DBA Data[Home] [Help]

APPS.PA_CONTROL_API_PVT dependencies on PA_CI_SECURITY_PKG

Line 255: if 'T' <> Pa_ci_security_pkg.check_update_access (p_ci_id) then

251: pa_debug.write(l_module_name,pa_debug.g_err_stage,l_debug_level3);
252: end if;
253:
254: /*Security check for the CI_ID UpdateAccess*/
255: if 'T' <> Pa_ci_security_pkg.check_update_access (p_ci_id) then
256: PA_UTILS.add_Message( p_app_short_name => 'PA'
257: ,p_msg_name => 'PA_CI_NO_UPDATE_ACCESS');
258: x_return_status := FND_API.G_RET_STS_ERROR;
259: if l_debug_mode = 'Y' then

Line 266: pa_debug.g_err_stage:= 'After call to pa_ci_security_pkg.check_update_acces';

262: end if;
263: raise FND_API.G_EXC_ERROR ;
264: end if;
265: if l_debug_mode = 'Y' then
266: pa_debug.g_err_stage:= 'After call to pa_ci_security_pkg.check_update_acces';
267: pa_debug.write(l_module_name,pa_debug.g_err_stage,l_debug_level3);
268: end if;
269:
270:

Line 1276: /*pa_ci_security_pkg.check_create_ci will check if the current project type and role played by user are allowed

1272: source_attrs_enabled_flag
1273: from pa_ci_types_b
1274: where ci_type_id = p_ci_type_id;
1275:
1276: /*pa_ci_security_pkg.check_create_ci will check if the current project type and role played by user are allowed
1277: to create the control item of this type. Also it will check for project authority.*/
1278: cursor check_create_ci_priv(p_ci_type_id NUMBER, p_project_id NUMBER) is
1279: select 'Y'
1280: from pa_ci_types_vl

Line 1282: and pa_ci_security_pkg.check_create_ci(p_ci_type_id, p_project_id)='T'

1278: cursor check_create_ci_priv(p_ci_type_id NUMBER, p_project_id NUMBER) is
1279: select 'Y'
1280: from pa_ci_types_vl
1281: where ci_type_id = p_ci_type_id
1282: and pa_ci_security_pkg.check_create_ci(p_ci_type_id, p_project_id)='T'
1283: and trunc(sysdate) between start_date_active and nvl(end_date_active, sysdate);
1284:
1285:
1286: l_ci_type_attrs_rec get_ci_type_attrs%rowtype;

Line 1695: and pa_ci_security_pkg.check_proj_auth_ci(p_project_id, l_user_id, l_resp_id) = 'T'; --validating the project authority here.

1691: from PA_PROJECT_PARTIES_V
1692: where party_type <> 'ORGANIZATION'
1693: and project_id = p_project_id
1694: and resource_party_id = p_closed_by_id --validating the p_closed_by_id
1695: and pa_ci_security_pkg.check_proj_auth_ci(p_project_id, l_user_id, l_resp_id) = 'T'; --validating the project authority here.
1696:
1697: cursor validate_resolution_code(p_resolution_code number)
1698: is
1699: select cat.class_code_id code

Line 2524: l_create_action_flg := pa_ci_security_pkg.check_create_action(p_ci_id => l_ci_id, p_calling_context => 'AMG');

2520: /*Need to revisit function used below. It cannot be used here. We dont want to use the status controls check
2521: from here*/
2522: if(l_ci_id is not null)--checking only if ci_id was valid and not null
2523: then
2524: l_create_action_flg := pa_ci_security_pkg.check_create_action(p_ci_id => l_ci_id, p_calling_context => 'AMG');
2525: end if;
2526:
2527: if(l_create_action_flg is not null and l_create_action_flg = 'F') then
2528: /*user doesnt have privilige to create the action*/

Line 3652: l_ViewAccess := PA_CI_SECURITY_PKG.Check_View_Access (p_Ci_Id, l_ProjectId, l_StatusCode, l_CiTypeClassCode);

3648: CLOSE Check_Workflow_On_CI;
3649: -- If the User has View Access to this Control Item and
3650: -- delete is allowed on this Control Item then call the
3651: -- API to delete it.
3652: l_ViewAccess := PA_CI_SECURITY_PKG.Check_View_Access (p_Ci_Id, l_ProjectId, l_StatusCode, l_CiTypeClassCode);
3653: l_DeleteAllowed := PA_CONTROL_ITEMS_UTILS.CheckCIActionAllowed ('CONTROL_ITEM', l_StatusCode, 'CONTROL_ITEM_ALLOW_DELETE', p_Ci_Id);
3654: IF (l_ViewAccess = 'T' AND l_DeleteAllowed = 'Y') THEN
3655: if (l_debug_mode = 'Y') then
3656: pa_debug.g_err_stage := 'Before Calling PA_CONTROL_ITEMS_PUB.Delete_Control_Item';