An aggregated view of the constraint related meta data for a given method and all the methods in the inheritance hierarchy which it overrides or implements.
Instances are retrieved by creating a {@link Builder} and adding all required{@link ConstrainedMethod} objects to it. Instances are read-only aftercreation.
Identity is solely based on the method's name and parameter types, hence sets and similar collections of this type may only be created in the scope of one Java type.
@author Gunnar MorlingThe method-permission element specifies that one or more security roles are allowed to invoke one or more enterprise bean methods. The method-permission element consists of an optional description, a list of security role names, or an indicator to specify that the methods are not to be checked for authorization, and a list of method elements. The security roles used in the method-permission element must be defined in the security-role element of the deployment descriptor, and the methods must be methods defined in the enterprise bean's component and/or home interfaces.
The container-transaction element specifies how the container must manage transaction scopes for the enterprise bean's method invocations. The element consists of an optional description, a list of method elements, and a transaction attribute. The transaction attribute is to be applied to all the specified methods.
@param < T> the delegate type @author Sebastien Alborini @author Scott Stark. @author Adrian Brock @version $Revision: 37390 $
|
|