From a8ac7aa362b61aacbb3f839d2568e59646192e56 Mon Sep 17 00:00:00 2001 From: DavidXanatos Date: Sat, 20 Aug 2022 14:48:18 +0200 Subject: [PATCH] sub icons --- .../MiscHelpers/Common/SettingsWidgets.cpp | 1 + SandboxiePlus/SandMan/Forms/OptionsWindow.ui | 2188 ++++++++--------- .../Resources/Actions/Accessibility.png | Bin 0 -> 1903 bytes .../SandMan/Resources/Actions/Anon.png | Bin 0 -> 2652 bytes .../SandMan/Resources/Actions/Bug.png | Bin 0 -> 1996 bytes .../SandMan/Resources/Actions/Entry.png | Bin 0 -> 1067 bytes .../SandMan/Resources/Actions/Fail.png | Bin 0 -> 1542 bytes .../SandMan/Resources/Actions/Fence.png | Bin 0 -> 2340 bytes .../SandMan/Resources/Actions/File.png | Bin 0 -> 463 bytes .../Resources/Actions/ImmidiateRecovery.png | Bin 0 -> 857 bytes .../SandMan/Resources/Actions/List.png | Bin 0 -> 1009 bytes .../Resources/Actions/Miscellaneous.png | Bin 0 -> 2092 bytes .../SandMan/Resources/Actions/Network.png | Bin 0 -> 1016 bytes .../SandMan/Resources/Actions/NoAccess.png | Bin 0 -> 1602 bytes .../SandMan/Resources/Actions/Pass.png | Bin 0 -> 1444 bytes .../SandMan/Resources/Actions/Policy.png | Bin 0 -> 1321 bytes .../SandMan/Resources/Actions/Process.png | Bin 0 -> 1310 bytes .../Resources/Actions/QuickRecovery.png | Bin 0 -> 1487 bytes .../SandMan/Resources/Actions/Rules.png | Bin 0 -> 1426 bytes .../SandMan/Resources/Actions/Security.png | Bin 0 -> 1565 bytes .../SandMan/Resources/Actions/Trigger.png | Bin 0 -> 1107 bytes .../SandMan/Resources/Actions/Users.png | Bin 0 -> 1571 bytes SandboxiePlus/SandMan/Resources/SandMan.qrc | 19 + .../SandMan/Windows/OptionsWindow.cpp | 31 +- .../SandMan/Windows/SettingsWindow.cpp | 5 +- 25 files changed, 1147 insertions(+), 1097 deletions(-) create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Accessibility.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Anon.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Bug.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Entry.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Fail.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Fence.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/File.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/ImmidiateRecovery.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/List.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Miscellaneous.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Network.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/NoAccess.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Pass.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Policy.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Process.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/QuickRecovery.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Rules.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Security.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Trigger.png create mode 100644 SandboxiePlus/SandMan/Resources/Actions/Users.png diff --git a/SandboxiePlus/MiscHelpers/Common/SettingsWidgets.cpp b/SandboxiePlus/MiscHelpers/Common/SettingsWidgets.cpp index 71cb9750..ee567a41 100644 --- a/SandboxiePlus/MiscHelpers/Common/SettingsWidgets.cpp +++ b/SandboxiePlus/MiscHelpers/Common/SettingsWidgets.cpp @@ -127,6 +127,7 @@ QWidget* CConfigDialog::ConvertToTree(QTabWidget* pTabWidget) QTreeWidgetItem* pSubItem = new QTreeWidgetItem(QStringList() << pSubTabs->tabText(j)); pItem->addChild(pSubItem); pSubItem->setData(0, Qt::UserRole, m_pStack->count()); + pSubItem->setIcon(0, pSubTabs->tabIcon(j)); m_pStack->addWidget(pSubTabs->widget(j--)); } } diff --git a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui index e98268a4..72e35055 100644 --- a/SandboxiePlus/SandMan/Forms/OptionsWindow.ui +++ b/SandboxiePlus/SandMan/Forms/OptionsWindow.ui @@ -53,7 +53,7 @@ - + 0 @@ -1218,7 +1218,7 @@ If leader processes are defined, all others are treated as lingering processes.< - + 0 @@ -1485,7 +1485,7 @@ If leader processes are defined, all others are treated as lingering processes.< - + 0 @@ -1922,947 +1922,89 @@ The process match level has a higher priority than the specificity and describes - - - - 50 - false - true - - - - 0 - - - - - 50 - false - true - - - - Miscellaneous - - - - - - - - Emulate sandboxed window station for all processes - - - - - - - Drop critical privileges from processes running with a SYSTEM token - - - - - - - Add sandboxed processes to job objects (recommended) - - - - - - - Do not start sandboxed services using a system token (recommended) - - - - - - - Protect sandboxed SYSTEM processes from unprivileged processes - - - - - - - Open access to COM infrastructure (not recommended) - - - - - - - Allow only privileged processes to access the Service Control Manager - - - - - - - Force usage of custom dummy Manifest files (legacy behaviour) - - - - - - - - 75 - true - true - - - - (Security Critical) - - - - - - - Qt::Horizontal - - - - 40 - 20 - - - - - - - - Start the sandboxed RpcSs as a SYSTEM process (not recommended) - - - - - - - Don't alter window class names created by sandboxed programs - - - - - - - - 75 - true - true - - - - Compatibility - - - - - - - Qt::Vertical - - - - 20 - 40 - - - - - - - - - 75 - true - true - - - - (Security Critical) - - - - - - - - 75 - true - true - - - - Protect the sandbox integrity itself - - - Sandbox isolation - - - - - - - - 75 - true - true - - - - Protect the sandbox integrity itself - - - COM/RPC - - - - - - - Allow use of nested job objects (works on Windows 8 and later) - - - - - - - Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) - - - - - - - - - - Isolation - - - - - - - - Security Isolation through the usage of a heavily restricted process token is Sandboxie's primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it’s no longer providing reliable security, just simple application compartmentalization. - - - true - - - - - - - Open access to Windows Local Security Authority - - - - - - - Allow sandboxed programs to manage Hardware/Devices - - - - - - - Qt::Vertical - - - - 20 - 40 - - - - - - - - Disable Security Isolation (experimental) - - - - - - - Various advanced isolation features can break compatibility with some applications. If you are using this sandbox <b>NOT for Security</b> but for simple application portability, by changing these options you can restore compatibility by sacrificing some security. - - - true - - - - - - - Qt::Horizontal - - - - 40 - 20 - - - - - - - - Open access to Windows Security Account Manager - - - - - - - - 75 - true - true - - - - Protect the sandbox integrity itself - - - Security Isolation & Filtering - - - - - - - Disable Security Filtering (not recommended) - - - - - - - Security Filtering used by Sandboxie to enforce filesystem and registry access restrictions, as well as to restrict process access. - - - true - - - - - - - The below options can be used safely when you don't grant admin rights. - - - true - - - - - - - - 75 - true - true - - - - Protect the sandbox integrity itself - - - Access isolation - - - - - - - - - - Triggers - - - - - - Qt::Vertical + + + + 50 + false + true + + + + 0 + + + + + 50 + false + true + + + + Miscellaneous + + + + + + + + Emulate sandboxed window station for all processes - - - 20 - 40 - - - - - - - - Qt::Vertical - - - - 20 - 40 - - - + - - - - 0 - 0 - - - - - 0 - 23 - - + - Remove - - - - - - - - Event - - - - - Action - - - - - - - - - - - - - - 0 - 0 - - - - - 0 - 23 - - - - Run Command - - - - - - - - 0 - 0 - - - - - 0 - 23 - - - - Start Service - - - - - - - These events are executed each time a box is started - - - On Box Start - - - Qt::AlignCenter - - - - - - - - 0 - 0 - - - - - 0 - 23 - - - - Run Command + Drop critical privileges from processes running with a SYSTEM token - - - Qt::Vertical - - - - 20 - 40 - - - - - - - - These commands are run UNBOXED just before the box content is deleted - + - On Box Delete - - - Qt::AlignCenter + Add sandboxed processes to job objects (recommended) - - - - 0 - 0 - - - - - 0 - 23 - - + - Run Command - - - - - - - These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. - - - On Box Init - - - Qt::AlignCenter - - - - - - - Here you can specify actions to be executed automatically on various box events. - - - true + Do not start sandboxed services using a system token (recommended) - + - Show Templates + Protect sandboxed SYSTEM processes from unprivileged processes - - - - - - 50 - false - true - - - - Hide Processes - - - - - - Qt::Vertical - - - - 20 - 40 - - - - - - + + - Add Process + Open access to COM infrastructure (not recommended) - - - - - + + - Hide host processes from processes running in the sandbox. - - - true + Allow only privileged processes to access the Service Control Manager - - + + - Remove + Force usage of custom dummy Manifest files (legacy behaviour) - - - - Don't allow sandboxed processes to see processes running in other boxes - - - - - - - - - 50 - false - true - - - - Users - - - - - - Restrict Resource Access monitor to administrators only - - - - - - - Add User - - - - - - - Qt::Vertical - - - - 20 - 40 - - - - - - - - - - - Remove User - - - - - - - Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. - -Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. - - - true - - - - - - - - Tracing - - - - - - - - API call trace (requires LogAPI to be installed in the Sbie directory) - - - - - - - Qt::Horizontal - - - - 40 - 20 - - - - - - - - Pipe Trace - - - - - - - Qt::Vertical - - - - 20 - 40 - - - - - - - - Log all SetError's to Trace log (creates a lot of output) - - - - - - - Qt::Horizontal - - - - 40 - 20 - - - - - - - - Log Debug Output to the Trace Log - - - - - - - Log all access events as seen by the driver to the resource access log. - -This options set the event mask to "*" - All access events -You can customize the logging using the ini by specifying -"A" - Allowed accesses -"D" - Denied accesses -"I" - Ignore access requests -instead of "*". - - - Qt::AlignLeading|Qt::AlignLeft|Qt::AlignTop - - - true - - - - - - - Ntdll syscall Trace (creates a lot of output) - - - - - - - File Trace - - - - - - - Disable Resource Access Monitor - - - - - - - IPC Trace - - - - - - - GUI Trace - - - - - - - - 75 - true - true - - - - Resource Access Monitor - - - - - - - - 20 - 16777215 - - - - - - - - - - - - 75 - true - true - - - - Access Tracing - - - - - - - COM Class Trace - - - - - - - Key Trace - - - - - - - Network Firewall - - - - - - - - - - - 50 - false - true - - - - Debug - - - - - - true - - - - - 0 - 0 - 80 - 16 - - - - - 0 - - - 0 - - - 0 - - - 0 - - - - - - - + + 75 @@ -2871,28 +2013,886 @@ instead of "*". - WARNING, these options can disable core security guarantees and break sandbox security!!! + (Security Critical) - - true + + + + + + Qt::Horizontal + + + + 40 + 20 + + + + + + + + Start the sandboxed RpcSs as a SYSTEM process (not recommended) + + + + + + + Don't alter window class names created by sandboxed programs - + + + + 75 + true + true + + - These options are intended for debugging compatibility issues, please do not use them in production use. + Compatibility + + + + + + + Qt::Vertical + + + + 20 + 40 + + + + + + + + + 75 + true + true + + + + (Security Critical) + + + + + + + + 75 + true + true + + + + Protect the sandbox integrity itself + + + Sandbox isolation + + + + + + + + 75 + true + true + + + + Protect the sandbox integrity itself + + + COM/RPC + + + + + + + Allow use of nested job objects (works on Windows 8 and later) + + + + + + + Disable the use of RpcMgmtSetComTimeout by default (this may resolve compatibility issues) + + + + + + + + + + Isolation + + + + + + + + Security Isolation through the usage of a heavily restricted process token is Sandboxie's primary means of enforcing sandbox restrictions, when this is disabled the box is operated in the application compartment mode, i.e. it’s no longer providing reliable security, just simple application compartmentalization. true + + + + Open access to Windows Local Security Authority + + + + + + + Allow sandboxed programs to manage Hardware/Devices + + + + + + + Qt::Vertical + + + + 20 + 40 + + + + + + + + Disable Security Isolation (experimental) + + + + + + + Various advanced isolation features can break compatibility with some applications. If you are using this sandbox <b>NOT for Security</b> but for simple application portability, by changing these options you can restore compatibility by sacrificing some security. + + + true + + + + + + + Qt::Horizontal + + + + 40 + 20 + + + + + + + + Open access to Windows Security Account Manager + + + + + + + + 75 + true + true + + + + Protect the sandbox integrity itself + + + Security Isolation & Filtering + + + + + + + Disable Security Filtering (not recommended) + + + + + + + Security Filtering used by Sandboxie to enforce filesystem and registry access restrictions, as well as to restrict process access. + + + true + + + + + + + The below options can be used safely when you don't grant admin rights. + + + true + + + + + + + + 75 + true + true + + + + Protect the sandbox integrity itself + + + Access isolation + + + - - - - + + + + + + Triggers + + + + + + Qt::Vertical + + + + 20 + 40 + + + + + + + + Qt::Vertical + + + + 20 + 40 + + + + + + + + + 0 + 0 + + + + + 0 + 23 + + + + Remove + + + + + + + + Event + + + + + Action + + + + + + + + + + + + + + 0 + 0 + + + + + 0 + 23 + + + + Run Command + + + + + + + + 0 + 0 + + + + + 0 + 23 + + + + Start Service + + + + + + + These events are executed each time a box is started + + + On Box Start + + + Qt::AlignCenter + + + + + + + + 0 + 0 + + + + + 0 + 23 + + + + Run Command + + + + + + + Qt::Vertical + + + + 20 + 40 + + + + + + + + These commands are run UNBOXED just before the box content is deleted + + + On Box Delete + + + Qt::AlignCenter + + + + + + + + 0 + 0 + + + + + 0 + 23 + + + + Run Command + + + + + + + These commands are executed only when a box is initialized. To make them run again, the box content must be deleted. + + + On Box Init + + + Qt::AlignCenter + + + + + + + Here you can specify actions to be executed automatically on various box events. + + + true + + + + + + + Show Templates + + + + + + + + + 50 + false + true + + + + Hide Processes + + + + + + Qt::Vertical + + + + 20 + 40 + + + + + + + + Add Process + + + + + + + + + + Hide host processes from processes running in the sandbox. + + + true + + + + + + + Remove + + + + + + + Don't allow sandboxed processes to see processes running in other boxes + + + + + + + + + 50 + false + true + + + + Users + + + + + + Restrict Resource Access monitor to administrators only + + + + + + + Add User + + + + + + + Qt::Vertical + + + + 20 + 40 + + + + + + + + + + + Remove User + + + + + + + Add user accounts and user groups to the list below to limit use of the sandbox to only those accounts. If the list is empty, the sandbox can be used by all user accounts. + +Note: Forced Programs and Force Folders settings for a sandbox do not apply to user accounts which cannot use the sandbox. + + + true + + + + + + + + Tracing + + + + + + + + API call trace (requires LogAPI to be installed in the Sbie directory) + + + + + + + Qt::Horizontal + + + + 40 + 20 + + + + + + + + Pipe Trace + + + + + + + Qt::Vertical + + + + 20 + 40 + + + + + + + + Log all SetError's to Trace log (creates a lot of output) + + + + + + + Qt::Horizontal + + + + 40 + 20 + + + + + + + + Log Debug Output to the Trace Log + + + + + + + Log all access events as seen by the driver to the resource access log. + +This options set the event mask to "*" - All access events +You can customize the logging using the ini by specifying +"A" - Allowed accesses +"D" - Denied accesses +"I" - Ignore access requests +instead of "*". + + + Qt::AlignLeading|Qt::AlignLeft|Qt::AlignTop + + + true + + + + + + + Ntdll syscall Trace (creates a lot of output) + + + + + + + File Trace + + + + + + + Disable Resource Access Monitor + + + + + + + IPC Trace + + + + + + + GUI Trace + + + + + + + + 75 + true + true + + + + Resource Access Monitor + + + + + + + + 20 + 16777215 + + + + + + + + + + + + 75 + true + true + + + + Access Tracing + + + + + + + COM Class Trace + + + + + + + Key Trace + + + + + + + Network Firewall + + + + + + + + + + + 50 + false + true + + + + Debug + + + + + + true + + + + + 0 + 0 + 98 + 28 + + + + + 0 + + + 0 + + + 0 + + + 0 + + + + + + + + + + 75 + true + true + + + + WARNING, these options can disable core security guarantees and break sandbox security!!! + + + true + + + + + + + These options are intended for debugging compatibility issues, please do not use them in production use. + + + true + + + + + + + + @@ -2900,190 +2900,190 @@ instead of "*". - - - 0 - - - - Compatibility Templates - - - - - - - - Filter Categories - - - Qt::AlignRight|Qt::AlignTrailing|Qt::AlignVCenter - - - - - - - - - - Text Filter - - - - - - - Add Template - - - - - - - This list contains a large amount of sandbox compatibility enhancing templates - - - true - - - - - - - - - - Remove Template - - - - - - - Qt::Vertical - - - - 20 - 40 - - - - - - - - true - - - - Category - - - - - Name - - - - - + + + 0 + + + + Compatibility Templates + + + + + + + + Filter Categories + + + Qt::AlignRight|Qt::AlignTrailing|Qt::AlignVCenter + + + + + + + + + + Text Filter + + + + + + + Add Template + + + + + + + This list contains a large amount of sandbox compatibility enhancing templates + + + true + + + + + + + + + + Remove Template + + + + + + + Qt::Vertical + + + + 20 + 40 + + + + + + + + true + + + + Category + + + + + Name + + + - - - - Template Folders - - + + + + + + Template Folders + + + + - - - - - Configure the folder locations used by your other applications. + + + Configure the folder locations used by your other applications. Please note that this values are currently user specific and saved globally for all boxes. - - - - - - - Qt::Vertical - - - - 20 - 40 - - - - - - - - - Name - - - - - Value - - - - - + + + + + + + Qt::Vertical + + + + 20 + 40 + + + + + + + + + Name + + + + + Value + + + - - - - Accessibility - - + + + + + + Accessibility + + + + + + + + To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. + + + + + + + Screen Readers: JAWS, NVDA, Window-Eyes, System Access + + + - - - - - To compensate for the lost protection, please consult the Drop Rights settings page in the Restrictions settings group. - - - - - - - Screen Readers: JAWS, NVDA, Window-Eyes, System Access - - - - - - - The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. - - - true - - - - - - - - - - - + + + The following settings enable the use of Sandboxie in combination with accessibility software. Please note that some measure of Sandboxie protection is necessarily lost when these settings are in effect. + + + true + + + + + + + + + - - - - + + + + + + @@ -3161,7 +3161,7 @@ Please note that this values are currently user specific and saved globally for tabs - tabWidget + tabsGeneral cmbBoxIndicator cmbBoxBorder btnBorderColor diff --git a/SandboxiePlus/SandMan/Resources/Actions/Accessibility.png b/SandboxiePlus/SandMan/Resources/Actions/Accessibility.png new file mode 100644 index 0000000000000000000000000000000000000000..68826dfa7a48811c513080b004e81dcc5f76945a GIT binary patch literal 1903 zcmV-#2ax!QP)EK~!jg?V8Vz97h$$KULk+)8n0)on1S#QX~u#V2hZ=Psii3`FB95^BlfDjG{DT#yQbsVxA;lwy0UT5u{otfR4 z=^ynt^z?dWx_fqZc9A*k_f%c=>h=3p*N^vJHSA#zdl&|_tJQxj^aU#970JI z^hCF{iO8pDwS@3Cs`D3Kc<9sJdiBnU%q>hI)=89{0v_3hP66Hkbq?1%$NaI{PRtme z$lSsd=vm-NptKVsfI7%axWSLcB{Uw9*>@gC@nfJm*ksunr(j{{G?uMVI;s}~VPFV+ zgVzcP1CyqC8PqeJKJv-F2k);UUMu}wN>M)GQku^9YJ8YBzu3~up{=v;JPvX)ew?V}DNZ@r z@**hXQT_aZOp%!{+=DV+w1zTJoXRs%>3xrUi@7T&hMAg8WNu-qyTtml{_!!bwd8_st+n{@;>RebFtWahNe6Ak zq-BzJ?mKC6cDglkDlYCT+IT2b-53wdt zx#Z56b1W=N6NUyr;RMHl-wr3D_0f2bcM2I(z=Y(j4)=fKKJ0w@?A$JbPQbz+7x9gi zI`y1_MXTBMm_;67fJkz-`7+q+C2E!k&KQJF8|>@TFpK$7iHy8`C{fv`>I6}Y{#D)+C~*h{o9@x zQ0rMedaP3DiOP_X8pE8Fx=nXkQlrtkgFai7st>j&i3rPaF(arLRPHR!yW zCYMfR{#Xs)e&CI1Gg5YM;maQ(k;zEloE2Xm#Dwz$XyJ*|nRkp_z}}hfrJI z==I5#alJEH(%D4jzgP#g8SHzlkov7oruc57zS6;K_iVYs)59|L!=0VeM_vK7xwzKX zJesS+$SC|)i0MwlR-+xo7TSu+fC&tKJ7icErMWtoZRFRy_~qXWGj(gH(d9|n>OPQ% z0UEbE7$cOYQ?iXp5$Zhe{&|t|Oo^3iHFQ3@uv+}vRSq1iP+x8ks(eNsK&Y=INW4i9 zes?P~N6RWiar|HDO=7z?m6@z0c7PZ`X?-W!Ga+J3l&8|k@e6}!P4rDC)FP_$=qOio zqo+rH_|N@F@H7!hKmJ7vB8U`ufUKYVO=uN7jbuEo3vQtYS p7r{Qy3tzgmtMA{#9`=xl{{kdCy+U$O!iN9=002ovPDHLkV1g)go_qiR literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/Actions/Anon.png b/SandboxiePlus/SandMan/Resources/Actions/Anon.png new file mode 100644 index 0000000000000000000000000000000000000000..3baf2ed43b3239315de9005ccfc2aab5f821c062 GIT binary patch literal 2652 zcmV-i3ZwOjP)MVqb%wYIjFrIc@#j#{jQ z2Q}fV0_8vjfIvUckI3g5a#bm5iw5gCUht{1*(E}|}K8XvjByXA(jxuK!Knu?xDgM56vWtYz%*cl3kR{^nt&dC52u9x0L zpD5WcB7b;v)v{BQ(KTU^<`XSHvrT)C<2cc9Btltvc|piX5R(Ha=?D=JH!z0*|My8If0RAlxTVRJplkI903j4YwEnbVa19&QwC{nK0VJ;<`u_r zLd60j(J0Zfvgrfx>Wy{;F8GzTuBoZ1e>APWu|Sm1dCRfw&`^<5{9U9(Y)Ni-Vu~R| zWJnZb+>a7@*ur>qEUo^reso>+m12OLKoP;RY&tqR=pX1u1ZK{vW_IoDe2B-20Dw}8 z&aN(c5r%v+MBt^&t`Q2ARmiQwGr>J=A@aQe3*!#^tM5aU7?lesxt9>(;KN zaz^E-03yQe-d;|eI7x4BZ>gAopCu11Ve!`%qia47zyncQ-;_ZFt-p9!S+-5fnNR5L z?WL-!irShQ9M|E?YuCw`8M@+e-Z^xLEt@wnYv#;h003R_I3ND=2##$75DW&XpI49W z)9Jm_%cti*<;Kk$tY7~)fj}S+BAP0to(zZ&>B|CTBhhmDG?lR!E0;aOocekKfdB%S zt1=vZ?;qUi?1W5)g9qPb$G5f(MkF5R}N6t~F+|i{`tXi$_mSf>n(xSlZA)tg;fn2LTWah1jb4JPU7P7HIOL_AJvFiAR@V(r?; z2llIIcX>+9LLc@zJ=a+NhrYfw^@tODP7 z{Bc@NoMis|`P9#y>sdFYNi9XTUUbyBiyYC=ZWW*B9%^Px?1&8--0HZ6Wm#0utfrzO zMq^_m%a$*rC!QE4v}(o-Hg4L82)Ig->g%H?(SzRzP+L=r?)MJ^$RF<}BAUa^;)msm zX<6*w_cpDUTCqL%0a&nbA)7aEp>}q5NVtxR&sVTfS1Cjw9`EAdI|u0K=qLyY1X#X& zIghR1K+rHsKtu$`r%xS3L|q>`3j=h=ySd(RlZwj9lKO+mB%fXQj3;ZKL=ar%qG?(l zMAvm($K~_?eSvA)RL`1Ka{m|CuCb`AlX>;?it+_O&{SsXAjxF;HS|ZxR zPd`mZSDb-?0hCgdMWfWut7qYYg(&5E5pmFcdLASg3SnkURym)nU1 z(TXy{!EnivW3a!UR60#=m0J;uVHiagJOn@xL?pfKsr8YubdG7i9;xykhG7`^0|6>$ zR1q)?FG?fXXZE^s++n{(%gQJ#FURi>fTm^Zslr?%O6AX$C`1XO7;{*`c=ijR`D{^6 zFgwP5hzLHPkBV3<*IOmFne9!LO;A^r_Ob^a38nH6ws7s3CVWy!Gi9}G2n;q*aSI-;&${YV8NYT0S&P6FNN5pe5xqR0k zK8^Fa9(0sLDxDf8d?c_?C`_zs#y9|KQ~*(4qKn`v)q2+;BEHv(#hyERj^to+bf;2< zYl-e|jvYJ3vE#={B)W$HNdCMSz_DyDx3}e8ODRzS$M>(h2HCo4!$qI2Cv#$h!63~a ze?(8B2g|aG08}2pbzKGq1~_y242eX7opJC5PB-X#^b0=Ipt%7{O4sLzEz* z&TQYlDL$Ug@$DDz`~7b_mi>YNbLY}qSK+!Y|2cP# zfq}xNhndN6s-=Z>>%M{J)AG={M7JHA(=8`)UFEHem6!DVaUvSWPj)~L`G2Zunq)0h zW6`2T#JjsWb+QG^ws2hs%QCSn8`p7YYipykvy*f>UGnL;d6VIV{Vh zJKmkYuco#ZfOuC|{@U!iI)b54enTUXNRS*HWYOX!tX%!|yp=1FS6W*8_1>9?OU%;RNtgFvG*N(|Ak~a_2=B!?&;~F^VTiGkubTL-<$6Vg~B}a&|)-i z_3JneSK8ajq*LTxmAvYJFlXL;s;a7U5VoM!z4-idr|$^}z~A;CI-E{tp3YgaCQw;b z<-K=MlE4Mq#v3lBR-JAa4 z>LCC_V356bfA>pM(KO}1Snb`r*GM_~Mbk1L%=NIY>x9B#3?qPTD^9f>C%5X=G>uiO z*5K29r2vKKy>-2A#t-*w*x-!Q^z?!N?Af!&KmWmobEauNEEFPvmVNBS3!jzLU%k31 zyHi5xkWxy1w|nRIpJVsbtB+pVcoatVN8 z7^mMqbf5`uE}!l)tq~bgq^Ik~N(cY1vJE-EK%+4wU`yLENHu(f zLdr;nPK_|NLny&kX~#DGr41@yI<**RT4@d5B2Ag9!D;Q3HljAt@C}Iq7R6}DHJRLx z{W@=dZ0>kTbCcaonIFjk}(DqQyzB;PhfqO)H4TV)NCQ8Z57FpL7H`Cg|9lQUEIp1*WufuZZ`bWMBdTgz8gyz-}mFUHT;)YJ%_VRb%$yBHyt zfJ^{jz%_tQGwwN>kt!amsj1=doO_n8C{ttM1|nG`&Kr6@y}HjSFUM0WPPV1>)IQA; zV`{2ekvr?Fjm+1(i9j0|Fnx$FE`iu{ey_Rf?Uw&6k$k=eS(ZgfRvKhxtPKW(<_!@7 zSYrNuw0WPZY3me4;nQZ!3<-je>7);no1K?0UQAbGQLpTi8pfxmxe@^kLkIvYTC~VJ zHjs5ZEfBbEIQ?{oLMIO&dg;pmT!{dN>BzbFEl?&Pye)r*Xj&6vKr&fyGyInv`(RI;jsxA0L-52mjYXN-IN#1~t zJXHPDsk$1S%k-nGHw&^_(1hP&T z5Cq^+0OchmB`N+uR%Ne7)rv=(#tq+V0G8MiV(3Plp&N5e)0k%J+743?A6vPsxQ?66 zOA{?*AmmN$M&8tJY`U)v-C-}ze>ev1AEhAFE21arMMt-Fi3w>2QWXP%F*>p*g)wV# zFVa$s&pYD)C2YJzShk|H_=z4}tTc5k)09LQy793o8Fd2>eiE!&wMrsE{!Szs*%}Uq zXD`ls4-YSIPZmBPI02WgS;sRn0m0$cQu}f?UO#;cQc_YbDvE!nz{l?i2De8CicMPm z27^KEj|cYu?#_bzIi{hnF3IcYAp>yQxM?*vxr^s^^q7Xe`p$yovBi+zsV?7|TM-SV5rU^N)>Zf|S*)m}vokuwnhKm<@<^+X0h&V{6@ zMYt8f`Jn=B3E?^lT-5+%2>@V~gD(0Yj@vO(Lde8K=M+Z75dikCZC6OZ4Fdwe`y3%| z{qF*{u5E8>8OU%ovl1QA-8sS-GVH|JtF;VxU5#eq8gV(b2$1Z=UDx$Pn;&^P7K^Nl zMWalOMiGfd5RF9eV8IE0Y3^0WMHLay-enzUX8_EFkjB%K)V;^^B8uXN-|vU4DDWu? zDY8=k?2g(k@wk4DP(EN;ndm@QSo(Zq9e~KX83KLIxDXNwi!uPYKPO@=KQZn)A(1ry zeNeU8Ab2<@2m*l#gn3z^QkeL;V-_Q@{m#3o`)7yR=@o$!I46Jr&OBx$O*xksXRGV( zXHZ0p9dk;809@#@#_>xT%-!QCr^57&`1ep@wibJjh7)7F&;dAlnj!+ou;{y-T3R}A z(oUeQSEf^|5hW9E-RPo`3^cPUsCGEof7I3KFT~hF+wri9#`qfHrt_ka5xr_R*7i$m zrr||0z#WgO+1H%A!NJim;zGXh=lNfI_v5r1Cgh!u(&_GlMJw#`^9&VGT3R}8;*=Tt zP2Jeq5f+7#$(`1AWTO!WK8;v^$H@S*nFj)%YMm)`s{VVjXXO;l$tn12Tico5!FUep z$eOj4cQZMqRg$F@k}T;bx>A3^b-eD_4d<@BcDifK4<%VrC0SbH^?O>^R6J1XO33<+ zTYlp8d7C6jnj}f`DOr&U-+lX7jfYbenTY)#$${EX!Uk?JX40mXci!45D^igp$)_Yq z%JRx$p2c$SK~!jg?V3$*TU8K-pE);#`Xdri+VYWrKrE^N6|E3!1Zt7!g1=EA zw(Qt+h1em4gy^3@l`6GT7l=Pls-#_XM^Y*x8i^t&PO94X42%0=#~;^oeUIIZXAvKd z=brPvo-=dbdmLEU!WLF!VhQ@_y1sN=Z-0mIi7E~hO+QngzAAtx`@km-vcJ8!G$4=5 z-uiq#%_rmcSEJM4-n}ZFNf?(bM2?$>U!n3%GQW~z$-ox)EincDkN2MM{{{RMgb2um zfZ$5`J^rEvp^bQPt!t`odyh9IB6@IhXSLgj zlf?i;lR>7xvR9`p*M_HTtku}Ow9bP&kMUYZB^pa$*l%MpmdMr~KPy}%hRrK)nmeS4SKHPU;CUH03~P^`}* z5-BK(q&L50h2&4@(Zk6~|B5ru{KNh$IhIVgn@+M6M9ji>ncAaw4?9j6^Y?qUZ@xS03EdH8PL0 z-+5&x7?D|lHeDOG*aLx@!f&<8KlFt1S0yx)-$$(AUO zg3SP0#wShwuwXQ0q_z6bFDp;aYyh94xEv^h1TyAAcFdYaBr<=X)=)+0|EB?Z45*z>k002ovPDHLkV1krB{KfzP literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/Actions/Fail.png b/SandboxiePlus/SandMan/Resources/Actions/Fail.png new file mode 100644 index 0000000000000000000000000000000000000000..7f22380fbfa53219ffded8dd8eed89595c0f96cf GIT binary patch literal 1542 zcmV+h2Ko7kP)P^1>ZMY%M^5KG&+v~z~e+1rORGo8-m zoIPPmG4dttw3(H))_2xk-`;y2c!2v0VzC^bJb5yZ)9riFVw;cxiTI|C*`dL~L1!`I z1sB69Kwd_V1`xZ15EOq7XpxKqyB8y#Z$-Y_|8&^OaY)0HfYe&o*vuw+W4Bj6+v6q- zLI?_xE(;kDNcp@F2#NekqIJNY%n2xxlSD6`8VgNa%2xU-N6=cK`N2ts-g##KY1=DL z--@*7*r~MMS?@dT1_K#HB_2iyS$g^eTvAH4Ii~=EPDlwMq-g7ol&d5KLI&1VCBHC+ z;0c*7+yai=6%n)^0EqN#VENW<2q9}sCT-2sKLup*DOW5f*&dKnLcp99qUt+@5OhEH z0`Wkh&I5Az`}Eh$+!zJa<9=!S643&I(j@z~5?@o_pFNc(H2qgql5WyU2qAIH#-nUn*UMbN0o;b4|1AA2ipjbE1B8N-nAPSTTWh0D!k|aWzdX^IjQK}v z66L7MKYnfJRzXprPWK#|dU9V621`qs6lBTauUb`~_Y~Ug5pB>U#;UaxXeP3;YAqF9 z)$-54T(u0EPAOOKrS#SiQ@dv1OT>RGa$(yxGh^d`Cfc)ta5!AoE|<%Zxq2NbC9zd2 z8`_niwKge;;W6H)8n$gSbKxS(j-P-+fyo`)p}(&t$y_c+=G-W;10SO1=19M{8@3EI zBx5SQV6cy9l;_T_lwxLVoMp#PATwD+c9xFMz92h#0o$HGc~_EPI)zAOu=X7$bM;zz zsWl>FqBl(}(#GDDazH7xqtK3nNM}fVbe!zSd2HLpwr#Q%By_<+I}WtmpBT{L%GMOyVp<`&rSx6!h!9KEZ7yv+JT-8XOw^&syc()f?e( znE1vGq;|dJR;ILcrc-q*;Y*^#rIf_o5@`nEaG3a}J~D5rT)#<71kl+TZohGei8JSn$oSn(&50Pmwr!Wh z{-ZS{a)`vHp*lq(FsaC|z+nF7C2oD&;0>|IaH5%Oaw8}$&iL8*5{b@bhBKk~L%>s%#Gy`dWnIxG sQz$cN_h9jTdn`ZPB9{;F0RLP33rW`4{m`^Bj{pDw07*qoM6N<$f|{o-}hhE|E~kgkNGh_=EwijP`yrcetFLwqWAyaMz$~Uvkw?G*tajDV5rbXXIYEk2?3wW@w{E=>L4_EiGeD;@>}e%3g&ZS`EZMyBx;DZ~C=D{@)x?SBgq zJ9m5_Av}C{LiJd~;7sCjl$?cW>cYZB(ul+mnmeMbg z%mxMvjVE|v`p~vTH!P&)IFFMYiWU}A%P%62hY&sAoqHe{?|-SGOx) z7vaYE{BXbJR!er>un-W#(ut4|RNS0|RPyyzLYB>Wu{A`>{k80>wygxiNl%zRTH5zA zN2c39n~rNy0q~MF{G^vBfND2{Lv2B;Xg&eLo9}%R0&OR8Emtf_nH%h<*xl%DiFe}h zb=xdr0|2OO{yT(P@5_J)d}0Cua9#H;r&@nOe5{5bpUtk!_7$Ft!~^0#2nm3wR4Pw5 z>#d9013>^RUQ&KIo3TGe01(ek;y)0C>&nUTtCP=pJIToXug?ChqmYr^YaavEkKtQE z2+!4icm!@2|9_F|kq8O%9f*gF@t*Kn;OJl;5Y6}g9?b(}*B5_V{b|5G?k=ha{dn|$ z1X>GR5m>f`QfUE{WkCxeA`l_OpV$8GJr5KM=r0w*cM*w183r&TkTfuQPM$TM7qtWsgk35rnU$=TWmJNER=Ecj` zaPr+taqFgdrO=ndU0c^7o6W#=1#kT0G-hUNh9?kUiYE7%M_iH63tAJd@0oIc0U|CO z#{noPmkPdDBG2fg#TBq*VG)kwz;PT5F6sxAmoJhy$xN>-T|5AQa2y9hjTM9C$UwdU zLPecC5|A-tS_sq{O*l>g{#k-ry$KNst=K94tF;F5Id6+b(}An~}nvKbpo%0*1i)^TBMI`ly3hv0=Av6RJX=R!6P|#^?HJ|d1{&OQ7x#{ znizTSa{8&05Mb7)_eUpj_R?g?+7w`XjC2$tE*=%H+50d_3qVPTtS2B^)a&~QQnf^+ zDh4S9WhPu-Dg0O^t+PG(=V;9`DMJe}Xw3mcY?3;u@IPDm%l~^&svEl|osC5#zu$Xl~Nym8m zwqbe}LYNDu5R>*}5J1?9Bn1Q~R$3g02vir$T({)zLL}W2;U;OL1WT0$ zxM3kvHOG!6dV-jhg1_F-whJOvfG^+HXzPBb8#+UyHYG8NY{Qr%-ZXx1{VG~=0N_S= zoRvS$ADM z=8@)cr81A+|LWBFRFBY-0}A{c;1P=iL`3851xh4Ku|fz&Rljr1SsAY%0JKh2`nH-= z0J)k31Xv9^0Py)#Aqw0SCma!2I=C361$~&FsbO^dn%7X8)=ME=DD+|V&>%?Qy>pi_ zQ?18a5`%0=9KdZuOEI`)025QQICXXmVu}k2jpDG$J<;|bm^tb#mlIxfbi(gj2w;maoXwi^4!&Y}AtdJAbO z*y^h!)&|Q3q(MReh?b+SzQtgbv`{2z|;RfmX}?dDC&mf^Sd& zpug1j1`kf1^XP|qhZr_R5BX2a0XK`M27aB9&2 z6Fm9O`O!0Ndueq7 literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/Actions/File.png b/SandboxiePlus/SandMan/Resources/Actions/File.png new file mode 100644 index 0000000000000000000000000000000000000000..0eb04deed1c9efb92681d85a69319e8ec7fd567b GIT binary patch literal 463 zcmeAS@N?(olHy`uVBq!ia0vp^Mj*_=1|;R|J2nC-wj^(N7l!{JxM1({$qWpPEuJop zAsLNtXYTi6b`)r@FYXlF+7Za%$Re+_AZclmhgL0{ZY}G^FM?}Cly3ZBb7R$gu}{zXqr6u8oKm=qfm)ZV;Wm$EPIp+udr{PyE=I2j)pC3+kno@dTL-j zcfClCYnMxa_%%*Nh6JazGHL1GwA9Uv*79kzI{41q{<`2~TaU2df@Yt6MLCn6yR}Gr z&-SrAGvmaL+fma}@8s!r8~M2~Wy!?bpFH#KzTCGdnU!vW&XbkjGRdaI>95`ym$K;F z@i%@+dYvZPjMtM=n3!lyt0R$(fsn z^Q1*T^5R9kcEX$i|DRg+RC~YoIGG@#JR@+*l}@{vVZk>fYaN6ft{r=yDcIuA#Ko-n h=AWm%Yv4cj`#rY`dCujyxBz2_!PC{xWt~$(698m-z0Lpt literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/Actions/ImmidiateRecovery.png b/SandboxiePlus/SandMan/Resources/Actions/ImmidiateRecovery.png new file mode 100644 index 0000000000000000000000000000000000000000..d909dadf6b7bb3318678819fb252f55a06e0890a GIT binary patch literal 857 zcmV-f1E&0mP){OADn`3Q`p>UWDj@M2zvEgf9!+ z)T90bCdLRc;7JcAo;+aC7^4Rd97Iio1fz)|97qI-l2}cpqErePpxxcq10QZ_%TDc* zS#+PI-R~VPI=Ab06c4X2=K;0W!#Rho9$DPmBmHZ&G9?;!XL;h#Oia z%ZMFXCdvpAk=XL|wUNxhd!L`?RMX@>a^c?LNfpQ-Gdn)hnv0CX{B9cKKNN&q>~AQ$Y*bT-2$LCnbpgI$LKRP#u#4SnY!Rzri&za?#A?_g zR>Kyt8vl%lkVRwSOA^Uw5+KsGX5J@NJKk_VHk4jP(}h#N5E11^66&mqY@JWpXA}Ss zNRQFM5E3Hdu609=DVTl}g{Ej&-$By7s|j^FIhPEl9cKVRrPA_}Tdv~b0WrTvoD7Z% zC%iR2O!Y;UyT<a`XGvSda@l3!zrD`+P`3_ zSW1L3pu9N**^@RaENY~kde>eP%a$u-9@z-l?SQLV#?g5-fDdyR5Fhe)+YU%qbIGyPT`M29ga`o%qnNEAGQt$PVH9M!c?1ARLzGEu j7(i#_LGzPrv$>w%sVe~%5qYo300000NkvXXu0mjf#A$sc literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/Actions/List.png b/SandboxiePlus/SandMan/Resources/Actions/List.png new file mode 100644 index 0000000000000000000000000000000000000000..6d2df0854553a63b4816550d04132350f6ed6afb GIT binary patch literal 1009 zcmV(>U(urRrW15ahI$<*Nj*Ce$ z^S+>M$S?!%x0yTlynEmO&wKBldk+Kz1Ox;GJUHUjd0;xzk1~WvC(2AH8oBV}!H*Xj zE$)7B89DGnW(1KB9o=~&GI+i3)b$4Gx^HYo_D`P~7W5JdOMlN%TDeQSyNhW2A%NNV zn(muQWmcV&JU=uMT?%)6VkwW=BgXc#fx2()z}VY$e=WtbjCFY~dvvmXMA+_1PXa9d zp5yk-TL2Vtf6+Ve5}{aI&vJxUfp46*T?)4yQaB~DA#y{guIsIdcAKypQfEwbeNe66 zs5uDi_p=Vr3s79RQ=7O_VYRSSZHw9CGyxzQiq=Hd-E_+)?ALA1uM%}?a2m-0baXyi zyC57UmWZzlwr+VDQIS%^OjKhfrw040C3;>}(vLjdL#RDUX{AWKyNgh)4IsB;jqkjS z#LFw+7b5Mau|nOzJ$@5f*EaPpj%&PCZ$i~lxa8E}UbUt(XF)!4bmuMf*p2?oPhLiv z0ner5#cOB!FxGJ(iI^D^4qt5cJQ5JFP57qQBVYa3DdA#bak=Y{pWl_WMv8h6Tt?Dk z^Lr~Q=YYfO@q)nTJEO@@FAqzl;R^2&TOLV&oqxPi;TqWXObLb4w@dlmzr?l#PX@T*gUZOA}2-yIQt0p|e;5dCuU^{)55i~#I;`)bT8 zt+e~aw@zZSH9J1A=#09a)63cUXGG+jRF_`^6jT{Wwk1Dn=H=HnAs(G5?9|m_VxhSE z&sIo?0Rh{D=Qr}o_Eh__B;|0 f5D*X$uoeCX9cW*!y|WoP00000NkvXXu0mjf-J05O literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/Actions/Miscellaneous.png b/SandboxiePlus/SandMan/Resources/Actions/Miscellaneous.png new file mode 100644 index 0000000000000000000000000000000000000000..d45eabcc0a3ae6df56b2f8cce1532b71806d490e GIT binary patch literal 2092 zcmV+{2-Ek8P){^gj39k52tNd%uLtqnC;Wm0vY`X_bkk1_h&wM?97562>NMN*i0 z2D>B z;PKQY?Dhi_)6>>t|5zM+i~M+hVdrjI~rb zj$vzpsWscwv3-bkVX8LR6|^e*^|Xgpj5>!ZwbGj&J#x1wxz%8RCK6)-&dDAN}sBBp_m|2Bv0}108ub*x_G!;<2-!%fnUT5 z8a`zQ#B#0|&AX^f6gdB{HJKKmBEiNyzF>fb`I6hHc#OQUyegfw zMLP4tH0cDJudndNr)63pExF?WwT0rO_jbpW>0JF%q#Tqq1M!?&Md&@>fwi6kM}B@` zLMy`Xgu{>CY4=P^gR8}qfVjKo3U%U74^q6gFcpB`o)~N7?+3ObDu`FONbs~8*#7?a zZsnVAbz;lvR!S?PNKEv=}TL>Uhc$g?P zaq#)w4E}d%P(?}8hJY-i8@kCj*(ra>BcD#Jr_ zIJ9q@cUrptD)6tUk!Qj)Mbt(SmK1hf?1)5pWz-t_t}cvReIo?|HJRQ%N%29Bi0X!L zchjC#00;|nD*D%Io+|PNsy*H(es35;(uxw1RK|!&@VqIIhSJ0n!+8fmR{{b=kJ^Vqz2%<+zTKPeiyfZXIGc-dVF8V)* WH}^8^`;qYg0000^Y%*ZmX*N|R*#p>3?LqM z*{5&*zJIZEXYBS9A#&_wz7JzeQf|#eN(&A3k<5q~9|1Xu@9`Kjt&$=D3LV=9fG6U1 zkyL5*0;oOv^0|)(r(F(xBX2y86q`s=lf4Z5qhMJ3 zs+GNJHVJ%L@U<&GHAF5Bbp8gMh#Q}t(rOUS5$PVB+#ZztT~Qh^Pg1Gv%GD3{{@vWv z>O+V~cYfkj<3mKkn}=v<{Dfu?tWDd#^p2LwdX9*AGiOoYQ@wak@bg%hW>Tgj-AQ_5EO%j;V;}i zeIxIdQ2b$Czp52?J!o_tF=;B=c-Wt=yRJDh8%uxDY@DbHx^kWG%@k%w|KFli9*t4E zMRCQ4*AaQ2%5;GG_FD_cKCi<+gbOd24@|_34-xtK!#$%tZ~yX0o1fVosRd8UE-`ue zlfBpCCeaKy<@eY3ADsfG63(R|tY6i-UpP2Cx7*Mw<(Cfu<*NcMf66z4Z!aF%cBwW# zHAGCjj&WQol4&c3Y6!0vc(OJ=J*DMERY^Jhk|MGMU>&)7kI<2kRB25B`@ALp?9tcq zKe%3E|Fv*^SFvMj><*G4BHqLp106DP$aQqfEnX+}M85j$%=qzB?>r_nVAu|qPbs@` zKj5@QL2CZh?HidpkMv^sSM6Jr$_NV3!B!0h~`RsTNvTKll&C79_7zBsWh00000eXFU{lOK|)O2oZFN^46Ppn%J z2^vvb$1eoWbV4muvdrnIp_30pK&smRn(fnTa?M?L9moKvZ9BKh_MdvT1_2?p<-Zt? z$9+m7rz2e{cxLLDfk@hOqA}9#^=&zPWGir927ul5Jx&H;iKGK0;R^ar0iaZS&aV2N z02u)7`zngI8a5Q^P+i3LV7aJY_8{Nyum+Uc8o2fx;hRmv!IdT z5%7JO{|X#F5=Tga4r?7oScR5>U{Pk z&buF2wxoMkT4qiGWz|94&0BCczGqb_>2@~W+w z?>J{bUxe2m@~9QZ|eC=p3l3G9s)4mlHE$ zI#9Sgjvj;O7b49q27~|#J##9$dsiFc*fBEm7b4BgF+ix3yYFsvkM0%($4^l4+{?(Z zret76@McX#&NFrhF=j*xKoZr#fRYy$!@+~rUZBU1MurTGbqyWorB`A90c$Vt#*Dzf zVvr3XLdBw`uyC$F2S2L&V~TobsJHiZ;AZ~$B{l4;oos{s!jx8%}CxrxaMTbH?V$Va@hfN z>5QH`9f^|8+%LY{jQU;9 z7?nsN$nX2%r6pk^8I>dB2FYF1!GhqxA>0@0z}E?T;%4w3o{gMQWBH;E{e?S!5%_)# zAV9_qAUby{0#PJK5=q|N0`p&krlvUWqnmr~L@wxML$u^@pI-=#e-|7lz@K(I`oi;V zXL32*c`rgkW4Kiq`^B`$NWVVm5QJqzv;k!1NVG33S&r22O#+A@H(rkn8)_#v;M6UH zUv?vAX-4peU4wta&{SvK#Vb%dcjcoR6&o3L4KgZyqclXa zQU+;jQU+;jQU+;jQU+;jQZk4VW&O*el->7lCCygan8l>@BZ|_i1gEz`g1;gVUpXu- zRsW>+wJg&PJsgw^ASe&~m8Z*oS;|tDva~Jv2LfzxG}=t)1poj507*qoM6N<$g0R-| A00000 literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/Actions/Pass.png b/SandboxiePlus/SandMan/Resources/Actions/Pass.png new file mode 100644 index 0000000000000000000000000000000000000000..e2eafa0f2c88e047c4553c06c48dc9ce0d338403 GIT binary patch literal 1444 zcmV;V1zY-wP)5Y%} zgbssI;Q2jz69e$dgkv{eEINHg;ip?tDcH#%K)ZgGB7@M-HCz zEBP525ii4lHfEsQGZPvE<)Y&qh^WHq)k{)7XV?w-~256EP3a`-vMH-qPd~2vTb9mHVKOwDSoSnwnTHZwJK4x zs-x|fR_+35=BU#xhoPL@mxD!WX`6toI-*r;!RIZ732Vey6p6KJtp=*GY^_?Wg;2Gk zJ+N1;RVj9R*sInGAeYOL&1Nf(F~(S>w_O{*0@3h&pUc-%OzVHxp6H^Xp<&KWUNCEK zH!>my9l5ht3*Yw{8Xsn0>>CEgPI6}KH!_(_dHcp#=}jb&IaAsXtpMNm`E@+WTj|qG z1R1gf4Bq&TKc-Ry!O{BnoQSrQ#f3`vmQYw$cSK_G%feTE*S9 zGKpWVUgY^RN7!@rW0L7>^T>oGlDzrXDaM1DypM)%6=!h$lWcD5z;(+fhbcI*Tq02j zf`H5E5nlb_b0)JhT$)bt%K2j?)7Qvmvqchbq)ss&WWa=tV7D7*u>C1Ew{56QqE-CU~h z#u|%%zcig<-}lFOedGiaIukC2fo?a>kqysSkpS{_V&O;R2py(ErKr@`*VEUtZ5|or zI83f{n8^9X|Lt<(e9-x&)UD|(ymDH+ZYpMB6)9>A zGZ%jZ2w!4Gz$PNU0R6L9FOd3rkvGH@E+?wFEnE!R$j?z@B8fC*r;bj=TH1kK6vUy7 yb46V-W{GWPDNNW{eCsvO9<9-ocW?*)Tl@=L-8}l|&vTss0000?m>3BUq$Z{WDo~413N71qyF0rx_xP}F zrKG^@&X}!{e=^x*_MZQo-<~sf?%ai2x}{tCUr2%sTCEyu{EIimunr{=_M(@M4RjxQ zYVHeReXdp@kWJ_HWl=te>Y`^pKS`oFx&P?4JG-LtG(iRlERX7f04R+0W;$2wKKor% zmVrR90mlWD0H`q5o9TS?ld}h+@QgIUpb}&XX7p6%$tYl|0s=F@>^}Q_7{BU(Xz61b zOmAjg7?|p{R>UyXZLJ7lssdu9^!U0F%*s7|`^xf+ILAP$Sy($AUYSqJRqG4|)Yq<#gG28eTGO)qW}a065l3iT-WqJMGC#<$s@?2S zD^x|S^%)%;0@ZL?h)_SL1!J6wEkc2u?>WWsZzEYM@$km=%wM*&;`mS?sk%DS&5e;% zBw1S<$|4j<>*57;y!dRW1fo*tS*z$4Dz1naA(jaJ!U==~894a|$G+NIxq-l{t($3C zI4?{Zz^&=Gq&x1toAs~0^xtnSfOs;RM8YZ*$mPC%y7wQ7WcqFITtn;P1puh;;}=}i zDxBTlk8!c`He=&Z1|>U{>NZ;%KiP_*NYFd zul4jf-Hq`4wdbQ+qNpl$Ee(*%(&>H1w!|)K$^PT30P3Og9-jY}JT#Dv6r|$Bt;Nsh zP~QVJ{{(hm>=*Lj;Dty)MlKH0bNCmu z%!;U+10ul&hEfud?@LeMI`>H=Ub7zI0VR3c$2wrU_g&IAN#g&=CA)YhtAbv7T2 z!zF(Xh~fxfEAw$CE27$86%Z4PaZVQlO3X18S0ombiPo|wtF!m(#Q52CfmKooQ`(@j zQUR?V) zs>cmVOQSyRMP)0?k0EvhpP=&-#5>3GHA~+0C*hY7cAKJmX z-P=BQTXl*3C2e}|bIx=A|9gAx%L4@p6!>2t|FwYb1a|#iV)=$u*~zQ%LrWfPHO(_J zGX7wANbw+9D9Ut2Dg?c#!r``d{rs01;p@GZoyp8SSMOGa*ZeWzd@I_T!9G@26=TUPH0=ur$|{b=SI3k_}m6WHQ?osc9mHL zt+Z@^^SrNro$}4ojSXZ5C;lyi^cL#n*3KeMXfaN`1x$Zl>pLiq@?=YbS@sLE>I&0P)iDmY*E! zyJb`z+5D;~ADUJWc;)!iO&`0Bha#~BKt(jP<^x0&y7x%u*>`GoMUbEA@XvC)uechS z(EQF||KJ;^fzbv&&fiLujXO1GeZn9%1Cy(kKvolw<*#*W&iaI^E&-A`v?LK-+#3@B zhn9@^yCZ4O7C7!SZejwm_6WqMh4-n&eBgph$azGcIq^hzznN@jQf9P=8B-JK*xaOU zj@FAR`lKkMRk&a&huafnU-b4&IFZ+9t$&+&?`d)S@Rq9b(()5uJ}>QgD-?<}jLqBR zeW;POM>0^A+Q{}sg)_C0?TuX@HTsiKBo$Q7o!uGspRw*-CM zZN$jP#nm$_KsI&T{nn+GvyCs0PKab(!F0-SjW;qoW=xs>C(!%f&Q1}ovcPQ9Pp{7J8-|ciG}XarIY;qFU=cSjdW{pH~OdX`-rO% zmj-vE&yC+#T#Yz3xElkY@g0q1Yj8Ju)A*`%c!>vfjdwJnmR*DQr6Lh@oyU|OtLi!8 zkGhSxJ)(R9`0-{&1^v{EtQ*N|kuu+45GLbzP_^^h7C6@0))w_Le}Mu83JhHS0o(4^ UH7dqM(f|Me07*qoM6N<$f`sXSssI20 literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/Actions/QuickRecovery.png b/SandboxiePlus/SandMan/Resources/Actions/QuickRecovery.png new file mode 100644 index 0000000000000000000000000000000000000000..fe5d7414d15979be1dd6fb3ff0798cf7ff74b975 GIT binary patch literal 1487 zcmV;=1u*)FP)xBRaxa|XLmTf-z zRk2Kl0>OsN7g7p96mI*#nrq)ay1f`Si(0_2Qm6vV;GYAlivd#-5Eun!^U-g{Vy`qH z5*$Xrv=7`e7MRj?ts=vewrdp;rX(O*1=H6*!Cd$5u`mCX%_5gEl%~v^Iuc+MnD}pJ z8~zPUr1-@=zh*A4#;J&qIh`t`34#oZGXxML4L9%Xf4*f^)u!{=ED4Bm6qSoF2$xx? z4U?^8gT2_A1es`>1es`>1es`>1es_m$;^IUi6F)xA`o(cWWs=mwb*nDlg%KWhgb_@ zQA$U{JYRYc5&UEVlS-0Jy7ZnoMgQO#(tZ}t8U(#M`u6)S`Y5QO}WDh zdoGN%U`%kd2CUSf%(v0^K3Y~%5I^CP864oiuRoBYLn#>EnK237m0yX z0@L1Q9$hlk5M%_4HWK=X=})qSZ(b<~V@^(3&pS1z<+3ENGED ztg*Al7bG`RN1VtoHw&HdH~?2x&j!y69KZ;7EZ})uF)LU?I^nvxg|EW>{&59STB96? z^74wI0wR2SxPz4Ev2y-JTwgN>vYC-EzQ_EsG8!+x41lkXbOe=Bm^A4O2cmPXW6UH9 z9f>frswTJ&!gS)+^2+W#D5Yp#+r-T^b0C>OGHFOAxoXN3zF6BxMKntDp*9W;#Dgd? zKWSRCJzUV(B@ZFIQ4AK7Opxd~$*z`dSUXfdQP1PkyVtU&{!#!AcAw(+zCJFjtYm3j z9ZJE^Jw2>???cWwkzmpc0!fr&Y3Se6GrHLXtQqU?X%S1NuQ&3`-j=$PT}NgOyFtYF zcyh&Z9=~BFGs?>gx6;1PTl@C&)OWjaqtPLVAS(XMU;n`Ep+NoC@>=rD^TzCZRN{tSl&eA*@%fMlH=g@?cx(K!E6TFD|l*-9SYlQRR!I za^EEiv;&ULb)&*JiWO9&dGw)eP~yc0@0pGJwXhO6UPzR}&yrxL6fhLl=e(IKR+{n< z01hRVZQ0Q+t5orIDD9RFz^YlB`jg;vmYLTtHzN#v_Id$p zq7fqz7e#5eQ~+%>0ssW;>1?rU5qub}3_#HlMF;>Xs2~!{D7bXGC0jR!|mzucUVi1SIfb8Y8ZC4 zf&|6urho9_w9l{jNT3!Ua^<1R1;G1A{Au{gvFT7-W{I?h42e<`}z^AmL>pNo9k$AIW+~M zt+NKla4R4|jzi>b!H|$QV~7deH>R_5+dhWk^{C@8Qt{GlG_h;v=k#Xgg!J$MNlBZ! zoc_L9OMA;Hr0Suyvl@rUOy&}7U4JmDSSiTaKzh#d84ozn zj5HNLO`K)c6}$UR=%DH_8KM_}vgAtza8sq!jJg^ymu27_8l6Q(oKKq%h%R13s!1Pq$aFN8 zkq}wW2O9=0E(R^`unp6)4Hz?nUx={`*DNv;eKLGNdhQJ281(;0F&()bqai_h?hfIw zhM(bbD4{{-E=gnXz8k^JpIjt@v=9&z88(Xx8AfdsNQ{{VpLQP*LrNTm6yKXEk}@R6 zVMvZ_#$&S~Y5?V74HybiX~Tf g#S~LaG5vq^5AXLjnq5w8=Kufz07*qoM6N<$f}&liVE_OC literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/Actions/Security.png b/SandboxiePlus/SandMan/Resources/Actions/Security.png new file mode 100644 index 0000000000000000000000000000000000000000..e4d9bd2fbb598cd82c7c6b88d076066b69fd1877 GIT binary patch literal 1565 zcmV+&2IBdNP)LPUBK*T^u|&|O8L5B0@} zQtD$x1k#7f!lJT-prH3aq7S`6A0mi^@TJutsKgBwDNDq_T3g+9UuI`_=l=UJv$N0Z z%rm>=w>>aB_ul88bN>Hx&$;(`o>`ccS(%k;Vwc0Hj$gABXAdE}8Mv-A=*}WLL55H5 zw%$J*?X#goboAhzMp4;W7QwPnrCw?fsXuj`6Bh>Iv;B+t?w3X6#|-BjP1y-H-_gsq4Sg)gf#(JF>hhJENIek= z0T~x7 zf{6(@aw^B6<5!hQsFFgH?E^h+{QP?p6Gi##`0dv4B@Lw~0{s<(;d+s;5du;ebNqC& z73W-lNci*P@%fC8`|ZjX6hd}GzDoCB5lN^KoeqHaH>&LU0tSXN6~IY^`iDH6o8F-+ zhIN7ZS^RIc-Xxz4$G2@!nu?PX@T;(H)#cktcBE?>XfX|m_>WPCKpIUQ@2SJMD zFjKi6@LkT~Y(}iTr4QsH;46A^bgdX5>k&#F1$`yei_0EPO~l&!&mevagRc-s$l^pm0p%xi+J>w0iNEv|9xOHO$=1p1O%x$G}C2J=LP0yyus?;j{{qjs@@c<+CftN4DnD zg}R9Vcyccx`jVnw3rLuVobNqCASgBK<)Y`jSF2*JcG1>cx?rZ4(&q4F(+pag1e&T5 z!_m^D(%X(2(GUAF#}4Zn?3*?b0PecEM~s z?;|?ca=&Ds15H72zD~Lo8#A+Q)|LNqx>#oZL(jhEwKDHZV96vZ|JT&Sn88x_oEZ;T z*J$Jodp%NDvB!yZj&@ttyB)Nz`ZGn$Ze{AWqPJ?MB%lFA0Br5hd9(Z`!ET^fA&|V) z7A1CBrqF4dM$R<^LnDm%Mc=pFB~KqCmM7H9U*_x)+cfi4@JmBh#4olX|C5c3u9D+5 zP{DUr6ol=vT;bM6lYq%< z=^Io&ks&}UUqrOlAPLK|U|BiH?|O}hWZn}70o=|_G`gGUEiQt~kHhn7#xZI)Q!9^Z zkpk&<@#<&ip>&Kvt%ghQz600w%;R=7wUAxxBw>dkR2+jO+#rNdvPEK+)VgqCtr@G{ zGo+o`jHaRE`01=CIFbOFq#y~7uFax$Mk41gu6!J#_W=M0O6PW(xv?Zj0Vtqw>Y90A zp&I%8%aylCerSwmL2#5tlq4!ifFvPj8fS=fdPJ0*s_aQ)i-gumYB6VO6{!&sJW@q8 zfXSjM0ti7&$e2+?ekp}%Xst0A1W?LCt>)j?>_|c&fR;(&=cO*9rS{ZYitf@qj-PswL;a~voj}DG~bqV!8!v2u1Ml#;qh(WYp|r zw6JYSOm%e;(6Yv4jPn$d->p>00n2f4?buPcK_5^2_InZ)5)k6g<;TVnyOl;`I{{Fz zeqcW=%YjrQzdCoRD+TxuK7=3Mcnup1KjP5pRX`^Z`1aJB@I2o*-ga!%TraaO3mtW3 zT$uTwltR7HK1CjjldoNta0~a0zkVGo0(d9=0`HiFDlI^%@=KNEa_~aSuXerH>N+bwF zzuC-nmfAH8!XQ;OQi*K#?sPoYebRAfk4hPc;t1V4o7=vL2TV1hwO-#?N8PW(b=(TS zq-20VtRnS*bvu^U*|TR-Rcnqp=9pt| Z;Xh63v0INrFIWHo002ovPDHLkV1mEp65{{> literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/Actions/Users.png b/SandboxiePlus/SandMan/Resources/Actions/Users.png new file mode 100644 index 0000000000000000000000000000000000000000..f60d93f97c11026e2eab89df43cfa731efef332b GIT binary patch literal 1571 zcmV+;2Hg3HP)oD}Ybpb{hi<%}4d%_9n;#r1~JHuahkGgNPpqC|1te-93B6KyG%lordWCd>}v$8RKkBfq+fJrB5WR+Mxx8oH z=k7Qv2l9o8r_uf}x?X~OP7!p5G zd0&1Igu?s~MpNON#*j95U*E$N9;Z@*AgFTuZ0poUh%n#$#euYMEvq#(bqZ$+MQ=!S zOwWxkSLK`%v-kFH0Qjaq1a8oYHJ)p)|0|4?@F2~*N@^uDZ%u=jmJ-=ZRt1wouqb(+t&-Sb;mS)o9x+jl$)FNPuG0Pq=z zQm^Q=G2@Up`92b3^T4*&tO78cmRI?$YTvm^$Sp#a3W#I_h|r1XB?2 z%-cfzO|VPE?EJlH+#kaZQuEyQ4uGwpL|gnIGFbm~Q(vT_d^+g%qW3@n_rRDpPBe`_ z8;lS)Uy$mS?UQ5-djLd2iO%6SVZm&Sn>RCiDbeCh^cs=o6U)XQ3t#{cutrKsb)}FI zA>+GUSenloajz#KaqDbPqSU6{(qT-s#D&QY^}xJ?eGNr}fS6yXXtDU+xpK|*&d3m* znKl6nML8AUE;=+&TNDVPQwtSs8#y`-oWVi6XwRsmK~Z-ns_zs9B7%xSMJHP_CYeK{ zj-P1jpi}Y6yn~l23kHE|QKH4-7bF^r48KIHaE4@g;UGndwsits>mi3|OCbP2HD{T)1=80ss&sDqBL+s z+;3u2Qf4a3>uAha04S-b7>dlD-%VgJqg+|mhajWeMnQI+onH5epVm6wv3>vm002ovPDHLkV1nn~+a&-1 literal 0 HcmV?d00001 diff --git a/SandboxiePlus/SandMan/Resources/SandMan.qrc b/SandboxiePlus/SandMan/Resources/SandMan.qrc index 10393b93..b984fd44 100644 --- a/SandboxiePlus/SandMan/Resources/SandMan.qrc +++ b/SandboxiePlus/SandMan/Resources/SandMan.qrc @@ -78,6 +78,25 @@ Actions/Update.png Actions/Install.png Actions/Cert.png + Actions/File.png + Actions/Security.png + Actions/NoAccess.png + Actions/Entry.png + Actions/Pass.png + Actions/Fail.png + Actions/List.png + Actions/Network.png + Actions/Policy.png + Actions/Rules.png + Actions/ImmidiateRecovery.png + Actions/QuickRecovery.png + Actions/Accessibility.png + Actions/Miscellaneous.png + Actions/Fence.png + Actions/Trigger.png + Actions/Anon.png + Actions/Users.png + Actions/Bug.png Boxes/sandbox-b-empty.png diff --git a/SandboxiePlus/SandMan/Windows/OptionsWindow.cpp b/SandboxiePlus/SandMan/Windows/OptionsWindow.cpp index 66a741c7..b904d60c 100644 --- a/SandboxiePlus/SandMan/Windows/OptionsWindow.cpp +++ b/SandboxiePlus/SandMan/Windows/OptionsWindow.cpp @@ -26,6 +26,10 @@ public: //QTreeWidgetItem *itemFromIndex(const QModelIndex &index) const; }; + +////////////////////////////////////////////////////////////////////////// +// ProgramsDelegate + class ProgramsDelegate : public QStyledItemDelegate { public: ProgramsDelegate(COptionsWindow* pOptions, QTreeWidget* pTree, int Column, QObject* parent = 0) : QStyledItemDelegate(parent) { m_pOptions = pOptions; m_pTree = pTree; m_Column = Column; } @@ -141,10 +145,11 @@ COptionsWindow::COptionsWindow(const QSharedPointer& pBox, const QStri this->setWindowFlag(Qt::WindowStaysOnTopHint, bAlwaysOnTop); ui.setupUi(this); - this->setWindowTitle(tr("Sandboxie Plus - '%1' Options").arg(Name)); + this->setWindowTitle(tr("Sandboxie Plus - '%1' Options").arg(QString(Name).replace("_", " "))); ui.tabs->setTabPosition(QTabWidget::West); ui.tabs->tabBar()->setStyle(new CustomTabStyle(ui.tabs->tabBar()->style())); + ui.tabs->tabBar()->setProperty("isSidebar", true); //this->setMinimumHeight(490); @@ -350,6 +355,30 @@ COptionsWindow::COptionsWindow(const QSharedPointer& pBox, const QStri if (iOptionTree == 2) iOptionTree = iViewMode == 2 ? 1 : 0; + ui.tabsGeneral->setTabIcon(0, CSandMan::GetIcon("Box")); + ui.tabsGeneral->setTabIcon(1, CSandMan::GetIcon("File")); + ui.tabsGeneral->setTabIcon(2, CSandMan::GetIcon("Security")); + ui.tabsGeneral->setTabIcon(3, CSandMan::GetIcon("NoAccess")); + ui.tabsGeneral->setTabIcon(4, CSandMan::GetIcon("Run")); + + ui.tabsInternet->setTabIcon(0, CSandMan::GetIcon("List")); + ui.tabsInternet->setTabIcon(1, CSandMan::GetIcon("Network")); + + ui.tabsAccess->setTabIcon(0, CSandMan::GetIcon("Rules")); + ui.tabsAccess->setTabIcon(1, CSandMan::GetIcon("Policy")); + + ui.tabsAdvanced->setTabIcon(0, CSandMan::GetIcon("Miscellaneous")); + ui.tabsAdvanced->setTabIcon(1, CSandMan::GetIcon("Fence")); + ui.tabsAdvanced->setTabIcon(2, CSandMan::GetIcon("Trigger")); + ui.tabsAdvanced->setTabIcon(3, CSandMan::GetIcon("Anon")); + ui.tabsAdvanced->setTabIcon(4, CSandMan::GetIcon("Users")); + ui.tabsAdvanced->setTabIcon(5, CSandMan::GetIcon("SetLogging")); + ui.tabsAdvanced->setTabIcon(6, CSandMan::GetIcon("Bug")); + + ui.tabsTemplates->setTabIcon(0, CSandMan::GetIcon("Compatibility")); + ui.tabsTemplates->setTabIcon(1, CSandMan::GetIcon("Explore")); + ui.tabsTemplates->setTabIcon(2, CSandMan::GetIcon("Accessibility")); + if (iOptionTree) OnSetTree(); else { diff --git a/SandboxiePlus/SandMan/Windows/SettingsWindow.cpp b/SandboxiePlus/SandMan/Windows/SettingsWindow.cpp index 8f37a34f..c8fb5fe2 100644 --- a/SandboxiePlus/SandMan/Windows/SettingsWindow.cpp +++ b/SandboxiePlus/SandMan/Windows/SettingsWindow.cpp @@ -12,7 +12,7 @@ QSize CustomTabStyle::sizeFromContents(ContentsType type, const QStyleOption* option, const QSize& size, const QWidget* widget) const { QSize s = QProxyStyle::sizeFromContents(type, option, size, widget); - if (type == QStyle::CT_TabBarTab) { + if (type == QStyle::CT_TabBarTab && widget->property("isSidebar").toBool()) { s.transpose(); if(theGUI->m_FusionTheme) s.setHeight(s.height() * 13 / 10); @@ -24,7 +24,7 @@ QSize CustomTabStyle::sizeFromContents(ContentsType type, const QStyleOption* op } void CustomTabStyle::drawControl(ControlElement element, const QStyleOption* option, QPainter* painter, const QWidget* widget) const { - if (element == CE_TabBarTabLabel) { + if (element == CE_TabBarTabLabel && widget->property("isSidebar").toBool()) { if (const QStyleOptionTab* tab = qstyleoption_cast(option)) { QStyleOptionTab opt(*tab); opt.shape = QTabBar::RoundedNorth; @@ -114,6 +114,7 @@ CSettingsWindow::CSettingsWindow(QWidget* parent) ui.tabs->setTabPosition(QTabWidget::West); ui.tabs->tabBar()->setStyle(new CustomTabStyle(ui.tabs->tabBar()->style())); + ui.tabs->tabBar()->setProperty("isSidebar", true); ui.tabs->setTabIcon(eOptions, CSandMan::GetIcon("Options")); ui.tabs->setTabIcon(eShell, CSandMan::GetIcon("Shell"));