DBA Data[Home] [Help]

APPS.RRS_SECURITY_PUB dependencies on FND_API

Line 47: RETURN FND_API.G_TRUE;

43: l_priv_name VARCHAR2(30);
44: BEGIN
45: --First check whether user has enabled the RBAC profile option. If hasn't, we skip security checking
46: IF FND_PROFILE.VALUE('RRS_ROLE_BASED_SECURITY_ENABLED') = 'N' THEN
47: RETURN FND_API.G_TRUE;
48: END IF;
49:
50: IF p_priv_type = 'VIEW' AND p_object_name = 'RRS_SITE' THEN
51: l_priv_name := 'RRS_VIEW_SITE';

Line 56: IF Check_Object_Privilege('VIEW', p_object_name, p_object_key) <> FND_API.G_TRUE THEN

52: ELSIF p_priv_type = 'VIEW' AND p_object_name = 'RRS_HIERARCHY' THEN
53: l_priv_name := 'RRS_VIEW_HIER';
54: ELSIF p_priv_type = 'EDIT' THEN
55: --For Edit Priv, we need check VIEW first.
56: IF Check_Object_Privilege('VIEW', p_object_name, p_object_key) <> FND_API.G_TRUE THEN
57: RETURN FND_API.G_FALSE;
58: END IF;
59: IF p_object_name = 'RRS_SITE' THEN
60: l_priv_name := 'RRS_EDIT_SITE';

Line 57: RETURN FND_API.G_FALSE;

53: l_priv_name := 'RRS_VIEW_HIER';
54: ELSIF p_priv_type = 'EDIT' THEN
55: --For Edit Priv, we need check VIEW first.
56: IF Check_Object_Privilege('VIEW', p_object_name, p_object_key) <> FND_API.G_TRUE THEN
57: RETURN FND_API.G_FALSE;
58: END IF;
59: IF p_object_name = 'RRS_SITE' THEN
60: l_priv_name := 'RRS_EDIT_SITE';
61: ELSIF p_object_name = 'RRS_HIERARCHY' THEN

Line 129: RETURN FND_API.G_TRUE;

125: l_ego_check_result VARCHAR2(30);
126: BEGIN
127: --First check whether user has enabled the RBAC profile option. If hasn't, we skip security checking
128: IF FND_PROFILE.VALUE('RRS_ROLE_BASED_SECURITY_ENABLED') = 'N' THEN
129: RETURN FND_API.G_TRUE;
130: END IF;
131:
132: BEGIN
133: --If user has enabled the RBAC profile option, we do the checking.

Line 136: IF Check_Object_Privilege(p_priv_type, p_object_name, p_object_key) <> FND_API.G_TRUE THEN

132: BEGIN
133: --If user has enabled the RBAC profile option, we do the checking.
134: IF p_priv_type = 'VIEW' THEN
135: --RBAC Phase 2, added object security
136: IF Check_Object_Privilege(p_priv_type, p_object_name, p_object_key) <> FND_API.G_TRUE THEN
137: RETURN FND_API.G_FALSE;
138: END IF;
139:
140: SELECT F.FUNCTION_NAME

Line 137: RETURN FND_API.G_FALSE;

133: --If user has enabled the RBAC profile option, we do the checking.
134: IF p_priv_type = 'VIEW' THEN
135: --RBAC Phase 2, added object security
136: IF Check_Object_Privilege(p_priv_type, p_object_name, p_object_key) <> FND_API.G_TRUE THEN
137: RETURN FND_API.G_FALSE;
138: END IF;
139:
140: SELECT F.FUNCTION_NAME
141: INTO l_ag_priv_name

Line 153: IF l_ego_check_result <> FND_API.G_TRUE THEN

149: p_attr_group_id => p_attr_group_id,
150: p_object_name => p_object_name,
151: p_object_key => p_object_key);
152: -- If user does not have view privilege for the attribute group, then we don't even check edit privielge.
153: IF l_ego_check_result <> FND_API.G_TRUE THEN
154: RETURN FND_API.G_FALSE;
155: END IF;
156: --Check Object Edit Privilege first
157: IF Check_Object_Privilege(p_priv_type, p_object_name, p_object_key) <> FND_API.G_TRUE THEN

Line 154: RETURN FND_API.G_FALSE;

150: p_object_name => p_object_name,
151: p_object_key => p_object_key);
152: -- If user does not have view privilege for the attribute group, then we don't even check edit privielge.
153: IF l_ego_check_result <> FND_API.G_TRUE THEN
154: RETURN FND_API.G_FALSE;
155: END IF;
156: --Check Object Edit Privilege first
157: IF Check_Object_Privilege(p_priv_type, p_object_name, p_object_key) <> FND_API.G_TRUE THEN
158: RETURN FND_API.G_FALSE;

Line 157: IF Check_Object_Privilege(p_priv_type, p_object_name, p_object_key) <> FND_API.G_TRUE THEN

153: IF l_ego_check_result <> FND_API.G_TRUE THEN
154: RETURN FND_API.G_FALSE;
155: END IF;
156: --Check Object Edit Privilege first
157: IF Check_Object_Privilege(p_priv_type, p_object_name, p_object_key) <> FND_API.G_TRUE THEN
158: RETURN FND_API.G_FALSE;
159: END IF;
160:
161: SELECT F.FUNCTION_NAME

Line 158: RETURN FND_API.G_FALSE;

154: RETURN FND_API.G_FALSE;
155: END IF;
156: --Check Object Edit Privilege first
157: IF Check_Object_Privilege(p_priv_type, p_object_name, p_object_key) <> FND_API.G_TRUE THEN
158: RETURN FND_API.G_FALSE;
159: END IF;
160:
161: SELECT F.FUNCTION_NAME
162: INTO l_ag_priv_name

Line 171: RETURN FND_API.G_TRUE;

167: END IF;
168: EXCEPTION
169: -- No data found means no security setting. So viewable or editable.
170: WHEN NO_DATA_FOUND THEN
171: RETURN FND_API.G_TRUE;
172: WHEN OTHERS THEN
173: RETURN FND_API.G_RET_STS_ERROR;
174: END;
175:

Line 173: RETURN FND_API.G_RET_STS_ERROR;

169: -- No data found means no security setting. So viewable or editable.
170: WHEN NO_DATA_FOUND THEN
171: RETURN FND_API.G_TRUE;
172: WHEN OTHERS THEN
173: RETURN FND_API.G_RET_STS_ERROR;
174: END;
175:
176: --Bug Fix 10141984/10119971: Here we change check_user_privilege function to check_party_privilege function
177: --Because in check_user_privilege function, to convert user_id to party_id, EGO has to use CustomerID, which is not necessarily populated.

Line 203: IF l_has_view_priv = FND_API.G_TRUE THEN

199: l_has_view_priv := Check_UDA_View_Privilege(p_api_version => 1.0,
200: p_attr_group_id => 2707,
201: p_object_name => 'RRS_SITE',
202: p_object_key => 62142);
203: IF l_has_view_priv = FND_API.G_TRUE THEN
204: DBMS_OUTPUT.PUT_LINE('Can View');
205: ELSE
206: DBMS_OUTPUT.PUT_LINE('Cannot View');
207: END IF;

Line 212: IF l_has_view_priv = FND_API.G_TRUE THEN

208:
209: l_has_view_priv := Check_Object_View_Privilege(p_api_version => 1.0,
210: p_object_name => 'RRS_HIERARCHY',
211: p_object_key => 20000);
212: IF l_has_view_priv = FND_API.G_TRUE THEN
213: DBMS_OUTPUT.PUT_LINE('Can View');
214: ELSE
215: DBMS_OUTPUT.PUT_LINE('Cannot View');
216: END IF;

Line 221: IF l_has_view_priv = FND_API.G_TRUE THEN

217:
218: l_has_view_priv := Check_Object_Edit_Privilege(p_api_version => 1.0,
219: p_object_name => 'RRS_HIERARCHY',
220: p_object_key => 20000);
221: IF l_has_view_priv = FND_API.G_TRUE THEN
222: DBMS_OUTPUT.PUT_LINE('Can Edit');
223: ELSE
224: DBMS_OUTPUT.PUT_LINE('Cannot Edit');
225: END IF;