SAP Reports / Programs | Structures Workbench | Defense Forces and Public Security | Structures Workbench(IS-DFS-OF-FDP) SAP IS

/ISDFPS/PPEARCH_SERVICES_IMPL SAP ABAP INCLUDE - /ISDFPS/PPEARCHSERVICESIMPL







/ISDFPS/PPEARCH_SERVICES_IMPL is a standard ABAP INCLUDE available within your SAP system (depending on your version and release level). Below is the basic information available for this SAP report including which OBJECTS it interacts with such as TABLES, FUNCTION MODULES, INCLUDES ETC. Also check out the submitted Comments related to this SAP report or see any standard documentation available.

If you would like to execute this report or see the full code listing simply enter /ISDFPS/PPEARCH_SERVICES_IMPL into the relevant SAP transactions such as SE38 or SE80


ABAP code to call this SAP report using the submit statement

This report can be called from another progam/report simply by using the ABAP SUBMIT statement, see below for example ABAP code snipts of how to do this.






SUBMIT /ISDFPS/PPEARCH_SERVICES_IMPL. "Basic submit
SUBMIT /ISDFPS/PPEARCH_SERVICES_IMPL AND RETURN. "Return to original report after report execution complete
SUBMIT /ISDFPS/PPEARCH_SERVICES_IMPL VIA SELECTION-SCREEN. "Display selection screen of submitted report to user
    See more syntax options for the ABAP SUBMIT statement


INCLUDES used within this REPORT /ISDFPS/PPEARCH_SERVICES_IMPL

No INCLUDES are used within this REPORT code!


TABLES used within REPORT and the associated SELECT statement:





No SAP DATABASE tables are accessed within this REPORT code!


Function Modules used within report and the associated call statement:

SELECT_TEXT CALL FUNCTION 'SELECT_TEXT' EXPORTING * CLIENT = SY-MANDT * DATABASE_ONLY = ' ' * TEXTMEMORY_ONLY = ' ' object = ppet_tdobject name = lv_tdname id = ppet_tdid-pnod language = '*' * ARCHIVE_HANDLE = 0 * LOCAL_CAT = ' ' * IMPORTING * ENTRIES = TABLES selections = lt_thead * T_OBJECT = * T_NAME = * T_ID = * T_LANGUAGE = * I_NAME = EXCEPTIONS wrong_access_to_archive = 1 OTHERS = 2.

READ_TEXT CALL FUNCTION 'READ_TEXT' EXPORTING * CLIENT = SY-MANDT id = -tdid language = -tdspras name = -tdname object = -tdobject * ARCHIVE_HANDLE = 0 * LOCAL_CAT = ' ' IMPORTING header = TABLES LINES = lt_line EXCEPTIONS id = 1 language = 2 name = 3 not_found = 4 object = 5 reference_check = 6 wrong_access_to_archive = 7 OTHERS = 8.

CONVERSION_EXIT_ISOLA_OUTPUT CALL FUNCTION 'CONVERSION_EXIT_ISOLA_OUTPUT' EXPORTING input = ls_node_longtext_hd-langu IMPORTING output = ls_node_longtext_hd-langu_iso.

CONVERSION_EXIT_KONPD_INPUT * CALL FUNCTION 'CONVERSION_EXIT_KONPD_INPUT' * EXPORTING * input = ls_projid_tmp-pspnr * IMPORTING * OUTPUT = ls_projid_tmp-pspnr ** PROJWA = * EXCEPTIONS * NOT_FOUND = 1 * OTHERS = 2.

CHANGEDOCUMENT_READ CALL FUNCTION 'CHANGEDOCUMENT_READ' EXPORTING archive_handle = 0 * date_of_change = iv_date_of_change objectclass = iv_objectclass objectid = iv_objectid * date_until = iv_date_until * time_until = '235959' TABLES editpos = et_cdoc EXCEPTIONS no_position_found = 1 wrong_access_to_archive = 2 time_zone_conversion_error = 3 OTHERS = 4.

CHANGEDOCUMENT_DELETE CALL FUNCTION 'CHANGEDOCUMENT_DELETE' EXPORTING CLIENT = SY-MANDT * CommIT_COUNTER = '20' OBJECTCLASS = iv_objectclass OBJECTID = iv_objectid * UP_TO_DATE = SY-DATUM * WITH_COMMIT = ' ' DISABLE_AUTHORITY_CHECK = 'X' * CHANGENR = ' ' IMPORTING NUMBER_OF_DELETED_HEADERS = NUMBER_OF_DELETED_HEADERS NUMBER_OF_DELETED_POSITIONS = NUMBER_OF_DELETED_POSITIONS NUMBER_OF_DELETED_UIDS = NUMBER_OF_DELETED_UIDS NUMBER_OF_DELETED_STRINGS = NUMBER_OF_DELETED_STRINGS EXCEPTIONS NO_AUTHORITY = 1 NO_CHANGES_FOUND = 2 OTHERS = 3.



Contribute (Add Comments)

Although this basic information may have limited use it does provide an easy to find location to store any knowledge about this program/report.







The contribute/comments section below therefore offer's an opportunity for anyone to add additional information. This can be anything from useful hints, tips and screen shots to relevant SAP notes or anything else you feel is relevant to this report.

This will then be available for everyone to easily find by simply searching on the report name /ISDFPS/PPEARCH_SERVICES_IMPL or its description.