1
|
|
|
<?php |
2
|
|
|
namespace BehEh\Flaps\Throttling; |
3
|
|
|
|
4
|
|
|
use BehEh\Flaps\ThrottlingStrategyInterface; |
5
|
|
|
use InvalidArgumentException; |
6
|
|
|
use BehEh\Flaps\StorageInterface; |
7
|
|
|
use LogicException; |
8
|
|
|
|
9
|
|
|
/** |
10
|
|
|
* This strategy allows a certain number of requests by an entity in a specific timespan. |
11
|
|
|
* Additionally, once at least one request per timespan is tracked, the number of requests |
12
|
|
|
* will be continuously reduced so that after the duration specified by timespan the specified |
13
|
|
|
* number of requests are allowed again. |
14
|
|
|
* |
15
|
|
|
* @since 0.1 |
16
|
|
|
* @author Benedict Etzel <[email protected]> |
17
|
|
|
*/ |
18
|
|
|
class LeakyBucketStrategy implements ThrottlingStrategyInterface |
19
|
|
|
{ |
20
|
|
|
/** |
21
|
|
|
* @var int |
22
|
|
|
*/ |
23
|
|
|
protected $requestsPerTimeSpan; |
24
|
|
|
|
25
|
|
|
/** |
26
|
|
|
* Sets the maximum number of requests allowed per timespan for a single entity. |
27
|
|
|
* @param int $requests |
28
|
|
|
* @throws \InvalidArgumentException |
29
|
|
|
*/ |
30
|
4 |
|
public function setRequestsPerTimeSpan($requests) |
31
|
|
|
{ |
32
|
4 |
|
if (!is_numeric($requests)) { |
33
|
1 |
|
throw new InvalidArgumentException('requests per timespan is not numeric'); |
34
|
|
|
} |
35
|
4 |
|
$requests = (int) $requests; |
36
|
4 |
|
if ($requests < 1) { |
37
|
2 |
|
throw new InvalidArgumentException('requests per timespan cannot be smaller than 1'); |
38
|
|
|
} |
39
|
4 |
|
$this->requestsPerTimeSpan = $requests; |
40
|
4 |
|
} |
41
|
|
|
|
42
|
|
|
/** |
43
|
|
|
* Returns the previously set number of requests per timespan. |
44
|
|
|
* @return int |
45
|
|
|
*/ |
46
|
1 |
|
public function getRequestsPerTimeSpan() |
47
|
|
|
{ |
48
|
1 |
|
return $this->requestsPerTimeSpan; |
49
|
|
|
} |
50
|
|
|
|
51
|
|
|
/** |
52
|
|
|
* @var float |
53
|
|
|
*/ |
54
|
|
|
protected $timeSpan; |
55
|
|
|
|
56
|
|
|
/** |
57
|
|
|
* Sets the timespan in which the defined number of requests is allowed per single entity. |
58
|
|
|
* @param float|string $timeSpan |
59
|
|
|
* @throws InvalidArgumentException |
60
|
|
|
*/ |
61
|
4 |
|
public function setTimeSpan($timeSpan) |
62
|
|
|
{ |
63
|
4 |
|
if (is_string($timeSpan)) { |
64
|
1 |
|
$timeSpan = self::parseTime($timeSpan); |
65
|
|
|
} |
66
|
4 |
|
if (!is_numeric($timeSpan)) { |
67
|
1 |
|
throw new InvalidArgumentException('timespan is not numeric'); |
68
|
|
|
} |
69
|
4 |
|
$timeSpan = floatval($timeSpan); |
70
|
4 |
|
if ($timeSpan <= 0) { |
71
|
2 |
|
throw new InvalidArgumentException('timespan cannot be 0 or less'); |
72
|
|
|
} |
73
|
4 |
|
$this->timeSpan = $timeSpan; |
74
|
4 |
|
} |
75
|
|
|
|
76
|
|
|
/** |
77
|
|
|
* Returns the previously set timespan. |
78
|
|
|
* @return float |
79
|
|
|
*/ |
80
|
1 |
|
public function getTimeSpan() |
81
|
|
|
{ |
82
|
1 |
|
return (float) $this->timeSpan; |
83
|
|
|
} |
84
|
|
|
|
85
|
|
|
/** |
86
|
|
|
* Sets the strategy up with $requests allowed per $timeSpan |
87
|
|
|
* @param int $requests the requests allowed per time span |
88
|
|
|
* @param int|string $timeSpan tither the amount of seconds or a string such as "10s", "5m" or "1h" |
89
|
|
|
* @throws InvalidArgumentException |
90
|
|
|
* @see LeakyBucketStrategy::setRequestsPerTimeSpan |
91
|
|
|
* @see LeakyBucketStrategy::setTimeSpan |
92
|
|
|
*/ |
93
|
|
|
public function __construct($requests, $timeSpan) |
94
|
|
|
{ |
95
|
|
|
$this->setRequestsPerTimeSpan($requests); |
96
|
|
|
$this->setTimeSpan($timeSpan); |
97
|
|
|
} |
98
|
|
|
|
99
|
|
|
/** |
100
|
|
|
* @var StorageInterface |
101
|
|
|
*/ |
102
|
|
|
protected $storage; |
103
|
|
|
|
104
|
|
|
public function setStorage(StorageInterface $storage) |
105
|
|
|
{ |
106
|
|
|
$this->storage = $storage; |
107
|
|
|
} |
108
|
|
|
|
109
|
|
|
/** |
110
|
|
|
* Parses a timespan string such as "10s", "5m" or "1h" and returns the amount of seconds. |
111
|
|
|
* @param string $timeSpan the time span to parse to seconds |
112
|
|
|
* @return float|null the number of seconds or null, if $timeSpan couldn't be parsed |
113
|
|
|
*/ |
114
|
1 |
|
public static function parseTime($timeSpan) |
115
|
|
|
{ |
116
|
1 |
|
$times = array('s' => 1, 'm' => 60, 'h' => 3600, 'd' => 86400, 'w' => 604800); |
117
|
1 |
|
$matches = array(); |
118
|
1 |
|
if (is_numeric($timeSpan)) { |
119
|
1 |
|
return $timeSpan; |
120
|
|
|
} |
121
|
1 |
|
if (preg_match('/^((\d+)?(\.\d+)?)('.implode('|', array_keys($times)).')$/', |
122
|
1 |
|
$timeSpan, $matches)) { |
123
|
1 |
|
return floatval($matches[1]) * $times[$matches[4]]; |
124
|
|
|
} |
125
|
1 |
|
return null; |
126
|
|
|
} |
127
|
|
|
|
128
|
|
|
/** |
129
|
|
|
* Returns whether entity exceeds it's allowed request capacity with this request. |
130
|
|
|
* @param string $identifier the identifer of the entity to check |
131
|
|
|
* @return bool true if this requests exceeds the number of requests allowed |
132
|
|
|
* @throws LogicException if no storage has been set |
133
|
|
|
*/ |
134
|
2 |
|
public function isViolator($identifier) |
135
|
|
|
{ |
136
|
2 |
|
if ($this->storage === null) { |
137
|
1 |
|
throw new LogicException('no storage set'); |
138
|
|
|
} |
139
|
|
|
|
140
|
1 |
|
$time = microtime(true); |
141
|
1 |
|
$timestamp = $time; |
142
|
|
|
|
143
|
1 |
|
$rate = (float) $this->requestsPerTimeSpan / $this->timeSpan; |
144
|
1 |
|
$identifier = 'leaky:'.sha1($rate.$identifier); |
145
|
|
|
|
146
|
1 |
|
$requestCount = $this->storage->getValue($identifier); |
147
|
1 |
|
if ($requestCount > 0) { |
148
|
1 |
|
$secondsSince = $time - $this->storage->getTimestamp($identifier); |
149
|
1 |
|
$reduceBy = floor($secondsSince * $rate); |
150
|
1 |
|
$unfinishedSeconds = fmod($secondsSince, $rate); |
151
|
1 |
|
$requestCount = max($requestCount - $reduceBy, 0); |
152
|
1 |
|
if ($requestCount > 0) { |
153
|
1 |
|
$timestamp = $time - ($rate - $unfinishedSeconds); |
154
|
|
|
} |
155
|
|
|
} |
156
|
|
|
|
157
|
1 |
|
if ($requestCount + 1 > $this->requestsPerTimeSpan) { |
158
|
1 |
|
return true; |
159
|
|
|
} |
160
|
|
|
|
161
|
1 |
|
$requestCount++; |
162
|
|
|
|
163
|
1 |
|
$this->storage->setValue($identifier, $requestCount); |
164
|
1 |
|
$this->storage->setTimestamp($identifier, $timestamp); |
165
|
|
|
|
166
|
1 |
|
$this->storage->expireIn($identifier, $requestCount / $rate); |
167
|
|
|
|
168
|
1 |
|
return false; |
169
|
|
|
} |
170
|
|
|
} |
171
|
|
|
|