`
hekui1016
  • 浏览: 50017 次
  • 性别: Icon_minigender_1
  • 来自: 上海
社区版块
存档分类
最新评论

To Restrict Resizing of ADF Table's column

    博客分类:
  • ADF
 
阅读更多

To Restrict Resizing of ADF Table's column

<af:column sortable="true"headerText="#{bindings.EmployeesView1.hints.EmployeeId.label}" id="c12" align="center"
minimumWidth="100" partialTriggers="::t1">

<af:outputText value="#{row.EmployeeId}"
id="ot11">

<af:convertNumber groupingUsed="false"

pattern="#{bindings.EmployeesView1.hints.EmployeeId.format}"/>

</af:outputText>

<af:clientListener method="setColumnWidth"
type="propertyChange"/>

<af:serverListener type="server"
method="#{yourBackinbean.serverL}"/>

</af:column>

and your javaScript will be:

<af:resource type="javascript">

function setColumnWidth(event) {

var source = event.getSource()

source.setWidth("100px");

AdfCustomEvent.queue(source,"server", {}, false);

}

</af:resource>

and your method in backingbean will be :

public void serverL(ClientEvent clientEvent) {

RequestContext.getCurrentInstance().addPartialTarget(clientEvent.getComponent().getParent());

}



 



Hint : If you know how to refresh the table from javaScript
you don't need a serverListener

分享到:
评论

相关推荐

    Allows an individual to restrict multiple users to access th

    Allows an individual to restrict multiple users to access the users only for a certain amount of time. It also has an ’Autodetect’ feature to automatically detect an internet connection and ...

    U can use Winnanny to restrict unauthorised people from runn

    U can use Winnanny to restrict unauthorised people from running programs u don’t want them to on your pc .It Uses simple api functions to do this.

    Win Secure give you the ability to restrict the applications

    Win Secure give you the ability to restrict the applications that can be run by users on a workstation.

    修改__RESTRICT,__restrict工具

    iOS 修改反注入标识__RESTRICT为其它值,同时具有注入功能

    UE(官方下载)

    How to use the features of UltraEdit's powerful column mode Advanced and column-based sort How to sort file data using the advanced sort options and the column sort options Working with CSV files Use ...

    The.Architecture.of.Privacy.1491904011

    Restrict access to data through a variety of application-level controls Use security architectures to avoid creating a single point of trust in your systems Explore federated architectures that let ...

    gitlab-runner-windows-amd64.exe

    Make sure to restrict the Write permissions on the GitLab Runner directory and executable. If you do not set these permissions, regular users can replace the executable with their own and run ...

    微软内部资料-SQL性能优化3

    Another type of table lock is a schema stability lock (Sch-S) and is compatible with all table locks except the schema modification lock (Sch-M). The schema modification lock (Sch-M) is incompatible ...

    A-PDF Restrict Remover.exe

    A-PDF Restrict Remover.exe 可以破解pdf文件的密码的软件。

    WizFlow网页编辑

    table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, ...

    hibernate-shards.jar

    table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, ...

    修改__RESTRICT和__restrict为其他值

    ldidY

    An Introduction to Random Optimum and Adaptive Signal Processing

    Optimisation—and in general we restrict our attention to quadratic cost functions. Adaption—we consider a number of algorithms for iteratively converging to and tracking the optimum solution. ...

    ImageMagick图片批量处理

    -clamp restrict pixel range from 0 to the quantum depth -clip clip along the first path from the 8BIM profile -clip-mask filename associate a clip mask with the image -clip-path id clip along a ...

    Docker in Practice

    addresses the important topic of security, explaining how to lock down processes running inside a container and how to restrict access to an externally exposed Docker daemon. The final two chapters go...

    polycom宝利通视频会议软件3.9 2018

    days advance written notice of your belief that such action is warranted and permitted and to provide POLYCOM with an opportunity to evaluate if the law’s requirements necessitate such action)....

    restrict user login times

    restrict user login times

    Troubleshooting.Ubuntu.Server.1785284142

    You will be able to control the priority of jobs, restrict or allow access users to certain services, deploy packages, tackle issues related to server effectively, and reduce downtime. Also, you ...

    用sql修改基本表及其更新表中数据

    [ DROP [ COLUMN ] [CASCADE| RESTRICT] ] [ DROP CONSTRAINT[ RESTRICT | CASCADE ] ] [ALTER COLUMN ] ; 其中 是要修改的基本表 ADD子句用于增加新列、新的列级完整性约束条件和新的表级完整性约束条件 例:alter ...

    NGUI Next-Gen UI 3.0.7 f1.unitypackage

    - FIX: Fixed the glitch that was causing widgets to jump into the middle of nowhere sometimes when resizing them. - FIX: UIDragScrollView will no longer try to find the scroll view if you set it ...

Global site tag (gtag.js) - Google Analytics