How to perform addition for attribute of Number type in expression language

When adding two attributes of oracle.jbo.domain.Number type in Expression Language like EmpSal and EmpBonus as below  :

#{bindings.bindings.EmpSal.inputValue + bindings.EmpBonus.inputValue}

or adding number 1000 to EmpSal as  :

#{bindings.bindings.EmpSal.inputValue + 1000}

You may get below exception :

Unexpected exception caught: java.util.MissingResourceException, msg=Can’t find resource for bundle java.util.PropertyResourceBundle, key el.convert

To Eliminate this Exception, Add EmpSal and EmpBonus as below :

#{bindings.EmpSal.inputValue.value + bindings.EmpBonus.inputValue.value}

Add ‘value’ to inputValue to remove the exception.

Happy learning in TechArtifact. 🙂

Useful Expression language (el)in Webcenter Spaces Application

Small webenter tip- If we want to check whther a user if member of any group or space.Or role of the user. and etc etc

following are el which i found today and usefull too.thats why i am sharing with you.

WebCenterSecurityContextSupport -this interface Provides EL support for WebCenter Security.

#{WCSecurityContext.userInScopedRole[‘Moderator’]} – Checks if current user is in group space role. Role membership is checked against the current Group Space Identifier.

#{WCSecurityContext.userInGroup[‘Administrators’]} – Checks if the current user is a member of the specified enterprise group.

#{WCSecurityContext.userInAppRole[‘SiteResourceAdmin’]} – Checks if current user is in application role.

#{WCSecurityContext.currentUser[‘weblogic’]} – Checks if current user name matches the one specified.

you can try this el as well for checking the current user have specified role in spaces application – #{WCSecurityContext.userInScopedRole[‘ReadOnly or custom role’]}”

Happy coding with Vinay Kumar in Techartifact . 🙂

Commonly ADF Security Expression Language -el

Name of authenticated user – #{securityContext.userName}

Check if user logged in – #{securityContext.authenticated}

Check if user is a member of at least one role in comma separated list – #{securityContext.userInRole[‘roleList’]}

Check if user is a member of all roles in comma separated list – #{securityContext.userInAllRoles[‘roleList’]}

True if the user has access rights,Where resource is a string containing
a semicolon-separated concatenation f resourceNameReturns.True if the
user has access rights – #{securityContext.userGrantedResource[‘resource’]}