|
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296 |
- # spring-boot-demo-ratelimit-redis
-
- > 此 demo 主要演示了 Spring Boot 项目如何通过 AOP 结合 Redis + Lua 脚本实现分布式限流,旨在保护 API 被恶意频繁访问的问题,是 `spring-boot-demo-ratelimit-guava` 的升级版。
-
- ## 1. 主要代码
-
- ### 1.1. pom.xml
-
- ```xml
- <?xml version="1.0" encoding="UTF-8"?>
- <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
- xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd">
- <modelVersion>4.0.0</modelVersion>
-
- <artifactId>spring-boot-demo-ratelimit-redis</artifactId>
- <version>1.0.0-SNAPSHOT</version>
- <packaging>jar</packaging>
-
- <name>spring-boot-demo-ratelimit-redis</name>
- <description>Demo project for Spring Boot</description>
-
- <parent>
- <groupId>com.xkcoding</groupId>
- <artifactId>spring-boot-demo</artifactId>
- <version>1.0.0-SNAPSHOT</version>
- </parent>
-
- <properties>
- <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
- <project.reporting.outputEncoding>UTF-8</project.reporting.outputEncoding>
- <java.version>1.8</java.version>
- </properties>
-
- <dependencies>
- <dependency>
- <groupId>org.springframework.boot</groupId>
- <artifactId>spring-boot-starter-web</artifactId>
- </dependency>
-
- <dependency>
- <groupId>org.springframework.boot</groupId>
- <artifactId>spring-boot-starter-aop</artifactId>
- </dependency>
-
- <dependency>
- <groupId>org.springframework.boot</groupId>
- <artifactId>spring-boot-starter-data-redis</artifactId>
- </dependency>
-
- <!-- 对象池,使用redis时必须引入 -->
- <dependency>
- <groupId>org.apache.commons</groupId>
- <artifactId>commons-pool2</artifactId>
- </dependency>
-
- <dependency>
- <groupId>cn.hutool</groupId>
- <artifactId>hutool-all</artifactId>
- </dependency>
-
- <dependency>
- <groupId>org.springframework.boot</groupId>
- <artifactId>spring-boot-starter-test</artifactId>
- <scope>test</scope>
- </dependency>
-
- <dependency>
- <groupId>org.projectlombok</groupId>
- <artifactId>lombok</artifactId>
- <optional>true</optional>
- </dependency>
- </dependencies>
-
- <build>
- <finalName>spring-boot-demo-ratelimit-redis</finalName>
- <plugins>
- <plugin>
- <groupId>org.springframework.boot</groupId>
- <artifactId>spring-boot-maven-plugin</artifactId>
- </plugin>
- </plugins>
- </build>
-
- </project>
- ```
-
- ### 1.2. 限流注解
-
- ```java
- /**
- * <p>
- * 限流注解,添加了 {@link AliasFor} 必须通过 {@link AnnotationUtils} 获取,才会生效
- * </p>
- *
- * @author yangkai.shen
- * @date Created in 2019-09-30 10:31
- * @see AnnotationUtils
- */
- @Target(ElementType.METHOD)
- @Retention(RetentionPolicy.RUNTIME)
- @Documented
- public @interface RateLimiter {
- long DEFAULT_REQUEST = 10;
-
- /**
- * max 最大请求数
- */
- @AliasFor("max") long value() default DEFAULT_REQUEST;
-
- /**
- * max 最大请求数
- */
- @AliasFor("value") long max() default DEFAULT_REQUEST;
-
- /**
- * 限流key
- */
- String key() default "";
-
- /**
- * 超时时长,默认1分钟
- */
- long timeout() default 1;
-
- /**
- * 超时时间单位,默认 分钟
- */
- TimeUnit timeUnit() default TimeUnit.MINUTES;
- }
- ```
-
- ### 1.3. AOP处理限流
-
- ```java
- /**
- * <p>
- * 限流切面
- * </p>
- *
- * @author yangkai.shen
- * @date Created in 2019-09-30 10:30
- */
- @Slf4j
- @Aspect
- @Component
- @RequiredArgsConstructor(onConstructor_ = @Autowired)
- public class RateLimiterAspect {
- private final static String SEPARATOR = ":";
- private final static String REDIS_LIMIT_KEY_PREFIX = "limit:";
- private final StringRedisTemplate stringRedisTemplate;
- private final RedisScript<Long> limitRedisScript;
-
- @Pointcut("@annotation(com.xkcoding.ratelimit.redis.annotation.RateLimiter)")
- public void rateLimit() {
-
- }
-
- @Around("rateLimit()")
- public Object pointcut(ProceedingJoinPoint point) throws Throwable {
- MethodSignature signature = (MethodSignature) point.getSignature();
- Method method = signature.getMethod();
- // 通过 AnnotationUtils.findAnnotation 获取 RateLimiter 注解
- RateLimiter rateLimiter = AnnotationUtils.findAnnotation(method, RateLimiter.class);
- if (rateLimiter != null) {
- String key = rateLimiter.key();
- // 默认用类名+方法名做限流的 key 前缀
- if (StrUtil.isBlank(key)) {
- key = method.getDeclaringClass().getName()+StrUtil.DOT+method.getName();
- }
- // 最终限流的 key 为 前缀 + IP地址
- // TODO: 此时需要考虑局域网多用户访问的情况,因此 key 后续需要加上方法参数更加合理
- key = key + SEPARATOR + IpUtil.getIpAddr();
-
- long max = rateLimiter.max();
- long timeout = rateLimiter.timeout();
- TimeUnit timeUnit = rateLimiter.timeUnit();
- boolean limited = shouldLimited(key, max, timeout, timeUnit);
- if (limited) {
- throw new RuntimeException("手速太快了,慢点儿吧~");
- }
- }
-
- return point.proceed();
- }
-
- private boolean shouldLimited(String key, long max, long timeout, TimeUnit timeUnit) {
- // 最终的 key 格式为:
- // limit:自定义key:IP
- // limit:类名.方法名:IP
- key = REDIS_LIMIT_KEY_PREFIX + key;
- // 统一使用单位毫秒
- long ttl = timeUnit.toMillis(timeout);
- // 当前时间毫秒数
- long now = Instant.now().toEpochMilli();
- long expired = now - ttl;
- // 注意这里必须转为 String,否则会报错 java.lang.Long cannot be cast to java.lang.String
- Long executeTimes = stringRedisTemplate.execute(limitRedisScript, Collections.singletonList(key), now + "", ttl + "", expired + "", max + "");
- if (executeTimes != null) {
- if (executeTimes == 0) {
- log.error("【{}】在单位时间 {} 毫秒内已达到访问上限,当前接口上限 {}", key, ttl, max);
- return true;
- } else {
- log.info("【{}】在单位时间 {} 毫秒内访问 {} 次", key, ttl, executeTimes);
- return false;
- }
- }
- return false;
- }
- }
- ```
-
- ### 1.4. lua 脚本
-
- ```lua
- -- 下标从 1 开始
- local key = KEYS[1]
- local now = tonumber(ARGV[1])
- local ttl = tonumber(ARGV[2])
- local expired = tonumber(ARGV[3])
- -- 最大访问量
- local max = tonumber(ARGV[4])
-
- -- 清除过期的数据
- -- 移除指定分数区间内的所有元素,expired 即已经过期的 score
- -- 根据当前时间毫秒数 - 超时毫秒数,得到过期时间 expired
- redis.call('zremrangebyscore', key, 0, expired)
-
- -- 获取 zset 中的当前元素个数
- local current = tonumber(redis.call('zcard', key))
- local next = current + 1
-
- if next > max then
- -- 达到限流大小 返回 0
- return 0;
- else
- -- 往 zset 中添加一个值、得分均为当前时间戳的元素,[value,score]
- redis.call("zadd", key, now, now)
- -- 每次访问均重新设置 zset 的过期时间,单位毫秒
- redis.call("pexpire", key, ttl)
- return next
- end
- ```
-
- ### 1.5. 接口测试
-
- ```java
- /**
- * <p>
- * 测试
- * </p>
- *
- * @author yangkai.shen
- * @date Created in 2019-09-30 10:30
- */
- @Slf4j
- @RestController
- public class TestController {
-
- @RateLimiter(value = 5)
- @GetMapping("/test1")
- public Dict test1() {
- log.info("【test1】被执行了。。。。。");
- return Dict.create().set("msg", "hello,world!").set("description", "别想一直看到我,不信你快速刷新看看~");
- }
-
- @GetMapping("/test2")
- public Dict test2() {
- log.info("【test2】被执行了。。。。。");
- return Dict.create().set("msg", "hello,world!").set("description", "我一直都在,卟离卟弃");
- }
-
- @RateLimiter(value = 2, key = "测试自定义key")
- @GetMapping("/test3")
- public Dict test3() {
- log.info("【test3】被执行了。。。。。");
- return Dict.create().set("msg", "hello,world!").set("description", "别想一直看到我,不信你快速刷新看看~");
- }
- }
- ```
-
- ### 1.6. 其余代码参见 demo
-
- ## 2. 测试
-
- - 触发限流时控制台打印
-
- 
-
- - 触发限流的时候 Redis 的数据
-
- 
-
- ## 3. 参考
-
- - [mica-plus-redis 的分布式限流实现](https://github.com/lets-mica/mica/tree/master/mica-plus-redis)
- - [Java并发:分布式应用限流 Redis + Lua 实践](https://segmentfault.com/a/1190000016042927)
|