Feeds

Groovy way to MySQL

Get your Groove on

The Power of One Brief: Top reasons to choose HP BladeSystem

A very traditional niche of scripting languages, (such as Perl, Python or Ruby), has been in the ad hoc manipulation of databases – from grabbing data, transforming it, performing bulk updates, right on through to full-on data migration projects that move data from one platform or RDBMS to another. Scripting languages are perfect for these types of task because they are quick to write and test, can be used interactively while the problem space is being explored, and because extraneous features – such as graphical user interface, detailed user documentation and so on – are not required.

For hardcore Java hackers, much of this kind of ad hoc activity has either entailed writing utilities libraries or, more likely, dropping down into another language – from Unix shell scripts to the aforementioned Perl, Python, Ruby et al. Now, however, Groovy exists to provide all of the benefits of a dynamically-typed scripting language that is designed to be easily accessible to Java developers and which sits on top of the Java Virtual Machine (JVM) and, as a big bonus, can make use of existing Java APIs and packages.

In the case of database access, Groovy can be used both with the standard Java JDBC mechanism (which makes use of SQL) or with its own high-level SQL-less DataSet libraries. In this two-part hands-on tutorial we'll look at how you can use Groovy to quickly and easily interface with a MySQL database sitting on a remote server somewhere.

First things first, though, and that's to install Groovy and to check that it all runs smoothly. Groovy can be downloaded here - there are install packages for various platforms, including Windows, Linux, and a platform-independent zip.

Aside from dropping the files into the right place the only other things to do are set the GROOVY_HOME environment variable (and JAVA_HOME if it doesn't already exist), and to make sure that the \groovy\bin directory is on your path.

A quick way to test is simply to open a command shell or terminal and type:

groovy -v

This should come back with the versions of Groovy and Java that you have installed.

The only other thing you need to have in place is a JDBC driver for MySQL. The jar file needs to be on the classpath; simply copying the file to the \groovy\lib is enough to banish any problems.

For the purposes of this article we'll be looking at a simple database (called pers) which contains a single table, called users, which is represented by the following grid:

user_name email user_id
'tom' 'tom@here.com' 1
'dick' 'dick@there.co.uk' 2
'harry' 'harry@harry.com' 3
'george' 'hello@hello.org' 4

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.