限流
本文的限流指的是系统接口访问次数进行限制,某些特定的接口因为安全等问题需要每分钟/小时
对用户调用进行限制,此处采用redis+aop+注解 方式编写简单的限流方案
限流类
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
|
@Component public class RateLimiter {
@Resource private StringRedisTemplate stringRedisTemplate;
private static final String RATE_LIMITING_PREFIX = "rate_limiting_";
private static final Long RATE_LIMITING_COUNT = 5L;
private static final Long RATE_LIMITING_TIME = 60L;
public boolean checkRateLimitingByTokenBucket(Long userId) { String tokenBucketKey = RATE_LIMITING_PREFIX + userId; Long currentTokens = stringRedisTemplate.opsForValue().increment(tokenBucketKey, 1); if (currentTokens != null && currentTokens == 1) { stringRedisTemplate.expire(tokenBucketKey, RATE_LIMITING_TIME, TimeUnit.SECONDS); return true; }
if (currentTokens <= RATE_LIMITING_COUNT) { return true; } return false; }
}
|
aop
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
| @Component @Aspect @Slf4j public class RateLimiterAop {
@Pointcut("@annotation(com.zself.zselfapi.common.annotation.RateLimiter)") public void rateLimiter() { }
@Resource private RateLimiter rateLimiter;
@Resource private SessionHelper sessionHelper;
@Around("rateLimiter()") public Object around(ProceedingJoinPoint point) { boolean isNormal = rateLimiter.checkRateLimitingByTokenBucket(sessionHelper.getUserId()); Assert.isTrue(isNormal,"一分钟访问频超过5次辣");
Object obj = null; try { obj = point.proceed(point.getArgs()); } catch (Throwable e) { e.printStackTrace(); } return obj; } }
|
注解
1 2 3 4 5 6 7 8 9
|
@Documented @Inherited @Target(ElementType.METHOD) @Retention(RetentionPolicy.RUNTIME) public @interface RateLimiter { }
|
使用方式
1 2 3 4 5 6 7
| @GetMapping("redisKeys") @RateLimiter public Map<String, String> getRedisAllKeys( @ApiParam("keyName") @RequestParam String keyName ) { return debugManager.getRedisAllKeys(keyName); }
|