Home Backend Development PHP Problem How to encapsulate PHP database operation function library

How to encapsulate PHP database operation function library

Apr 03, 2023 pm 03:48 PM

With the rapid development of the Internet, databases have become an important part of many websites and applications. Database operations are also one of the basic operations of websites and applications. With the development of PHP language, PHP has become the development language for most websites and applications. The MySQL extension library and its encapsulation functions provided by PHP enable PHP to easily interact with the MySQL database and realize the addition, deletion, modification and query operations of the database.

In actual development, function libraries that encapsulate database operations can greatly improve development efficiency and code readability. In this article, we will introduce how to encapsulate the PHP database operation function library and demonstrate how to perform add, delete, modify and query operations.

1. Environment preparation

Before introducing the encapsulated PHP database operation function library, we need to prepare the corresponding development environment, including PHP, MySQL and the required extension libraries.

In PHP, the mysql extension is a commonly used MySQL operation extension, and the mysqli extension is a MySQL operation extension recommended for PHP5 and above. In this article, we will use the mysqli extension as an example to explain.

2. Database connection

Before performing database operations, we need to establish a connection with the database first. The code to establish a database connection is as follows:

$link = mysqli_connect('localhost','username','password','database') or die ('连接数据库失败!');
Copy after login

Among them, 'localhost' represents the host address where the database is located, 'username' and 'password' represent the username and password of the database respectively, and 'database' represents the name of the database to be connected. . If the connection fails, the program will return an error message and exit.

3. Database operation

  1. Database query

The code for database query is as follows:

function db_query($sql) {
    $link = mysqli_connect('localhost','username','password','database') or die ('连接数据库失败!');
    $result = mysqli_query($link, $sql);
    mysqli_close($link);
    return $result;
}
Copy after login

This code converts the SQL statement Passed into the function as a parameter, first connect to the MySQL database through the mysqli_connect function, then execute the SQL statement through the mysqli_query function, and store the query results in the $result variable. Finally, the database connection is closed through the mysqli_close function and the query results are returned.

  1. Database insertion

The code for database insertion is as follows:

function db_insert($table, $data) {
    $link = mysqli_connect('localhost','username','password','database') or die ('连接数据库失败!');
    $fields = array();
    $values = array();
    foreach ($data as $key => $value) {
        $fields[] = "`".$key."`";
        $values[] = "'".$value."'";
    }
    $fields = implode(",", $fields);
    $values = implode(",", $values);
    $sql = "INSERT INTO `".$table."` (".$fields.") VALUES (".$values.")";
    $result = mysqli_query($link, $sql);
    mysqli_close($link);
    return $result;
}
Copy after login

This code passes the data to be inserted into the function as a parameter and traverses the data Array, extract the fields and values ​​of the data, and then splice them into the field and value parts in the SQL statement through the implode function. Finally, the SQL statement is executed through the mysqli_query function, the data is inserted into the specified table, the database connection is closed through the mysqli_close function, and the insertion result is returned.

  1. Database update

The code for database update is as follows:

function db_update($table, $data, $where) {
    $link = mysqli_connect('localhost','username','password','database') or die ('连接数据库失败!');
    $fields = array();
    foreach ($data as $key => $value) {
        $fields[] = "`".$key."`='".$value."'";
    }
    $fields = implode(",", $fields);
    $where = " WHERE ".$where;
    $sql = "UPDATE `".$table."` SET ".$fields.$where;
    $result = mysqli_query($link, $sql);
    mysqli_close($link);
    return $result;
}
Copy after login

This code takes the data to be updated, update conditions and update table name as parameters Pass in the function, traverse the data array, extract the fields and values ​​of the data, and then use the implode function to splice them into the field and value parts of the SQL statement. Then splice the update conditions into a WHERE clause, execute the SQL statement through the mysqli_query function, update the data to the specified table, close the database connection through the mysqli_close function, and return the update result.

  1. Database deletion

The code for database deletion is as follows:

function db_delete($table, $where) {
    $link = mysqli_connect('localhost','username','password','database') or die ('连接数据库失败!');
    $where = " WHERE ".$where;
    $sql = "DELETE FROM `".$table."`".$where;
    $result = mysqli_query($link, $sql);
    mysqli_close($link);
    return $result;
}
Copy after login

This code passes the data to be deleted and the deletion conditions as parameters into the function. , splice the conditions into a WHERE clause, execute the SQL statement through the mysqli_query function, delete the specified data from the table, close the database connection through the mysqli_close function, and return the deletion result.

4. Summary

In this article, we introduced how to encapsulate PHP's database operation function library, and demonstrated how to perform add, delete, modify, and query operations on the database. By encapsulating database operations, you can not only improve the readability and maintainability of your code, but also save development time. Therefore, in actual development, we can write corresponding encapsulation functions for different database operations according to specific needs to improve development efficiency and code quality.

The above is the detailed content of How to encapsulate PHP database operation function library. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

OWASP Top 10 PHP: Describe and mitigate common vulnerabilities. OWASP Top 10 PHP: Describe and mitigate common vulnerabilities. Mar 26, 2025 pm 04:13 PM

The article discusses OWASP Top 10 vulnerabilities in PHP and mitigation strategies. Key issues include injection, broken authentication, and XSS, with recommended tools for monitoring and securing PHP applications.

PHP 8 JIT (Just-In-Time) Compilation: How it improves performance. PHP 8 JIT (Just-In-Time) Compilation: How it improves performance. Mar 25, 2025 am 10:37 AM

PHP 8's JIT compilation enhances performance by compiling frequently executed code into machine code, benefiting applications with heavy computations and reducing execution times.

PHP Secure File Uploads: Preventing file-related vulnerabilities. PHP Secure File Uploads: Preventing file-related vulnerabilities. Mar 26, 2025 pm 04:18 PM

The article discusses securing PHP file uploads to prevent vulnerabilities like code injection. It focuses on file type validation, secure storage, and error handling to enhance application security.

PHP Encryption: Symmetric vs. asymmetric encryption. PHP Encryption: Symmetric vs. asymmetric encryption. Mar 25, 2025 pm 03:12 PM

The article discusses symmetric and asymmetric encryption in PHP, comparing their suitability, performance, and security differences. Symmetric encryption is faster and suited for bulk data, while asymmetric is used for secure key exchange.

PHP Authentication & Authorization: Secure implementation. PHP Authentication & Authorization: Secure implementation. Mar 25, 2025 pm 03:06 PM

The article discusses implementing robust authentication and authorization in PHP to prevent unauthorized access, detailing best practices and recommending security-enhancing tools.

PHP API Rate Limiting: Implementation strategies. PHP API Rate Limiting: Implementation strategies. Mar 26, 2025 pm 04:16 PM

The article discusses strategies for implementing API rate limiting in PHP, including algorithms like Token Bucket and Leaky Bucket, and using libraries like symfony/rate-limiter. It also covers monitoring, dynamically adjusting rate limits, and hand

PHP CSRF Protection: How to prevent CSRF attacks. PHP CSRF Protection: How to prevent CSRF attacks. Mar 25, 2025 pm 03:05 PM

The article discusses strategies to prevent CSRF attacks in PHP, including using CSRF tokens, Same-Site cookies, and proper session management.

PHP Input Validation: Best practices. PHP Input Validation: Best practices. Mar 26, 2025 pm 04:17 PM

Article discusses best practices for PHP input validation to enhance security, focusing on techniques like using built-in functions, whitelist approach, and server-side validation.

See all articles