GDBM, NDBM, DB2, DB3, DBM, and CDB Databases in PHP
By: David Sklar in PHP Tutorials on 2008-12-01
PHP can support a few different kinds of DBM backends: GDBM, NDBM, DB2, DB3, DBM, and CDB. The DBA abstraction layer lets you use the same functions on any DBM backend. All these backends store key/value pairs. You can iterate through all the keys in a database, retrieve the value associated with a particular key, and find if a particular key exists. Both the keys and the values are strings.
Use the DBA abstraction layer to access a DBM-style database:
$dbh = dba_open('fish.db','c','gdbm') or die($php_errormsg); // retrieve and change values if (dba_exists('flounder',$dbh)) { $flounder_count = dba_fetch('flounder',$dbh); $flounder_count++; dba_replace('flounder',$flounder_count); print "Updated the flounder count."; } else { dba_insert('flounder',1); print "Started the flounder count."; } // no more tilapia dba_delete('tilapia',$dbh); // what fish do we have? for ($key = dba_firstkey($dbh); $key !== false; $key = dba_nextkey($dbh)) { $value = dba_fetch($key); print "$key: $value\n"; } dba_close($dbh);
The following program maintains a list of usernames and passwords in a DBM database. The username is the first command-line argument, and the password is the second argument. If the given username already exists in the database, the password is changed to the given password; otherwise the user and password combination are added to the database:
$user = $_SERVER['argv'][1]; $password = $_SERVER['argv'][2]; $data_file = '/tmp/users.db'; $dbh = dba_open($data_file,'c','gdbm') or die("Can't open db $data_file"); if (dba_exists($user,$dbh)) { print "User $user exists. Changing password."; } else { print "Adding user $user."; } dba_replace($user,$password,$dbh) or die("Can't write to database $data_file"); dba_close($dbh);
The dba_open() function returns a handle to a DBM file (or false on error). It takes three arguments. The first is the filename of the DBM file. The second argument is the mode for opening the file. A mode of 'r' opens an existing database for read-only access, and 'w' opens an existing database for read-write access. The 'c' mode opens a database for read-write access and creates the database if it doesn't already exist. Last, 'n' does the same thing as 'c', but if the database already exists, 'n' empties it. The third argument to dba_open( ) is which DBM handler to use; this example uses 'gdbm'. To find what DBM handlers are compiled into your PHP installation, look at the "DBA" section of the output from phpinfo(). The "Supported handlers" line gives you your choices.
To find if a key has been set in a DBM database, use dba_exists(). It takes two arguments: a string key and a DBM file handle. It looks for the key in the DBM file and returns true if it finds the key (or false if it doesn't). The dba_replace() function takes three arguments: a string key, a string value, and a DBM file handle. It puts the key/value pair into the DBM file. If an entry already exists with the given key, it overwrites that entry with the new value.
To close a database, call dba_close(). A DBM file opened with dba_open() is automatically closed at the end of a request, but you need to call dba_close() explicitly to close persistent connections created with dba_popen().
You can use dba_firstkey()and dba_nextkey() to iterate through all the keys in a DBM file and dba_fetch() to retrieve the values associated with each key. This program calculates the total length of all passwords in a DBM file:
$data_file = '/tmp/users.db'; $total_length = 0; if (! ($dbh = dba_open($data_file,'r','gdbm'))) { die("Can't open database $data_file"); } $k = dba_firstkey($dbh); while ($k) { $total_length += strlen(dba_fetch($k,$dbh)); $k = dba_nextkey($dbh); } print "Total length of all passwords is $total_length characters."; dba_close($dbh);
The dba_firstkey() function initializes $k to the first key in the DBM file. Each time through the while loop, dba_fetch( ) retrieves the value associated with key $k and $total_length is incremented by the length of the value (calculated with strlen()). With dba_nextkey(), $k is set to the next key in the file.
You can use serialize() to store complex data in a DBM file, just like in a text file. However, the data in the DBM file can be indexed by a key:
$dbh = dba_open('users.db','c','gdbm') or die($php_errormsg); // read in and unserialize the data if ($exists = dba_exists($_REQUEST['username'])) { $serialized_data = dba_fetch($_REQUEST['username']) or die($php_errormsg); $data = unserialize($serialized_data); } else { $data = array(); } // update values if ($_REQUEST['new_password']) { $data['password'] = $_REQUEST['new_password']; } $data['last_access'] = time(); // write data back to file if ($exists) { dba_replace($_REQUEST['username'],serialize($data)); } else { dba_insert($_REQUEST['username'],serialize($data)); } dba_close($dbh);
While this example can store multiple users' data in the same file, you can't search, for example, a user's last access time, without looping through each key in the file. Structured data like this belongs in a SQL database.
Each DBM handler has different behavior in some areas. For example, GDBM provides internal locking. If one process has opened a GDBM file in read-write mode, other calls to dba_open() to open the same file in read-write mode will fail. The DB3 handler, however, provides no such internal locking; you need to do that with additional code. Two DBA functions are also database-specific: dba_optimize()and dba_sync(). The dba_optimize( ) function calls a handler-specific DBM file-optimization function. Currently, this is implemented only for GDBM, for which its gdbm_reorganize( ) function is called. The dba_sync() function calls a handler-specific DBM file synchronizing function. For DB2 and DB3, their sync( ) function is called. For GDBM, its gdbm_sync() function is called. Nothing happens for other DBM handlers.
Using a DBM database is a step up from a text file but it lacks most features of a SQL database. Your data structure is limited to key/value pairs, and locking robustness varies greatly depending on the DBM handler. Still, DBM handlers can be a good choice for heavily accessed read-only data; for example, the Internet Movie Database uses DBM databases.
Add Comment
This policy contains information about your privacy. By posting, you are declaring that you understand this policy:
- Your name, rating, website address, town, country, state and comment will be publicly displayed if entered.
- Aside from the data entered into these form fields, other stored data about your comment will include:
- Your IP address (not displayed)
- The time/date of your submission (displayed)
- Your email address will not be shared. It is collected for only two reasons:
- Administrative purposes, should a need to contact you arise.
- To inform you of new comments, should you subscribe to receive notifications.
- A cookie may be set on your computer. This is used to remember your inputs. It will expire by itself.
This policy is subject to change at any time and without notice.
These terms and conditions contain rules about posting comments. By submitting a comment, you are declaring that you agree with these rules:
- Although the administrator will attempt to moderate comments, it is impossible for every comment to have been moderated at any given time.
- You acknowledge that all comments express the views and opinions of the original author and not those of the administrator.
- You agree not to post any material which is knowingly false, obscene, hateful, threatening, harassing or invasive of a person's privacy.
- The administrator has the right to edit, move or remove any comment for any reason and without notice.
Failure to comply with these rules may result in being banned from submitting further comments.
These terms and conditions are subject to change at any time and without notice.
- Data Science
- Android
- React Native
- AJAX
- ASP.net
- C
- C++
- C#
- Cocoa
- Cloud Computing
- HTML5
- Java
- Javascript
- JSF
- JSP
- J2ME
- Java Beans
- EJB
- JDBC
- Linux
- Mac OS X
- iPhone
- MySQL
- Office 365
- Perl
- PHP
- Python
- Ruby
- VB.net
- Hibernate
- Struts
- SAP
- Trends
- Tech Reviews
- WebServices
- XML
- Certification
- Interview
categories
Related Tutorials
Send push notifications using Expo tokens in PHP
PHP convert string to lower case
A Basic Example using PHP in AWS (Amazon Web Services)
Different versions of PHP - History and evolution of PHP
PHP code to write to a CSV file for Microsoft Applications
PHP code to write to a CSV file from MySQL query
PHP code to import from CSV file to MySQL
Password must include both numeric and alphabetic characters - Magento
Resume or Pause File Uploads in PHP
PHP file upload prompts authentication for anonymous users
PHP file upload with IIS on windows XP/2000 etc
Comments