWNLOAD_DIR/$actualDistributionDir" "$MAVEN_HOME" || [ -d "$MAVEN_HOME" ] || die "fail to move MAVEN_HOME" + +clean || : +exec_maven "$@" diff --git a/mvnw.cmd b/mvnw.cmd new file mode 100644 index 0000000..92450f9 --- /dev/null +++ b/mvnw.cmd @@ -0,0 +1,189 @@ +<# : batch portion +@REM ---------------------------------------------------------------------------- +@REM Licensed to the Apache Software Foundation (ASF) under one +@REM or more contributor license agreements. See the NOTICE file +@REM distributed with this work for additional information +@REM regarding copyright ownership. The ASF licenses this file +@REM to you under the Apache License, Version 2.0 (the +@REM "License"); you may not use this file except in compliance +@REM with the License. You may obtain a copy of the License at +@REM +@REM http://www.apache.org/licenses/LICENSE-2.0 +@REM +@REM Unless required by applicable law or agreed to in writing, +@REM software distributed under the License is distributed on an +@REM "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +@REM KIND, either express or implied. See the License for the +@REM specific language governing permissions and limitations +@REM under the License. +@REM ---------------------------------------------------------------------------- + +@REM ---------------------------------------------------------------------------- +@REM Apache Maven Wrapper startup batch script, version 3.3.4 +@REM +@REM Optional ENV vars +@REM MVNW_REPOURL - repo url base for downloading maven distribution +@REM MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven +@REM MVNW_VERBOSE - true: enable verbose log; others: silence the output +@REM ---------------------------------------------------------------------------- + +@IF "%__MVNW_ARG0_NAME__%"=="" (SET __MVNW_ARG0_NAME__=%~nx0) +@SET __MVNW_CMD__= +@SET __MVNW_ERROR__= +@SET __MVNW_PSMODULEP_SAVE=%PSModulePath% +@SET PSModulePath= +@FOR /F "usebackq tokens=1* delims==" %%A IN (`powershell -noprofile "& {$scriptDir='%~dp0'; $script='%__MVNW_ARG0_NAME__%'; icm -ScriptBlock ([Scriptblock]::Create((Get-Content -Raw '%~f0'))) -NoNewScope}"`) DO @( + IF "%%A"=="MVN_CMD" (set __MVNW_CMD__=%%B) ELSE IF "%%B"=="" (echo %%A) ELSE (echo %%A=%%B) +) +@SET PSModulePath=%__MVNW_PSMODULEP_SAVE% +@SET __MVNW_PSMODULEP_SAVE= +@SET __MVNW_ARG0_NAME__= +@SET MVNW_USERNAME= +@SET MVNW_PASSWORD= +@IF NOT "%__MVNW_CMD__%"=="" ("%__MVNW_CMD__%" %*) +@echo Cannot start maven from wrapper >&2 && exit /b 1 +@GOTO :EOF +: end batch / begin powershell #> + +$ErrorActionPreference = "Stop" +if ($env:MVNW_VERBOSE -eq "true") { + $VerbosePreference = "Continue" +} + +# calculate distributionUrl, requires .mvn/wrapper/maven-wrapper.properties +$distributionUrl = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionUrl +if (!$distributionUrl) { + Write-Error "cannot read distributionUrl property in $scriptDir/.mvn/wrapper/maven-wrapper.properties" +} + +switch -wildcard -casesensitive ( $($distributionUrl -replace '^.*/','') ) { + "maven-mvnd-*" { + $USE_MVND = $true + $distributionUrl = $distributionUrl -replace '-bin\.[^.]*$',"-windows-amd64.zip" + $MVN_CMD = "mvnd.cmd" + break + } + default { + $USE_MVND = $false + $MVN_CMD = $script -replace '^mvnw','mvn' + break + } +} + +# apply MVNW_REPOURL and calculate MAVEN_HOME +# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-,maven-mvnd--}/ +if ($env:MVNW_REPOURL) { + $MVNW_REPO_PATTERN = if ($USE_MVND -eq $False) { "/org/apache/maven/" } else { "/maven/mvnd/" } + $distributionUrl = "$env:MVNW_REPOURL$MVNW_REPO_PATTERN$($distributionUrl -replace "^.*$MVNW_REPO_PATTERN",'')" +} +$distributionUrlName = $distributionUrl -replace '^.*/','' +$distributionUrlNameMain = $distributionUrlName -replace '\.[^.]*$','' -replace '-bin$','' + +$MAVEN_M2_PATH = "$HOME/.m2" +if ($env:MAVEN_USER_HOME) { + $MAVEN_M2_PATH = "$env:MAVEN_USER_HOME" +} + +if (-not (Test-Path -Path $MAVEN_M2_PATH)) { + New-Item -Path $MAVEN_M2_PATH -ItemType Directory | Out-Null +} + +$MAVEN_WRAPPER_DISTS = $null +if ((Get-Item $MAVEN_M2_PATH).Target[0] -eq $null) { + $MAVEN_WRAPPER_DISTS = "$MAVEN_M2_PATH/wrapper/dists" +} else { + $MAVEN_WRAPPER_DISTS = (Get-Item $MAVEN_M2_PATH).Target[0] + "/wrapper/dists" +} + +$MAVEN_HOME_PARENT = "$MAVEN_WRAPPER_DISTS/$distributionUrlNameMain" +$MAVEN_HOME_NAME = ([System.Security.Cryptography.SHA256]::Create().ComputeHash([byte[]][char[]]$distributionUrl) | ForEach-Object {$_.ToString("x2")}) -join '' +$MAVEN_HOME = "$MAVEN_HOME_PARENT/$MAVEN_HOME_NAME" + +if (Test-Path -Path "$MAVEN_HOME" -PathType Container) { + Write-Verbose "found existing MAVEN_HOME at $MAVEN_HOME" + Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" + exit $? +} + +if (! $distributionUrlNameMain -or ($distributionUrlName -eq $distributionUrlNameMain)) { + Write-Error "distributionUrl is not valid, must end with *-bin.zip, but found $distributionUrl" +} + +# prepare tmp dir +$TMP_DOWNLOAD_DIR_HOLDER = New-TemporaryFile +$TMP_DOWNLOAD_DIR = New-Item -Itemtype Directory -Path "$TMP_DOWNLOAD_DIR_HOLDER.dir" +$TMP_DOWNLOAD_DIR_HOLDER.Delete() | Out-Null +trap { + if ($TMP_DOWNLOAD_DIR.Exists) { + try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } + catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } + } +} + +New-Item -Itemtype Directory -Path "$MAVEN_HOME_PARENT" -Force | Out-Null + +# Download and Install Apache Maven +Write-Verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." +Write-Verbose "Downloading from: $distributionUrl" +Write-Verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" + +$webclient = New-Object System.Net.WebClient +if ($env:MVNW_USERNAME -and $env:MVNW_PASSWORD) { + $webclient.Credentials = New-Object System.Net.NetworkCredential($env:MVNW_USERNAME, $env:MVNW_PASSWORD) +} +[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 +$webclient.DownloadFile($distributionUrl, "$TMP_DOWNLOAD_DIR/$distributionUrlName") | Out-Null + +# If specified, validate the SHA-256 sum of the Maven distribution zip file +$distributionSha256Sum = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionSha256Sum +if ($distributionSha256Sum) { + if ($USE_MVND) { + Write-Error "Checksum validation is not supported for maven-mvnd. `nPlease disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." + } + Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash + if ((Get-FileHash "$TMP_DOWNLOAD_DIR/$distributionUrlName" -Algorithm SHA256).Hash.ToLower() -ne $distributionSha256Sum) { + Write-Error "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised. If you updated your Maven version, you need to update the specified distributionSha256Sum property." + } +} + +# unzip and move +Expand-Archive "$TMP_DOWNLOAD_DIR/$distributionUrlName" -DestinationPath "$TMP_DOWNLOAD_DIR" | Out-Null + +# Find the actual extracted directory name (handles snapshots where filename != directory name) +$actualDistributionDir = "" + +# First try the expected directory name (for regular distributions) +$expectedPath = Join-Path "$TMP_DOWNLOAD_DIR" "$distributionUrlNameMain" +$expectedMvnPath = Join-Path "$expectedPath" "bin/$MVN_CMD" +if ((Test-Path -Path $expectedPath -PathType Container) -and (Test-Path -Path $expectedMvnPath -PathType Leaf)) { + $actualDistributionDir = $distributionUrlNameMain +} + +# If not found, search for any directory with the Maven executable (for snapshots) +if (!$actualDistributionDir) { + Get-ChildItem -Path "$TMP_DOWNLOAD_DIR" -Directory | ForEach-Object { + $testPath = Join-Path $_.FullName "bin/$MVN_CMD" + if (Test-Path -Path $testPath -PathType Leaf) { + $actualDistributionDir = $_.Name + } + } +} + +if (!$actualDistributionDir) { + Write-Error "Could not find Maven distribution directory in extracted archive" +} + +Write-Verbose "Found extracted Maven distribution directory: $actualDistributionDir" +Rename-Item -Path "$TMP_DOWNLOAD_DIR/$actualDistributionDir" -NewName $MAVEN_HOME_NAME | Out-Null +try { + Move-Item -Path "$TMP_DOWNLOAD_DIR/$MAVEN_HOME_NAME" -Destination $MAVEN_HOME_PARENT | Out-Null +} catch { + if (! (Test-Path -Path "$MAVEN_HOME" -PathType Container)) { + Write-Error "fail to move MAVEN_HOME" + } +} finally { + try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } + catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } +} + +Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" diff --git a/pom.xml b/pom.xml new file mode 100644 index 0000000..e358423 --- /dev/null +++ b/pom.xml @@ -0,0 +1,120 @@ + + + 4.0.0 + + org.springframework.boot + spring-boot-starter-parent + 3.5.6 + + + com.backend.hls.proxy + hls-proxy + 0.0.1-SNAPSHOT + hls-proxy + HLS Proxy with prefetching + + + + + + + + + + + + + + + 21 + + 2025.0.0 + 3.2.2 + 6.2.0 + 0.30 + 2.8.9 + 4.0.0 + 6.2.11 + + + + org.springframework.boot + spring-boot-starter-data-redis + + + org.springframework.boot + spring-boot-starter-cache + + + redis.clients + jedis + ${jedis.version} + + + com.github.ben-manes.caffeine + caffeine + ${caffeine.version} + + + org.springframework.boot + spring-boot-starter-data-rest + + + org.springframework.boot + spring-boot-starter-web + + + org.springframework.cloud + spring-cloud-starter-netflix-eureka-client + + + org.springdoc + springdoc-openapi-starter-webmvc-ui + ${springdoc-openapi-starter.version} + + + me.paulschwarz + spring-dotenv + ${spring-dotenv.version} + + + io.lindstrom + m3u8-parser + ${m3u8-parser.version} + + + org.springframework + spring-context-support + ${spring-context-support.version} + + + + org.springframework.boot + spring-boot-starter-test + test + + + + + + org.springframework.cloud + spring-cloud-dependencies + ${spring-cloud.version} + pom + import + + + + + + + + org.springframework.boot + spring-boot-maven-plugin + + + + + diff --git a/src/main/java/com/backend/hls/proxy/HlsProxyApplication.java b/src/main/java/com/backend/hls/proxy/HlsProxyApplication.java new file mode 100644 index 0000000..2bd0016 --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/HlsProxyApplication.java @@ -0,0 +1,13 @@ +package com.backend.hls.proxy; + +import org.springframework.boot.SpringApplication; +import org.springframework.boot.autoconfigure.SpringBootApplication; + +@SpringBootApplication +public class HlsProxyApplication { + + public static void main(String[] args) { + SpringApplication.run(HlsProxyApplication.class, args); + } + +} diff --git a/src/main/java/com/backend/hls/proxy/config/CacheConfig.java b/src/main/java/com/backend/hls/proxy/config/CacheConfig.java new file mode 100644 index 0000000..28997ec --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/config/CacheConfig.java @@ -0,0 +1,18 @@ +package com.backend.hls.proxy.config; + +import org.springframework.cache.CacheManager; +import org.springframework.cache.annotation.EnableCaching; +import org.springframework.cache.caffeine.CaffeineCacheManager; +import org.springframework.context.annotation.Bean; +import org.springframework.context.annotation.Configuration; + +@Configuration +@EnableCaching +public class CacheConfig { + + @Bean + public CacheManager cacheManager() { + return new CaffeineCacheManager("hlsPlaylistContent", "playlistSegmentContent"); + } + +} diff --git a/src/main/java/com/backend/hls/proxy/config/ParserConfig.java b/src/main/java/com/backend/hls/proxy/config/ParserConfig.java new file mode 100644 index 0000000..141ad3d --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/config/ParserConfig.java @@ -0,0 +1,22 @@ +package com.backend.hls.proxy.config; + +import org.springframework.context.annotation.Bean; +import org.springframework.context.annotation.Configuration; + +import io.lindstrom.m3u8.parser.MediaPlaylistParser; +import io.lindstrom.m3u8.parser.MultivariantPlaylistParser; +import io.lindstrom.m3u8.parser.ParsingMode; + +@Configuration +public class ParserConfig { + + @Bean + public MultivariantPlaylistParser multivariantParser() { + return new MultivariantPlaylistParser(ParsingMode.LENIENT); + } + + @Bean + public MediaPlaylistParser mediaParser() { + return new MediaPlaylistParser(ParsingMode.LENIENT); + } +} diff --git a/src/main/java/com/backend/hls/proxy/config/RedisConfig.java b/src/main/java/com/backend/hls/proxy/config/RedisConfig.java new file mode 100644 index 0000000..bc6025c --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/config/RedisConfig.java @@ -0,0 +1,24 @@ +package com.backend.hls.proxy.config; + +import org.springframework.context.annotation.Bean; +import org.springframework.context.annotation.Configuration; +import org.springframework.data.redis.connection.RedisStandaloneConfiguration; +import org.springframework.data.redis.connection.jedis.JedisConnectionFactory; +import org.springframework.data.redis.core.RedisTemplate; + +@Configuration +public class RedisConfig { + @Bean + public JedisConnectionFactory jedisConnectionFactory() { + RedisStandaloneConfiguration config = new RedisStandaloneConfiguration("redis"); + return new JedisConnectionFactory(config); + } + + @Bean + public RedisTemplate redisTemplate() { + RedisTemplate template = new RedisTemplate<>(); + template.setConnectionFactory(jedisConnectionFactory()); + return template; + } + +} diff --git a/src/main/java/com/backend/hls/proxy/config/RetrieverConfig.java b/src/main/java/com/backend/hls/proxy/config/RetrieverConfig.java new file mode 100644 index 0000000..82e6cba --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/config/RetrieverConfig.java @@ -0,0 +1,20 @@ +package com.backend.hls.proxy.config; + +import java.net.http.HttpClient; +import java.net.http.HttpClient.Redirect; +import java.time.Duration; + +import org.springframework.context.annotation.Bean; +import org.springframework.context.annotation.Configuration; + +@Configuration +public class RetrieverConfig { + @Bean + public HttpClient httpClient() { + return HttpClient.newBuilder() + .followRedirects(Redirect.NORMAL) + .connectTimeout(Duration.ofSeconds(10)) + .build(); + + } +} diff --git a/src/main/java/com/backend/hls/proxy/controller/ProxyController.java b/src/main/java/com/backend/hls/proxy/controller/ProxyController.java new file mode 100644 index 0000000..1e0998b --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/controller/ProxyController.java @@ -0,0 +1,30 @@ +package com.backend.hls.proxy.controller; + +import org.springframework.http.ResponseEntity; +import org.springframework.web.bind.annotation.GetMapping; +import org.springframework.web.bind.annotation.RequestParam; +import org.springframework.web.bind.annotation.RestController; +import org.springframework.web.servlet.support.ServletUriComponentsBuilder; + +import com.backend.hls.proxy.exception.FetchFailException; +import com.backend.hls.proxy.exception.PlaylistParseException; +import com.backend.hls.proxy.service.PlaylistProxyService; + +@RestController +public class ProxyController { + + private final PlaylistProxyService playlistProxyService; + + public ProxyController(PlaylistProxyService playlistProxyService) { + this.playlistProxyService = playlistProxyService; + } + + @GetMapping("/proxy") + public ResponseEntity proxy(@RequestParam("url") String url) throws FetchFailException, PlaylistParseException { + String fullUrl = ServletUriComponentsBuilder.fromCurrentRequestUri().build().toUriString(); + String baseUrl = fullUrl.substring(0, fullUrl.indexOf("/", 8)); + String result = playlistProxyService.proxyPlaylist(url, baseUrl); + return ResponseEntity.ok(result); + } + +} diff --git a/src/main/java/com/backend/hls/proxy/controller/ProxyServeController.java b/src/main/java/com/backend/hls/proxy/controller/ProxyServeController.java new file mode 100644 index 0000000..0c42443 --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/controller/ProxyServeController.java @@ -0,0 +1,118 @@ +package com.backend.hls.proxy.controller; + +import java.io.IOException; +import java.net.URI; +import java.util.Optional; + +import org.springframework.http.HttpHeaders; +import org.springframework.http.HttpStatus; +import org.springframework.http.ResponseEntity; +import org.springframework.web.bind.annotation.GetMapping; +import org.springframework.web.bind.annotation.PathVariable; +import org.springframework.web.bind.annotation.RequestHeader; +import org.springframework.web.bind.annotation.RestController; + +import com.backend.hls.proxy.exception.FetchFailException; +import com.backend.hls.proxy.exception.PlaylistParseException; +import com.backend.hls.proxy.model.Link; +import com.backend.hls.proxy.model.RangeRequest; +import com.backend.hls.proxy.model.SimpleResponse; +import com.backend.hls.proxy.repository.LinkRepository; +import com.backend.hls.proxy.service.FetchService; + +@RestController +public class ProxyServeController { + private final LinkRepository linkRepository; + private final ProxyController proxyController; + private final FetchService fetchService; + + public ProxyServeController(LinkRepository linkRepository, ProxyController proxyController, + FetchService fetchService) { + this.linkRepository = linkRepository; + this.proxyController = proxyController; + this.fetchService = fetchService; + } + + @GetMapping("/proxy/{id}") + public ResponseEntity proxy( + @PathVariable("id") String id, + @RequestHeader(value = "Range", required = false) String rangeHeader) { + if (id.contains(".")) + id = id.substring(0, id.lastIndexOf(".")); + Optional link = linkRepository.findById(id); + if (link.isEmpty()) { + return ResponseEntity.notFound().build(); + } + String url = link.get().getUrl(); + if (url.contains(".m3u8")) { + try { + return proxyController.proxy(url); + } catch (FetchFailException | PlaylistParseException e) { + e.printStackTrace(); + return redirect(url); + } + } + try { + if (rangeHeader == null) { + return handleFullRequest(url); + } else { + return handleRangeRequest(url, rangeHeader); + } + } catch (IOException | InterruptedException | FetchFailException e) { + e.printStackTrace(); + return redirect(url); + } + } + + private ResponseEntity handleFullRequest(String url) + throws IOException, InterruptedException, FetchFailException { + SimpleResponse response = fetchService.fetchBinaryContent(url); + HttpHeaders headers = new HttpHeaders(); + response.getHeaders().map().forEach((key, values) -> { + headers.addAll(key, values); + }); + return new ResponseEntity<>(response.getBody(), headers, HttpStatus.OK); + } + + private ResponseEntity handleRangeRequest(String url, String rangeHeader) + throws IOException, InterruptedException, FetchFailException { + + long contentLength = fetchService.getContentLength(url); + if (contentLength <= 0) { + return handleFullRequest(url); + } + + RangeRequest range = RangeRequest.parse(rangeHeader, contentLength); + if (range == null) { + // Invalid range, return 416 Range Not Satisfiable + HttpHeaders headers = new HttpHeaders(); + headers.add("Content-Range", "bytes */" + contentLength); + return new ResponseEntity<>(headers, HttpStatus.REQUESTED_RANGE_NOT_SATISFIABLE); + } + + String rangeHeaderToSend = String.format("bytes=%d-%d", + range.getStart(), range.getEnd()); + SimpleResponse response = fetchService.fetchBinaryContent(url, rangeHeaderToSend); + + HttpHeaders headers = new HttpHeaders(); + response.getHeaders().map().forEach((key, values) -> { + // Don't copy certain headers + if (!key.equalsIgnoreCase("Transfer-Encoding") && + !key.equalsIgnoreCase("Connection")) { + headers.addAll(key, values); + } + }); + + headers.add("Content-Range", range.toContentRangeHeader()); + headers.add("Accept-Ranges", "bytes"); + headers.setContentLength(range.getLength()); + + return new ResponseEntity<>(response.getBody(), headers, HttpStatus.PARTIAL_CONTENT); + } + + private ResponseEntity redirect(String target) { + HttpHeaders headers = new HttpHeaders(); + headers.setLocation(URI.create(target)); + return new ResponseEntity<>(headers, HttpStatus.MOVED_PERMANENTLY); + } +} diff --git a/src/main/java/com/backend/hls/proxy/exception/FetchFailException.java b/src/main/java/com/backend/hls/proxy/exception/FetchFailException.java new file mode 100644 index 0000000..0da20ce --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/exception/FetchFailException.java @@ -0,0 +1,17 @@ +package com.backend.hls.proxy.exception; + +import java.net.http.HttpResponse; + +public class FetchFailException extends Exception { + private final HttpResponse response; + + public FetchFailException(String message, HttpResponse response) { + super(message); + this.response = response; + } + + public HttpResponse getResponse() { + return response; + } + +} diff --git a/src/main/java/com/backend/hls/proxy/exception/PlaylistParseException.java b/src/main/java/com/backend/hls/proxy/exception/PlaylistParseException.java new file mode 100644 index 0000000..daa3b8b --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/exception/PlaylistParseException.java @@ -0,0 +1,7 @@ +package com.backend.hls.proxy.exception; + +public class PlaylistParseException extends Exception { + public PlaylistParseException(String message, Exception e) { + super(message, e); + } +} diff --git a/src/main/java/com/backend/hls/proxy/model/Link.java b/src/main/java/com/backend/hls/proxy/model/Link.java new file mode 100644 index 0000000..5179e26 --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/model/Link.java @@ -0,0 +1,40 @@ +package com.backend.hls.proxy.model; + +import java.io.Serializable; +import java.time.Duration; +import java.util.concurrent.TimeUnit; + +import org.springframework.data.annotation.Id; +import org.springframework.data.redis.core.RedisHash; +import org.springframework.data.redis.core.TimeToLive; +import org.springframework.data.redis.core.index.Indexed; + +@RedisHash("hls-link") +public class Link implements Serializable { + private static final Duration TTL = Duration.ofDays(1); + + @Id + private String id; + @TimeToLive(unit = TimeUnit.SECONDS) + private Long expirationSeconds; + @Indexed + private String url; + + Link() { + } + + public Link(String id, String url) { + this.id = id; + this.url = url; + this.expirationSeconds = TTL.toSeconds(); + } + + public String getId() { + return id; + } + + public String getUrl() { + return url; + } + +} diff --git a/src/main/java/com/backend/hls/proxy/model/RangeRequest.java b/src/main/java/com/backend/hls/proxy/model/RangeRequest.java new file mode 100644 index 0000000..8e03f8a --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/model/RangeRequest.java @@ -0,0 +1,74 @@ +package com.backend.hls.proxy.model; + +public class RangeRequest { + private final long start; + private final long end; + private final long total; + + public RangeRequest(long start, long end, long total) { + this.start = start; + this.end = end; + this.total = total; + } + + public static RangeRequest parse(String rangeHeader, long contentLength) { + if (rangeHeader == null || !rangeHeader.startsWith("bytes=")) { + return null; + } + + try { + String range = rangeHeader.substring(6); // Remove "bytes=" + String[] parts = range.split("-"); + + long start = 0; + long end = contentLength - 1; + + if (parts.length == 1) { + if (range.startsWith("-")) { + // Last N bytes + long suffix = Long.parseLong(parts[0]); + start = Math.max(0, contentLength + suffix); + } else { + // From start to end + start = Long.parseLong(parts[0]); + } + } else if (parts.length == 2) { + // Range: bytes=500-999 + start = Long.parseLong(parts[0]); + if (!parts[1].isEmpty()) { + end = Long.parseLong(parts[1]); + } + } + + if (start > end || start >= contentLength) { + return null; + } + + end = Math.min(end, contentLength - 1); + return new RangeRequest(start, end, contentLength); + + } catch (NumberFormatException e) { + return null; + } + } + + public long getStart() { + return start; + } + + public long getEnd() { + return end; + } + + public long getTotal() { + return total; + } + + public long getLength() { + return end - start + 1; + } + + public String toContentRangeHeader() { + return String.format("bytes %d-%d/%d", start, end, total); + } +} diff --git a/src/main/java/com/backend/hls/proxy/model/SimpleResponse.java b/src/main/java/com/backend/hls/proxy/model/SimpleResponse.java new file mode 100644 index 0000000..0c6bcd9 --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/model/SimpleResponse.java @@ -0,0 +1,22 @@ +package com.backend.hls.proxy.model; + +import java.net.http.HttpHeaders; + +public class SimpleResponse { + private final T body; + private final HttpHeaders headers; + + public SimpleResponse(T body, HttpHeaders headers) { + this.body = body; + this.headers = headers; + } + + public T getBody() { + return body; + } + + public HttpHeaders getHeaders() { + return headers; + } + +} diff --git a/src/main/java/com/backend/hls/proxy/repository/LinkRepository.java b/src/main/java/com/backend/hls/proxy/repository/LinkRepository.java new file mode 100644 index 0000000..7816584 --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/repository/LinkRepository.java @@ -0,0 +1,13 @@ +package com.backend.hls.proxy.repository; + +import java.util.Optional; + +import org.springframework.data.repository.CrudRepository; +import org.springframework.stereotype.Repository; + +import com.backend.hls.proxy.model.Link; + +@Repository +public interface LinkRepository extends CrudRepository { + Optional findFirstByUrl(String url); +} diff --git a/src/main/java/com/backend/hls/proxy/service/FetchService.java b/src/main/java/com/backend/hls/proxy/service/FetchService.java new file mode 100644 index 0000000..f9637cc --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/service/FetchService.java @@ -0,0 +1,107 @@ +package com.backend.hls.proxy.service; + +import java.io.IOException; +import java.net.URI; +import java.net.http.HttpClient; +import java.net.http.HttpRequest; +import java.net.http.HttpResponse; +import java.time.Duration; + +import org.springframework.cache.annotation.Cacheable; +import org.springframework.stereotype.Service; + +import com.backend.hls.proxy.exception.FetchFailException; +import com.backend.hls.proxy.model.SimpleResponse; + +@Service +public class FetchService { + private final HttpClient httpClient; + + public FetchService(HttpClient httpClient) { + this.httpClient = httpClient; + } + + /** + * Fetch text content from URL + * + * @throws FetchFailException + */ + @Cacheable("hlsPlaylistContent") + public String fetchTextContent(String url) throws IOException, InterruptedException, FetchFailException { + HttpRequest request = HttpRequest.newBuilder() + .uri(URI.create(url)) + .build(); + + HttpResponse response = httpClient.send(request, HttpResponse.BodyHandlers.ofString()); + + if (response.statusCode() != 200) { + throw new FetchFailException("Failed to fetch content from " + url + ", status: " + response.statusCode(), + response); + } + + return response.body(); + } + + /** + * Fetch binary content from URL + * + * @throws FetchFailException + */ + @Cacheable("playlistSegmentContent") + public SimpleResponse fetchBinaryContent(String url) + throws IOException, InterruptedException, FetchFailException { + return fetchBinaryContent(url, null); + } + + /** + * Fetch binary content from URL + * + * @throws FetchFailException + */ + @Cacheable("playlistSegmentContent") + public SimpleResponse fetchBinaryContent(String url, String rangeHeader) + throws IOException, InterruptedException, FetchFailException { + HttpRequest.Builder builder = HttpRequest.newBuilder() + .uri(URI.create(url)); + + if (rangeHeader != null && !rangeHeader.isEmpty()) { + builder.header("Range", rangeHeader); + } + + HttpResponse response = httpClient.send(builder.build(), HttpResponse.BodyHandlers.ofByteArray()); + + if (response.statusCode() >= 400) { + throw new FetchFailException("Failed to fetch content from " + url + ", status: " + response.statusCode(), + response); + } + + return new SimpleResponse(response.body(), response.headers()); + } + + /** + * Fetch content length + * + * @throws FetchFailException + */ + public long getContentLength(String url) + throws IOException, InterruptedException, FetchFailException { + + HttpRequest request = HttpRequest.newBuilder() + .uri(URI.create(url)) + .method("HEAD", HttpRequest.BodyPublishers.noBody()) + .timeout(Duration.ofSeconds(10)) + .build(); + + HttpResponse response = httpClient.send(request, + HttpResponse.BodyHandlers.discarding()); + + if (response.statusCode() >= 400) { + throw new FetchFailException("HTTP " + response.statusCode(), response); + } + + return response.headers() + .firstValueAsLong("Content-Length") + .orElse(-1L); + } + +} diff --git a/src/main/java/com/backend/hls/proxy/service/PlaylistParseService.java b/src/main/java/com/backend/hls/proxy/service/PlaylistParseService.java new file mode 100644 index 0000000..79ddfb7 --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/service/PlaylistParseService.java @@ -0,0 +1,52 @@ +package com.backend.hls.proxy.service; + +import java.io.IOException; + +import org.springframework.stereotype.Service; + +import com.backend.hls.proxy.exception.FetchFailException; +import com.backend.hls.proxy.exception.PlaylistParseException; + +import io.lindstrom.m3u8.model.MediaPlaylist; +import io.lindstrom.m3u8.model.MultivariantPlaylist; +import io.lindstrom.m3u8.parser.MediaPlaylistParser; +import io.lindstrom.m3u8.parser.MultivariantPlaylistParser; + +@Service +public class PlaylistParseService { + private final FetchService fetchService; + private final MultivariantPlaylistParser playlistParser; + private final MediaPlaylistParser mediaParser; + + public PlaylistParseService(FetchService fetchService, MultivariantPlaylistParser playlistParser, + MediaPlaylistParser mediaParser) { + this.fetchService = fetchService; + this.playlistParser = playlistParser; + this.mediaParser = mediaParser; + } + + public MultivariantPlaylist readMultivariantPlaylist(String m3u8URL) + throws PlaylistParseException, FetchFailException { + try { + return playlistParser.readPlaylist(fetchService.fetchTextContent(m3u8URL)); + } catch (IOException | InterruptedException e) { + throw new PlaylistParseException("Failed to read playlist from " + m3u8URL, e); + } + } + + public MediaPlaylist readMediaPlaylist(String m3u8URL) throws PlaylistParseException, FetchFailException { + try { + return mediaParser.readPlaylist(fetchService.fetchTextContent(m3u8URL)); + } catch (IOException | InterruptedException e) { + throw new PlaylistParseException("Failed to read playlist from " + m3u8URL, e); + } + } + + public String writeAsString(MultivariantPlaylist proxiedPlaylist) { + return playlistParser.writePlaylistAsString(proxiedPlaylist); + } + + public String writeAsString(MediaPlaylist proxiedPlaylist) { + return mediaParser.writePlaylistAsString(proxiedPlaylist); + } +} diff --git a/src/main/java/com/backend/hls/proxy/service/PlaylistProxyService.java b/src/main/java/com/backend/hls/proxy/service/PlaylistProxyService.java new file mode 100644 index 0000000..7638b1d --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/service/PlaylistProxyService.java @@ -0,0 +1,170 @@ +package com.backend.hls.proxy.service; + +import java.util.List; +import java.util.stream.Collectors; + +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import org.springframework.stereotype.Service; + +import com.backend.hls.proxy.exception.FetchFailException; +import com.backend.hls.proxy.exception.PlaylistParseException; + +import io.lindstrom.m3u8.model.AlternativeRendition; +import io.lindstrom.m3u8.model.MediaPlaylist; +import io.lindstrom.m3u8.model.MediaSegment; +import io.lindstrom.m3u8.model.MultivariantPlaylist; +import io.lindstrom.m3u8.model.PartialSegment; +import io.lindstrom.m3u8.model.SegmentMap; +import io.lindstrom.m3u8.model.Variant; + +@Service +public class PlaylistProxyService { + private static final Logger logger = LoggerFactory.getLogger(PlaylistProxyService.class); + private final PlaylistParseService playlistParseService; + private final URLForwardService urlForwardService; + + public PlaylistProxyService(PlaylistParseService playlistParseService, URLForwardService urlForwardService) { + this.playlistParseService = playlistParseService; + this.urlForwardService = urlForwardService; + } + + public String proxyPlaylist(String hlsUrl, String proxyUrl) + throws FetchFailException { + String base = hlsUrl.substring(0, hlsUrl.lastIndexOf('/') + 1); + String suffix = hlsUrl.substring(hlsUrl.lastIndexOf('/') + 1); + String url = base + suffix; + try { + MultivariantPlaylist playlist = playlistParseService.readMultivariantPlaylist(url); + + List variants = playlist.variants() + .stream() + .map(variant -> proxyVariant(variant, base, proxyUrl)) + .collect(Collectors.toList()); + List alternativeRenditions = playlist.alternativeRenditions() + .stream() + .map(rendition -> proxyRendition(rendition, base, proxyUrl)) + .collect(Collectors.toList()); + + MultivariantPlaylist proxiedPlaylist = MultivariantPlaylist.builder() + .from(playlist) + .variants(variants) + .alternativeRenditions(alternativeRenditions) + .build(); + return playlistParseService.writeAsString(proxiedPlaylist); + } catch (PlaylistParseException e) { + } + try { + MediaPlaylist playlist = playlistParseService.readMediaPlaylist(url); + + List mediaSegments = playlist.mediaSegments() + .stream() + .map(segment -> proxySegment(segment, base, proxyUrl)) + .collect(Collectors.toList()); + + List partialSegments = playlist.partialSegments() + .stream() + .map(segment -> proxyPartialSegment(segment, base, proxyUrl)) + .collect(Collectors.toList()); + + logger.info("media playlist " + playlist.variables() + " " + playlist.partialSegmentInformation()); + mediaSegments.forEach(segment -> logger.info("segment map " + segment.segmentMap())); + + MediaPlaylist proxiedPlaylist = MediaPlaylist.builder() + .from(playlist) + .mediaSegments(mediaSegments) + .partialSegments(partialSegments) + .build(); + + return playlistParseService.writeAsString(proxiedPlaylist); + } catch (PlaylistParseException e) { + e.printStackTrace(); + } + throw new IllegalStateException("Unknown playlist format"); + } + + /** + * Process a variant and rewrite its URI + */ + private Variant proxyVariant(Variant variant, String base, String proxyUrl) { + if (variant.uri() == null) { + logger.error("cannot proxy variant: {}", variant); + return variant; + } + String variantUri = base + variant.uri(); + String proxiedUri = urlForwardService.createForwarded(variantUri); + return Variant.builder() + .from(variant) + .uri(proxiedUri) + .build(); + } + + /** + * Process a rendition and rewrite its URI + */ + private AlternativeRendition proxyRendition(AlternativeRendition rendition, String base, String proxyUrl) { + if (rendition.uri().isEmpty()) { + return rendition; + } + String renditionUri = base + rendition.uri().get(); + String proxiedUri = urlForwardService.createForwarded(renditionUri); + return AlternativeRendition.builder() + .from(rendition) + .uri(proxiedUri) + .build(); + } + + /** + * Process a segment and rewrite its URI + */ + private MediaSegment proxySegment(MediaSegment segment, String base, String proxyUrl) { + if (segment.uri() == null) { + logger.error("cannot proxy segment: {}", segment); + return segment; + } + + String segmentUri = base + segment.uri(); + String proxiedUri = urlForwardService.createForwarded(segmentUri); + + MediaSegment.Builder builder = MediaSegment.builder() + .from(segment) + .uri(proxiedUri); + if (segment.segmentMap().isPresent()) { + builder.segmentMap(proxySegmentMap(segment.segmentMap().get(), base, proxyUrl)); + } + return builder.build(); + } + + /** + * Process a partial segment and rewrite its URI + */ + private PartialSegment proxyPartialSegment(PartialSegment segment, String base, String proxyUrl) { + if (segment.uri() == null) { + logger.error("cannot proxy segment: {}", segment); + return segment; + } + String segmentUri = base + segment.uri(); + String proxiedUri = urlForwardService.createForwarded(segmentUri); + return PartialSegment.builder() + .from(segment) + .uri(proxiedUri) + .build(); + } + + /** + * Process a segment map and rewrite its URI + */ + private SegmentMap proxySegmentMap(SegmentMap segmentMap, String base, String proxyUrl) { + if (segmentMap.uri() == null) { + logger.error("cannot proxy segment: {}", segmentMap); + return segmentMap; + } + String segmentMapUri = base + segmentMap.uri(); + String proxiedUri = urlForwardService.createForwarded(segmentMapUri); + return SegmentMap.builder() + .from(segmentMap) + .uri(proxiedUri) + .build(); + } + +} diff --git a/src/main/java/com/backend/hls/proxy/service/URLForwardService.java b/src/main/java/com/backend/hls/proxy/service/URLForwardService.java new file mode 100644 index 0000000..8cd2e94 --- /dev/null +++ b/src/main/java/com/backend/hls/proxy/service/URLForwardService.java @@ -0,0 +1,39 @@ +package com.backend.hls.proxy.service; + +import java.util.Optional; +import java.util.UUID; + +import org.springframework.stereotype.Service; + +import com.backend.hls.proxy.model.Link; +import com.backend.hls.proxy.repository.LinkRepository; + +@Service +public class URLForwardService { + private final LinkRepository linkRepository; + + public URLForwardService(LinkRepository linkRepository) { + this.linkRepository = linkRepository; + } + + public String createForwarded(String originalUrl) { + String suffix = ""; + if (originalUrl.contains(".")) { + suffix = originalUrl.substring(originalUrl.lastIndexOf(".")); + } + + Optional existingLink = linkRepository.findFirstByUrl(originalUrl); + if (existingLink.isPresent()) { + return wrapId(existingLink.get().getId() + suffix); + } + UUID uuid = UUID.randomUUID(); + linkRepository.save(new Link(uuid.toString(), originalUrl)); + + return wrapId(uuid.toString() + suffix); + } + + private String wrapId(String id) { + return "/proxy/" + id; + } + +} diff --git a/src/main/resources/application.properties b/src/main/resources/application.properties new file mode 100644 index 0000000..015ed27 --- /dev/null +++ b/src/main/resources/application.properties @@ -0,0 +1,3 @@ +spring.application.name=hls-proxy +eureka.client.serviceUrl.defaultZone: ${EUREKA_SCHEMA}://${EUREKA_HOST}/eureka/ + diff --git a/src/test/java/com/backend/hls/proxy/HlsProxyApplicationTests.java b/src/test/java/com/backend/hls/proxy/HlsProxyApplicationTests.java new file mode 100644 index 0000000..31ef762 --- /dev/null +++ b/src/test/java/com/backend/hls/proxy/HlsProxyApplicationTests.java @@ -0,0 +1,13 @@ +package com.backend.hls.proxy; + +import org.junit.jupiter.api.Test; +import org.springframework.boot.test.context.SpringBootTest; + +@SpringBootTest +class HlsProxyApplicationTests { + + @Test + void contextLoads() { + } + +}