From 9e62d9f50a1146b72637d1e1dc1173382fd778ab Mon Sep 17 00:00:00 2001 From: Ana Maria Martinez Gomez Date: Tue, 7 May 2024 15:13:45 +0200 Subject: [PATCH] [7zip] Keep full paths in right click shortcut Swap `e` by `x` in the command used by the right click shortcut `unzip "infected"` to keep full paths when unzipping nested directories. --- packages/7zip-15-05.vm/7zip-15-05.vm.nuspec | 2 +- packages/7zip-15-05.vm/tools/chocolateyinstall.ps1 | 2 +- packages/7zip-nsis.vm/7zip-nsis.vm.nuspec | 2 +- packages/7zip-nsis.vm/tools/chocolateyinstall.ps1 | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/packages/7zip-15-05.vm/7zip-15-05.vm.nuspec b/packages/7zip-15-05.vm/7zip-15-05.vm.nuspec index f66001c18..96d7e6b34 100644 --- a/packages/7zip-15-05.vm/7zip-15-05.vm.nuspec +++ b/packages/7zip-15-05.vm/7zip-15-05.vm.nuspec @@ -2,7 +2,7 @@ 7zip-15-05.vm - 15.05.0.20240425 + 15.05.0.20240507 Igor Pavlov 7-Zip file archiver. This version is able to extract NSIS scripts. diff --git a/packages/7zip-15-05.vm/tools/chocolateyinstall.ps1 b/packages/7zip-15-05.vm/tools/chocolateyinstall.ps1 index a06c70688..4ab830fea 100644 --- a/packages/7zip-15-05.vm/tools/chocolateyinstall.ps1 +++ b/packages/7zip-15-05.vm/tools/chocolateyinstall.ps1 @@ -34,7 +34,7 @@ try { # 7z can unzip other file extensions like .docx but these don't likely use the infected password. $extensions = @(".7z", ".bzip2", ".gzip", ".tar", ".wim", ".xz", ".txz", ".zip", ".rar") foreach ($extension in $extensions) { - VM-Add-To-Right-Click-Menu $toolName 'unzip "infected"' "`"$7zExecutablePath`" e -pinfected `"%1`"" "$executablePath" -extension $extension + VM-Add-To-Right-Click-Menu $toolName 'unzip "infected"' "`"$7zExecutablePath`" x -pinfected `"%1`"" "$executablePath" -extension $extension VM-Set-Open-With-Association $executablePath $extension } } catch { diff --git a/packages/7zip-nsis.vm/7zip-nsis.vm.nuspec b/packages/7zip-nsis.vm/7zip-nsis.vm.nuspec index bdce9c088..3d2cd0c0f 100644 --- a/packages/7zip-nsis.vm/7zip-nsis.vm.nuspec +++ b/packages/7zip-nsis.vm/7zip-nsis.vm.nuspec @@ -2,7 +2,7 @@ 7zip-nsis.vm - 23.01.0.20240425 + 23.01.0.20240507 myfreeer 7-zip build with nsis script decompiling diff --git a/packages/7zip-nsis.vm/tools/chocolateyinstall.ps1 b/packages/7zip-nsis.vm/tools/chocolateyinstall.ps1 index 7a046e6d2..af7fe198e 100644 --- a/packages/7zip-nsis.vm/tools/chocolateyinstall.ps1 +++ b/packages/7zip-nsis.vm/tools/chocolateyinstall.ps1 @@ -34,7 +34,7 @@ try { # 7z can unzip other file extensions like .docx but these don't likely use the infected password. $extensions = @(".7z", ".bzip2", ".gzip", ".tar", ".wim", ".xz", ".txz", ".zip", ".rar") foreach ($extension in $extensions) { - VM-Add-To-Right-Click-Menu $toolName 'unzip "infected"' "`"$7zExecutablePath`" e -pinfected `"%1`"" "$executablePath" -extension $extension + VM-Add-To-Right-Click-Menu $toolName 'unzip "infected"' "`"$7zExecutablePath`" x -pinfected `"%1`"" "$executablePath" -extension $extension VM-Set-Open-With-Association $executablePath $extension } } catch {