This section provides a reference to ODBC compliance and a walk-through to writing ODBC data access code to Bugzilla in C/C++.
Connecting from C/C++
Use ODBC functions to execute SQL to Bugzilla:
- See Querying Data to execute SELECT statements and iterate over the results.
- See Parameterized Statements to execute parameterized statements. Parameterized statements provide a means to efficiently execute queries more than once and to mitigate SQL injection attacks.
- See Discovering Schemas to obtain schema information, such as the available tables, columns, keys, and types. See Data Model to obtain the driver metadata by querying the available system tables.
Executing Stored Procedures
See Executing Stored Procedures to execute stored procedures as SQL statements.