Skip to content

Commit

Permalink
Update CHANGELOG.txt up to CL 251531419.
Browse files Browse the repository at this point in the history
  • Loading branch information
sorinj committed Jun 5, 2019
1 parent c12dff5 commit 84d8ce7
Showing 1 changed file with 34 additions and 20 deletions.
54 changes: 34 additions & 20 deletions CHANGELOG.txt
Original file line number Diff line number Diff line change
@@ -1,35 +1,49 @@
## 2019-05-10 @243143383,247089588
## 2019-06-05 @247089589,251531419

### Changes
--------------------------------------------------------------------------------
Fix broken unit test CommandLineTest.ParseCommandLine_Install.
Remove obsolete smartany wrappers.

Also, remove obsolete #pragmas to disable C4640
(construction of local static object is not thread-safe).
--------------------------------------------------------------------------------
App-specific disclaimers for RollbackToTargetVersion policy.
Implement the Omaha Cloud Policies Fetcher.

This change provides a way for apps to inject their own specific disclaimer
text in their RollbackToTargetVersion policy documentation.
New text for Chrome is included.
* The policies are fetched when the UpdateApps (/ua) process runs. UA runs at
5 hour intervals typically.
* The serialized policies are stored locally in separate directories for each
policy_type within the directory "%ProgramFiles(x86)%\Google\Policies".
* Each PolicyFetchResponse is stored into a subdirectory based off the
policy_type, with a fixed file name of "PolicyFetchResponse", where the file
contents are {SerializeToString-PolicyFetchResponse}}.
* Each "PolicyFetchResponse" file is opened in exclusive mode. If we are unable
to open or write to this file, UA will retry at the next UA interval.
* Client applications could use ::FindFirstChangeNotificationW on the
subdirectory corresponding to their respective policy_type to watch for
changes. They can then read and apply the policies within this file.
--------------------------------------------------------------------------------
Switch Omaha continuous build from VS2017 to VS2019.
Perform best-effort registration with the DMServer during UpdateApps processing.

This allows post-install registration to take place in the normal /ua scheduled
task in case:
- The network could not be used during installation on account
of NOGOOGLEUPDATEPING.
- Non-mandatory registration failed during installation.
- An enrollment token was provisioned to the machine via Group Policy
after installation.
--------------------------------------------------------------------------------
Remove precompiled headers support.
Workaround for ICE in service_main.h when building with 16.1.0
--------------------------------------------------------------------------------
Fix various test failures.
- RegKey::HasNativeKey has been removed, and callers have been updated to
use HKEY_LOCAL_MACHINE[64] or HKLM[64] as the name of the root key.
- ParseCommandLine_Install had a blatant typo ('%' instead of '&') which
has been fixed.
- DmClientRequestTest.RegisterWithRequest has been updated to reflect the
late change in the request type.
Cloud policy fetch.
--------------------------------------------------------------------------------
Fix bug 131367413 Eliminate MFC headers.
Enable '/permissive-' as a compiler switch.
--------------------------------------------------------------------------------
Compliance changes for VS2017.
Allow C++17 language features
--------------------------------------------------------------------------------
Rework the fix for bug 130373054 Build the Protocol Buffer Compiler executable
protoc.exe from source.
Remove weak crypto hash algorithms from Omaha client.
This cl removes MD5 support.
--------------------------------------------------------------------------------
Device Registration in Google Update during install.
Produce 3 consecutive versions of some of the Omaha build artifacts.
--------------------------------------------------------------------------------

## 2019-04-11 @239101812,243143382
Expand Down

0 comments on commit 84d8ce7

Please sign in to comment.