SpringBoot使用Redis实现限流案例

一、目标

通过注解的形式限制某个用户访问API的访问频率

二、案例代码

1)、定义注解

定义注解:用于自定义限制任意频次接口访问

@Target({ElementType.METHOD, ElementType.TYPE})
@Retention(RetentionPolicy.RUNTIME)
public @interface RequestLimit {

    //限制访问次数
    int limitCount() default 3;

    //超时时间
    long expireTime() default 60L;

    //请求url
    String requestUrl() default "";
}

定义注解:用于限制某个接口当天访问频次

@Target({ElementType.METHOD, ElementType.TYPE})
@Retention(RetentionPolicy.RUNTIME)
public @interface RequestDayLimit {
    //限制访问次数
    int limitCount() default 3;

    //请求url
    String requestUrl() default "";
}

2)、编写AOP

@Aspect
@Component
public class RequestLimitAspect {

    @Autowired
    private RedisTemplate redisTemplate;

    @Autowired
    private OpenJwtUtils openJwtUtils;

    @Pointcut("@annotation(requestLimit)")
    public void limit(RequestLimit requestLimit) {}

    @Pointcut("@annotation(requestDayLimit)")
    public void dayLimit(RequestDayLimit requestDayLimit) {}

    @Around("limit(requestLimit)")
    public Object requestLimitLog(ProceedingJoinPoint joinPoint, RequestLimit requestLimit) throws Throwable {
        ServletRequestAttributes attributes = (ServletRequestAttributes) RequestContextHolder.getRequestAttributes();
        HttpServletRequest request = null;
        TmsUserInfo tmsUserInfo =null;
        if (attributes != null) {
            request = attributes.getRequest();
            //解析jwt token
            tmsUserInfo = getTmsUserInfo(request);
        }
        if (request != null) {
            String key ="requestLimit-"+requestLimit.requestUrl()+"-"+tmsUserInfo.getId();
            //从redis获取值次数
            Long count = redisTemplate.opsForValue().increment(key, 1);
            if (count == 1) {
                redisTemplate.expire(key, requestLimit.expireTime(), TimeUnit.SECONDS);
            }
            if (count >= requestLimit.limitCount()) {
                //超过限制次数返回对应枚举值
                throw new CommonException(CommonErrorCode.TOO_MANY_REQUESTS);
            }
        }
        return joinPoint.proceed();
    }

    @Around("dayLimit(requestDayLimit)")
    public Object requestDayLimitLog(ProceedingJoinPoint joinPoint, RequestDayLimit requestDayLimit) throws Throwable {
        ServletRequestAttributes attributes = (ServletRequestAttributes) RequestContextHolder.getRequestAttributes();
        HttpServletRequest request = null;
        TmsUserInfo tmsUserInfo =null;
        if (attributes != null) {
            request = attributes.getRequest();
            //解析jwt token
            tmsUserInfo = getTmsUserInfo(request);
        }
        if (request != null) {
            String key ="requestDayLimit-"+requestDayLimit.requestUrl()+"-"+tmsUserInfo.getId();
            //从redis获取值次数
            Long count = redisTemplate.opsForValue().increment(key, 1);
            if (count == 1) {
                Date start = new Date();
                DateTime endOfDay = DateUtil.endOfDay(start);
                //当天还剩多少s
                long betweenSecond = DateUtil.between(start, endOfDay, DateUnit.SECOND);
                redisTemplate.expire(key, betweenSecond, TimeUnit.SECONDS);
            }
            if (count >= requestDayLimit.limitCount()) {
                //超过限制次数返回对应枚举值
                throw new CommonException(CommonErrorCode.DAILY_TOO_MANY_REQUESTS);
            }
        }
        return joinPoint.proceed();
    }

}

3)、测试案例

每天访问5次接口

    @GetMapping("/dynamicDb")
    @RequestDayLimit(requestUrl = "/dynamicDb", limitCount = 5)
    public R sayHi(){
        ...
        return R.ok();
    }

三、案例改造

当并发的时候,从Redis拿次数,假设第一次拿,设置key成功了,然后超时导致设置ttl失败,这个数据将永远无法过期,要解决这个问题需要把设置key和加1作为一个原子操作,我们可以通过lua脚本去处理。

改造以后的案例:

@Aspect
@Component
public class RequestLimitAspect {

    @Autowired
    private StringRedisTemplate redisTemplate;

    @Autowired
    private OpenJwtUtils openJwtUtils;

    @Pointcut("@annotation(requestLimit)")
    public void limit(RequestLimit requestLimit) {}

    @Pointcut("@annotation(requestDayLimit)")
    public void dayLimit(RequestDayLimit requestDayLimit) {}

    @Around("limit(requestLimit)")
    public Object requestLimitLog(ProceedingJoinPoint joinPoint, RequestLimit requestLimit) throws Throwable {
        ServletRequestAttributes attributes = (ServletRequestAttributes) RequestContextHolder.getRequestAttributes();
        HttpServletRequest request = null;
        TmsUserInfo tmsUserInfo =null;
        if (attributes != null) {
            request = attributes.getRequest();
            //解析jwt token
            tmsUserInfo = getTmsUserInfo(request);
        }
        if (request != null) {
            String key ="requestLimit-"+requestLimit.requestUrl()+"-"+tmsUserInfo.getId();
            ImmutableList<String> keys = ImmutableList.of(key);
            String luaScript = buildLuaScript();
            RedisScript<Number> redisScript = new DefaultRedisScript<>(luaScript, Number.class);
            Number count =  redisTemplate.execute(redisScript, keys, String.valueOf(requestLimit.limitCount()),String.valueOf(requestLimit.expireTime()));
            if (count != null && count.intValue() <= requestLimit.limitCount()) {
                return joinPoint.proceed();
            } else {
                throw new CommonException(CommonErrorCode.DAILY_TOO_MANY_REQUESTS);
            }
        }
        return joinPoint.proceed();
    }

    @Around("dayLimit(requestDayLimit)")
    public Object requestDayLimitLog(ProceedingJoinPoint joinPoint, RequestDayLimit requestDayLimit) throws Throwable {
        ServletRequestAttributes attributes = (ServletRequestAttributes) RequestContextHolder.getRequestAttributes();
        HttpServletRequest request = null;
        TmsUserInfo tmsUserInfo =null;
        if (attributes != null) {
            request = attributes.getRequest();
            //解析jwt token
            tmsUserInfo = getTmsUserInfo(request);
        }
        if (request != null) {
            String key ="requestDayLimit-"+requestDayLimit.requestUrl()+"-"+tmsUserInfo.getId();
            ImmutableList<String> keys = ImmutableList.of(key);
            String luaScript = buildLuaScript();
            RedisScript<Number> redisScript = new DefaultRedisScript<>(luaScript, Number.class);
            Date start = new Date();
            DateTime endOfDay = DateUtil.endOfDay(start);
            //当天还剩多少s
            long betweenSecond = DateUtil.between(start, endOfDay, DateUnit.SECOND);
            Number count =  redisTemplate.execute(redisScript, keys, String.valueOf(requestDayLimit.limitCount()),String.valueOf(betweenSecond));
            if (count != null && count.intValue() <= requestDayLimit.limitCount()) {
                return joinPoint.proceed();
            } else {
                throw new CommonException(CommonErrorCode.DAILY_TOO_MANY_REQUESTS);
            }
        }
        return joinPoint.proceed();
    }

    /**
     * 获取当前用户信息
     * @param request 请求
     * @return TmsUserInfo
     */
    private TmsUserInfo getTmsUserInfo(HttpServletRequest request) {
        TmsUserInfo tmsUserInfo =null;
        Cookie cookie = ServletUtil.getCookie(request, CommonConstants.TMS_SOCIAL_TOKEN);
        String jwtHeader = ServletUtil.getHeaderIgnoreCase(request, CommonConstants.TMS_AUTHORIZATION);
        String bearer = StringUtils.remove(jwtHeader, "Bearer ");
        if (cookie != null || StringUtils.isNotEmpty(bearer)) {
            String jwt = cookie == null ? bearer : cookie.getValue();
            Claims claims = openJwtUtils.parseJwt(jwt);
            tmsUserInfo = BeanUtil.fillBeanWithMapIgnoreCase(claims, new TmsUserInfo(), false);
        }
        return tmsUserInfo;
    }

    /**
     * Lua 原子操作统计
     * @return String
     */
    private String buildLuaScript() {
        StringBuilder lua = new StringBuilder();
        lua.append("local c");
        lua.append("\nc = redis.call('GET',KEYS[1])");
        // 调用超过最大值,则直接返回
        lua.append("\nif c and tonumber(c) > tonumber(ARGV[1]) then");
        lua.append("\nreturn tonumber(c);");
        lua.append("\nend");
        // 执行计算器自加
        lua.append("\nc = redis.call('incr',KEYS[1])");
        lua.append("\nif tonumber(c) == 1 then");
        // 从第一次调用开始限流,设置对应键值的过期
        lua.append("\nredis.call('EXPIRE',KEYS[1],tonumber(ARGV[2]))");
        lua.append("\nend");
        lua.append("\nreturn c;");
        return lua.toString();
    }
}

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Spring Boot结合Redis实现接口限的步骤如下[^1][^2]: 1. 引入依赖:在Spring Boot项目的pom.xml文件中添加Redis和AOP的相关依赖。 2. 配置RedisTemplate:在Spring Boot的配置文件中配置Redis连接信息,包括主机名、端口号、密码等。 3. 创建自定义注解:使用@RateLimiter注解来标记需要进行接口限流的方法。 4. 编写切面类:创建一个切面类,使用@Aspect注解标记,并在该类中编写切点和通知方法。 5. 实现接口限流逻辑:在通知方法中,使用Redis的原子操作来实现接口限流的逻辑。可以使用Redis的incr命令来对接口访问次数进行计数,然后根据设定的阈值来判断是否限流。 6. 配置切面:在Spring Boot的配置类中,使用@EnableAspectJAutoProxy注解开启AOP功能,并将切面类添加到容器中。 7. 在需要进行接口限流的方法上添加注解:在需要进行接口限流的方法上添加@RateLimiter注解,并配置相关参数,如限流的阈值、时间窗口大小等。 8. 测试接口限流效果:启动Spring Boot应用程序,并访问限流接口,观察接口访问频率是否受到限制。 以下是一个示例代码,演示了如何使用Spring BootRedis实现接口限流: ```java // 1. 创建自定义注解 @Target(ElementType.METHOD) @Retention(RetentionPolicy.RUNTIME) public @interface RateLimiter { int value() default 10; // 默认限流阈值为10 int window() default 60; // 默认时间窗口为60秒 } // 2. 编写切面类 @Aspect @Component public class RateLimiterAspect { @Autowired private RedisTemplate<String, String> redisTemplate; @Around("@annotation(rateLimiter)") public Object around(ProceedingJoinPoint joinPoint, RateLimiter rateLimiter) throws Throwable { String methodName = joinPoint.getSignature().getName(); String key = "rate_limiter:" + methodName; int limit = rateLimiter.value(); int window = rateLimiter.window(); // 使用Redis的incr命令对接口访问次数进行计数 Long count = redisTemplate.opsForValue().increment(key, 1); if (count == 1) { // 设置过期时间,保证计数器在一定时间后自动清零 redisTemplate.expire(key, window, TimeUnit.SECONDS); } if (count > limit) { // 超过限流阈值,抛出异常或返回错误信息 throw new RuntimeException("接口访问频率超过限制"); } // 执行原方法 return joinPoint.proceed(); } } // 3. 在需要进行接口限流的方法上添加注解 @RestController public class DemoController { @RateLimiter(value = 5, window = 60) // 每分钟最多访问5次 @GetMapping("/demo") public String demo() { return "Hello World!"; } } ```

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值