As an answer to your big question: no. There is no distinction between a
rule that isn't activated because one of its patterns doesn't match with any
of the existing facts or due to the absence of facts of a type. Hence, (A, B
and not C) with A, B and C that does not match is indistinguishable
Hi
For this I saved the schema (change-set-1.0.0.xsd) on my local machine and
gave the path in the ChangeSet.xml
Now its working fine...
Regards,
Sumeet Karawal
Mailto: sumeet.kara...@tcs.com
- Forwarded by Sumeet Karawal/MUM/TCS on 08/22/2011 03:44 PM -
Thank you for the reply Wolfgang!
Altho this particular application involves a Expert System, I quite enjoyed
learning about drools and I intend to keep studying it in the following
months regardless if I end up using it or not right now.
A solution (far from ideal) that I came up with was to
Hi Hough,
Unfortunately, there isn't any documentation on this (Container Managed
Persistence w/ jBPM 5) that I know of. I've asked around a little and
couldn't find any.
What are you using transactions for in your case? jBPM itself has some
mechanisms that manage transactions.
Regards,
Hi Wolfgang,
I finally decided to test different implementations:
* first based on an accumulation function
* second (your suggestion) relying on drools to 1) build all
SentenceWindows then to 2) locate ManualAnnotations inside those
Windows
* third (your suggestion as well)
hi all
I am looking for a sample ant script which shows how an excel spreadsheet
can be precompiled and also the dependencies on the class path that are
required for it, can anyone poit me in the right direction?
Thanks,
--
View this message in context:
In Drools 5 is it possible for a rule to call one of two specific rules
depending on whether the condition in the first rule evaluates to true or
false? For example lets say that there are three rules: A, B, and C. A is
evaluated and if its condition is True then execute rule B, otherwise
Yes, Im using Guvnor 5.2
--
View this message in context:
http://drools.46999.n3.nabble.com/Guvnor-5-2-method-call-in-rhs-tp3275866p3276170.html
Sent from the Drools: User forum mailing list archive at Nabble.com.
___
rules-users mailing list
This version: guvnor-5.2.0.Final-tomcat-6.0.war
--
View this message in context:
http://drools.46999.n3.nabble.com/Guvnor-5-2-method-call-in-rhs-tp3275866p3276180.html
Sent from the Drools: User forum mailing list archive at Nabble.com.
___
rules-users
that class is in drools-compiler-5.2.0.Final.jar
I set up my path using pathelement instead of fileset, and compile worked
with these jars (droolsPath is of course set for my own environment):
path id=drools.classpath
pathelement
There is a good example in the Drools JBoss Rules 5.0 Developer's Guide
chapter 11.
I just got this working for my own build, here is my xml, which is part of a
larger build script but at least will give you a sample:
property name=droolsPath value=../../../shared /
path id=drools.classpath
I changed my script to use this:
fileset dir=${droolsPath} includes=*.jar /
instead of the separate pathelement entries and it worked fine.
my droolsPath includes all of the jars I listed in my last post (plus many
others)
--
View this message in context:
I was working on a similar scenario. My solution is when rule A fired,
insert a fact AF. Rule B's LHS detects if there's an instance of AF and it's
only fired if so. And I don't think you can do else in a rule now. So you
may consider split rule A into two rules to fire either B or C.
Regards
Yu
I've Guvnor working with Websphere 7.0 pretty well. That said, I've having
problem using JAAS with WebsPhere WSLogin login implementation module, i.e.
com.ibm.ws.security.common.auth.module.WSLoginModuleImpl. It seems that
Guvnor will accept the any user authentication if you specify a blank
Hi Henry,
I vaguely remember seeing the same problem in WAS6. WebSphere
documentation says:
A username and password must be specified in the callback handler.
Custom classes that are added to the Subject on the client side should
get propagated to the server automatically whenever security
15 matches
Mail list logo