From the course: Java Database Access with Hibernate

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Reverse engineering

Reverse engineering - Java Tutorial

From the course: Java Database Access with Hibernate

Start my 1-month free trial

Reverse engineering

- [Instructor] The term reverse engineering refers to the process of taking the database and the database tables, and using those to generate our mapping files and our plain old Java objects. Let's take a closer look at what reverse engineering is, and how to set up the reverse engineering file for Hibernate. The default strategy uses a collection of rules for mapping the JDBC, the database artifact names to the Java artifact names. In other words, the database tables to the classes in Java. It also provides basic type mappings from JDBC types to Hibernate types. The file can specify type mappings as well as table filtering. The file can be created by hand, it's basically just another XML file, or you could use the Hibernate plug-ins which provides a specialized editor. The tag <schema-selection> is used to determine which schemas the reverse engineering will try and process. You might have more than one schema in your application, but maybe you only want to reverse engineer one. The…

Contents