{"id":201342,"date":"2025-05-10T09:47:54","date_gmt":"2025-05-10T01:47:54","guid":{"rendered":"https:\/\/server.hk\/cnblog\/201342\/"},"modified":"2025-05-10T09:47:54","modified_gmt":"2025-05-10T01:47:54","slug":"%e4%bd%bf%e7%94%a8aopredislua%e5%81%9a%e6%96%b9%e6%b3%95%e9%99%90%e6%b5%81%e7%9a%84%e5%ae%9e%e7%8e%b0","status":"publish","type":"post","link":"https:\/\/server.hk\/cnblog\/201342\/","title":{"rendered":"\u4f7f\u7528AOP+redis+lua\u505a\u65b9\u6cd5\u9650\u6d41\u7684\u5b9e\u73b0"},"content":{"rendered":"<p><b><\/b> <\/p>\n<h1>\u4f7f\u7528AOP+redis+lua\u505a\u65b9\u6cd5\u9650\u6d41\u7684\u5b9e\u73b0<\/h1>\n<p><span style=\"cursor: pointer\"><i><\/i>\u6536\u85cf<\/span> <\/p>\n<p>\u77e5\u8bc6\u70b9\u638c\u63e1\u4e86\uff0c\u8fd8\u9700\u8981\u4e0d\u65ad\u7ec3\u4e60\u624d\u80fd\u719f\u7ec3\u8fd0\u7528\u3002\u4e0b\u9762golang\u5b66\u4e60\u7f51\u7ed9\u5927\u5bb6\u5e26\u6765\u4e00\u4e2a\u6570\u636e\u5e93\u5f00\u53d1\u5b9e\u6218\uff0c\u624b\u628a\u624b\u6559\u5927\u5bb6\u5b66\u4e60\u300a\u4f7f\u7528AOP+redis+lua\u505a\u65b9\u6cd5\u9650\u6d41\u7684\u5b9e\u73b0\u300b\uff0c\u5728\u5b9e\u73b0\u529f\u80fd\u7684\u8fc7\u7a0b\u4e2d\u4e5f\u5e26\u5927\u5bb6\u91cd\u65b0\u6e29\u4e60\u76f8\u5173\u77e5\u8bc6\u70b9\uff0c\u6e29\u6545\u800c\u77e5\u65b0\uff0c\u56de\u5934\u770b\u770b\u8bf4\u4e0d\u5b9a\u53c8\u6709\u4e0d\u4e00\u6837\u7684\u611f\u609f\uff01<\/p>\n<h2>\u9700\u6c42<\/h2>\n<blockquote>\n<p>\u516c\u53f8\u91cc\u4f7f\u7528OneByOne\u7684\u65b9\u5f0f\u5220\u9664\u6570\u636e\uff0c\u4e3a\u4e86\u9632\u6b62\u4e00\u6bb5\u65f6\u95f4\u5185\u5220\u9664\u6570\u636e\u8fc7\u591a\uff0c\u8ba9\u6211\u8fd9\u8fb9\u505a\u4e00\u4e2a\u63a5\u53e3\u9650\u6d41\uff0c\u8d85\u8fc7\u4e00\u5b9a\u9608\u503c\u540e\u62a5\u5f02\u5e38\uff0c\u7ec8\u6b62\u5220\u9664\u64cd\u4f5c\u3002<\/p>\n<\/blockquote>\n<h2>\u5b9e\u73b0\u65b9\u5f0f<\/h2>\n<blockquote>\n<p>\u521b\u5efa\u81ea\u5b9a\u4e49\u6ce8\u89e3 <code>@limit<\/code> \u8ba9\u4f7f\u7528\u8005\u5728\u9700\u8981\u7684\u5730\u65b9\u914d\u7f6e <code>count(\u4e00\u5b9a\u65f6\u95f4\u5185\u6700\u591a\u8bbf\u95ee\u6b21\u6570)<\/code>\u3001 <code>period(\u7ed9\u5b9a\u7684\u65f6\u95f4\u8303\u56f4)<\/code>\uff0c\u4e5f\u5c31\u662f\u8bbf\u95ee\u9891\u7387\u3002\u7136\u540e\u901a\u8fc7<code>LimitInterceptor<\/code>\u62e6\u622a\u65b9\u6cd5\u7684\u8bf7\u6c42\uff0c \u901a\u8fc7 redis+lua \u811a\u672c\u7684\u65b9\u5f0f\uff0c\u63a7\u5236\u8bbf\u95ee\u9891\u7387\u3002<\/p>\n<\/blockquote>\n<h2>\u6e90\u7801<\/h2>\n<h3>Limit \u6ce8\u89e3<\/h3>\n<blockquote>\n<p>\u7528\u4e8e\u914d\u7f6e\u65b9\u6cd5\u7684\u8bbf\u95ee\u9891\u7387count\u3001period<\/p>\n<\/blockquote>\n<pre>import javax.validation.constraints.Min;\nimport java.lang.annotation.*;\n@Target({ElementType.METHOD, ElementType.TYPE})\n@Retention(RetentionPolicy.RUNTIME)\n@Inherited\n@Documented\npublic @interface Limit {\n    \/**\n     * key\n     *\/\n    String key() default \"\";\n    \/**\n     * Key\u7684\u524d\u7f00\n     *\/\n    String prefix() default \"\";\n    \/**\n     * \u4e00\u5b9a\u65f6\u95f4\u5185\u6700\u591a\u8bbf\u95ee\u6b21\u6570\n     *\/\n    @Min(1)\n    int count();\n    \/**\n     * \u7ed9\u5b9a\u7684\u65f6\u95f4\u8303\u56f4 \u5355\u4f4d(\u79d2)\n     *\/\n    @Min(1)\n    int period();\n    \/**\n     * \u9650\u6d41\u7684\u7c7b\u578b(\u7528\u6237\u81ea\u5b9a\u4e49key\u6216\u8005\u8bf7\u6c42ip)\n     *\/\n    LimitType limitType() default LimitType.CUSTOMER;\n}<\/pre>\n<h3>LimitKey<\/h3>\n<blockquote>\n<p>\u7528\u4e8e\u6807\u8bb0\u53c2\u6570\uff0c\u4f5c\u4e3aredis key\u503c\u7684\u4e00\u90e8\u5206<\/p>\n<\/blockquote>\n<pre>import java.lang.annotation.ElementType;\nimport java.lang.annotation.Retention;\nimport java.lang.annotation.RetentionPolicy;\nimport java.lang.annotation.Target;\n@Target(ElementType.PARAMETER)\n@Retention(RetentionPolicy.RUNTIME)\npublic @interface LimitKey {\n}<\/pre>\n<h3>LimitType<\/h3>\n<blockquote>\n<p>\u679a\u4e3e\uff0credis key\u503c\u7684\u7c7b\u578b\uff0c\u652f\u6301\u81ea\u5b9a\u4e49key\u548cip\u3001methodName\u4e2d\u83b7\u53d6key<\/p>\n<\/blockquote>\n<pre>public enum LimitType {\n    \/**\n     * \u81ea\u5b9a\u4e49key\n     *\/\n    CUSTOMER,\n    \/**\n     * \u8bf7\u6c42\u8005IP\n     *\/\n    IP,\n    \/**\n     * \u65b9\u6cd5\u540d\u79f0\n     *\/\n    METHOD_NAME;\n}<\/pre>\n<h3>RedisLimiterHelper<\/h3>\n<blockquote>\n<p>\u521d\u59cb\u5316\u4e00\u4e2a\u9650\u6d41\u7528\u5230\u7684redisTemplate Bean<\/p>\n<\/blockquote>\n<pre>import org.springframework.beans.factory.annotation.Qualifier;\nimport org.springframework.context.annotation.Bean;\nimport org.springframework.context.annotation.Configuration;\nimport org.springframework.data.redis.core.RedisTemplate;\nimport org.springframework.data.redis.core.StringRedisTemplate;\nimport org.springframework.data.redis.serializer.GenericJackson2JsonRedisSerializer;\nimport org.springframework.data.redis.serializer.StringRedisSerializer;\nimport java.io.Serializable;\n@Configuration\npublic class RedisLimiterHelper {\n    @Bean\n    public RedisTemplate\n   \n     limitRedisTemplate(@Qualifier(\"defaultStringRedisTemplate\") StringRedisTemplate redisTemplate) {\n        RedisTemplate\n    \n      template = new RedisTemplate\n     \n      (); template.setKeySerializer(new StringRedisSerializer()); template.setValueSerializer(new GenericJackson2JsonRedisSerializer()); template.setConnectionFactory(redisTemplate.getConnectionFactory()); return template; } }\n     \n    \n   <\/pre>\n<h3>LimitInterceptor<\/h3>\n<blockquote>\n<p>\u4f7f\u7528 aop \u7684\u65b9\u5f0f\u6765\u62e6\u622a\u8bf7\u6c42\uff0c\u63a7\u5236\u8bbf\u95ee\u9891\u7387<\/p>\n<\/blockquote>\n<pre>import com.google.common.collect.ImmutableList;\nimport com.yxt.qida.api.bean.service.xxv2.openapi.anno.Limit;\nimport com.yxt.qida.api.bean.service.xxv2.openapi.anno.LimitKey;\nimport com.yxt.qida.api.bean.service.xxv2.openapi.anno.LimitType;\nimport lombok.extern.slf4j.Slf4j;\nimport org.apache.commons.lang3.ArrayUtils;\nimport org.apache.commons.lang3.StringUtils;\nimport org.aspectj.lang.ProceedingJoinPoint;\nimport org.aspectj.lang.annotation.Around;\nimport org.aspectj.lang.annotation.Aspect;\nimport org.aspectj.lang.reflect.MethodSignature;\nimport org.springframework.beans.factory.annotation.Autowired;\nimport org.springframework.context.annotation.Configuration;\nimport org.springframework.data.redis.core.RedisTemplate;\nimport org.springframework.data.redis.core.script.DefaultRedisScript;\nimport org.springframework.data.redis.core.script.RedisScript;\nimport org.springframework.web.context.request.RequestContextHolder;\nimport org.springframework.web.context.request.ServletRequestAttributes;\nimport javax.servlet.http.HttpServletRequest;\nimport java.io.Serializable;\nimport java.lang.annotation.Annotation;\nimport java.lang.reflect.Method;\n@Slf4j\n@Aspect\n@Configuration\npublic class LimitInterceptor {\n    private static final String UNKNOWN = \"unknown\";\n    private final RedisTemplate\n   \n     limitRedisTemplate;\n    @Autowired\n    public LimitInterceptor(RedisTemplate\n    \n      limitRedisTemplate) { this.limitRedisTemplate = limitRedisTemplate; } @Around(\"execution(public * *(..)) &amp;&amp; @annotation(com.yxt.qida.api.bean.service.xxv2.openapi.anno.Limit)\") public Object interceptor(ProceedingJoinPoint pjp) { MethodSignature signature = (MethodSignature) pjp.getSignature(); Method method = signature.getMethod(); Limit limitAnnotation = method.getAnnotation(Limit.class); LimitType limitType = limitAnnotation.limitType(); int limitPeriod = limitAnnotation.period(); int limitCount = limitAnnotation.count(); \/** * \u6839\u636e\u9650\u6d41\u7c7b\u578b\u83b7\u53d6\u4e0d\u540c\u7684key ,\u5982\u679c\u4e0d\u4f20\u6211\u4eec\u4f1a\u4ee5\u65b9\u6cd5\u540d\u4f5c\u4e3akey *\/ String key; switch (limitType) { case IP: key = getIpAddress(); break; case CUSTOMER: key = limitAnnotation.key(); break; case METHOD_NAME: String methodName = method.getName(); key = StringUtils.upperCase(methodName); break; default: throw new RuntimeException(\"limitInterceptor - \u65e0\u6548\u7684\u679a\u4e3e\u503c\"); } \/** * \u83b7\u53d6\u6ce8\u89e3\u6807\u6ce8\u7684 key\uff0c\u8fd9\u4e2a\u662f\u4f18\u5148\u7ea7\u6700\u9ad8\u7684\uff0c\u4f1a\u8986\u76d6\u524d\u9762\u7684 key \u503c *\/ Object[] args = pjp.getArgs(); Annotation[][] paramAnnoAry = method.getParameterAnnotations(); for (Annotation[] item : paramAnnoAry) { int paramIndex = ArrayUtils.indexOf(paramAnnoAry, item); for (Annotation anno : item) { if (anno instanceof LimitKey) { Object arg = args[paramIndex]; if (arg instanceof String &amp;&amp; StringUtils.isNotBlank((String) arg)) { key = (String) arg; break; } } } } if (StringUtils.isBlank(key)) { throw new RuntimeException(\"limitInterceptor - key\u503c\u4e0d\u80fd\u4e3a\u7a7a\"); } String prefix = limitAnnotation.prefix(); String[] keyAry = StringUtils.isBlank(prefix) ? new String[]{\"limit\", key} : new String[]{\"limit\", prefix, key}; ImmutableList\n     \n       keys = ImmutableList.of(StringUtils.join(keyAry, \"-\")); try { String luaScript = buildLuaScript(); RedisScript\n      \n        redisScript = new DefaultRedisScript\n       \n        (luaScript, Number.class); Number count = limitRedisTemplate.execute(redisScript, keys, limitCount, limitPeriod); if (count != null &amp;&amp; count.intValue() tonumber(ARGV[1]) then\"); lua.append(\"\\nreturn c;\"); lua.append(\"\\nend\"); \/\/ \u6267\u884c\u8ba1\u7b97\u5668\u81ea\u52a0 lua.append(\"\\nc = redis.call('incr',KEYS[1])\"); lua.append(\"\\nif tonumber(c) == 1 then\"); \/\/ \u4ece\u7b2c\u4e00\u6b21\u8c03\u7528\u5f00\u59cb\u9650\u6d41\uff0c\u8bbe\u7f6e\u5bf9\u5e94\u952e\u503c\u7684\u8fc7\u671f lua.append(\"\\nredis.call('expire',KEYS[1],ARGV[2])\"); lua.append(\"\\nend\"); lua.append(\"\\nreturn c;\"); return lua.toString(); } public String getIpAddress() { HttpServletRequest request = ((ServletRequestAttributes) RequestContextHolder.getRequestAttributes()).getRequest(); String ip = request.getHeader(\"x-forwarded-for\"); if (ip == null || ip.length() == 0 || UNKNOWN.equalsIgnoreCase(ip)) { ip = request.getHeader(\"Proxy-Client-IP\"); } if (ip == null || ip.length() == 0 || UNKNOWN.equalsIgnoreCase(ip)) { ip = request.getHeader(\"WL-Proxy-Client-IP\"); } if (ip == null || ip.length() == 0 || UNKNOWN.equalsIgnoreCase(ip)) { ip = request.getRemoteAddr(); } return ip; } }\n       \n      \n     \n    \n   <\/pre>\n<h3>TestService<\/h3>\n<blockquote>\n<p>\u4f7f\u7528\u65b9\u5f0f\u793a\u4f8b<\/p>\n<\/blockquote>\n<pre>    @Limit(period = 10, count = 10)\n    public String delUserByUrlTest(@LimitKey String token, String thirdId, String url) throws IOException {\n        return \"success\";\n    }<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>\u4f7f\u7528AOP+redis+lua\u505a&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[101],"tags":[],"class_list":["post-201342","post","type-post","status-publish","format-standard","hentry","category-database"],"_links":{"self":[{"href":"https:\/\/server.hk\/cnblog\/wp-json\/wp\/v2\/posts\/201342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/server.hk\/cnblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/server.hk\/cnblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/server.hk\/cnblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/server.hk\/cnblog\/wp-json\/wp\/v2\/comments?post=201342"}],"version-history":[{"count":0,"href":"https:\/\/server.hk\/cnblog\/wp-json\/wp\/v2\/posts\/201342\/revisions"}],"wp:attachment":[{"href":"https:\/\/server.hk\/cnblog\/wp-json\/wp\/v2\/media?parent=201342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/server.hk\/cnblog\/wp-json\/wp\/v2\/categories?post=201342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/server.hk\/cnblog\/wp-json\/wp\/v2\/tags?post=201342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}