Επεξεργασία

Κοινή χρήση μέσω


FILETYPEATTRIBUTEFLAGS enumeration (shlwapi.h)

Indicates FILETYPEATTRIBUTEFLAGS constants that are used in the EditFlags value of a file association PROGID registry key.

Syntax

typedef enum {
  FTA_None = 0x00000000,
  FTA_Exclude = 0x00000001,
  FTA_Show = 0x00000002,
  FTA_HasExtension = 0x00000004,
  FTA_NoEdit = 0x00000008,
  FTA_NoRemove = 0x00000010,
  FTA_NoNewVerb = 0x00000020,
  FTA_NoEditVerb = 0x00000040,
  FTA_NoRemoveVerb = 0x00000080,
  FTA_NoEditDesc = 0x00000100,
  FTA_NoEditIcon = 0x00000200,
  FTA_NoEditDflt = 0x00000400,
  FTA_NoEditVerbCmd = 0x00000800,
  FTA_NoEditVerbExe = 0x00001000,
  FTA_NoDDE = 0x00002000,
  FTA_NoEditMIME = 0x00008000,
  FTA_OpenIsSafe = 0x00010000,
  FTA_AlwaysUnsafe = 0x00020000,
  FTA_NoRecentDocs = 0x00100000,
  FTA_SafeForElevation = 0x00200000,
  FTA_AlwaysUseDirectInvoke = 0x00400000
} FILETYPEATTRIBUTEFLAGS;

Constants

 
FTA_None
Value: 0x00000000
No FILETYPEATTRIBUTEFLAGS options set.
FTA_Exclude
Value: 0x00000001
Excludes the file type.
FTA_Show
Value: 0x00000002
Shows file types, such as folders, that are not associated with a file name extension.
FTA_HasExtension
Value: 0x00000004
Indicates that the file type has a file name extension.
FTA_NoEdit
Value: 0x00000008
Prohibits editing of the registry entries associated with this file type, the addition of new entries, and the deletion or modification of existing entries.
FTA_NoRemove
Value: 0x00000010
Prohibits deletion of the registry entries associated with this file type.
FTA_NoNewVerb
Value: 0x00000020
Prohibits the addition of new verbs to the file type.
FTA_NoEditVerb
Value: 0x00000040
Prohibits the modification or deletion of canonical verbs such as open and print.
FTA_NoRemoveVerb
Value: 0x00000080
Prohibits the deletion of canonical verbs such as open and print.
FTA_NoEditDesc
Value: 0x00000100
Prohibits the modification or deletion of the description of the file type.
FTA_NoEditIcon
Value: 0x00000200
Prohibits the modification or deletion of the icon assigned to the file type.
FTA_NoEditDflt
Value: 0x00000400
Prohibits the modification of the default verb.
FTA_NoEditVerbCmd
Value: 0x00000800
Prohibits the modification of the commands associated with verbs.
FTA_NoEditVerbExe
Value: 0x00001000
Prohibits the modification or deletion of verbs.
FTA_NoDDE
Value: 0x00002000
Prohibits the modification or deletion of the entries related to DDE.
FTA_NoEditMIME
Value: 0x00008000
Prohibits the modification or deletion of the content type and default extension entries.
FTA_OpenIsSafe
Value: 0x00010000
Indicates that the file type's open verb can be safely invoked for downloaded files. This flag applies only to safe file types, as identified by AssocIsDangerous. To improve the user experience and reduce unnecessary user prompts when downloading and activating items, file type owners should specify this flag and applications that download and activate files should respect this flag.
FTA_AlwaysUnsafe
Value: 0x00020000
Prevents the Never ask me check box from being enabled. Use of this flag means FTA_OpenIsSafe is not respected and AssocIsDangerous always returns TRUE.
If your file type can execute code, you should always use this flag or ensure that the file type handlers mitigate risks, for example, by producing warning prompts before running the code.

The user can override this attribute through the File Type dialog box.
FTA_NoRecentDocs
Value: 0x00100000
Prohibits the addition of members of this file type to the Recent Documents folder. Additionally, in Windows 7 and later, prohibits the addition of members of this file type to the automatic Recent or Frequent category of an application's Jump List.

This flag does not restrict members of this file type from being added to a custom Jump List. It also places no restriction on the file type being added to the automatic Jump Lists of other applications in the case that other applications use this file type.
FTA_SafeForElevation
Value: 0x00200000
Introduced in Windows 8. Marks the file or URI scheme as safe to be used from a low trust application. Files that originate from the Internet or an app container are examples where the file is considered untrusted. Untrusted files that contain code are especially dangerous, and appropriate security mitigations must be applied if the file is to be opened by a full trust application. File type owners for file formats that have the ability to execute code should specify this flag only if their program mitigates elevation-of-privilege threats that are associated with running code at a higher integrity level. Mitigations include prompting the user before code is executed or executing the code with reduced privileges.

By specifying this flag for an entire file type, an app running within an app container can pass files of this type to a program running at full trust. Some file types are recognized as inherently dangerous due to their ability to execute code and will be blocked if you don't specify this value.
FTA_AlwaysUseDirectInvoke
Value: 0x00400000
Introduced in Windows 8. Ensures that the verbs for the file type are invoked with a URI instead of a downloaded version of the file. Use this flag only if you've registered the file type's verb to support DirectInvoke through the SupportedProtocols or UseUrl registration.

Remarks

These flags represent possible attributes stored in the EditFlags value of a ProgID registration. The EditFlags data is a single REG_DWORD.

The following example shows the FTA_NoRemove (0x00000010) and FTA_NoNewVerb (0x00000020) attributes assigned to the .myp file type.

HKEY_CLASSES_ROOT
   .myp
      (Default) = MyProgram.1
   MyProgram.1
      (Default) = MyProgram Application
      EditFlags = 0x00000030
\

APIs such as IQueryAssociations::GetData can retrieve that EditFlags data. Compare the numerical equivalents of these FILETYPEATTRIBUTEFLAGS flags against that retrieved value to determine which flags are set.

The following example demonstrates the use of IQueryAssociations::GetData to determine if those values are set.

IQueryAssociations *passoc;

HRESULT hr = AssocCreate(CLSID_QueryAssociations, IID_PPV_ARGS(&passoc));
if (SUCCEEDED(hr))
{
    hr = passoc->Init(NULL, pszType, NULL, NULL);
    if (SUCCEEDED(hr))
    {
        DWORD dwEditFlags;
        ULONG cb = sizeof(dwEditFlags);
        
        hr = passoc->GetData(NULL, ASSOCDATA_EDITFLAGS, NULL, &dwEditFlags, &cb);
        if (SUCCEEDED(hr))
        {
            if (dwEditFlags & 0x00000010) // FTA_NoRemove
            {
                // ...
            }    
            if (dwEditFlags & 0x00000020)  // FTA_NoNewVerb
            {
                // ...
            }
        }
    }
    passoc->Release();
}

To set an EditFlags attribute, you can use the RegSetValueEx or SHSetValue functions. First use IQueryAssociations::GetData to retrieve the current set of attributes as shown in the example above, add the desired FILETYPEATTRIBUTEFLAGS to that value, then write that value back to the registry using one of the two set functions.

Requirements

Requirement Value
Minimum supported client Windows XP, Windows 2000 Professional, Windows Vista [desktop apps only]
Minimum supported server Windows Server 2008 [desktop apps only]
Header shlwapi.h