DBA Data[Home] [Help]

APPS.PA_SECURITY_PVT dependencies on PA_SECURITY

Line 1: package body PA_SECURITY_PVT AS

1: package body PA_SECURITY_PVT AS
2: /* $Header: PASECPVB.pls 120.17 2011/09/19 22:12:02 skkoppul ship $ */
3: G_PKG_NAME varchar2(30) :='PA_SECURITY_PVT';
4: G_responsibility_id NUMBER :=FND_GLOBAL.RESP_ID;
5: G_user_id NUMBER:=FND_GLOBAL.USER_ID;

Line 3: G_PKG_NAME varchar2(30) :='PA_SECURITY_PVT';

1: package body PA_SECURITY_PVT AS
2: /* $Header: PASECPVB.pls 120.17 2011/09/19 22:12:02 skkoppul ship $ */
3: G_PKG_NAME varchar2(30) :='PA_SECURITY_PVT';
4: G_responsibility_id NUMBER :=FND_GLOBAL.RESP_ID;
5: G_user_id NUMBER:=FND_GLOBAL.USER_ID;
6: G_source_type VARCHAR2(30) := '';
7: G_source_id NUMBER;

Line 292: PA_SECURITY.Initialize(X_user_id =>G_user_id ,

288: ---(check if any of the roles the user plays on the object
289: ----does not have a menu_id or the user does not play any role on the object)
290: IF p_object_name='PA_PROJECTS' THEN
291: -----------fixing bug 1484710-------------------
292: PA_SECURITY.Initialize(X_user_id =>G_user_id ,
293: X_calling_module => 'PAXPREPR');
294: ----------end of fixing bug 1484710------------
295: END IF;
296:

Line 326: if pa_security.allow_update (p_object_key)<>'Y' then

322: IF G_debug_flag = 'Y' THEN
323: pa_debug.write_file('check_user_privilege: ' || 'LOG', pa_debug.G_err_stage);
324: END IF;
325: if p_object_name='PA_PROJECTS' then
326: if pa_security.allow_update (p_object_key)<>'Y' then
327: x_ret_code:=fnd_api.g_false;
328: x_return_status:=fnd_api.g_ret_sts_success;
329: return;
330: end if;

Line 515: AND pa_security.g_cross_project_user='Y' THEN

511: END IF;
512: CLOSE c_any_role;
513:
514: IF p_object_name IN ('PA_PROJECTS')
515: AND pa_security.g_cross_project_user='Y' THEN
516: --profile option override this check
517: RETURN fnd_api.g_true;
518: END IF;
519:

Line 1069: --dbms_output.put_line('pa_security_pvt.grant_role');

1065: l_error_message_code VARCHAR2(30);
1066:
1067: begin
1068:
1069: --dbms_output.put_line('pa_security_pvt.grant_role');
1070:
1071: x_return_status:=fnd_api.g_ret_sts_success;
1072: x_msg_count:=0;
1073: x_msg_data:=null;

Line 1080: pa_security_pvt.check_grant_exists(p_project_role_id => p_project_role_id,

1076:
1077: -- for role-based security, check to see the this person already has a FND_GRANTS
1078: -- record for this given role. Only grant if person does not have such records.
1079: IF p_project_role_id IS NOT NULL AND p_object_name = 'PA_PROJECTS' THEN
1080: pa_security_pvt.check_grant_exists(p_project_role_id => p_project_role_id,
1081: p_instance_type => 'SET',
1082: p_instance_set_name => G_project_roles_ins_set_name,
1083: p_grantee_type => 'USER',
1084: p_grantee_key => l_grantee_key,

Line 2015: ' WHERE pa_security_pvt.check_sec_by_resp('||

2011: --Commented the below code for the bug 3137696
2012: /*IF p_object_name='PA_PROJECTS' THEN
2013: -- Bug 1571014, faulty dynamic sql
2014: l_sql := 'SELECT 1 FROM '||l_db_object_name||
2015: ' WHERE pa_security_pvt.check_sec_by_resp('||
2016: g_user_id||',''PA_PROJECTS'','''||
2017: g_source_type||''','||l_db_pk1_column||')=''T'''||
2018: ' AND pa_security.allow_update('||l_db_pk1_column||')=''Y'''||
2019: ' AND ROWNUM=1';

Line 2018: ' AND pa_security.allow_update('||l_db_pk1_column||')=''Y'''||

2014: l_sql := 'SELECT 1 FROM '||l_db_object_name||
2015: ' WHERE pa_security_pvt.check_sec_by_resp('||
2016: g_user_id||',''PA_PROJECTS'','''||
2017: g_source_type||''','||l_db_pk1_column||')=''T'''||
2018: ' AND pa_security.allow_update('||l_db_pk1_column||')=''Y'''||
2019: ' AND ROWNUM=1';
2020:
2021: pa_debug.G_err_stage := 'checking allow_update in case of PA_PROJECTS';
2022: IF G_debug_flag = 'Y' THEN

Line 2026: PA_SECURITY.Initialize(X_user_id =>G_user_id ,

2022: IF G_debug_flag = 'Y' THEN
2023: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2024: END IF;
2025:
2026: PA_SECURITY.Initialize(X_user_id =>G_user_id ,
2027: X_calling_module => 'PAXPREPR');
2028:
2029: OPEN l_cur FOR l_sql;
2030: FETCH l_cur INTO l_dummy;

Line 2040: ' WHERE pa_security_pvt.check_sec_by_resp('||

2036:
2037: ELSE
2038: -- Bug 1571014, faulty dynamic sql
2039: l_sql := 'SELECT 1 FROM '||l_db_object_name||
2040: ' WHERE pa_security_pvt.check_sec_by_resp('||
2041: g_user_id||','''||p_object_name||''','''||
2042: g_source_type||''','||l_db_pk1_column||')=''T'''||
2043: ' AND ROWNUM=1';
2044:

Line 2050: PA_SECURITY.Initialize(X_user_id =>G_user_id ,

2046: IF G_debug_flag = 'Y' THEN
2047: pa_debug.write_file('check_access_exist: ' || 'LOG', pa_debug.G_err_stage);
2048: END IF;
2049:
2050: PA_SECURITY.Initialize(X_user_id =>G_user_id ,
2051: X_calling_module => 'PAXPREPR');
2052:
2053: OPEN l_cur FOR l_sql;
2054: FETCH l_cur INTO l_dummy;

Line 2214: (p_pkg_name => 'PA_SECURITY_PVT',

2210: EXCEPTION
2211: when others then
2212: x_return_status:=fnd_api.g_ret_sts_unexp_error;
2213: fnd_msg_pub.add_exc_msg
2214: (p_pkg_name => 'PA_SECURITY_PVT',
2215: p_procedure_name => 'UPDATE_MENU',
2216: p_error_text => SQLCODE);
2217: x_msg_count := 1;
2218:

Line 2251: (p_pkg_name => 'PA_SECURITY_PVT',

2247: EXCEPTION
2248: when others then
2249: x_return_status:=fnd_api.g_ret_sts_unexp_error;
2250: fnd_msg_pub.add_exc_msg
2251: (p_pkg_name => 'PA_SECURITY_PVT',
2252: p_procedure_name => 'REVOKE_ROLE_BASED_SEC',
2253: p_error_text => SQLCODE);
2254: x_msg_count := 1;
2255: END revoke_role_based_sec;

Line 2466: (p_pkg_name => 'PA_SECURITY_PVT',

2462: EXCEPTION
2463: when others then
2464: x_return_status:=fnd_api.g_ret_sts_unexp_error;
2465: fnd_msg_pub.add_exc_msg
2466: (p_pkg_name => 'PA_SECURITY_PVT',
2467: p_procedure_name => 'GRANT_ROLE_BASED_SEC',
2468: p_error_text => SQLCODE);
2469: FND_MSG_PUB.Count_And_Get
2470: (p_count => x_msg_count ,

Line 2506: (p_pkg_name => 'PA_SECURITY_PVT',

2502: EXCEPTION
2503: when others then
2504: x_return_status:=fnd_api.g_ret_sts_unexp_error;
2505: fnd_msg_pub.add_exc_msg
2506: (p_pkg_name => 'PA_SECURITY_PVT',
2507: p_procedure_name => 'REVOKE_STATUS_BASED_SEC',
2508: p_error_text => SQLCODE);
2509: x_msg_count := 1;
2510: END revoke_status_based_sec;

Line 2694: (p_pkg_name => 'PA_SECURITY_PVT',

2690: EXCEPTION
2691: when others then
2692: x_return_status:=fnd_api.g_ret_sts_unexp_error;
2693: fnd_msg_pub.add_exc_msg
2694: (p_pkg_name => 'PA_SECURITY_PVT',
2695: p_procedure_name => 'UPDATE_STATUS_BASED_SEC',
2696: p_error_text => SQLCODE);
2697: FND_MSG_PUB.Count_And_Get
2698: (p_count => x_msg_count ,

Line 2762: PA_SECURITY_PVT.check_user_privilege

2758: , resp_id => user_resp_rec.responsibility_id
2759: , resp_appl_id => user_resp_rec.application_id
2760: );
2761:
2762: PA_SECURITY_PVT.check_user_privilege
2763: ( p_privilege => p_privilege
2764: ,p_object_name => NULL
2765: ,p_object_key => to_number(NULL)
2766: ,x_ret_code => l_ret_code

Line 2817: end PA_SECURITY_PVT;

2813: p_data => x_msg_data
2814: );
2815: END GET_RESP_WITH_ACCESS;
2816:
2817: end PA_SECURITY_PVT;