spring boot+ redis 接口訪問頻率限制的實現(xiàn)
生產(chǎn)環(huán)境下可以解決的問題:
1.短信驗證碼請求評率限制(防止抓包短信轟炸)
2.熱點數(shù)據(jù)請求評率限制(防止數(shù)據(jù)庫爆炸)
@Componentpublic class BlackInterceper implements HandlerInterceptor { @Autowired private RedisTemplate<String, Object> redisTemplate; private Logger log = LoggerFactory.getLogger(this.getClass()); @Override public boolean preHandle(HttpServletRequest request, HttpServletResponse response, Object handler) throws Exception { response.setHeader('Content-type', 'text/html;charset=UTF-8'); String token = request.getHeader(Cons.TOKEN.WECHAT); String requestURI = request.getRequestURI(); if (StringUtils.isBlank(token)) { response.setHeader('Content-type', 'text/html;charset=UTF-8'); response.getWriter().write(JsonUtils.marshalToString(ReturnResult.build(401, '未授權'))); return false; } Integer userId = (Integer) redisTemplate.opsForValue().get(Cons.TOKEN.WECHAT + ':' + token); log.error('userId={},訪問了url={},請求ip={}',token,requestURI, IpUtil.getIpAddress(request)); if(redisTemplate.hasKey('black')){ if(redisTemplate.opsForSet().isMember('black', userId)){ response.getWriter().write(JsonUtils.marshalToString(ReturnResult.build(500, '由于存在惡意攻擊你已被限制訪問'))); return false; } } Integer count = (Integer)redisTemplate.opsForValue().get('limit:'+token); if(count==null){ redisTemplate.opsForValue().set('limit:'+token, 1, 60, TimeUnit.SECONDS); return true; }else{ if(count>100 && count<150){ response.getWriter().write(JsonUtils.marshalToString(ReturnResult.build(500, '請求太頻繁,請稍后再試'))); redisTemplate.opsForValue().increment('limit:'+token, 1); return false; }else if(count>=150){ redisTemplate.opsForSet().add('black',userId,2,TimeUnit.DAYS); response.getWriter().write(JsonUtils.marshalToString(ReturnResult.build(500, '請求太頻繁,已經(jīng)被限制訪問'))); //redisTemplate.opsForSet().add('black',token); return false; }else{ redisTemplate.opsForValue().increment('limit:'+token, 1); return true; } } } @Override public void postHandle(HttpServletRequest request, HttpServletResponse response, Object handler, ModelAndView modelAndView) throws Exception { // TODO Auto-generated method stub } @Override public void afterCompletion(HttpServletRequest request, HttpServletResponse response, Object handler, Exception ex) throws Exception { // TODO Auto-generated method stub }}
到此這篇關于spring boot+ redis 接口訪問頻率限制的實現(xiàn)的文章就介紹到這了,更多相關springboot redis 接口訪問頻率限制內容請搜索好吧啦網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關文章希望大家以后多多支持好吧啦網(wǎng)!
相關文章:
1. 詳解Android studio 動態(tài)fragment的用法2. 基于android studio的layout的xml文件的創(chuàng)建方式3. 編程語言PHP在Web開發(fā)領域的優(yōu)勢在哪?4. 解決Android studio xml界面無法預覽問題5. 什么是python的自省6. Spring Boot和Thymeleaf整合結合JPA實現(xiàn)分頁效果(實例代碼)7. 圖文詳解vue中proto文件的函數(shù)調用8. Android如何加載Base64編碼格式圖片9. Springboot Druid 自定義加密數(shù)據(jù)庫密碼的幾種方案10. Vue封裝一個TodoList的案例與瀏覽器本地緩存的應用實現(xiàn)

網(wǎng)公網(wǎng)安備