当前位置:网站首页>Transaction method call @transactional
Transaction method call @transactional
2022-07-01 08:04:00 【The fifth brother of the Wang family】
Method A Calling method B
class | Method A Whether to add @Transactional | Method B Whether to add @Transactional | A The method is abnormal | B The method is abnormal |
AB Method congener | yes | no | AB Roll back | AB Roll back |
no | yes | A Don't roll back B Don't roll back | A Don't roll back B Don't roll back | |
AB Methods different classes | yes | no | AB Roll back | AB Roll back |
no | yes | A Don't roll back B Don't roll back | A Don't roll back B Roll back |
summary :
A All transactions take effect
AB Alien species ,B take effect
边栏推荐
- Office365 - how to use stream app to watch offline files at any time
- Significance and measures of source code encryption
- Gru of RNN
- Oracle create auto increment ID
- 十大劵商如何开户?另外,手机开户安全么?
- Latex formula code
- Serial port oscilloscope software ns-scope
- golang中的正则表达式使用注意事项与技巧
- Cmake I two ways to compile source files
- The H5 page has set the font thickness style, but the wechat access style in Huawei mobile phone doesn't take effect?
猜你喜欢
随机推荐
2022 electrician (intermediate) recurrent training question bank and answers
Eigen matrix operation Library
5大组合拳,解决校园6大难题,护航教育信息化建设
【无标题】
三极管是一项伟大的发明
Wang Yingqi, founder of ones, talks to fortune (Chinese version): is there any excellent software in China?
Insufficient executors to build thread pool
getInputStream() has already been called for this request
slice扩容机制分析
EDA open source simulation tool verilator beginner 6: debugging examples
Set up file server Minio for quick use
web254
Gdip - hatchbrush pattern table
軟鍵盤高度報錯
Oracle create auto increment ID
Cmake I two ways to compile source files
源代码加密的意义和措施
Significance and measures of source code encryption
PWN attack and defense world int_ overflow
Five combination boxing, solving six difficult problems on campus and escorting the construction of educational informatization