DBA Data[Home] [Help]

APPS.PA_SECURITY_PVT dependencies on FND_FUNCTION

Line 213: if fnd_function.test(p_privilege) then

209: pa_debug.G_err_stage := 'check responsibility level security: not in object instance context';
210: IF G_debug_flag = 'Y' THEN
211: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
212: END IF;
213: if fnd_function.test(p_privilege) then
214: x_ret_code:=fnd_api.g_true;
215: x_return_status:=fnd_api.g_ret_sts_success;
216: else
217: x_ret_code:=fnd_api.g_false;

Line 333: if fnd_function.test(p_privilege) then

329: return;
330: end if;
331: end if;
332:
333: if fnd_function.test(p_privilege) then
334: x_ret_code:=fnd_api.g_true;
335: x_return_status:=fnd_api.g_ret_sts_success;
336: return;
337: end if;

Line 576: l_fnd_function_test boolean:=false; -- Added for Bug2970209

572: v_resource_emp_id number;
573: v_project_org_id number;
574: v_fnd_api_ret_code varchar2(1);
575: v_resource_super_user varchar2(1) := 'N';
576: l_fnd_function_test boolean:=false; -- Added for Bug2970209
577: begin
578:
579: Init_global ;
580:

Line 682: -- Bug 2970209 : Getting the value from fnd_function.test, which will be used at other places in this code

678: end if;
679: ---------End of check if the user has resource authority------
680: */
681:
682: -- Bug 2970209 : Getting the value from fnd_function.test, which will be used at other places in this code
683: l_fnd_function_test:=fnd_function.test(p_privilege);
684:
685: -- Bug 2991490 Added the following condition.
686: -- If the logged in user is the resource on which the action is being performed, then grant privilege to the user.

Line 683: l_fnd_function_test:=fnd_function.test(p_privilege);

679: ---------End of check if the user has resource authority------
680: */
681:
682: -- Bug 2970209 : Getting the value from fnd_function.test, which will be used at other places in this code
683: l_fnd_function_test:=fnd_function.test(p_privilege);
684:
685: -- Bug 2991490 Added the following condition.
686: -- If the logged in user is the resource on which the action is being performed, then grant privilege to the user.
687:

Line 688: IF (p_resource_id = pa_resource_utils.get_resource_id(G_source_id) and l_fnd_function_test = true) THEN

684:
685: -- Bug 2991490 Added the following condition.
686: -- If the logged in user is the resource on which the action is being performed, then grant privilege to the user.
687:
688: IF (p_resource_id = pa_resource_utils.get_resource_id(G_source_id) and l_fnd_function_test = true) THEN
689: x_ret_code:=fnd_api.g_true;
690: x_return_status:=fnd_api.g_ret_sts_success;
691: return;
692: END IF;

Line 707: pa_debug.G_err_stage := 'check FND function security';

703: G_RESPONSIBILITY_ID ,
704: fnd_global.resp_appl_id);
705: IF v_resource_super_user = 'Y' THEN
706:
707: pa_debug.G_err_stage := 'check FND function security';
708:
709: IF G_debug_flag = 'Y' THEN
710: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
711: END IF;

Line 713: if l_fnd_function_test then

709: IF G_debug_flag = 'Y' THEN
710: pa_debug.write_file( 'LOG', pa_debug.G_err_stage);
711: END IF;
712:
713: if l_fnd_function_test then
714: x_ret_code:=fnd_api.g_true;
715: x_return_status:=fnd_api.g_ret_sts_success;
716: return;
717: else

Line 757: if (v_ret_code=fnd_api.g_true and l_fnd_function_test = true)then

753: p_error_text => v_error_message_code);
754: RETURN;
755: end if;
756:
757: if (v_ret_code=fnd_api.g_true and l_fnd_function_test = true)then
758: x_ret_code:=v_ret_code;
759: x_return_status:=v_return_status;
760: return;
761: else

Line 807: -- Hence commenting out check of l_fnd_function_test

803: -- Bug 4099469 changes - If the person has organization authority
804: -- over the resource organization and the call to FND's security
805: -- returns TRUE, then give access. At this time do not check if the
806: -- function is in the responsibility.
807: -- Hence commenting out check of l_fnd_function_test
808:
809: --if (v_fnd_api_ret_code=fnd_api.g_true and l_fnd_function_test = true)then
810: if (v_fnd_api_ret_code=fnd_api.g_true) then
811: x_ret_code:= fnd_api.g_true;

Line 809: --if (v_fnd_api_ret_code=fnd_api.g_true and l_fnd_function_test = true)then

805: -- returns TRUE, then give access. At this time do not check if the
806: -- function is in the responsibility.
807: -- Hence commenting out check of l_fnd_function_test
808:
809: --if (v_fnd_api_ret_code=fnd_api.g_true and l_fnd_function_test = true)then
810: if (v_fnd_api_ret_code=fnd_api.g_true) then
811: x_ret_code:= fnd_api.g_true;
812: x_return_status:=fnd_api.g_ret_sts_success;
813: return;

Line 2006: IF fnd_function.test(p_privilege) THEN

2002: pa_debug.G_err_stage := 'check access from responsibility level';
2003: IF G_debug_flag = 'Y' THEN
2004: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2005: END IF;
2006: IF fnd_function.test(p_privilege) THEN
2007: --Adding the below code for the bug 3137696
2008: x_ret_code := FND_API.G_TRUE;
2009: x_return_status := FND_API.G_RET_STS_SUCCESS;
2010: RETURN;