Spelling fixes
This commit is contained in:
parent
98299fcfc8
commit
b1d0e1b637
|
@ -38,7 +38,7 @@ jobs:
|
|||
wget -q https://raw.githubusercontent.com/codespell-project/codespell/master/codespell_lib/data/dictionary.txt
|
||||
wget -q https://raw.githubusercontent.com/codespell-project/codespell/master/codespell_lib/data/dictionary_rare.txt
|
||||
wget -q https://raw.githubusercontent.com/codespell-project/codespell/master/codespell_lib/data/dictionary_code.txt
|
||||
# Add further typos to check
|
||||
# Add further typos to check continuously
|
||||
echo 'behavioure->behaviour' >> dictionary.txt
|
||||
echo 'blockign->blocking' >> dictionary.txt
|
||||
echo 'ate->are' >> dictionary.txt
|
||||
|
@ -46,6 +46,10 @@ jobs:
|
|||
echo 'actuallly->actually' >> dictionary.txt
|
||||
echo 'asynchroniusly->asynchronously' >> dictionary.txt
|
||||
echo 'seams->seems' >> dictionary.txt
|
||||
echo 'selelction->selection' >> dictionary.txt
|
||||
echo 'injectted->injected' >> dictionary.txt
|
||||
echo 'prepanding->prepending' >> dictionary.txt
|
||||
echo 'probablys->probably' >> dictionary.txt
|
||||
# Only lowercase letters are allowed in --ignore-words-list
|
||||
codespell --dictionary=dictionary.txt --dictionary=dictionary_rare.txt --dictionary=dictionary_code.txt \
|
||||
--ignore-words-list="wil,unknwn,tolen,pevent,doubleclick,parm,parms,etcp,ois,ba,ptd,modell,namesd,stdio,uint,errorstring,ontext,atend,deque,ecounter,nmake,namess,inh,daa,varient" \
|
||||
|
|
|
@ -27,7 +27,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
|
|||
## [1.6.1a / 5.61.1] - 2022-12-07
|
||||
|
||||
### Added
|
||||
- added run boxed command to the sandbox menu
|
||||
- added "Run Sandboxed" command to the sandbox menu
|
||||
- DefaultBox can now be replaced with another sandbox [#2445](https://github.com/sandboxie-plus/Sandboxie/issues/2445)
|
||||
|
||||
### Fixed
|
||||
|
|
|
@ -343,7 +343,7 @@ DWORD64 FindDllExport_impl(P_NtReadVirtualMemory64 ReadDll, HANDLE hProcess, DWO
|
|||
|
||||
DYN_RELOC_TABLE* DynamicValueRelocTable = NULL;
|
||||
|
||||
if (DllBase == 0 && (resolve_ec || resolve_exp)) { // only for images on disk, on linve images we take the actuallly used export directory
|
||||
if (DllBase == 0 && (resolve_ec || resolve_exp)) { // only for images on disk, on live images we take the actually used export directory
|
||||
|
||||
PIMAGE_SECTION_HEADER section = IMAGE_FIRST_SECTION(nt_hdrs);
|
||||
nt_hdrs->FileHeader.NumberOfSections;
|
||||
|
|
|
@ -471,7 +471,7 @@ _FX ULONG SbieDll_MatchPath2(WCHAR path_code, const WCHAR *path, BOOLEAN bCheckO
|
|||
BOOLEAN use_rule_specificity = (path_code == L'f' || path_code == L'k' || path_code == L'i') && (Dll_ProcessFlags & SBIE_FLAG_RULE_SPECIFICITY) != 0;
|
||||
|
||||
//
|
||||
// set default behavioure
|
||||
// set default behaviour
|
||||
//
|
||||
|
||||
level = 3; // 3 - global default - lower is better, 3 is max value
|
||||
|
|
|
@ -219,7 +219,7 @@ _FX HHOOK Gui_SetWindowsHookExW(
|
|||
//
|
||||
// we also don't care if the target thread is in the same process.
|
||||
//
|
||||
// in any other case, the hooker probablys expects their hook dll to
|
||||
// in any other case, the hooker probably expects their hook dll to
|
||||
// be injected into target threads, but this will not occur.
|
||||
//
|
||||
// on Vista and later, UIPI will prevent the dll from loading into
|
||||
|
@ -232,9 +232,9 @@ _FX HHOOK Gui_SetWindowsHookExW(
|
|||
|
||||
//
|
||||
// the boxed "global" hook mechanism should only be used for global hooks
|
||||
// using it for hooks that specify a thread ID like done in sbie 5.33.6
|
||||
// and earlier results in a non standard conform behavioure:
|
||||
// the hook in handled as a global one and injectted into all processes.
|
||||
// using it for hooks that specify a thread ID like done in SBIE 5.33.6
|
||||
// and earlier results in a non standard conform behaviour:
|
||||
// the hook in handled as a global one and injected into all processes.
|
||||
//
|
||||
// so we let the system handle hooks on a specified thread or once without
|
||||
// a dll module handle always as those are not global
|
||||
|
|
|
@ -504,7 +504,7 @@ _FX NTSTATUS Key_GetName(
|
|||
//
|
||||
// Note: some keys like L"\\REGISTRY\\MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Perflib\\007"
|
||||
// do not return valid results when querying using NtQueryKey and returns a STATUS_INVALID_HANDLE
|
||||
// using Obj_GetObjectName seams to break sbie on 1803, strangely on w7 its fine
|
||||
// using Obj_GetObjectName seems to break SBIE on Windows 10 1803, strangely on W7 it is fine
|
||||
// hence this alternative access mode is made optional
|
||||
//
|
||||
|
||||
|
|
|
@ -751,9 +751,9 @@ _FX int WSA_AcceptEx(
|
|||
LPOVERLAPPED lpOverlapped)
|
||||
{
|
||||
//
|
||||
// this call can operate asynchroniusly, hence we can not simply filter here the incoming connection
|
||||
// this call can operate asynchronously, hence we can not simply filter here the incoming connection
|
||||
// as we have a proper WFP filter in the driver for now this usermode filtering implementation
|
||||
// will not filter incoming traffic at all, normally users ate behind NATs or other firewall so
|
||||
// will not filter incoming traffic at all, normally users are behind NATs or other firewall so
|
||||
// blocking only outgoing connections should be good enough
|
||||
//
|
||||
|
||||
|
|
|
@ -1108,7 +1108,7 @@ NTSTATUS Ldr_NtAccessCheckByType(PSECURITY_DESCRIPTOR SecurityDescriptor, PSID P
|
|||
NTSTATUS rc;
|
||||
HANDLE hTokenReal = NULL;
|
||||
|
||||
// todo: is that right? seams wrong
|
||||
// todo: is that right? It seems wrong
|
||||
if (Dll_ImageType == DLL_IMAGE_SANDBOXIE_BITS ||
|
||||
Dll_ImageType == DLL_IMAGE_SANDBOXIE_WUAU ||
|
||||
Dll_ImageType == DLL_IMAGE_WUAUCLT) {
|
||||
|
|
|
@ -2013,7 +2013,7 @@ _FX BOOLEAN Sxs_PreferExternal(THREAD_DATA *TlsData)
|
|||
return FALSE;
|
||||
|
||||
//
|
||||
// KB5014019 breaks edge, it seams making edge start its child processes with
|
||||
// KB5014019 breaks Edge, it seems that making Edge to start its child processes with
|
||||
// PreferExternalManifest fixes the issue, but the main process must be loaded normally
|
||||
// hence we have ExternalManifestHack that checks the parent and not the target
|
||||
//
|
||||
|
|
|
@ -928,11 +928,11 @@ _FX ULONG Process_MatchPathEx(
|
|||
//
|
||||
// If a rule ends with an * it is not exact and will be overruled by an exact rule
|
||||
//
|
||||
// Adding UseRuleSpecificity=n disables this behavioure and reverts to the old classical one
|
||||
// Adding UseRuleSpecificity=n disables this behaviour and reverts to the old classical one
|
||||
//
|
||||
|
||||
//
|
||||
// set default behavioure
|
||||
// set default behaviour
|
||||
//
|
||||
|
||||
level = 3; // 3 - global default - lower is better, 3 is max value
|
||||
|
@ -993,7 +993,7 @@ _FX ULONG Process_MatchPathEx(
|
|||
}
|
||||
|
||||
//
|
||||
// read path list behaves in the kernel like the default normal behavioure
|
||||
// read path list behaves in the kernel like the default normal behaviour
|
||||
// these paths allow read only access to true path and copy locations
|
||||
//
|
||||
|
||||
|
@ -1003,7 +1003,7 @@ _FX ULONG Process_MatchPathEx(
|
|||
}
|
||||
|
||||
//
|
||||
// normal path list restores normal behavioure when used in specific mode
|
||||
// normal path list restores normal behaviour when used in specific mode
|
||||
// these paths allow reading the true location and write to the copy location
|
||||
//
|
||||
|
||||
|
|
|
@ -293,7 +293,7 @@ int ServiceServer::RunServiceAsSystem(const WCHAR* svcname, const WCHAR* boxname
|
|||
if (svcname && _wcsicmp(svcname, L"MSIServer") == 0 && SbieApi_QueryConfBool(boxname, L"MsiInstallerExemptions", FALSE))
|
||||
return 2;
|
||||
|
||||
// legacy behavioure option
|
||||
// legacy behaviour option
|
||||
if (SbieApi_QueryConfBool(boxname, L"RunServicesAsSystem", FALSE))
|
||||
return 1;
|
||||
|
||||
|
|
|
@ -48,7 +48,7 @@ public:
|
|||
}
|
||||
}
|
||||
|
||||
// default behavioure
|
||||
// default behaviour
|
||||
return QSortFilterProxyModel::filterAcceptsRow(source_row, source_parent);
|
||||
}
|
||||
|
||||
|
|
|
@ -49,7 +49,7 @@ COnlineUpdater::COnlineUpdater(QObject *parent) : QObject(parent)
|
|||
int iUpdate = 0;
|
||||
QString UpdateStr = ParseVersionStr(theConf->GetString("Updater/PendingUpdate"), &iUpdate);
|
||||
if (!IsVersionNewer(UpdateStr) && (UpdateStr != GetCurrentVersion() || iUpdate <= GetCurrentUpdate()))
|
||||
theConf->SetValue("Updater/PendingUpdate", ""); // seams update has been applied
|
||||
theConf->SetValue("Updater/PendingUpdate", ""); // it seems update has been applied
|
||||
|
||||
bool bIsInstallerReady = false;
|
||||
QString FilePath = theConf->GetString("Updater/InstallerPath");
|
||||
|
@ -315,7 +315,7 @@ bool COnlineUpdater::HandleUpdate()
|
|||
theConf->SetValue("Updater/PendingUpdate", PendingUpdate);
|
||||
|
||||
//
|
||||
// special case: updates allowed be to installed, but releases only allowed to be download
|
||||
// special case: updates allowed be to installed, but releases only allowed to be downloaded
|
||||
// solution: apply updates silently, then prompt to install new release, else prioritize installing new releases over updating the existing one
|
||||
//
|
||||
|
||||
|
|
|
@ -1410,7 +1410,7 @@ void CSandMan::timerEvent(QTimerEvent* pEvent)
|
|||
|
||||
m_pBoxView->Refresh();
|
||||
|
||||
if(!IsSilentMode()) // dont check for updates when in presentation/game mode
|
||||
if(!IsSilentMode()) // do not check for updates when in presentation/game mode
|
||||
m_pUpdater->Process();
|
||||
|
||||
if (!m_MissingTemplates.isEmpty())
|
||||
|
|
|
@ -874,7 +874,7 @@ void CSbieView::OnGroupAction(QAction* Action)
|
|||
if (Offset == 0)
|
||||
return;
|
||||
|
||||
// todo: fix behavioure on multiple selelction
|
||||
// todo: fix behaviour on multiple selection
|
||||
foreach(const QString& Name, GetSelectedGroups(true)) {
|
||||
bool bFound = false;
|
||||
retry:
|
||||
|
|
|
@ -392,7 +392,7 @@ void COptionsWindow::AddAccessEntry(EAccessType Type, EAccessMode Mode, QString
|
|||
//////////////////////////////////////////////////////////
|
||||
// File and Registry entries auto append a '*' wildcard
|
||||
// when they don't contain any.
|
||||
// Prepanding '|' disables this behavioure
|
||||
// Prepending '|' disables this behaviour
|
||||
//
|
||||
|
||||
QString sPath = Path;
|
||||
|
|
|
@ -44,7 +44,7 @@ void COptionsWindow::CreateNetwork()
|
|||
void COptionsWindow::LoadINetAccess()
|
||||
{
|
||||
m_IsEnabledWFP = m_pBox->GetAPI()->GetGlobalSettings()->GetBool("NetworkEnableWFP", false);
|
||||
// check if we are blockign globaly and if so adapt the behavioure accordingly
|
||||
// check if we are blocking globally and if so adapt the behaviour accordingly
|
||||
m_WFPisBlocking = !m_pBox->GetAPI()->GetGlobalSettings()->GetBool("AllowNetworkAccess", true);
|
||||
|
||||
ui.lblNoWfp->setVisible(!m_IsEnabledWFP); // warn user that this is only user mode
|
||||
|
@ -479,7 +479,7 @@ void COptionsWindow::SaveNetFwRules()
|
|||
QString Prot = pItem->text(4);
|
||||
|
||||
QString Temp = GetFwRuleActionStr(Action);
|
||||
//if (Program.contains("=") || Program.contains(";") || Program.contains(",")) // todo: make sbie parse this proeprly
|
||||
//if (Program.contains("=") || Program.contains(";") || Program.contains(",")) // todo: make SBIE parses this properly
|
||||
// Program = "\'" + Program + "\'";
|
||||
if (Program.isEmpty())
|
||||
Program = "*";
|
||||
|
|
Loading…
Reference in New Issue