From the course: Java Database Access with Hibernate
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Reverse engineering - Java Tutorial
From the course: Java Database Access with Hibernate
Reverse engineering
- [Instructor] The term reverse engineering refers to the process of taking the database and the database tables, and using those to generate our mapping files and our plain old Java objects. Let's take a closer look at what reverse engineering is, and how to set up the reverse engineering file for Hibernate. The default strategy uses a collection of rules for mapping the JDBC, the database artifact names to the Java artifact names. In other words, the database tables to the classes in Java. It also provides basic type mappings from JDBC types to Hibernate types. The file can specify type mappings as well as table filtering. The file can be created by hand, it's basically just another XML file, or you could use the Hibernate plug-ins which provides a specialized editor. The tag <schema-selection> is used to determine which schemas the reverse engineering will try and process. You might have more than one schema in your application, but maybe you only want to reverse engineer one. The…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.