At the last hackathon (mysql conference), we worked on standardizing
what we've seen come up in a few different projects:  Range fetch
operations.

  The purpose of this document is very much *not* to specify something
that will ever show up in the memcached server proper, but more to
standardize protocol for such operations for memcached-like
applications so clients can access them without having to implement
thousands of very similar operations.

  Please look this over and if you don't have any complaints, find
your favorite memcached-like application and get them all working the
same way.



                Memcached Range Command Specification
                =====================================

Author: Dustin Sallings <dus...@spy.net>
Date: 2009-05-13 Wed


Table of Contents
=================
1 Overview
2 General Properties of Range Commands
    2.1 Abstract Representation of Ranges
    2.2 Binary Protocol Generalities
    2.3 Text Protocol Generalities
3 Supported commands
    3.1 get
    3.2 set
    3.3 append
    3.4 prepend
    3.5 delete
    3.6 incr
    3.7 decr
    3.8 replace (omitted)
4 Command Reference
5 Isolation


1 Overview
~~~~~~~~~~~

Several implementations of servers speaking the memcached protocol
have backends that allow for inexpensive operations over ranges of
keys.

The purpose of this document is to standardize the protocol for making
use of these operations.

2 General Properties of Range Commands
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Commands that take ranges all follow the same pattern of key
representation.

Each range representation will have a minimum and maximum range as
well as flags to indicate whether each end is inclusive or exclusive.

Either end may be null indicating there's no limit on the side where
the null appears.

2.1 Abstract Representation of Ranges
======================================

This document uses standard [interval notation], but you can see the
possibilities listed here:

- (null, null) :: Operate over all key.
- (null, "X") :: Operate over every key up to (not including) "X".
- (null, "X"] :: Operate over every key up to (and including) "X".
- ("F", null) :: Operate over every key from (not including) "F".
- ("F", "X") :: Operate over every key from "F" to "X" (not including
                either).
- ("F", "X"] :: Operate over every key from "F" to "X" (excluding "F",
                including "X").
- ["F", "X") :: Operate over every key from "F" to "X" (including "F",
                excluding "X").
- ["F", "X"] :: Operate over every key from "F" to "X" (including
both).

2.2 Binary Protocol Generalities
=================================

2.2.1 Requests
---------------

In the binary protocol, we've got some extra space and can apply that
to defining ranges.

The "key" field will be used as the start key.  A key length of zero
represents null as an empty key can't be stored.

The extra info will contain the following info:

  Fields        Size
 -------------+------
  End key len     16
  Reserved         8
  Flags            8
  Max results     32

Flags is a bitmask indicating whether the ends are inclusive or
exclusive.

- (flags & 1) :: If non-zero, start key is inclusive.
- (flags & 2) :: If non-zero, end key is inclusive.

Max results represents the number of objects the operation is
permitted to affect.  A value of zero indicates there should be no
limit.

A server *may* enforce a maximum limit and respond with an error if
the requested limit exceeds the limit enforced by the server (or is
zero).

The end key immediately follows the maximum results.

2.2.2 Responses
----------------

Each requests will generally have many responses and will return
similarly to the way stats works in the binary protocol.  The final
response will be one with an empty key.

The binary protocol allows for commands to operate in a "quiet mode"
where most responses are quelled.  No such facility is available for
the text protocol as it can't be done consistently without introducing
new verbs (and then can't be done safely).

2.3 Text Protocol Generalities
===============================

The general form of a range command is as follows (please see details
for how this varies by command):

CMD <start inclusion> <end inclusion> <max items> <start key> [end key]
\r\n

The end key is optional.  If not specified, it is considered null.
Null is not explicitly included for the start key as there is a
natural minimum of keys which can be used in its place.

The inclusion flags are either 0 or 1.  If 0, the endpoint is not
included.  If 1, the endpoint is included.

This *is* different from the rget as specified in memcachedb to allow
for infinite ranges.

3 Supported commands
~~~~~~~~~~~~~~~~~~~~~

3.1 get
========

Ranged get operations allow multiple key/value pairs returned for a
single key request.

3.1.1 Binary Protocol Details
------------------------------

The command ID for binary get is 0x30.

3.1.2 Text Protocol Details
----------------------------

The command for text get is rget.

3.2 set
========

Ranged set operations allow for a range of *existing* items to be set
to a specific value.

For example, if you have stats stored in a server with keys prefixed
as "stats." you can reset all of them in a single operation by setting
("stats.", "stats/") to "0".  This range specifies everything that
begins with "stats." excluding "stats." itself.

Upon batch mutation, each modified value will receive a new distinct
CAS identifier.

3.2.1 Binary Protocol Details
------------------------------

The command ID for binary get is 0x31.  The command ID for a binary
quiet get is 0x32.

Each modified value will respond as a plain set does although the key
will be included in the response.  The final response will contain no
key.

In the case of a quiet request, no response will be given unless the
command fails.

3.2.2 Text Protocol Details
----------------------------

The command for text set is rset and has the following form:

rset <start inclusion> <end inclusion> <max items> <flags> <exptime>
<bytes> <start key> [end key]\r\n
<data>\r\n

The response will be similar to a gets, but with no values included.
Example:

VALUE <key> <flags> 0 [<cas>]\r\n
\r\n

3.3 append
===========

Ranged append will append a value to every item within a range.

For both protocols, the response will be in the form of their
respective protocol-specific response in ranged set.

3.3.1 Binary Protocol Details
------------------------------

The command ID for binary range append is 0x33.  The command ID for a
silent append is 0x34.

3.3.2 Text Protocol Details
----------------------------

The command for text append has the following orm:

rappend <start inclusion> <end inclusion> <max items> <bytes> <start
key> [end key]\r\n
<data>\r\n

3.4 prepend
============

Prepend follows the same pattern of append.

3.4.1 Binary Protocol Details
------------------------------

The command ID for a binary range prepend is 0x35.  The command ID for
a silent prepend is 0x36.

3.4.2 Text Protocol Details
----------------------------

The command for a text range prepend is "rprepend".

3.5 delete
===========

Ranged delete will remove all values in the specified range.

For both protocols, the response will be in the form of their
respective protocol-specific response in ranged set.

3.5.1 Binary Protocol Details
------------------------------

The command ID for a binary range delete is 0x37.  The command ID for
a silent delete is 0x38.

3.5.2 Text Protocol Details
----------------------------

The text protocol follows the common form of a range command, but uses
the command "rdelete".

3.6 incr
=========

Ranged incr will increment all existing keys within a range by the
same amount.  This follows the same patterns as existing increment
with the obvious exception that it will not initialize keys since it's
only modifing things that already exist.

3.6.1 Binary Protocol Details
------------------------------

The command ID for binary range increment is 0x39.  The command ID for
a silent increment is 0x3a.

The extra data includes the standard incr/decr extra data *after* the
ranged extra data.

The responses will include a key and value for every modified item.

3.6.2 Text Protocol Details
----------------------------

The text command for range increment is "rincr" and is in the
following form:

rincr <start inclusion> <end inclusion> <max items> <value> <start
key> [end key]\r\n

Responses are the same as a multi-gets.

3.7 decr
=========

Ranged decr follows ranged incr.

3.7.1 Binary Protocol Details
------------------------------

The command ID for binary range decrement is 0x3b.  The command ID for
a silent range decrement is 0x3c.

3.7.2 Text Protocol Details
----------------------------

The command for range decrement is "rdecr".

3.8 replace (omitted)
======================

Ranged replace is explicitly omitted as it it would mean the same
thing as a set.

4 Command Reference
~~~~~~~~~~~~~~~~~~~~

The following table is a quick reference to all of the commands
defined herein.  Commands omitted from the text column are intentional
as they are not defined outside of the binary protocol.

  Command         Bin CMD ID   Text Command
 ---------------+------------+--------------
  Get                   0x30   rget
  Set                   0x31   rset
  Quiet Set             0x32
  Append                0x33   rappend
  Quiet Append          0x34
  Prepend               0x35   rprepend
  Quiet Prepend         0x36
  Delete                0x37   rdelete
  Quiet Delete          0x38
  Incr                  0x39   rincr
  Quiet Incr            0x3a
  Decr                  0x3b   rdecr
  Quiet Decr            0x3c

5 Isolation
~~~~~~~~~~~~

Isolation levels are specifically left unspecified.  Operations
concurrently working on the same data set may interleave, mutually
exclude each other, or just stomp all over each other.

Implementors are encouraged to document their intentions.

Reply via email to