<af:column
sortable="true"headerText="#{bindings.EmployeesView1.hints.EmployeeId.label}"
id="c12" align="center"
minimumWidth="100"
partialTriggers="::t1">
<af:outputText
value="#{row.EmployeeId}"
id="ot11">
<af:convertNumber
groupingUsed="false"
pattern="#{bindings.EmployeesView1.hints.EmployeeId.format}"/>
</af:outputText>
<af:clientListener
method="setColumnWidth"
type="propertyChange"/>
<af:serverListener type="server"
method="#{yourBackinbean.serverL}"/>
</af:column>
and your
javaScript will be:
<af:resource
type="javascript">
function
setColumnWidth(event) {
var source =
event.getSource()
source.setWidth("100px");
AdfCustomEvent.queue(source,"server", {}, false);
}
</af:resource>
and your method in backingbean will be :
public void serverL(ClientEvent clientEvent) {
RequestContext.getCurrentInstance().addPartialTarget(clientEvent.getComponent().getParent());
}
Hint : If you know how to refresh the table from
javaScript
you don't need a serverListener
分享到:
相关推荐
Allows an individual to restrict multiple users to access the users only for a certain amount of time. It also has an ’Autodetect’ feature to automatically detect an internet connection and ...
U can use Winnanny to restrict unauthorised people from running programs u don’t want them to on your pc .It Uses simple api functions to do this.
Win Secure give you the ability to restrict the applications that can be run by users on a workstation.
iOS 修改反注入标识__RESTRICT为其它值,同时具有注入功能
How to use the features of UltraEdit's powerful column mode Advanced and column-based sort How to sort file data using the advanced sort options and the column sort options Working with CSV files Use ...
Restrict access to data through a variety of application-level controls Use security architectures to avoid creating a single point of trust in your systems Explore federated architectures that let ...
Make sure to restrict the Write permissions on the GitLab Runner directory and executable. If you do not set these permissions, regular users can replace the executable with their own and run ...
Another type of table lock is a schema stability lock (Sch-S) and is compatible with all table locks except the schema modification lock (Sch-M). The schema modification lock (Sch-M) is incompatible ...
A-PDF Restrict Remover.exe 可以破解pdf文件的密码的软件。
table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, ...
table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, ...
ldidY
Optimisation—and in general we restrict our attention to quadratic cost functions. Adaption—we consider a number of algorithms for iteratively converging to and tracking the optimum solution. ...
-clamp restrict pixel range from 0 to the quantum depth -clip clip along the first path from the 8BIM profile -clip-mask filename associate a clip mask with the image -clip-path id clip along a ...
addresses the important topic of security, explaining how to lock down processes running inside a container and how to restrict access to an externally exposed Docker daemon. The final two chapters go...
days advance written notice of your belief that such action is warranted and permitted and to provide POLYCOM with an opportunity to evaluate if the law’s requirements necessitate such action)....
restrict user login times
You will be able to control the priority of jobs, restrict or allow access users to certain services, deploy packages, tackle issues related to server effectively, and reduce downtime. Also, you ...
[ DROP [ COLUMN ] [CASCADE| RESTRICT] ] [ DROP CONSTRAINT[ RESTRICT | CASCADE ] ] [ALTER COLUMN ] ; 其中 是要修改的基本表 ADD子句用于增加新列、新的列级完整性约束条件和新的表级完整性约束条件 例:alter ...
- FIX: Fixed the glitch that was causing widgets to jump into the middle of nowhere sometimes when resizing them. - FIX: UIDragScrollView will no longer try to find the scroll view if you set it ...