On 10/24/11 12:46 PM, dormando wrote:
>> > I'm using the last spymemcached release 2.7.3.
>> > This is caused by validateKey method in MemcachedClient:
>> >
>> >   for(byte b : keyBytes) {
>> >      if(b == ' ' || b == '\n' || b == '\r' || b == 0) {
>> >         throw new IllegalArgumentException("Key contains invalid
>> > characters: ``" + key + "''");
>> >
>> > What java client do you recommend?
> There should be a flag telling the client to not validate the key if
> you're in binprot mode. Dustin? Anyone?

There's nothing like that currently.  Last discussion I remember is that
we decided against allowing binary keys at the client because we don't
know what other clients may expect when trying to get that item.

We can certainly reconsider that, but it's not been needed thus far.

I might ask, are you doing sha1/md5 because you really need the sum of
something, or are you doing it to simplify what you use for your key?

Matt

Reply via email to