Полезная информация

Learning Perl

Learning PerlSearch this book
Previous: 16.4 ExerciseChapter 17Next: 17.2 Opening and Closing DBM Hashes
 

17. User Database Manipulation

Contents:
DBM Databases and DBM Hashes
Opening and Closing DBM Hashes
Using a DBM Hash
Fixed-Length Random Access Databases
Variable-Length ( Text) Databases
Exercises

17.1 DBM Databases and DBM Hashes

Most UNIX systems have a standard library called DBM. This library provides a simple database management facility that allows programs to store a collection of key-value pairs into a pair of disk files. These files retain the values in the database between invocations of the programs using the database, and these programs can add new values, update existing values, or delete old values.

The DBM library is fairly simple, but being readily available, some system programs have used it for their fairly modest needs. For example, sendmail (and its variants and derivatives) stores the aliases database (the mapping of mail addresses to recipients) as a DBM database. The most popular Usenet news software uses a DBM database to track current and recently seen articles. The Sun NIS (nйe YP) database masters are also kept in DBM format.

Perl provides access to this same DBM mechanism through a rather clever means: a hash may be associated with a DBM database through a process similar to opening a file. This hash (called a DBM array) is then used to access and modify the DBM database. Creating a new element in the array modifies the DBM database immediately. Deleting an element deletes the value from the DBM database. And so on.[1]

[1] This is actually just a special use of the general tie mechanism. If you want something more flexible, check out the AnyDBM_File (3), DB_File (3), and perltie (1) manpages.

The size, number, and kind of keys and values in a DBM database are restricted, and depending on which version of DBM library you're using, a DBM array may share these same restrictions. See the AnyDBM_File manpage for details. In general, if you keep both the keys and the values down to 1000 arbitrary binary characters or less, you'll probably be OK.


Previous: 16.4 ExerciseLearning PerlNext: 17.2 Opening and Closing DBM Hashes
16.4 ExerciseBook Index17.2 Opening and Closing DBM Hashes