MySQL is an open source relational database management system that supports multiple programming languages. When developing applications, we often need to execute some complex SQL query statements. At this time, we can use MySQL stored procedures to complete the work.
A stored procedure is a collection of SQL statements that can accept parameters and return a result set. Compared with executing SQL statements alone, using stored procedures has the following advantages:
- Simplifies the application code, making the program easier to maintain and update.
- Stored procedures run faster than executing SQL statements alone.
- Stored procedures can ensure data consistency and security.
Let’s look at some common examples of MySQL stored procedures.
(1) Create a simple stored procedure
CREATE PROCEDURE get_person
(IN id INT)
BEGIN
SELECT * FROM person WHERE id = id;
END;
The above code creates a stored procedure named get_person
, with an input parameter id
, and returns all the records with the specified id in the person
table information. The parameter type can be IN
, OUT
, or INOUT
, representing input, output, and input/output types respectively.
The statement to execute the stored procedure is:
CALL get_person(1);
This statement will return the id# in the
person table ## is a record of 1.
get_status(IN id INT, OUT status VARCHAR(50))
BEGIN
SELECT status FROM order WHERE id = id INTO status;END;This stored procedure accepts an input parameter
id, and will
order the # corresponding to
id in the table ##status
The field value is returned to the status
variable. The statement to execute the stored procedure is:
CALL get_status(1, @status);
SELECT @status;
This statement will output
The status
field value of the record with id
in the table is 1. (3) Create a stored procedure with a cursor
CREATE PROCEDURE
get_persons_by_age(IN age INT)BEGIN
DECLARE done BOOLEAN DEFAULT FALSE; DECLARE pid INT; DECLARE pname VARCHAR(50); DECLARE persons CURSOR FOR SELECT id, name FROM person WHERE age = age; DECLARE CONTINUE HANDLER FOR NOT FOUND SET done = TRUE; OPEN persons; repeat_row: LOOP FETCH persons INTO pid, pname; IF done THEN LEAVE repeat_row; END IF; SELECT pid, pname; END LOOP; CLOSE persons;
END;
This stored procedure accepts an input parameter
age and returns all records in the person
table where age
is equal to age
. This stored procedure uses a cursor to traverse the result set and output the
and name
field values for each record. The statement to execute the stored procedure is:
CALL get_persons_by_age(20);
This statement will return all
age in theperson table
is 20 records, and output their id
and name
values. In short, using MySQL stored procedures can easily complete some complex database operations and improve the efficiency and security of the application. Developers can design appropriate stored procedures based on actual needs to achieve optimal performance and maintainability.
The above is the detailed content of mysql query stored procedure. For more information, please follow other related articles on the PHP Chinese website!

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version
Recommended: Win version, supports code prompts!

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment
