How to programmatically mimic the user action of selecting a button ?

I am using JAVA Swings to build a desktop application. The application has many buttons, lists and text boxes etc. I have created actionPerformed methods that monitor the source for user action. I am able to execute the code whenever an action is performed by user manually.
I also require to save the choices, and texts entered by a user during his active run with the application. This is to avoid user to re-enter all the information once again.
The problem is to programmatically select those buttons and lists which were saved during users earlier session. How can I perform the action event of selecting a radio button from my java code.

Kiran,
Your approach is missing the whole idea of Model-View-Controller. I suspect that somewhere you are saving the data of the user's choices. For example, if you have a checkbox, I suspect you have a java bean somewhere containing a boolean value that is set to true when the checkbox is selected, and false when the checkbox is unselected. This process is mediated by a controller, which has a references to the model (the data) and the view (the UI). The controller sets up as a listener to the actions within the UI, and, when notified, sets the appropriate properties of the data, usually into one or more java beans.
So, on the reverse side of things, the data is read into the java bean(s), and the controller uses that data to set the state of the UI elements. So, your controller can do something like this:
    uiThing.initUI(yourBean);And in the initUI method you have:
    public void initUI(DataBean data) {
         cbxBlue.setSelected(data.isBlue());
         txtLastName.setText(data.getLastName());
         // etc...
    }If you take that general approach, you'll find you don't need to simulate user actions.
In the few cases within the UI where you think you do, you really don't. An ActionListener is just a receiver of when something like a button is pressed. If your program needs to do the same thing as when the button is clicked, create a method to perform the processing, and invoke it directly, rather than trying to figure out how to programmatically press a button.
     public void actionPerformed(ActionEvent e) {
          if (e.getActionCommand().equals("BlueButton"))
              this.setBlue();
          //... etc.
     private void setBlue() {
         // whatever
     // somewhere else in the code
     private void someProcess() {
          // other work
          // other work
          if (someCondition) this.setBlue();  // rather than forcing an action event
          // other work
          // other work
     }

Similar Messages

  • Need to have pop up window in selection screen and capture the user action.

    Hello Friends,
                         I have a requirement, that need to show a pop up window after execution, and to get the action from user using a Push button.
    I create a selection screen and a sub screen as window.
    After user execute from the selection screen, I am popping up this window.
    Window contains some input values to be entered and push button to identify the user action.
    I try to capture the user action using sy-ucomm, but it does not hold any value when user press the button.
    How to overcome this issue.
    Here is the definition of the window.
    Pop Up Window for getting values
    SELECTION-SCREEN BEGIN OF SCREEN 500 AS WINDOW TITLE title .
    PARAMETER : p_vdate LIKE t9aa01-validfrom,
                p_dcggt LIKE t9aa01-hkont,
                p_dcgst1 LIKE t9aa01-hkont,
                p_dcgst2 LIKE t9aa01-hkont,
                p_na LIKE t9aa01-hkont.
    SELECTION-SCREEN SKIP.
    SELECTION-SCREEN BEGIN OF LINE.
    SELECTION-SCREEN POSITION 20.
    SELECTION-SCREEN PUSHBUTTON 2(10) text-001 USER-COMMAND SVE.
    SELECTION-SCREEN END OF LINE.
    SELECTION-SCREEN END OF SCREEN 500.
    Cheers,
    Senthil
    Edited by: Senthil on Jan 7, 2008 11:03 AM

    Hi,
    Try using the below code.
           data : w_var type string.
           CALL FUNCTION 'POPUP_TO_CONFIRM_STEP'
             EXPORTING
              DEFAULTOPTION        = 'Y'
               textline1            = 'test '
             TEXTLINE2            = ' '
               titel                = 'check'
             START_COLUMN         = 25
             START_ROW            = 6
             CANCEL_DISPLAY       = 'X'
            IMPORTING
              ANSWER               = w_var.
                     if w_var = 'J'.
                     else.
                     endif.
    Comments : J indicates Yes and N indicates No
    Regards,
    Jeswanth

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •             B_BUPA_GRP
    •             B_BUPA_ATT
    •             B_BUPA_FDG
    •             B_BUPA_RLT•       
    Authorization objects for relationships:
    •             B_BUPR_BZT
    •             B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •             The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •             If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •             You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •             So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • Show the user action script function is in progress

    Hi friends,
    iam using action script code to store bitmap images and
    display in the required format.
    This code takes noticable time to complete.How can i show the
    user that the operation is in progress .
    regards,
    Krishna

    The bar won't animate unless you give it a source.
    Also, it won't animate if a loop clogs up the CPU.
    Consider using callLater() for step by step execution of the
    function in sync with the application framerate.

  • How to find out the user-exits?

    hi.
    how to find out the user-exits?
    regards
    eswar.

    Hi,
    *& Report  ZEXITFINDER
    *report  zexitfinder.
    *& Enter the transaction code that you want to search through in order
    *& to find which Standard SAP User Exits exists.
    *& Tables
    tables : tstc, "SAP Transaction Codes
    tadir, "Directory of Repository Objects
    modsapt, "SAP Enhancements - Short Texts
    modact, "Modifications
    trdir, "System table TRDIR
    tfdir, "Function Module
    enlfdir, "Additional Attributes for Function Modules
    tstct. "Transaction Code Texts
    *& Variables
    data : jtab like tadir occurs 0 with header line.
    data : field1(30).
    data : v_devclass like tadir-devclass.
    *& Selection Screen Parameters
    selection-screen begin of block a01 with frame title text-001.
    selection-screen skip.
    parameters : p_tcode like tstc-tcode obligatory.
    selection-screen skip.
    selection-screen end of block a01.
    *& Start of main program
    start-of-selection.
    Validate Transaction Code
    select single * from tstc
    where tcode eq p_tcode.
    Find Repository Objects for transaction code
    if sy-subrc eq 0.
    select single * from tadir
    where pgmid = 'R3TR'
    and object = 'PROG'
    and obj_name = tstc-pgmna.
    move : tadir-devclass to v_devclass.
    if sy-subrc ne 0.
    select single * from trdir
    where name = tstc-pgmna.
    if trdir-subc eq 'F'.
    select single * from tfdir
    where pname = tstc-pgmna.
    select single * from enlfdir
    where funcname = tfdir-funcname.
    select single * from tadir
    where pgmid = 'R3TR'
    and object = 'FUGR'
    and obj_name = enlfdir-area.
    move : tadir-devclass to v_devclass.
    endif.
    endif.
    Find SAP Modifactions
    select * from tadir
    into table jtab
    where pgmid = 'R3TR'
    and object = 'SMOD'
    and devclass = v_devclass.
    select single * from tstct
    where sprsl eq sy-langu
    and tcode eq p_tcode.
    format color col_positive intensified off.
    write:/(19) 'Transaction Code - ',
    20(20) p_tcode,
    45(50) tstct-ttext.
    skip.
    if not jtab[] is initial.
    write:/(95) sy-uline.
    format color col_heading intensified on.
    write:/1 sy-vline,
    2 'Exit Name',
    21 sy-vline ,
    22 'Description',
    95 sy-vline.
    write:/(95) sy-uline.
    loop at jtab.
    select single * from modsapt
    where sprsl = sy-langu and
    name = jtab-obj_name.
    format color col_normal intensified off.
    write:/1 sy-vline,
    2 jtab-obj_name hotspot on,
    21 sy-vline ,
    22 modsapt-modtext,
    95 sy-vline.
    endloop.
    write:/(95) sy-uline.
    describe table jtab.
    skip.
    format color col_total intensified on.
    write:/ 'No of Exits:' , sy-tfill.
    else.
    format color col_negative intensified on.
    write:/(95) 'No User Exit exists'.
    endif.
    else.
    format color col_negative intensified on.
    write:/(95) 'Transaction Code Does Not Exist'.
    endif.
    Take the user to SMOD for the Exit that was selected.
    at line-selection.
    get cursor field field1.
    check field1(4) eq 'JTAB'.
    set parameter id 'MON' field sy-lisel+1(10).
    call transaction 'SMOD' and skip first screen.
    Regards

  • How to find out the user who modified formula

    Hi  Experts,
    How can I find the user ID who modified the formula in transfer rules?
    Thanks
    Manish

    you can check the infosource status, menu - extras - infosource status. there you will find info abt the comm and transfer structure, active and modified version, last changed, date, time etc. I dont think it would work if the structure has been changed after the structure has been changed with the formulas.

  • How to find out the user who has created  a new field in the custom table.

    How to find out the user details who has created  a new field in the custom table.
    Thanks,
    Joan

    Hi Jesudasan ,
    You can know the user details with version management.Please find the
    below procedure to know.
    Go to table->Utilities tab->version->Version management->Compare the previous one .
    Hope this solves the issue,Let me know if you have any issues.
    Thanks,
    Rajani

  • HT201342 How can I change the USER of my i-cloud address? My 12 year old set up the e-mail account and used a silly user name (like: turtle!!). I would like to have an icloud e-mail account but under my own user name. The other /old name can be deleted?

    How can I change the USER name of my i-cloud e-mail account? It was set up by my son and he used a silly / embarrassing user name. I would like to change this name OR set up another i-cloud e-mail account under my own name / reference. Help?

    iCloud email addresses can't be changed or deleted, but you can set up an alias namethat he can use which will be linked to his current iCloud account and will receive email in the existing iCould inbox.  This guide explains how: http://support.apple.com/kb/PH2622.

  • How can  I  restrain the user login portal once, in the same time ???

    Hi
    I need to restrain the user can't repeat to login portal ....
    to reduce portal loading
    How can I restrain the user login portal once, in the same time???
    Which attributs in Identity Manager or amconsole I can do it to restrain the user ??
    tks

    Does your portal support anonymous access? If so, make sure you are using the authlessanonymous mode. This mode only creates one session that is shared for all anonymous users. This is much more efficient than anonymous access, which creates a session for each anonymous user.
    I have no other recommendation for limiting users to a single login. In general, web applications do not behave like this. What if a user closes their browser without logging out? Does the user have to wait until the session times out in order to log back in again?
    The same thing is true for users that are mobile. If a user leaves their office without logging out and then attempts to log in with a laptop in the conference room, then access will be denied in your implementation. Users do not expect this type of limitation being built into the system.
    If you are having problems scaling, then you need to look at your architecture and perhaps add some more resources. Also, make sure you are making efficient use of the authlessanonymous access mode as stated above.
    - Jim

  • How to find out the users currently logged into ODI

    Hi all,
    How to find out the users currently logged into ODI Work Repository?
    Thanks.

    Hi,
    It stores all the final queries in work rep table i.e "SNP_SESS_TXT_LOG" and the column is "TXT".
    Here u can find all the ODI bkp process queries.Pls specify the SESS_NO for purtivular task u want to check which u can get this in ODI operator.
    I dont think so that it will keep the substituted value(because its implicit and temporary process) but it will keep all the default values in the table SNP_VAR_SESS and the column is "DEF_V".
    Thanks,
    katukota

  • Hi guys,Explain how to find whether the user request is dialog or bc ...

    how to find whether the user request is dialog or bc or some other wp and where we can see that ?

    Hello Damodar,
    You can find out that in SM50.
    However one piece of advice. I have noticed that you are raising lots of questions about very basic questions. Either you new to SAP or dont know anything about SAP Basis and want to get in this area. Or else you are preparing for some interview. In either of these cases expecting solutions given at SDN are not going to be of much help. Better read yorself in SAP Help as most people do. SDN should not be overly used for such purposes. Basic questions are welcome but you want to learn SAP through SDN !!!
    Regards.
    Ruchit.

  • The Ipad2 Application Data folder is taking up huge space in C: Drive. How can I shift the User Application data for iPad2 to another Drive?

    The Ipad2 Application Data folder is taking up huge space in C: Drive. How can I shift the User Application data for iPad2 to another Drive?

    Thanks a lot for the response. Yes, I am checking my C: drive data thoroughly now, including the hidden folders, to ascertain if something else can be moved, as per your suggestion.

  • How to programmatically place the field in the canvas.

    Hello!
    Can you please tell, how to programmatically place the field BLOCK1.FIELD1 in the canvas CANVAS1.
    At the moment on the field value CANVAS = NULL.
    And when opening the form error "FRM-41014 Cannot set attribute of null canvas item..."
    Thank you

    Youcannot assign a canvas at runtime. Yu have to specify int at designtime and it cannot be changed at runtime. if you need an item in more than one canvas, use a mirror-item (duplcate the item and set the property Synchronize with)

  • How to determine that the user/ pernr is comp cord?

    Hi,
    In tcode pa30 i see there is Comp Cord field. so these are the HR persons right which use the three digits numbers.
    So my question is how to determine that the user/ pernr is comp cord?
    I want to create the fm and pass user id as import and want to find out where this user is belongs to comp coordinator or not.
    i do see some entry in the T526 table but not sure, how it work.
    Regards
    Ali

    hi ali,
    SACHX is the field you are looking for ..
    regards
    Manthan Raja

  • How can i receive the user name of the present operating system

    HI,all.
    how can i receive the user name of the present operating system from SAP.Have any funciton to use?Thankyou!

    use sy-uname system field.
    report ztest.
    write:sy-uname.
    thanks.
    reward if solved.

Maybe you are looking for

  • Trying to open old logic files.

    I have Logic Pro 9.1.6. It works fine. I am trying to open old files and understand I need to save them in Logic 7 first. I have L7 installed on a separate disk with OS10.4.11. When I startup with that disk I can't launch Logic 7 because it  does not

  • WVC54GCA no longer working on wireless

    I had the camera for about 2 months and it was working fine wirelessly. The only problem I had was the camera randomly disconnects and gets reassigned a new IP so I set it to static and it worked fine. About 2 weeks ago it stopped working. I connecte

  • How to find contents of ABAP proxy message

    we are using an ABAP proxy to send data including a document number from SAP to PI when a document is received on our SAP ERP system. it is possible under certain conditions that the proxy will not be processed, but the document has. I want to be abl

  • Overwritten Folder Recovery

    Earlier today, I was backing up my files from my mac to my external hard drive. I copied and pasted all of my project folders into the folder on my external. The prompt came up to overwrite and I chose to, being that most of the files were updates of

  • Upgrade 10.1.0.4 to latest patch release

    I have currently 10.1.0.4 database installed on Microsoft Server 2003 32-bits. I want to upgrade this to latest release on 10.2. Where would I download this version? I have access to My Oracle Support. I tried to search on 'Patches & Updates' but it'