FILETYPEATTRIBUTEFLAGS enumeration (shlwapi.h)
Indicates FILETYPEATTRIBUTEFLAGS constants that are used in the EditFlags value of a file association PROGID registry key.
Syntax
typedef enum {
FTA_None = 0x00000000,
FTA_Exclude = 0x00000001,
FTA_Show = 0x00000002,
FTA_HasExtension = 0x00000004,
FTA_NoEdit = 0x00000008,
FTA_NoRemove = 0x00000010,
FTA_NoNewVerb = 0x00000020,
FTA_NoEditVerb = 0x00000040,
FTA_NoRemoveVerb = 0x00000080,
FTA_NoEditDesc = 0x00000100,
FTA_NoEditIcon = 0x00000200,
FTA_NoEditDflt = 0x00000400,
FTA_NoEditVerbCmd = 0x00000800,
FTA_NoEditVerbExe = 0x00001000,
FTA_NoDDE = 0x00002000,
FTA_NoEditMIME = 0x00008000,
FTA_OpenIsSafe = 0x00010000,
FTA_AlwaysUnsafe = 0x00020000,
FTA_NoRecentDocs = 0x00100000,
FTA_SafeForElevation = 0x00200000,
FTA_AlwaysUseDirectInvoke = 0x00400000
} FILETYPEATTRIBUTEFLAGS;
Constants
FTA_None Value: 0x00000000 No FILETYPEATTRIBUTEFLAGS options set. |
FTA_Exclude Value: 0x00000001 Excludes the file type. |
FTA_Show Value: 0x00000002 Shows file types, such as folders, that are not associated with a file name extension. |
FTA_HasExtension Value: 0x00000004 Indicates that the file type has a file name extension. |
FTA_NoEdit Value: 0x00000008 Prohibits editing of the registry entries associated with this file type, the addition of new entries, and the deletion or modification of existing entries. |
FTA_NoRemove Value: 0x00000010 Prohibits deletion of the registry entries associated with this file type. |
FTA_NoNewVerb Value: 0x00000020 Prohibits the addition of new verbs to the file type. |
FTA_NoEditVerb Value: 0x00000040 Prohibits the modification or deletion of canonical verbs such as open and print. |
FTA_NoRemoveVerb Value: 0x00000080 Prohibits the deletion of canonical verbs such as open and print. |
FTA_NoEditDesc Value: 0x00000100 Prohibits the modification or deletion of the description of the file type. |
FTA_NoEditIcon Value: 0x00000200 Prohibits the modification or deletion of the icon assigned to the file type. |
FTA_NoEditDflt Value: 0x00000400 Prohibits the modification of the default verb. |
FTA_NoEditVerbCmd Value: 0x00000800 Prohibits the modification of the commands associated with verbs. |
FTA_NoEditVerbExe Value: 0x00001000 Prohibits the modification or deletion of verbs. |
FTA_NoDDE Value: 0x00002000 Prohibits the modification or deletion of the entries related to DDE. |
FTA_NoEditMIME Value: 0x00008000 Prohibits the modification or deletion of the content type and default extension entries. |
FTA_OpenIsSafe Value: 0x00010000 Indicates that the file type's open verb can be safely invoked for downloaded files. This flag applies only to safe file types, as identified by AssocIsDangerous. To improve the user experience and reduce unnecessary user prompts when downloading and activating items, file type owners should specify this flag and applications that download and activate files should respect this flag. |
FTA_AlwaysUnsafe Value: 0x00020000 Prevents the Never ask me check box from being enabled. Use of this flag means FTA_OpenIsSafe is not respected and AssocIsDangerous always returns TRUE. If your file type can execute code, you should always use this flag or ensure that the file type handlers mitigate risks, for example, by producing warning prompts before running the code. The user can override this attribute through the File Type dialog box. |
FTA_NoRecentDocs Value: 0x00100000 Prohibits the addition of members of this file type to the Recent Documents folder. Additionally, in Windows 7 and later, prohibits the addition of members of this file type to the automatic Recent or Frequent category of an application's Jump List. This flag does not restrict members of this file type from being added to a custom Jump List. It also places no restriction on the file type being added to the automatic Jump Lists of other applications in the case that other applications use this file type. |
FTA_SafeForElevation Value: 0x00200000 Introduced in Windows 8. Marks the file or URI scheme as safe to be used from a low trust application. Files that originate from the Internet or an app container are examples where the file is considered untrusted. Untrusted files that contain code are especially dangerous, and appropriate security mitigations must be applied if the file is to be opened by a full trust application. File type owners for file formats that have the ability to execute code should specify this flag only if their program mitigates elevation-of-privilege threats that are associated with running code at a higher integrity level. Mitigations include prompting the user before code is executed or executing the code with reduced privileges. By specifying this flag for an entire file type, an app running within an app container can pass files of this type to a program running at full trust. Some file types are recognized as inherently dangerous due to their ability to execute code and will be blocked if you don't specify this value. |
FTA_AlwaysUseDirectInvoke Value: 0x00400000 Introduced in Windows 8. Ensures that the verbs for the file type are invoked with a URI instead of a downloaded version of the file. Use this flag only if you've registered the file type's verb to support DirectInvoke through the SupportedProtocols or UseUrl registration. |
Remarks
These flags represent possible attributes stored in the EditFlags value of a ProgID registration. The EditFlags data is a single REG_DWORD.
The following example shows the FTA_NoRemove (0x00000010) and FTA_NoNewVerb (0x00000020) attributes assigned to the .myp file type.
HKEY_CLASSES_ROOT .myp (Default) = MyProgram.1 MyProgram.1 (Default) = MyProgram Application EditFlags = 0x00000030\
APIs such as IQueryAssociations::GetData can retrieve that EditFlags data. Compare the numerical equivalents of these FILETYPEATTRIBUTEFLAGS flags against that retrieved value to determine which flags are set.
The following example demonstrates the use of IQueryAssociations::GetData to determine if those values are set.
IQueryAssociations *passoc;
HRESULT hr = AssocCreate(CLSID_QueryAssociations, IID_PPV_ARGS(&passoc));
if (SUCCEEDED(hr))
{
hr = passoc->Init(NULL, pszType, NULL, NULL);
if (SUCCEEDED(hr))
{
DWORD dwEditFlags;
ULONG cb = sizeof(dwEditFlags);
hr = passoc->GetData(NULL, ASSOCDATA_EDITFLAGS, NULL, &dwEditFlags, &cb);
if (SUCCEEDED(hr))
{
if (dwEditFlags & 0x00000010) // FTA_NoRemove
{
// ...
}
if (dwEditFlags & 0x00000020) // FTA_NoNewVerb
{
// ...
}
}
}
passoc->Release();
}
To set an EditFlags attribute, you can use the RegSetValueEx or SHSetValue functions. First use IQueryAssociations::GetData to retrieve the current set of attributes as shown in the example above, add the desired FILETYPEATTRIBUTEFLAGS to that value, then write that value back to the registry using one of the two set functions.
Requirements
Requirement | Value |
---|---|
Minimum supported client | Windows XP, Windows 2000 Professional, Windows Vista [desktop apps only] |
Minimum supported server | Windows Server 2008 [desktop apps only] |
Header | shlwapi.h |