433:
434:
435: -- As part of enforcing project security, which would determine
436: -- whether the user has the necessary privileges to update the project
437: -- need to call the pa_security package
438:
439: pa_security.initialize (X_user_id => l_user_id,
440: X_calling_module => l_module_name);
441:
435: -- As part of enforcing project security, which would determine
436: -- whether the user has the necessary privileges to update the project
437: -- need to call the pa_security package
438:
439: pa_security.initialize (X_user_id => l_user_id,
440: X_calling_module => l_module_name);
441:
442: -- Actions performed using the APIs would be subject to
443: -- function security. If the responsibility does not allow
480: END IF;
481:
482:
483: -- Now verify whether project security allows the user to update the project
484: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN
485:
486: -- The user does not have query privileges on this project
487: -- Hence, cannot update the project.Raise error
488: pa_interface_utils_pub.map_new_amg_msg
501: RAISE FND_API.G_EXC_ERROR;
502: ELSE
503: -- If the user has query privileges, then check whether
504: -- update privileges are also available
505: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN
506:
507: -- The user does not have update privileges on this project
508: -- Hence , raise error
509:
2168:
2169:
2170: -- As part of enforcing project security, which would determine
2171: -- whether the user has the necessary privileges to update the project
2172: -- need to call the pa_security package
2173:
2174: pa_security.initialize (X_user_id => l_user_id,
2175: X_calling_module => l_module_name);
2176:
2170: -- As part of enforcing project security, which would determine
2171: -- whether the user has the necessary privileges to update the project
2172: -- need to call the pa_security package
2173:
2174: pa_security.initialize (X_user_id => l_user_id,
2175: X_calling_module => l_module_name);
2176:
2177: -- Actions performed using the APIs would be subject to
2178: -- function security. If the responsibility does not allow
2215: END IF;
2216:
2217:
2218: -- Now verify whether project security allows the user to update the project
2219: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN
2220:
2221: -- The user does not have query privileges on this project
2222: -- Hence, cannot update the project.Raise error
2223: pa_interface_utils_pub.map_new_amg_msg
2236: RAISE FND_API.G_EXC_ERROR;
2237: ELSE
2238: -- If the user has query privileges, then check whether
2239: -- update privileges are also available
2240: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN
2241:
2242: -- The user does not have update privileges on this project
2243: -- Hence , raise error
2244:
3278:
3279:
3280: -- As part of enforcing project security, which would determine
3281: -- whether the user has the necessary privileges to update the project
3282: -- need to call the pa_security package
3283:
3284: pa_security.initialize (X_user_id => l_user_id,
3285: X_calling_module => l_module_name);
3286:
3280: -- As part of enforcing project security, which would determine
3281: -- whether the user has the necessary privileges to update the project
3282: -- need to call the pa_security package
3283:
3284: pa_security.initialize (X_user_id => l_user_id,
3285: X_calling_module => l_module_name);
3286:
3287: -- Actions performed using the APIs would be subject to
3288: -- function security. If the responsibility does not allow
3326:
3327:
3328:
3329: -- Now verify whether project security allows the user to update the project
3330: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN
3331:
3332: -- The user does not have query privileges on this project
3333: -- Hence, cannot update the project.Raise error
3334: pa_interface_utils_pub.map_new_amg_msg
3347: RAISE FND_API.G_EXC_ERROR;
3348: ELSE
3349: -- If the user has query privileges, then check whether
3350: -- update privileges are also available
3351: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN
3352:
3353: -- The user does not have update privileges on this project
3354: -- Hence , raise error
3355:
6854:
6855:
6856: -- As part of enforcing project security, which would determine
6857: -- whether the user has the necessary privileges to update the project
6858: -- need to call the pa_security package
6859:
6860: pa_security.initialize (X_user_id => l_user_id,
6861: X_calling_module => l_module_name);
6862:
6856: -- As part of enforcing project security, which would determine
6857: -- whether the user has the necessary privileges to update the project
6858: -- need to call the pa_security package
6859:
6860: pa_security.initialize (X_user_id => l_user_id,
6861: X_calling_module => l_module_name);
6862:
6863: -- Actions performed using the APIs would be subject to
6864: -- function security. If the responsibility does not allow
6901: END IF;
6902:
6903:
6904: -- Now verify whether project security allows the user to update the project
6905: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN
6906:
6907: -- The user does not have query privileges on this project
6908: -- Hence, cannot update the project.Raise error
6909: pa_interface_utils_pub.map_new_amg_msg
6922: RAISE FND_API.G_EXC_ERROR;
6923: ELSE
6924: -- If the user has query privileges, then check whether
6925: -- update privileges are also available
6926: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN
6927:
6928: -- The user does not have update privileges on this project
6929: -- Hence , raise error
6930:
7262:
7263:
7264: -- As part of enforcing project security, which would determine
7265: -- whether the user has the necessary privileges to update the project
7266: -- need to call the pa_security package
7267:
7268: pa_security.initialize (X_user_id => l_user_id,
7269: X_calling_module => l_module_name);
7270:
7264: -- As part of enforcing project security, which would determine
7265: -- whether the user has the necessary privileges to update the project
7266: -- need to call the pa_security package
7267:
7268: pa_security.initialize (X_user_id => l_user_id,
7269: X_calling_module => l_module_name);
7270:
7271: -- Actions performed using the APIs would be subject to
7272: -- function security. If the responsibility does not allow
7309: END IF;
7310:
7311:
7312: -- Now verify whether project security allows the user to update the project
7313: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN
7314:
7315: -- The user does not have query privileges on this project
7316: -- Hence, cannot update the project.Raise error
7317: pa_interface_utils_pub.map_new_amg_msg
7330: RAISE FND_API.G_EXC_ERROR;
7331: ELSE
7332: -- If the user has query privileges, then check whether
7333: -- update privileges are also available
7334: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN
7335:
7336: -- The user does not have update privileges on this project
7337: -- Hence , raise error
7338: