DATA: lv_loio TYPE skwf_io.
DATA: lv_is_folder TYPE boole_d.
DATA(o_mime_rep) = cl_mime_repository_api=>get_api( ).
TRY.
* logische IO zu MIME-Objekt holen
o_mime_rep->get_io_for_url( EXPORTING
i_url = '/SAP/PUBLIC/xyz.jpg'
IMPORTING
e_is_folder = lv_is_folder
e_loio = lv_loio ).
WRITE: / lv_is_folder.
WRITE: / lv_loio.
DATA: lv_error TYPE skwf_error.
DATA: it_phios TYPE STANDARD TABLE OF skwf_io WITH DEFAULT KEY.
* physical IOs zu log. IO holen
CALL FUNCTION 'SKWF_LOIO_ALL_PHIOS_GET'
EXPORTING
loio = lv_loio
IMPORTING
error = lv_error
TABLES
phios = it_phios.
LOOP AT it_phios ASSIGNING FIELD-SYMBOL(<p>).
DATA: lv_err TYPE skwf_error.
* Berechtigungen zu physical IO prüfen
CALL FUNCTION 'SKWF_AUTH_OBJECT_CHECK'
EXPORTING
activity = skwfa_c_act_read
object = <p>
IMPORTING
error = lv_err.
IF lv_err-type = 'E'.
ELSE.
WRITE: / <p>.
ENDIF.
ENDLOOP.
CATCH cx_root INTO DATA(e).
WRITE: / e->get_text( ).
ENDTRY.