`
hekui1016
  • 浏览: 51128 次
  • 性别: Icon_minigender_1
  • 来自: 上海
社区版块
存档分类
最新评论

To Restrict Resizing of ADF Table's column

    博客分类:
  • ADF
 
阅读更多

To Restrict Resizing of ADF Table's column

<af:column sortable="true"headerText="#{bindings.EmployeesView1.hints.EmployeeId.label}" id="c12" align="center"
minimumWidth="100" partialTriggers="::t1">

<af:outputText value="#{row.EmployeeId}"
id="ot11">

<af:convertNumber groupingUsed="false"

pattern="#{bindings.EmployeesView1.hints.EmployeeId.format}"/>

</af:outputText>

<af:clientListener method="setColumnWidth"
type="propertyChange"/>

<af:serverListener type="server"
method="#{yourBackinbean.serverL}"/>

</af:column>

and your javaScript will be:

<af:resource type="javascript">

function setColumnWidth(event) {

var source = event.getSource()

source.setWidth("100px");

AdfCustomEvent.queue(source,"server", {}, false);

}

</af:resource>

and your method in backingbean will be :

public void serverL(ClientEvent clientEvent) {

RequestContext.getCurrentInstance().addPartialTarget(clientEvent.getComponent().getParent());

}



 



Hint : If you know how to refresh the table from javaScript
you don't need a serverListener

分享到:
评论

相关推荐

    Allows an individual to restrict multiple users to access th

    Allows an individual to restrict multiple users to access the users only for a certain amount of time. It also has an ’Autodetect’ feature to automatically detect an internet connection and ...

    U can use Winnanny to restrict unauthorised people from runn

    U can use Winnanny to restrict unauthorised people from running programs u don’t want them to on your pc .It Uses simple api functions to do this.

    Win Secure give you the ability to restrict the applications

    Win Secure give you the ability to restrict the applications that can be run by users on a workstation.

    修改__RESTRICT,__restrict工具

    iOS 修改反注入标识__RESTRICT为其它值,同时具有注入功能

    UE(官方下载)

    How to use the features of UltraEdit's powerful column mode Advanced and column-based sort How to sort file data using the advanced sort options and the column sort options Working with CSV files Use ...

    pgsql表修改

    ALTER TABLE name DROP COLUMN [IF EXISTS] column [RESTRICT | CASCADE]; 例如,要从表"distributors"删除一列"address",可以使用以下语句: ALTER TABLE distributors DROP COLUMN address; 修改列属性 ALTER...

    数据库的三种状态RESTRICT、QUIESCE和SUSPEND(三)

    本文主要探讨了数据库的三种特殊状态:RESTRICT、QUIESCE和SUSPEND,它们在不同场景下有着不同的作用和应用。我们将深入理解这三种状态,并结合实际应用场景进行详细解析。 1. RESTRICT状态: RESTRICT状态通常用于...

    gitlab-runner-windows-amd64.exe

    Make sure to restrict the Write permissions on the GitLab Runner directory and executable. If you do not set these permissions, regular users can replace the executable with their own and run ...

    微软内部资料-SQL性能优化3

    Another type of table lock is a schema stability lock (Sch-S) and is compatible with all table locks except the schema modification lock (Sch-M). The schema modification lock (Sch-M) is incompatible ...

    A-PDF Restrict Remover.exe

    A-PDF Restrict Remover.exe 可以破解pdf文件的密码的软件。

    WizFlow网页编辑

    table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, ...

    hibernate-shards.jar

    table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, ...

    修改__RESTRICT和__restrict为其他值

    ldidY

    2009 达内Unix学习笔记

    ftp工具 192.168.0.202 tools-toolss 老师测评网址 http://172.16.0.198:8080/poll/ 各个 shell 可互相切换 ksh:$ sh:$ csh:guangzhou% bash:bash-3.00$ 一、注意事项 命令和参数之间必需用空格隔开,参数和...

    mysql常用的sql语句

    - 语法示例:`SELECT left_table.column_name(s), right_table.column_name(s) FROM left_table LEFT OUTER JOIN right_table ON left_table.join_column = right_table.join_column;` 2. **查询示例解析**: - ...

    mysql中的cascade级联,set null,restrict限制 都是什么意思,有何区别.zip

    在MySQL数据库中,当涉及到表间关系,特别是外键约束时,`CASCADE`, `SET NULL`, 和 `RESTRICT` 是三种常见的操作行为。这些行为定义了如何处理在删除或更新主表(父表)记录时,与之相关联的从表(子表)的记录。...

    Multicore Processing User's Guide

    The Multicore Processing User's Guide describes how you can use symmetric multiprocessing to get the most performance possible out of a multiprocessor system. It also describes how to use bound ...

    ImageMagick图片批量处理

    -clamp restrict pixel range from 0 to the quantum depth -clip clip along the first path from the 8BIM profile -clip-mask filename associate a clip mask with the image -clip-path id clip along a ...

    Docker in Practice

    addresses the important topic of security, explaining how to lock down processes running inside a container and how to restrict access to an externally exposed Docker daemon. The final two chapters go...

Global site tag (gtag.js) - Google Analytics