Solved

How to trap 'Access Denied' with CopyFile

Posted on 2003-11-03
4
943 Views
Last Modified: 2008-03-17
Hello,
I am using the CopyFile API function to copy a file from the user's machine to a network directory.  Under most circumstances it should work fine, but I have identified two conditions where it might fail and I need to be able to trap them:
1. the destination file already exists (in which case I need to prompt them for the next step - it may be overwrite, it may be rename, it may be cancel, up to them)
2. they don't have write access to this network directory (in which case I need to throw an error and bail)

All I have been able to do so far is test if CopyFile(parameters) = 0, but this doesn't tell me very much.

By the way here is the declaration in case it helps.
Private Declare Function CopyFile Lib "kernel32" Alias "CopyFileA" _
(ByVal lpExistingFileName As String, ByVal lpNewFileName As String, _
ByVal bFailIfExists As Long) As Long

Thanks for your help
0
Comment
Question by:pteehan
  • 2
4 Comments
 
LVL 48

Expert Comment

by:AlexFM
ID: 9671405
Call GetLastError API immidiately after CopyFile:

Public Declare Function GetLastError Lib "kernel32" Alias "GetLastError" () As Long

If it returns 5, this means Access is Denied.
0
 
LVL 48

Accepted Solution

by:
AlexFM earned 125 total points
ID: 9671479
Read also this article which gives the generic solution:

http://www.freevbcode.com/ShowCode.Asp?ID=507
0
 
LVL 48

Expert Comment

by:Mikal613
ID: 9671663
Put this abel in that form.
on error goto ErrHanlder:

ErrHandler:
If err.number = 70 or err.number = 75 then
 'Ignores Access Denied
end if
0
 
LVL 2

Author Comment

by:pteehan
ID: 9671957
Thanks AlexFM.
GetLastError didn't seem to work but from the article you linked I noticed Err.LastDllError - this is what I needed.  Exactly what I was looking for!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Article by: Martin
Here are a few simple, working, games that you can use as-is or as the basis for your own games. Tic-Tac-Toe This is one of the simplest of all games.   The game allows for a choice of who goes first and keeps track of the number of wins for…
You can of course define an array to hold data that is of a particular type like an array of Strings to hold customer names or an array of Doubles to hold customer sales, but what do you do if you want to coordinate that data? This article describes…
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
This lesson covers basic error handling code in Microsoft Excel using VBA. This is the first lesson in a 3-part series that uses code to loop through an Excel spreadsheet in VBA and then fix errors, taking advantage of error handling code. This l…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now