DBA Data[Home] [Help]

APPS.PA_SECURITY_PVT dependencies on FND_FUNCTION

Line 203: if fnd_function.test(p_privilege) then

199: pa_debug.G_err_stage := 'check responsibility level security: not in object instance context';
200: IF G_debug_flag = 'Y' THEN
201: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
202: END IF;
203: if fnd_function.test(p_privilege) then
204: x_ret_code:=fnd_api.g_true;
205: x_return_status:=fnd_api.g_ret_sts_success;
206: else
207: x_ret_code:=fnd_api.g_false;

Line 323: if fnd_function.test(p_privilege) then

319: return;
320: end if;
321: end if;
322:
323: if fnd_function.test(p_privilege) then
324: x_ret_code:=fnd_api.g_true;
325: x_return_status:=fnd_api.g_ret_sts_success;
326: return;
327: end if;

Line 565: l_fnd_function_test boolean:=false; -- Added for Bug2970209

561: v_resource_emp_id number;
562: v_project_org_id number;
563: v_fnd_api_ret_code varchar2(1);
564: v_resource_super_user varchar2(1) := 'N';
565: l_fnd_function_test boolean:=false; -- Added for Bug2970209
566: begin
567:
568: Init_global ;
569:

Line 671: -- Bug 2970209 : Getting the value from fnd_function.test, which will be used at other places in this code

667: end if;
668: ---------End of check if the user has resource authority------
669: */
670:
671: -- Bug 2970209 : Getting the value from fnd_function.test, which will be used at other places in this code
672: l_fnd_function_test:=fnd_function.test(p_privilege);
673:
674: -- Bug 2991490 Added the following condition.
675: -- If the logged in user is the resource on which the action is being performed, then grant privilege to the user.

Line 672: l_fnd_function_test:=fnd_function.test(p_privilege);

668: ---------End of check if the user has resource authority------
669: */
670:
671: -- Bug 2970209 : Getting the value from fnd_function.test, which will be used at other places in this code
672: l_fnd_function_test:=fnd_function.test(p_privilege);
673:
674: -- Bug 2991490 Added the following condition.
675: -- If the logged in user is the resource on which the action is being performed, then grant privilege to the user.
676:

Line 677: IF (p_resource_id = pa_resource_utils.get_resource_id(G_source_id) and l_fnd_function_test = true) THEN

673:
674: -- Bug 2991490 Added the following condition.
675: -- If the logged in user is the resource on which the action is being performed, then grant privilege to the user.
676:
677: IF (p_resource_id = pa_resource_utils.get_resource_id(G_source_id) and l_fnd_function_test = true) THEN
678: x_ret_code:=fnd_api.g_true;
679: x_return_status:=fnd_api.g_ret_sts_success;
680: return;
681: END IF;

Line 696: pa_debug.G_err_stage := 'check FND function security';

692: G_RESPONSIBILITY_ID ,
693: fnd_global.resp_appl_id);
694: IF v_resource_super_user = 'Y' THEN
695:
696: pa_debug.G_err_stage := 'check FND function security';
697:
698: IF G_debug_flag = 'Y' THEN
699: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
700: END IF;

Line 702: if l_fnd_function_test then

698: IF G_debug_flag = 'Y' THEN
699: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
700: END IF;
701:
702: if l_fnd_function_test then
703: x_ret_code:=fnd_api.g_true;
704: x_return_status:=fnd_api.g_ret_sts_success;
705: return;
706: else

Line 746: if (v_ret_code=fnd_api.g_true and l_fnd_function_test = true)then

742: p_error_text => v_error_message_code);
743: RETURN;
744: end if;
745:
746: if (v_ret_code=fnd_api.g_true and l_fnd_function_test = true)then
747: x_ret_code:=v_ret_code;
748: x_return_status:=v_return_status;
749: return;
750: else

Line 796: -- Hence commenting out check of l_fnd_function_test

792: -- Bug 4099469 changes - If the person has organization authority
793: -- over the resource organization and the call to FND's security
794: -- returns TRUE, then give access. At this time do not check if the
795: -- function is in the responsibility.
796: -- Hence commenting out check of l_fnd_function_test
797:
798: --if (v_fnd_api_ret_code=fnd_api.g_true and l_fnd_function_test = true)then
799: if (v_fnd_api_ret_code=fnd_api.g_true) then
800: x_ret_code:= fnd_api.g_true;

Line 798: --if (v_fnd_api_ret_code=fnd_api.g_true and l_fnd_function_test = true)then

794: -- returns TRUE, then give access. At this time do not check if the
795: -- function is in the responsibility.
796: -- Hence commenting out check of l_fnd_function_test
797:
798: --if (v_fnd_api_ret_code=fnd_api.g_true and l_fnd_function_test = true)then
799: if (v_fnd_api_ret_code=fnd_api.g_true) then
800: x_ret_code:= fnd_api.g_true;
801: x_return_status:=fnd_api.g_ret_sts_success;
802: return;

Line 1995: IF fnd_function.test(p_privilege) THEN

1991: pa_debug.G_err_stage := 'check access from responsibility level';
1992: IF G_debug_flag = 'Y' THEN
1993: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
1994: END IF;
1995: IF fnd_function.test(p_privilege) THEN
1996: --Adding the below code for the bug 3137696
1997: x_ret_code := FND_API.G_TRUE;
1998: x_return_status := FND_API.G_RET_STS_SUCCESS;
1999: RETURN;