search
HomeDatabaseMysql TutorialLet's take a look at the MyBatis command line implementation of reverse engineering

Let's take a look at the MyBatis command line implementation of reverse engineering

Free learning recommendation: mysql tutorial(Video)

1. Introduction to MyBatis reverse engineering

During the development process, there are often situations where MyBatis needs to be used. Under normal circumstances, MyBatis construction projects cannot avoid writing entity classes, Dao interfaces, and Mapper mappings. files, these tasks are similar, have a certain degree of repetition, and are sometimes error-prone, so someone invented [MyBatis Reverse Engineering]->MyBatis Generator. MyBatis Generator (MBG) is a code generator that can generate the dao.java, mapper.xml, and pojo entity class files we need. For some projects with many tables, it can reduce a lot of workload and improve our s efficiency. There are many similar tutorials on the Internet. You can install plug-ins in eclipse to generate, and generate in IDEA. Since I use the command line to implement it, I will only introduce the command line method here, which is relatively simple.

The SQL statements that can be generated include:

  • insert
  • update by primary key
  • update by example (using a dynamic where clause)
  • delete by primary key
  • delete by example (using a dynamic where clause)
  • select by primary key
  • select by example (using a dynamic where clause) )
  • count by example

The variations of these statements depend on the structure of the table (for example, if the table does not have a primary key, MBG will not generate updates through the primary key function) More introductions can Reference documentation: http://mybatis.org/generator.

2. Download the MyBatis Generator file

I downloaded it from github, GitHub address: https://github.com/mybatis /generator/releases, it is recommended to use Thunder to download which should be faster. Download the file and decompress it. The decompressed file directory is as follows:
Lets take a look at the MyBatis command line implementation of reverse engineering
Check the contents of the lib folder after decompression. This is the jar package we need to use
Lets take a look at the MyBatis command line implementation of reverse engineering

3. Configure the generatorConfig.xml file

Create a new generatorConfig.xml file in the folder you just decompressed. Of course, the name of this file is I took it myself, so what does this file do? This configuration file tells MBG:

  • How to connect to the database
  • What objects are generated, and how to generate them
  • What tables should be used for object generation

In addition, we still need to do some preparations:
1) Find the location of the jar package of your database driver. For the convenience of demonstration, I put the database driver under the directory where I just unzipped it. Mine is MySQL5 .7
2) Create a new empty src folder to store the generated files
Lets take a look at the MyBatis command line implementation of reverse engineering
generatorConfig.xmlThe content of the file is as follows:
Lets take a look at the MyBatis command line implementation of reverse engineering
generatorConfig.xml code

PUBLIC "-//mybatis.org//DTD MyBatis Generator Configuration 1.0//EN"
"http://mybatis.org/dtd/mybatis-generator-config_1_0.dtd"><generatorconfiguration><!--数据库驱动,最好不要有中文字符,不然会找不到--><classpathentry></classpathentry><context><commentgenerator><property></property><property></property></commentgenerator><!--数据库链接地址账号密码--><jdbcconnection></jdbcconnection><javatyperesolver>
	<property></property></javatyperesolver><!--生成Model类存放位置--><javamodelgenerator>
	<property></property>
	<property></property></javamodelgenerator><!--生成映射文件存放位置--><sqlmapgenerator>
	<property></property></sqlmapgenerator><!--生成DaoMapper类存放位置--><javaclientgenerator><property></property></javaclientgenerator><!--生成对应表及类名,需要记住的一点是逆向工程无法生成关联关系,只能生成单表操作--><table enablecountbyexample="false" enableselectbyexample="false"></table></context></generatorconfiguration>

The information that needs to be configured, I have circled it with a red box here, the information that needs to be configured includes
database information;
generated The package name of the entity class and targetProject are the location where our generated file will be stored. I put it in the src directory;
Generate mapper interface information;
Generated mapper xml File information, here my mapper interface and xml file are in the same directory
The database table configuration information to be generated, which tables need to be generated, just add it at the end. The specific meaning of the configuration attributes in the table can be viewed in the document For instructions, refer to here

4. Generate code

The commands that need to be executed on the command line are as follows:

 java -jar lib/mybatis-generator-core-1.3.1.jar -configfile generatorConfig.xml -overwrite

We can cd to the current directory and then execute the above command. Here I put it into the bat file to execute, create a new start.bat file, and copy the above command
Lets take a look at the MyBatis command line implementation of reverse engineering

Double-click to execute the bat file, you can see the generated file in the src directory, and then copy the file we generated to our project to use it!

ps: In the generated file, some fields or methods may not be created correctly. It should be due to the inconsistency between the MySQL environment and the plug-in version. You can try adding the following attributes to jdbcConnection: <property name="databaseSchemaUpdate" value="true"></property>
Lets take a look at the MyBatis command line implementation of reverse engineering

More related learning recommendations: mysql learning

The above is the detailed content of Let's take a look at the MyBatis command line implementation of reverse engineering. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:CSDN. If there is any infringement, please contact admin@php.cn delete
What Are the Limitations of Using Views in MySQL?What Are the Limitations of Using Views in MySQL?May 14, 2025 am 12:10 AM

MySQLviewshavelimitations:1)Theydon'tsupportallSQLoperations,restrictingdatamanipulationthroughviewswithjoinsorsubqueries.2)Theycanimpactperformance,especiallywithcomplexqueriesorlargedatasets.3)Viewsdon'tstoredata,potentiallyleadingtooutdatedinforma

Securing Your MySQL Database: Adding Users and Granting PrivilegesSecuring Your MySQL Database: Adding Users and Granting PrivilegesMay 14, 2025 am 12:09 AM

ProperusermanagementinMySQLiscrucialforenhancingsecurityandensuringefficientdatabaseoperation.1)UseCREATEUSERtoaddusers,specifyingconnectionsourcewith@'localhost'or@'%'.2)GrantspecificprivilegeswithGRANT,usingleastprivilegeprincipletominimizerisks.3)

What Factors Influence the Number of Triggers I Can Use in MySQL?What Factors Influence the Number of Triggers I Can Use in MySQL?May 14, 2025 am 12:08 AM

MySQLdoesn'timposeahardlimitontriggers,butpracticalfactorsdeterminetheireffectiveuse:1)Serverconfigurationimpactstriggermanagement;2)Complextriggersincreasesystemload;3)Largertablesslowtriggerperformance;4)Highconcurrencycancausetriggercontention;5)M

MySQL: Is it safe to store BLOB?MySQL: Is it safe to store BLOB?May 14, 2025 am 12:07 AM

Yes,it'ssafetostoreBLOBdatainMySQL,butconsiderthesefactors:1)StorageSpace:BLOBscanconsumesignificantspace,potentiallyincreasingcostsandslowingperformance.2)Performance:LargerrowsizesduetoBLOBsmayslowdownqueries.3)BackupandRecovery:Theseprocessescanbe

MySQL: Adding a user through a PHP web interfaceMySQL: Adding a user through a PHP web interfaceMay 14, 2025 am 12:04 AM

Adding MySQL users through the PHP web interface can use MySQLi extensions. The steps are as follows: 1. Connect to the MySQL database and use the MySQLi extension. 2. Create a user, use the CREATEUSER statement, and use the PASSWORD() function to encrypt the password. 3. Prevent SQL injection and use the mysqli_real_escape_string() function to process user input. 4. Assign permissions to new users and use the GRANT statement.

MySQL: BLOB and other no-sql storage, what are the differences?MySQL: BLOB and other no-sql storage, what are the differences?May 13, 2025 am 12:14 AM

MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

MySQL Add User: Syntax, Options, and Security Best PracticesMySQL Add User: Syntax, Options, and Security Best PracticesMay 13, 2025 am 12:12 AM

ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

MySQL: How to avoid String Data Types common mistakes?MySQL: How to avoid String Data Types common mistakes?May 13, 2025 am 12:09 AM

ToavoidcommonmistakeswithstringdatatypesinMySQL,understandstringtypenuances,choosetherighttype,andmanageencodingandcollationsettingseffectively.1)UseCHARforfixed-lengthstrings,VARCHARforvariable-length,andTEXT/BLOBforlargerdata.2)Setcorrectcharacters

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor