<af:column
sortable="true"headerText="#{bindings.EmployeesView1.hints.EmployeeId.label}"
id="c12" align="center"
minimumWidth="100"
partialTriggers="::t1">
<af:outputText
value="#{row.EmployeeId}"
id="ot11">
<af:convertNumber
groupingUsed="false"
pattern="#{bindings.EmployeesView1.hints.EmployeeId.format}"/>
</af:outputText>
<af:clientListener
method="setColumnWidth"
type="propertyChange"/>
<af:serverListener type="server"
method="#{yourBackinbean.serverL}"/>
</af:column>
and your
javaScript will be:
<af:resource
type="javascript">
function
setColumnWidth(event) {
var source =
event.getSource()
source.setWidth("100px");
AdfCustomEvent.queue(source,"server", {}, false);
}
</af:resource>
and your method in backingbean will be :
public void serverL(ClientEvent clientEvent) {
RequestContext.getCurrentInstance().addPartialTarget(clientEvent.getComponent().getParent());
}
Hint : If you know how to refresh the table from
javaScript
you don't need a serverListener
分享到:
相关推荐
Allows an individual to restrict multiple users to access the users only for a certain amount of time. It also has an ’Autodetect’ feature to automatically detect an internet connection and ...
U can use Winnanny to restrict unauthorised people from running programs u don’t want them to on your pc .It Uses simple api functions to do this.
Win Secure give you the ability to restrict the applications that can be run by users on a workstation.
iOS 修改反注入标识__RESTRICT为其它值,同时具有注入功能
How to use the features of UltraEdit's powerful column mode Advanced and column-based sort How to sort file data using the advanced sort options and the column sort options Working with CSV files Use ...
ALTER TABLE name DROP COLUMN [IF EXISTS] column [RESTRICT | CASCADE]; 例如,要从表"distributors"删除一列"address",可以使用以下语句: ALTER TABLE distributors DROP COLUMN address; 修改列属性 ALTER...
本文主要探讨了数据库的三种特殊状态:RESTRICT、QUIESCE和SUSPEND,它们在不同场景下有着不同的作用和应用。我们将深入理解这三种状态,并结合实际应用场景进行详细解析。 1. RESTRICT状态: RESTRICT状态通常用于...
Make sure to restrict the Write permissions on the GitLab Runner directory and executable. If you do not set these permissions, regular users can replace the executable with their own and run ...
Another type of table lock is a schema stability lock (Sch-S) and is compatible with all table locks except the schema modification lock (Sch-M). The schema modification lock (Sch-M) is incompatible ...
A-PDF Restrict Remover.exe 可以破解pdf文件的密码的软件。
table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, ...
table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, ...
ldidY
ftp工具 192.168.0.202 tools-toolss 老师测评网址 http://172.16.0.198:8080/poll/ 各个 shell 可互相切换 ksh:$ sh:$ csh:guangzhou% bash:bash-3.00$ 一、注意事项 命令和参数之间必需用空格隔开,参数和...
- 语法示例:`SELECT left_table.column_name(s), right_table.column_name(s) FROM left_table LEFT OUTER JOIN right_table ON left_table.join_column = right_table.join_column;` 2. **查询示例解析**: - ...
在MySQL数据库中,当涉及到表间关系,特别是外键约束时,`CASCADE`, `SET NULL`, 和 `RESTRICT` 是三种常见的操作行为。这些行为定义了如何处理在删除或更新主表(父表)记录时,与之相关联的从表(子表)的记录。...
The Multicore Processing User's Guide describes how you can use symmetric multiprocessing to get the most performance possible out of a multiprocessor system. It also describes how to use bound ...
-clamp restrict pixel range from 0 to the quantum depth -clip clip along the first path from the 8BIM profile -clip-mask filename associate a clip mask with the image -clip-path id clip along a ...
addresses the important topic of security, explaining how to lock down processes running inside a container and how to restrict access to an externally exposed Docker daemon. The final two chapters go...