DBA Data[Home] [Help]

APPS.PA_SECURITY_PVT dependencies on PA_DEBUG

Line 9: G_debug_flag varchar2(1) := NVL(FND_PROFILE.value('PA_DEBUG_MODE'), 'N');

5: G_user_id NUMBER:=FND_GLOBAL.USER_ID;
6: G_source_type VARCHAR2(30) := '';
7: G_source_id NUMBER;
8: G_grantee_key VARCHAR2(240) := '';
9: G_debug_flag varchar2(1) := NVL(FND_PROFILE.value('PA_DEBUG_MODE'), 'N');
10: G_source_type_id NUMBER;
11: G_project_system_status_code VARCHAR2(30) := '';
12: G_project_roles_ins_set_id NUMBER;
13: G_project_roles_ins_set_name FND_OBJECT_INSTANCE_SETS.instance_set_name%TYPE := 'PA_PROJECT_ROLES';

Line 26: G_debug_flag := NVL(FND_PROFILE.value('PA_DEBUG_MODE'), 'N');

22: l_cust_id NUMBER;
23: BEGIN
24: G_responsibility_id := FND_GLOBAL.RESP_ID;
25: G_user_id := FND_GLOBAL.USER_ID;
26: G_debug_flag := NVL(FND_PROFILE.value('PA_DEBUG_MODE'), 'N');
27: G_project_roles_ins_set_id := get_instance_set_id(G_project_roles_ins_set_name);
28:
29: SELECT employee_id, person_party_id -- Bug 4527617. Replaced customer_id with person_party_id.
30: INTO l_emp_id, l_cust_id

Line 182: pa_debug.Init_err_stack ( 'Check User Privilege');

178: IF p_init_msg_list = 'Y' THEN
179: FND_MSG_PUB.initialize;
180: END IF;
181:
182: pa_debug.Init_err_stack ( 'Check User Privilege');
183: x_msg_count :=0;
184: x_msg_data:= null;
185: x_return_status:=fnd_api.g_ret_sts_success;
186: x_ret_code:=fnd_api.g_true;

Line 199: pa_debug.G_err_stage := 'check responsibility level security: not in object instance context';

195:
196: If nvl(p_object_key,-999) =-999 then
197: -----Not in object instance context. Check responbility level
198: ------function security
199: pa_debug.G_err_stage := 'check responsibility level security: not in object instance context';
200: IF G_debug_flag = 'Y' THEN
201: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
202: END IF;
203: if fnd_function.test(p_privilege) then

Line 201: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);

197: -----Not in object instance context. Check responbility level
198: ------function security
199: pa_debug.G_err_stage := 'check responsibility level security: not in object instance context';
200: IF G_debug_flag = 'Y' THEN
201: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
202: END IF;
203: if fnd_function.test(p_privilege) then
204: x_ret_code:=fnd_api.g_true;
205: x_return_status:=fnd_api.g_ret_sts_success;

Line 214: pa_debug.G_err_stage := 'check role based security';

210: return;
211: end if;
212:
213: --------check role based security ------------
214: pa_debug.G_err_stage := 'check role based security';
215: -- store project system status code in global variable for instance set
216: IF p_object_name = 'PA_PROJECTS' THEN
217: select project_system_status_code into G_project_system_status_code
218: from pa_projects_all ppa,

Line 225: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);

221: and ppa.project_id = p_object_key;
222: END IF;
223:
224: IF G_debug_flag = 'Y' THEN
225: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
226: END IF;
227: --dbms_output.put_line('before: calling fnd_data_sec');
228: --dbms_output.put_line('get_grantee_key:'||get_grantee_key);
229: --dbms_output.put_line('p_privilege:'||p_privilege);

Line 272: pa_debug.G_err_stage := 'get secure_resp_flag';

268: ----responsibility level check
269: end if;
270: -----------End of check role based security-----------
271:
272: pa_debug.G_err_stage := 'get secure_resp_flag';
273: IF G_debug_flag = 'Y' THEN
274: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
275: END IF;
276:

Line 274: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);

270: -----------End of check role based security-----------
271:
272: pa_debug.G_err_stage := 'get secure_resp_flag';
273: IF G_debug_flag = 'Y' THEN
274: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
275: END IF;
276:
277: -----check if responsibility based security is enforced
278: ---(check if any of the roles the user plays on the object

Line 311: pa_debug.G_err_stage := 'check responsibility level security: in object context';

307: -----1. The user plays unsecured roles (roles without menu) on the object
308: -----2. The user doesn't play any roles (instance assignment) on the object
309:
310: if secure_resp_flag=fnd_api.g_true then
311: pa_debug.G_err_stage := 'check responsibility level security: in object context';
312: IF G_debug_flag = 'Y' THEN
313: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
314: END IF;
315: if p_object_name='PA_PROJECTS' then

Line 313: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);

309:
310: if secure_resp_flag=fnd_api.g_true then
311: pa_debug.G_err_stage := 'check responsibility level security: in object context';
312: IF G_debug_flag = 'Y' THEN
313: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
314: END IF;
315: if p_object_name='PA_PROJECTS' then
316: if pa_security.allow_update (p_object_key)<>'Y' then
317: x_ret_code:=fnd_api.g_false;

Line 344: pa_debug.G_err_stage := 'exceptions raised';

340: return;
341: end if ;
342: Exception
343: when others then
344: pa_debug.G_err_stage := 'exceptions raised';
345: IF G_debug_flag = 'Y' THEN
346: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
347: END IF;
348: fnd_msg_pub.add_exc_msg

Line 346: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);

342: Exception
343: when others then
344: pa_debug.G_err_stage := 'exceptions raised';
345: IF G_debug_flag = 'Y' THEN
346: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
347: END IF;
348: fnd_msg_pub.add_exc_msg
349: (p_pkg_name => G_PKG_NAME,
350: p_procedure_name =>'CHECK_USER_PRIVILEGE' );

Line 575: pa_debug.Init_err_stack ( 'check_confirm_asmt');

571: IF p_init_msg_list = 'T' THEN
572: FND_MSG_PUB.initialize;
573: END IF;
574:
575: pa_debug.Init_err_stack ( 'check_confirm_asmt');
576: x_msg_count :=0;
577: x_msg_data:= null;
578: x_return_status:=fnd_api.g_ret_sts_success;
579: x_ret_code:=fnd_api.g_true;

Line 588: pa_debug.G_err_stage := 'Initialization: get resource id, resource org, project org';

584: RETURN;
585: END IF;
586:
587: -----Initialization: get resource id, resource org, project org
588: pa_debug.G_err_stage := 'Initialization: get resource id, resource org, project org';
589: -- Bug 4359282 : Added check before calling pa_debug.write_file
590: IF G_debug_flag = 'Y' THEN
591: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
592: END IF;

Line 589: -- Bug 4359282 : Added check before calling pa_debug.write_file

585: END IF;
586:
587: -----Initialization: get resource id, resource org, project org
588: pa_debug.G_err_stage := 'Initialization: get resource id, resource org, project org';
589: -- Bug 4359282 : Added check before calling pa_debug.write_file
590: IF G_debug_flag = 'Y' THEN
591: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
592: END IF;
593:

Line 591: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);

587: -----Initialization: get resource id, resource org, project org
588: pa_debug.G_err_stage := 'Initialization: get resource id, resource org, project org';
589: -- Bug 4359282 : Added check before calling pa_debug.write_file
590: IF G_debug_flag = 'Y' THEN
591: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
592: END IF;
593:
594: ------- Check for License
595: IF pa_product_install_utils.check_function_licensed(p_privilege) <> 'Y' THEN

Line 650: pa_debug.G_err_stage := 'Check if the user has resource authority on the resource';

646:
647: /* Bug 2970209 -- Commented the code to call check_user_privilege. Now new
648: code is added in the last to check for resource autority */
649: /*------- Check if the user has resource authority on the resource
650: pa_debug.G_err_stage := 'Check if the user has resource authority on the resource';
651: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
652:
653: check_user_privilege(p_privilege => p_privilege,
654: p_object_name => 'ORGANIZATION',

Line 651: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);

647: /* Bug 2970209 -- Commented the code to call check_user_privilege. Now new
648: code is added in the last to check for resource autority */
649: /*------- Check if the user has resource authority on the resource
650: pa_debug.G_err_stage := 'Check if the user has resource authority on the resource';
651: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
652:
653: check_user_privilege(p_privilege => p_privilege,
654: p_object_name => 'ORGANIZATION',
655: p_object_key => v_resource_org_id,

Line 685: pa_debug.G_err_stage := 'Check if the user is a resource super user';

681: END IF;
682:
683:
684: -----------Check if user is Resource Super User--------------
685: pa_debug.G_err_stage := 'Check if the user is a resource super user';
686: IF G_debug_flag = 'Y' THEN
687: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
688: END IF;
689:

Line 687: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);

683:
684: -----------Check if user is Resource Super User--------------
685: pa_debug.G_err_stage := 'Check if the user is a resource super user';
686: IF G_debug_flag = 'Y' THEN
687: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
688: END IF;
689:
690: v_resource_super_user := fnd_profile.value_specific('PA_SUPER_RESOURCE',
691: G_USER_ID,

Line 696: pa_debug.G_err_stage := 'check FND function security';

692: G_RESPONSIBILITY_ID ,
693: fnd_global.resp_appl_id);
694: IF v_resource_super_user = 'Y' THEN
695:
696: pa_debug.G_err_stage := 'check FND function security';
697:
698: IF G_debug_flag = 'Y' THEN
699: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
700: END IF;

Line 699: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);

695:
696: pa_debug.G_err_stage := 'check FND function security';
697:
698: IF G_debug_flag = 'Y' THEN
699: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
700: END IF;
701:
702: if l_fnd_function_test then
703: x_ret_code:=fnd_api.g_true;

Line 716: pa_debug.G_err_stage := 'Check if the user is the manager of the resource in HR hierarchy';

712:
713: -----------End Resource Super User Check-------------------
714:
715: ---------Check if the user is the manager of the resource in HR hierarchy
716: pa_debug.G_err_stage := 'Check if the user is the manager of the resource in HR hierarchy';
717: IF G_debug_flag = 'Y' THEN
718: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
719: END IF;
720:

Line 718: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);

714:
715: ---------Check if the user is the manager of the resource in HR hierarchy
716: pa_debug.G_err_stage := 'Check if the user is the manager of the resource in HR hierarchy';
717: IF G_debug_flag = 'Y' THEN
718: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
719: END IF;
720:
721: -- Bug 2970209 The following condition is not needed and it is unambiguoys, because we are defaulting x_ret_code as true
722: -- so this check will not be fired if v_resource_super_user <> Y

Line 759: pa_debug.G_err_stage := 'check role based security';

755: -- end if;
756: -------------End of check HR hierarchy---------------------
757: -- Bug 2970209 Added role based security here
758: --------check role based security ------------
759: pa_debug.G_err_stage := 'check role based security';
760: IF G_debug_flag = 'Y' THEN
761: pa_debug.write_file('check_confirm_asmt: ' || 'LOG', pa_debug.G_err_stage);
762: END IF;
763:

Line 761: pa_debug.write_file('check_confirm_asmt: ' || 'LOG', pa_debug.G_err_stage);

757: -- Bug 2970209 Added role based security here
758: --------check role based security ------------
759: pa_debug.G_err_stage := 'check role based security';
760: IF G_debug_flag = 'Y' THEN
761: pa_debug.write_file('check_confirm_asmt: ' || 'LOG', pa_debug.G_err_stage);
762: END IF;
763:
764: --dbms_output.put_line('p_privilege IS : ' || p_privilege);
765: --dbms_output.put_line('v_resource_org_id IS : ' || v_resource_org_id);

Line 815: pa_debug.G_err_stage := SUBSTR(SQLERRM, 1, 200);

811:
812:
813: Exception
814: when others then
815: pa_debug.G_err_stage := SUBSTR(SQLERRM, 1, 200);
816: IF G_debug_flag = 'Y' THEN
817: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
818: END IF;
819: fnd_msg_pub.add_exc_msg

Line 817: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);

813: Exception
814: when others then
815: pa_debug.G_err_stage := SUBSTR(SQLERRM, 1, 200);
816: IF G_debug_flag = 'Y' THEN
817: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
818: END IF;
819: fnd_msg_pub.add_exc_msg
820: (p_pkg_name => G_PKG_NAME,
821: p_procedure_name =>'CHECK_CONFIRM_ASMT' );

Line 1961: pa_debug.Init_err_stack ( 'Check_Access_Exist');

1957: BEGIN
1958: --Clear the global PL/SQL message table
1959: FND_MSG_PUB.initialize;
1960:
1961: pa_debug.Init_err_stack ( 'Check_Access_Exist');
1962:
1963: Init_global;
1964: x_ret_code := FND_API.G_TRUE;
1965: x_return_status := FND_API.G_RET_STS_SUCCESS;

Line 1977: pa_debug.G_err_stage := 'get objects primary keys information';

1973: RETURN;
1974: END IF;
1975: ------- End check for License
1976:
1977: pa_debug.G_err_stage := 'get objects primary keys information';
1978: IF G_debug_flag = 'Y' THEN
1979: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
1980: END IF;
1981: get_pk_information(p_object_name ,

Line 1979: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);

1975: ------- End check for License
1976:
1977: pa_debug.G_err_stage := 'get objects primary keys information';
1978: IF G_debug_flag = 'Y' THEN
1979: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
1980: END IF;
1981: get_pk_information(p_object_name ,
1982: l_db_pk1_column ,
1983: l_db_pk2_column ,

Line 1991: pa_debug.G_err_stage := 'check access from responsibility level';

1987: l_aliased_pk_column ,
1988: l_aliased_ik_column ,
1989: l_db_object_name);
1990:
1991: pa_debug.G_err_stage := 'check access from responsibility level';
1992: IF G_debug_flag = 'Y' THEN
1993: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
1994: END IF;
1995: IF fnd_function.test(p_privilege) THEN

Line 1993: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);

1989: l_db_object_name);
1990:
1991: pa_debug.G_err_stage := 'check access from responsibility level';
1992: IF G_debug_flag = 'Y' THEN
1993: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
1994: END IF;
1995: IF fnd_function.test(p_privilege) THEN
1996: --Adding the below code for the bug 3137696
1997: x_ret_code := FND_API.G_TRUE;

Line 2010: pa_debug.G_err_stage := 'checking allow_update in case of PA_PROJECTS';

2006: g_source_type||''','||l_db_pk1_column||')=''T'''||
2007: ' AND pa_security.allow_update('||l_db_pk1_column||')=''Y'''||
2008: ' AND ROWNUM=1';
2009:
2010: pa_debug.G_err_stage := 'checking allow_update in case of PA_PROJECTS';
2011: IF G_debug_flag = 'Y' THEN
2012: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2013: END IF;
2014:

Line 2012: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);

2008: ' AND ROWNUM=1';
2009:
2010: pa_debug.G_err_stage := 'checking allow_update in case of PA_PROJECTS';
2011: IF G_debug_flag = 'Y' THEN
2012: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2013: END IF;
2014:
2015: PA_SECURITY.Initialize(X_user_id =>G_user_id ,
2016: X_calling_module => 'PAXPREPR');

Line 2034: pa_debug.G_err_stage := 'checking check_sec_by_resp';

2030: g_user_id||','''||p_object_name||''','''||
2031: g_source_type||''','||l_db_pk1_column||')=''T'''||
2032: ' AND ROWNUM=1';
2033:
2034: pa_debug.G_err_stage := 'checking check_sec_by_resp';
2035: IF G_debug_flag = 'Y' THEN
2036: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2037: END IF;
2038:

Line 2036: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);

2032: ' AND ROWNUM=1';
2033:
2034: pa_debug.G_err_stage := 'checking check_sec_by_resp';
2035: IF G_debug_flag = 'Y' THEN
2036: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2037: END IF;
2038:
2039: PA_SECURITY.Initialize(X_user_id =>G_user_id ,
2040: X_calling_module => 'PAXPREPR');

Line 2053: pa_debug.G_err_stage := 'get predicate from fnd_data_security';

2049: END IF;*/
2050: END IF;
2051:
2052:
2053: pa_debug.G_err_stage := 'get predicate from fnd_data_security';
2054: IF G_debug_flag = 'Y' THEN
2055: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2056: END IF;
2057: fnd_data_security.get_security_predicate(

Line 2055: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);

2051:
2052:
2053: pa_debug.G_err_stage := 'get predicate from fnd_data_security';
2054: IF G_debug_flag = 'Y' THEN
2055: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2056: END IF;
2057: fnd_data_security.get_security_predicate(
2058: p_api_version => l_api_version,
2059: p_function => p_privilege,

Line 2089: pa_debug.G_err_stage := 'open cursor for dynamic sql';

2085: --Bug 2603255, selecting from db_object table instead of dual
2086: -- l_predicate := 'SELECT 1 FROM DUAL WHERE '||l_predicate;
2087: l_predicate := 'SELECT 1 FROM '||l_db_object_name||' WHERE '||l_predicate;
2088:
2089: pa_debug.G_err_stage := 'open cursor for dynamic sql';
2090: IF G_debug_flag = 'Y' THEN
2091: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2092: END IF;
2093: OPEN l_cur FOR l_predicate;

Line 2091: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);

2087: l_predicate := 'SELECT 1 FROM '||l_db_object_name||' WHERE '||l_predicate;
2088:
2089: pa_debug.G_err_stage := 'open cursor for dynamic sql';
2090: IF G_debug_flag = 'Y' THEN
2091: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2092: END IF;
2093: OPEN l_cur FOR l_predicate;
2094: FETCH l_cur INTO l_dummy;
2095: IF l_cur%NOTFOUND THEN

Line 2107: pa_debug.G_err_stage := 'exceptions raised';

2103: CLOSE l_cur; -- Bug #2994870: closing the cursor.
2104:
2105: EXCEPTION
2106: WHEN OTHERS THEN
2107: pa_debug.G_err_stage := 'exceptions raised';
2108: IF G_debug_flag = 'Y' THEN
2109: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2110: END IF;
2111: x_ret_code := FND_API.G_FALSE;

Line 2109: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);

2105: EXCEPTION
2106: WHEN OTHERS THEN
2107: pa_debug.G_err_stage := 'exceptions raised';
2108: IF G_debug_flag = 'Y' THEN
2109: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2110: END IF;
2111: x_ret_code := FND_API.G_FALSE;
2112: x_return_status := FND_API.G_RET_STS_UNEXP_ERROR;
2113: FND_MSG_PUB.Count_And_Get