Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

pkg/cmd/pr/list/http.go #8

Open
wants to merge 426 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
426 commits
Select commit Hold shift + click to select a range
2ae994b
Update SaveArguments.exe file.
sorinj Sep 24, 2020
9fe61bd
Fix OmahaCustomizationTest*.* for the open source build.
sorinj Sep 25, 2020
64ea375
Refactor proxy detection policies, and expose via IPolicyStatus2.
sorinj Sep 25, 2020
f10078a
Fix NetworkConfigPolicyTest unit tests.
sorinj Sep 28, 2020
9c0fe7b
Update DeveloperSetupGuide.md
sorinj Sep 28, 2020
ab3d202
Search for DLLs only in System32 folder.
Oct 1, 2020
cbef35a
Use LOAD_LIBRARY_SEARCH_SYSTEM32 when loading system dlls
Oct 2, 2020
dd9902e
Use ::LoadLibraryEx instead of ::LoadLibraryEx{A,W}.
sorinj Oct 2, 2020
d3b6a94
Integrate changes in certificate_tag{_test}.go from google3 to google…
sorinj Nov 19, 2020
0d5dff2
Update README to reflect support for MSI files in Omaha's certificate…
sorinj Nov 19, 2020
dee55cd
Integrate changes to Omaha's certificate tagger to the googleclient d…
sorinj Nov 19, 2020
935694a
Integrate print-tag-details in Omaha cert tagger from google3 to goog…
sorinj Nov 19, 2020
c84e1b3
Integrate change to support reading from mini stream for Omaha taggin…
sorinj Nov 19, 2020
de20d3a
Enable Omaha to read tag from the superfluous certificate in the MSI …
sorinj Nov 19, 2020
354ccce
Apply wait before DM registration.
sorinj Nov 19, 2020
7a84e55
Use LOAD_LIBRARY_SEARCH_SYSTEM32 only when available.
sorinj Nov 19, 2020
910c0c8
Make update3web_demo.js available in the open source build.
sorinj Nov 24, 2020
907189e
Change the signing servers in Omaha OSS build.
sorinj Jan 15, 2021
e3d8903
Omaha: Support Windows "High Contrast" modes.
sorinj Jan 16, 2021
4d0e033
Display Progress Text in the Title Bar.
sorinj Jan 16, 2021
4375aa6
Omaha Enterprise: DMPolicyManager fallback not accurate in some cases
sorinj Jan 16, 2021
17d3874
Remove the Helper MSI and MSP from Omaha3.
sorinj Jan 16, 2021
7411d09
Send DM policy validation errors back to DM server.
sorinj Jan 16, 2021
2be1861
Use CreateProcess instead of ShellExecute for background process laun…
sorinj Jan 16, 2021
f17f51a
Use new SimpleRequest for each DM error report.
sorinj Jan 17, 2021
42262d6
Update SaveArguments.exe file.
sorinj Jan 19, 2021
005dca4
base/security: Spelling correction in README
linux4life798 Dec 29, 2020
53b0f81
Fix Chrome standalone installer fails: GoogleUpdateHelper.msi is miss…
sorinj Jan 20, 2021
169a4f1
Fix memory leak when DM network request is not sent.
sorinj Jan 23, 2021
bece74c
Fix crash in omaha::goopdate_utils::StartGoogleUpdateWithArgs at line…
sorinj Jan 23, 2021
b6477e1
Fix flag parsing in certificate_tag_test; add Windows example
roander-msft Mar 5, 2021
2b781c4
Remove binary name; windows can run a non-exe executable just fine
roander-msft Mar 5, 2021
38918b4
Fallback to checking HasGoopdateTaskEverRun if last exit code != TASK…
roander-msft Mar 1, 2021
a6874ed
Cleanup exe after ping test
roander-msft Mar 10, 2021
018ef8c
EXPECT_SUCCEEDED the File::Remove for safety
roander-msft Mar 11, 2021
ca6106b
Fix comment line length to <= 80 chars.
sorinj Mar 18, 2021
ef91287
Validate Omaha policy values before accepting.
sorinj Mar 23, 2021
45c6994
Code refactor for Omaha policy validation:
sorinj Mar 23, 2021
e0e3c13
Add PROGRAMFILESDIR support to Chrome's msi installer.
sorinj Mar 23, 2021
08a3ebb
Fix hidden ProgramFileDirSubstitution property.
sorinj Mar 23, 2021
ad7d568
Remove dead code related to the MSI Helper.
sorinj Mar 24, 2021
fae9f4f
DM: Only update the cached information if the server returns a valid …
sorinj Mar 24, 2021
0db1d40
Rollback of Add PROGRAMFILESDIR support to Chrome's msi installer.
sorinj Mar 24, 2021
e3ae43a
Remove code that uninstalls the Legacy MSI helper.
sorinj Mar 24, 2021
90aac3a
Fix Downgrade to a more stable channel via TargetChannel does not work.
sorinj Mar 24, 2021
0c91b50
Typo error when calculating the aggregated error report status.
sorinj Mar 24, 2021
83918d1
Deploy Enterprise Applications via Omaha
sorinj Mar 25, 2021
7e4e2ab
Update the DM unit tests to account for the new InstallDefaultValue e…
sorinj Apr 1, 2021
1e9e412
Added DM support for deploying Enterprise Applications via Omaha.
sorinj Apr 1, 2021
62934df
Fixed unit test for DM support for deploying Enterprise Applications …
sorinj Apr 1, 2021
35ae40d
Fixed some unit tests to account for DM changes.
sorinj Apr 1, 2021
768cf32
Add a default application name to the apps within the Force Install B…
sorinj Apr 1, 2021
bfe7e00
Single sign test MSIs
roander-msft Apr 8, 2021
82246da
MsiTagExtractorTest: read unittest_support files from direct relative…
roander-msft Apr 8, 2021
e6ab647
Fix Security Arbitrary file read when caching file CallAsSelfAndImper…
sorinj Apr 1, 2021
30f4e74
Better error handling: Do not delete reparse points.
sorinj Apr 1, 2021
8c25006
Enterprise App Deployment: Separate ForceInstall controls for User an…
sorinj Apr 28, 2021
101e4e9
Fix formatting for the Group Policy adm/admx templates.
sorinj Apr 28, 2021
557fa14
Expose Enterprise App Deployment forceInstallApps policies via new in…
sorinj Apr 28, 2021
5284d03
Omaha DM Registration: add serial number in the registration
sorinj Apr 28, 2021
b8f0aa6
Omaha DM Registration: add serial number in the policy fetch
sorinj Apr 29, 2021
2c53d93
Omaha should not use cached policies if DMtoken is removed
sorinj Apr 29, 2021
533fc37
Fix DeviceManagementTest_RollbackToTargetVersion fails.
sorinj Apr 29, 2021
80af318
Delete cached policies when no valid DM token is available.
sorinj Apr 29, 2021
f90fc58
Change the default value of the "Auto-update check period override" p…
sorinj Apr 29, 2021
3f3cc1c
Update SaveArguments.exe file.
sorinj Apr 30, 2021
a6db762
2021 CUP key rotation.
sorinj Apr 30, 2021
510b036
Build a branded test_foo_v1.0.101.0.msi; rip out dead test/build.scons
roander-msft Apr 28, 2021
0d9965c
take change from upstream pull 265
roander-msft Apr 28, 2021
e52004e
Verify registry key/value exists: fixes updater crash in debug mode
mmxw11 May 29, 2021
83a9084
Update GitHub URLs which have moved.
fmarier Jun 8, 2021
2d721e3
remove unused includes in com_register_shell.cc
roander-msft Jun 8, 2021
3c9350a
remove unused libs in ComRegisterShell build target
roander-msft Jun 8, 2021
549ff7b
Update ClientLog.md
GitHubGanesh Jun 16, 2021
3ec84c7
Security: Local Elevation of Privilege vulnerability in Google Update…
sorinj Jun 2, 2021
3b84490
Update the description of Omaha's "Auto-update check period override"…
sorinj Jul 15, 2021
9a1e353
Fix Race condition leads to lack of policy control
sorinj Jul 15, 2021
bc589c2
Fix unit test failures.
sorinj Jul 16, 2021
688ca03
BITS: More logging and fallback faster on error
sorinj Jul 16, 2021
52027cc
Report the current version "pv" for new installs and over-installs.
sorinj Jul 16, 2021
e0e37ac
Remove unneeded assert.
sorinj Jul 16, 2021
d323920
Take 2: Report the current version "pv" for new installs and over-ins…
sorinj Jul 16, 2021
c574492
Fix unit test.
sorinj Jul 16, 2021
4ad20ad
Added signature and validation for the new SHA256 certificate.
sorinj Jul 16, 2021
b9a47da
Update Omaha3Walkthrough.md
timgws Jul 12, 2021
a089134
Fix flaky tests due to group policy preloading.
sorinj Jul 21, 2021
118f894
Disable calling ::EnterCriticalPolicySection/::LeaveCriticalPolicySec…
sorinj Jul 28, 2021
21c9d5e
Revert sending the current version "pv" for over-installs
sorinj Jul 28, 2021
2505807
Switch to the new SHA256 certificate.
sorinj Jul 28, 2021
678dd4d
Update SaveArguments.exe file.
sorinj Jul 29, 2021
3dac438
Update VERSION to 1.3.99.0
sorinj Jul 29, 2021
b40d6e9
C++ compliance changes for VS2019 v16.10.4.
sorinj Aug 4, 2021
076cd4d
Updated VS supported version to 16.10.4
sorinj Aug 4, 2021
38b7cb9
Extend Authenticode signature verification (#296)
mherrmann Aug 9, 2021
cf43413
Fix LNK2019 unresolved external ArenaStringPtr::SetLite.
sorinj Aug 11, 2021
77902cc
Sort base:libprotobuf cc_sources lexically.
sorinj Aug 11, 2021
bbc6cfa
Update DeveloperSetupGuide.md
sorinj Aug 11, 2021
8f70c2c
Update DeveloperSetupGuide.md
sorinj Aug 11, 2021
ebc25b2
Update DeveloperSetupGuide.md
sorinj Aug 11, 2021
32ac63d
Abstract registry key name to REG_KEY_NAME vs short company name
sparist Sep 14, 2021
7bb98f7
Ensure google_update_installer_fragment.wxs uses Win32 registry key
sparist Sep 14, 2021
5c0b00f
Rename REG_KEY_NAME, document, and use in kCrashPipeNamePrefix defini…
sparist Sep 16, 2021
a1cf099
Roll back some accidental company name changes
sparist Sep 17, 2021
d2a3e0b
Fix registry paths in unit test
sparist Sep 18, 2021
edb5000
Fix unquoted registry path
sparist Sep 18, 2021
1a675d4
Update ClientUpdateProtocolEcdsa.md
jpawlicki Sep 20, 2021
c3fc7a7
Factor company name out of google_update_installer_fragment.wxs.xml
sparist Sep 22, 2021
925f7ac
Fix Take Group Policy Critical Section to prevent race conditions
sorinj Sep 22, 2021
acb5ed4
A test tool for interacting with the Update3Web interfaces.
sorinj Sep 22, 2021
b502f5d
[py3] Use range instead of xrange.
sorinj Sep 23, 2021
880b509
Python3 fixes for Omaha builds scripts.
sorinj Sep 23, 2021
ca30555
Deduplicate company names in .wxs files
sparist Sep 23, 2021
8040002
Group PATH_COMPANY_NAME_ANSI declaration with other company names
sparist Sep 23, 2021
be7e62a
Replace hard-coded names with preprocessor defines in C++ code
sparist Sep 23, 2021
0cbb2a8
Factor exe base name duplication out of omaha_version_utils.py
sparist Sep 23, 2021
3f5ced8
Remove lower-case hard-coded main executable names
sparist Sep 23, 2021
03eefd8
Quote paths in case of spaces (#310)
sparist Sep 24, 2021
c6a1ea9
Disable warnings 5245 and 5246 (#312)
sparist Sep 24, 2021
cdfe40b
Make *.Install_NotOverInstall test ignore file order (#322)
sparist Sep 25, 2021
2dc797c
Set default SCONS_DIR to correct path (#315), make omaha/hammer.bat r…
sparist Sep 27, 2021
52281df
ReadEntireFile: allow for either LF or CRLF line endings (#329)
sparist Sep 27, 2021
3320994
Disable Google-specific tests when not GOOGLE_UPDATE_BUILD
sparist Sep 25, 2021
a65a7a1
Replace EXPECT_GU_STREQ with EXPECT_STREQ when comparison can be made…
sparist Sep 25, 2021
360e95a
Replace hard-coded GUIDs
sparist Sep 25, 2021
ceebfc2
Factor out kds and kdsm
sparist Sep 27, 2021
63431d6
Factor out company domain
sparist Sep 27, 2021
c17663c
Remove another hard-coded company name
sparist Sep 27, 2021
c5a0282
Fix crbug/1245879: Security: Incomplete fix for CVE-2021-30577
sorinj Oct 19, 2021
927b20d
Enable Omaha logging to file even in the absence of a GoogleUpdate.ini.
sorinj Oct 19, 2021
b62a09b
Fix IsMachine/InstallManagerTest.InstallDir_ReadOnlyFiles/1 is flaky.
sorinj Oct 20, 2021
1c71b46
Populate usage_stats_enable_ in AppManager::ReadAppPersistentData (#294)
roander-msft Oct 20, 2021
e7a8587
Avoid BITS getting stuck in queued state during user logoff (#323)
richardfiles-msft Oct 20, 2021
83c5050
Remove v1_2_11 subdirectory from zlib
sparist Sep 17, 2021
9ae033a
Use submodules for missing third_party libraries
sparist Sep 17, 2021
8cd09aa
Merge pull request #314 from Kings-Distributed-Systems/tickets/313
sorinj Oct 21, 2021
2f2bc76
Fix kRequestBuffer xml namespace
sparist Oct 21, 2021
30846fa
Fix Constants_BuildFiles test
sparist Oct 21, 2021
05eeb60
Merge pull request #325 from Kings-Distributed-Systems/tickets/324
sorinj Oct 21, 2021
aba0fc6
Define PATH_COMPANY_NAME and replace existing company name tokens as …
sparist Dec 10, 2021
4c65834
Replace hard-coded company path names with PATH_COMPANY_NAME
sparist Dec 10, 2021
e8900d6
Factor company name out of XML files
sparist Dec 10, 2021
4154911
Exclude some Google-specific unit test checks when GOOGLE_UPDATE_BUIL…
sparist Dec 10, 2021
18a24cf
Factor out COMPANY_DOMAIN
sparist Dec 10, 2021
88abddc
Factor out SHORT_COMPANY_NAME
sparist Dec 10, 2021
6a19c92
Factor out SERVICE_PREFIX and MEDIUM_SERVICE_PREFIX
sparist Dec 10, 2021
c82d02c
Factor out CRASH_HANDLER_NAME
sparist Dec 10, 2021
892f84f
Merge pull request #344 from Kings-Distributed-Systems/tickets/307-pa…
sorinj Dec 29, 2021
09fe248
Merge pull request #345 from Kings-Distributed-Systems/tickets/327-msi
sorinj Dec 29, 2021
7649403
Merge pull request #346 from Kings-Distributed-Systems/tickets/327-un…
sorinj Dec 29, 2021
5f6b9d3
Merge pull request #349 from Kings-Distributed-Systems/tickets/327-co…
sorinj Dec 29, 2021
1521fed
Merge pull request #350 from Kings-Distributed-Systems/tickets/327-sh…
sorinj Dec 29, 2021
80b2c81
Merge pull request #351 from Kings-Distributed-Systems/tickets/327-se…
sorinj Dec 29, 2021
77e9df8
Merge pull request #352 from Kings-Distributed-Systems/tickets/327-cr…
sorinj Dec 29, 2021
9b74f1d
Factor out GOOPDATE_APP_ID (#347)
sparist Jan 5, 2022
4a42c46
Factor out MAIN_EXE_BASE_NAME (#348)
sparist Jan 5, 2022
347686e
Fix broken unit test CupEcdsaRequestTest.PostSimpleRequestHttps
sorinj Jan 6, 2022
c700e19
Update SaveArguments.exe file.
sorinj Jan 7, 2022
3040ef7
Create Scheduled Tasks with a random suffix as a defense in depth
sorinj Jan 5, 2022
61e8c28
Increases nonce entropy to 256 bits.
sorinj Jan 6, 2022
8f2d6fd
Fix code signing with Windows SDK 10.0.22000.0.
sorinj Feb 19, 2022
fa7b88d
Updated for Windows SDK 10.0.22000.0
sorinj Feb 19, 2022
c8a6457
Updated for Visual Studio 2019 Update 16.11.10.
sorinj Feb 19, 2022
01f2f99
Fix Enterprise MSI installer Elevation of Privileges Vulnerability
sorinj Mar 23, 2022
3f5a62a
Switch to using google3's gyp instead of googleclient's gyp.
sorinj Mar 23, 2022
4aac8dd
Build protoc for Omaha using Scons builders.
sorinj Mar 23, 2022
9e5db09
Fix Omaha: Rollback of shell done from an unsecure location
sorinj Mar 23, 2022
ada7318
Fix Omaha: InstallerData is written to an unsecure location
sorinj Mar 23, 2022
310a8f7
Removed unused gyp-related files/directories
sorinj Mar 23, 2022
1b62e4d
Respectful code cleanup in github.com/google/omaha
sorinj Apr 7, 2022
c0fcf45
[docs] Update CUPv2 server behavior section within ClientUpdateProtoc…
ambuc Apr 21, 2022
1117c2e
Merge pull request #397 from ambuc/update-cup-ecdsa-docs-01
sorinj Apr 21, 2022
82c56fd
Remove unused path literals.
sorinj Apr 21, 2022
f01d0bf
cup: Rotate CUP keys.
sorinj Apr 22, 2022
32f7d6a
Fix Build break C1083 missing include 'util/regexp/re2/re2.h'
sorinj Apr 22, 2022
804d15f
Merge branch 'sec-fixes'
sorinj Apr 22, 2022
2e3e48c
Update SaveArguments.exe file.
sorinj Apr 22, 2022
856d7cc
Fix InstallerWrapperUserTest.InstallApp_InstallerEmtpyFilename
sorinj Apr 26, 2022
60bb7cc
Fix Omaha continuous build.
sorinj Jun 9, 2022
e4045bf
Remove non-inclusive language in Omaha client.
sorinj Jun 9, 2022
5b1a67d
[docs] explicitly state that cohort shouldn't be overwritten if not p…
JayXon Jun 15, 2022
4839576
Merge pull request #418 from JayXon/patch-1
jpawlicki Jun 15, 2022
578a81b
[docs] add documentation for `sameversionupdate`
JayXon Jun 15, 2022
7c08cac
Delete unused code for building Chrome official installers.
sorinj Jul 22, 2022
82ae7ef
Fix generation of tagged installers.
sorinj Jul 22, 2022
93a7f45
Fixed generation of tagged installer.
sorinj Jul 22, 2022
b41cf09
Disable unit test NetworkConfigTest.GetProxyForUrlLocal.
sorinj Jul 22, 2022
234d752
Add DMToken deletion to the Chrome Windows updater
sorinj Jul 22, 2022
d88cc93
Update SaveArguments.exe file.
sorinj Jul 22, 2022
126400f
Merge pull request #419 from JayXon/patch-2
sorinj Aug 3, 2022
2809f4f
Fix LogWriter register instead of unregister
orieltalon Dec 22, 2022
ce08c9b
Merge pull request #499 from orielrosen/fix-logging-unregister
sorinj Jan 3, 2023
4676085
Fix Omaha continuous is broken.
sorinj Sep 21, 2022
086470d
Omaha3: Only single sign all binaries with SHA256
sorinj Jan 26, 2023
ba19b2d
Omaha3: Enhanced architecture support
sorinj Jan 26, 2023
606348a
Add more OPT logging to Omaha around update checks
sorinj Jan 26, 2023
18eae52
Fix UA Scheduled task client get killed when going on batteries or idle
sorinj Jan 26, 2023
b32c9b9
Omaha3: Fix issues with enhanced architecture support
sorinj Jan 26, 2023
6188498
Security: Quote the Scheduled task path
sorinj Jan 26, 2023
15fa03a
Fix build break base\libzip\zip_err_str.c(8) error C2040
sorinj Jan 26, 2023
cd0ac68
Add support for custom application logo in the Omaha progress UI
sorinj Jan 26, 2023
a8f00f2
Fix scheduled task unit tests
sorinj Jan 26, 2023
4839547
Fix Unit test PathSubjectThumbprintHash/CertInfoTest.CertInfo/0 fails
sorinj Jan 26, 2023
cad15bb
Remove unused Chrome bmp resource
sorinj May 4, 2023
bf17692
Add an `UpdateDev` override for the custom application logo URL
sorinj May 4, 2023
ea7a085
Ignore errors if the logo fails to load
sorinj May 4, 2023
08acce7
cup: Rotate CUP key for Omaha 3
sorinj May 4, 2023
2a4c532
Fix bcj2 encoder fails when trying to encode large file
sorinj May 4, 2023
8a7638a
Fix out of memory error redux
sorinj May 4, 2023
6f85d7e
Fix file formatting
sorinj May 5, 2023
5caf9f2
Enable addresses larger than 2 GB for Omaha
sorinj May 5, 2023
5e6f32c
Enable addresses larger than 2 GB only for the metainstaller
sorinj May 5, 2023
528e672
Clear the buffer immediately after use to free up heap space
sorinj May 5, 2023
72f9bdd
Use GoogleUpdate.exe itself when elevating machine handoff installs
sorinj May 5, 2023
b68ee97
Revert to using the metainstaller for elevating machine handoff installs
sorinj May 5, 2023
d8643a2
Update SaveArguments.exe file.
sorinj May 5, 2023
867b619
Create scorecard.yml
sorinj May 9, 2023
4d4e364
Define an exclusion list for binary files in the repository.
sorinj May 9, 2023
1cc89fb
Update scorecard.yml
sorinj May 9, 2023
fce9cbf
Added more detail to the binary_artifacts.yaml file.
sorinj May 9, 2023
812992a
Fix Standalone installs fail when using the `/eularequired` flag
sorinj May 23, 2023
4695583
Fix unit test UnitTestHelpersTest.ClearGroupPolicies fails non-domain
sorinj May 23, 2023
df174f8
Improved fix for Standalone installs fail when using /eularequired flag
sorinj May 23, 2023
e89f052
Fix unit test PathTest.ShortPathToLongPath fails in windows sandbox
sorinj May 23, 2023
00954b0
Fix unit test UserInfoTest.GetProcessUserSid fails for non domain users
sorinj May 23, 2023
3d16ee4
Fix unit test failures in WorkerWithTwoAppsTest* from non-corp IPs
sorinj May 23, 2023
68e7009
Fix unit test UtilsTest.AddAllowedAce fails
sorinj May 23, 2023
13c4d38
One more fix for unit test UtilsTest.AddAllowedAce
sorinj May 23, 2023
e89abc1
Update SaveArguments.exe file.
sorinj May 23, 2023
a5742f7
Fix Google Update leaves empty folders after uninstalling
sorinj May 31, 2023
405e03e
More fixes for GoogleUpdate leaves empty folders after uninstalling
sorinj May 31, 2023
8fa5322
Delete the Google directory if it is empty.
sorinj May 31, 2023
0aca21f
Fix Security Omaha EoP on Windows via COM
sorinj Dec 13, 2023
d69cc37
Fix Updates not suppressed when the duration rolls over to the next day
sorinj Dec 13, 2023
09093d5
Delete registry symlinks instead of the targets when deleting keys
sorinj Dec 13, 2023
b7df00a
Revert to using `::SHQueryValueEx` instead of `::RegQueryValueEx`
sorinj Dec 13, 2023
2ec5d6a
Use `BELOW_NORMAL_PRIORITY_CLASS` instead of `PROCESS_MODE_BACKGROUND…
sorinj Dec 14, 2023
4ceb05a
Fix build break semantic_annotations.pb.h fatal error C1083
sorinj Dec 14, 2023
a6e9d78
c++ modernization for Visual Studio 17.8.3.
sorinj Dec 15, 2023
495eec0
Enable building Omaha open source with Visual Studio 2022 version 17.0.
sorinj Dec 18, 2023
729cd09
Change version_num from float to string.
sorinj Dec 18, 2023
b6b5184
Update DeveloperSetupGuide.md
sorinj Dec 18, 2023
acd0593
Update DeveloperSetupGuide.md
sorinj Dec 27, 2023
a57d8a7
Update DeveloperSetupGuide.md
sorinj Dec 27, 2023
c97bc28
Update DeveloperSetupGuide.md
sorinj Dec 27, 2023
720c71b
Update scorecard.yml
sorinj Apr 9, 2024
5a70713
Fix Elevation of Privilege in GoogleUpdate related to impersonation
sorinj Apr 9, 2024
d2ddb61
Allow Chrome to auto-launch after /silent mode installs
sorinj Apr 10, 2024
cb0798f
2024 CUP key rotation
sorinj Apr 10, 2024
bc6d20f
Deleted unused cup_ecdsa_pubkey headers.
sorinj Apr 10, 2024
c3e428c
Fix GoogleUpdateComRegisterShell64.exe does not have a manifest
sorinj Apr 11, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
63 changes: 63 additions & 0 deletions .allstar/binary_artifacts.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,63 @@
# Ignore reason: These artifacts are used in unit tests or they are tools
# used by the build. It's impractical to make changes at this stage of the
# project to generate the tools from source.
ignorePaths:
- omaha/internal/tools/ApplyTag.exe
- omaha/recovery/lib/bin/dbg/google_update_recovery.lib
- omaha/recovery/lib/bin/opt/google_update_recovery.lib
- omaha/testing/unittest_support/CodeRed.crx3
- omaha/testing/unittest_support/GoogleUpdateHelper.msi
- omaha/testing/unittest_support/GoogleUpdate_corrupted.exe
- omaha/testing/unittest_support/GoogleUpdate_now_expired_cert.exe
- omaha/testing/unittest_support/GoogleUpdate_old_signature.exe
- omaha/testing/unittest_support/LongRunning.exe
- omaha/testing/unittest_support/LongRunningSilent.exe
- omaha/testing/unittest_support/Omaha_1.2.x_resources/goopdateres_ar.dll
- omaha/testing/unittest_support/Omaha_1.2.x_resources/goopdateres_bg.dll
- omaha/testing/unittest_support/Omaha_1.2.x_resources/goopdateres_ca.dll
- omaha/testing/unittest_support/SaveArguments.exe
- omaha/testing/unittest_support/SaveArguments_OmahaTestSigned.exe
- omaha/testing/unittest_support/SaveArguments_different_ou.exe
- omaha/testing/unittest_support/SaveArguments_multiple_cn.exe
- omaha/testing/unittest_support/SaveArguments_no_cn.exe
- omaha/testing/unittest_support/SaveArguments_unsigned_no_resources.exe
- omaha/testing/unittest_support/SaveArguments_unsigned_wrong_markup_size.exe
- omaha/testing/unittest_support/SaveArguments_unsigned_wrong_markup_value.exe
- omaha/testing/unittest_support/SaveArguments_unsigned_wrong_resource_name.exe
- omaha/testing/unittest_support/SaveArguments_wrong_cn.exe
- omaha/testing/unittest_support/Sha1_4c40dba5f988fae57a57d6457495f98b.exe
- omaha/testing/unittest_support/Sha1_4c40dba5f988fae57a57d6457495f98b_and_sha2_2a9c21acaaa63a3c58a7b9322bee948d.exe
- omaha/testing/unittest_support/chrome_certificate_09E28B26DB593EC4E73286B66499C370.dll
- omaha/testing/unittest_support/chrome_certificate_2912C70C9A2B8A3EF6F6074662D68B8D.dll
- omaha/testing/unittest_support/chrome_setup.exe
- omaha/testing/unittest_support/download_cache_test/{7101D597-3481-4971-AD23-455542964072}/livelysetup.exe
- omaha/testing/unittest_support/download_cache_test/{89640431-FE64-4da8-9860-1A1085A60E13}/gears-win32-opt.msi
- omaha/testing/unittest_support/download_cache_test/{C5CC8735-9BE0-45c5-804C-F117E96047C7}/GoogleUpdateSetup.exe
- omaha/testing/unittest_support/old_google_certificate.dll
- omaha/testing/unittest_support/omaha_1.0.x/GoogleUpdate.exe
- omaha/testing/unittest_support/omaha_1.0.x/goopdate.dll
- omaha/testing/unittest_support/omaha_1.1.x/GoogleUpdate.exe
- omaha/testing/unittest_support/omaha_1.1.x/goopdate.dll
- omaha/testing/unittest_support/omaha_1.1.x/goopdateres_en.dll
- omaha/testing/unittest_support/omaha_1.2.131.7_shell/GoogleUpdate.exe
- omaha/testing/unittest_support/omaha_1.2.183.9_shell/GoogleUpdate.exe
- omaha/testing/unittest_support/omaha_1.2.x/GoogleUpdate.exe
- omaha/testing/unittest_support/omaha_1.2.x/goopdate.dll
- omaha/testing/unittest_support/omaha_1.2.x/goopdateres_en.dll
- omaha/testing/unittest_support/omaha_1.2.x_newer/GoogleUpdate.exe
- omaha/testing/unittest_support/omaha_1.3.x/GoogleUpdate.exe
- omaha/testing/unittest_support/omaha_1.3.x/goopdate.dll
- omaha/testing/unittest_support/omaha_1.3.x/goopdateres_en.dll
- omaha/testing/unittest_support/sha1_06aea76bac46a9e8cfe6d29e45aaf033.sys
- omaha/testing/unittest_support/sha1_14F8FDD167F92402B1570B5DC495C815.sys
- omaha/testing/unittest_support/sha2_0c15be4a15bb0903c901b1d6c265302f.msi
- omaha/testing/unittest_support/sha2_0e4418e2dede36dd2974c3443afb5ce5.msi
- omaha/testing/unittest_support/sha2_2a9c21acaaa63a3c58a7b9322bee948d.exe
- omaha/testing/unittest_support/unsigned.crx3
- omaha/testing/unittest_support/valid.crx2
- omaha/testing/unittest_support/valid_no_publisher.crx3
- omaha/testing/unittest_support/valid_publisher.crx3
- omaha/tools/MsiTagger.exe
- omaha/tools/resmerge.exe
- third_party/lzma/files/7zr.exe
- third_party/lzma/files/lzma.exe
28 changes: 28 additions & 0 deletions .clang-format
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
# Defines the Chromium style for automatic reformatting.
# http://clang.llvm.org/docs/ClangFormatStyleOptions.html
BasedOnStyle: Chromium
# This defaults to 'Auto'. Explicitly set it for a while, so that
# 'vector<vector<int> >' in existing files gets formatted to
# 'vector<vector<int>>'. ('Auto' means that clang-format will only use
# 'int>>' if the file already contains at least one such instance.)
Standard: Cpp11

# Make sure code like:
# IPC_BEGIN_MESSAGE_MAP()
# IPC_MESSAGE_HANDLER(WidgetHostViewHost_Update, OnUpdate)
# IPC_END_MESSAGE_MAP()
# gets correctly indented.
MacroBlockBegin: "^\
BEGIN_COM_MAP|\
BEGIN_MSG_MAP|\
BEGIN_OBJECT_MAP|\
BEGIN_PROP_MAP|\
BEGIN_REGISTRY_MAP|\
BEGIN_SERVICE_MAP$"
MacroBlockEnd: "^\
END_COM_MAP|\
END_MSG_MAP|\
END_OBJECT_MAP|\
END_PROP_MAP|\
END_REGISTRY_MAP|\
END_SERVICE_MAP$"
73 changes: 73 additions & 0 deletions .github/workflows/scorecard.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,73 @@
# This workflow uses actions that are not certified by GitHub. They are provided
# by a third-party and are governed by separate terms of service, privacy
# policy, and support documentation.

name: Scorecard supply-chain security
on:
# For Branch-Protection check. Only the default branch is supported. See
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
branch_protection_rule:
# To guarantee Maintained check is occasionally updated. See
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
schedule:
- cron: '35 20 * * 0'
push:
branches: [ "main" ]
workflow_dispatch:

# Declare default permissions as read only.
permissions: read-all

jobs:
analysis:
name: Scorecard analysis
runs-on: ubuntu-latest
permissions:
# Needed to upload the results to code-scanning dashboard.
security-events: write
# Needed to publish results and get a badge (see publish_results below).
id-token: write
# Uncomment the permissions below if installing in a private repository.
# contents: read
# actions: read

steps:
- name: "Checkout code"
uses: actions/checkout@v4
with:
persist-credentials: false

- name: "Run analysis"
uses: ossf/[email protected]
with:
results_file: results.sarif
results_format: sarif
# (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
# - you want to enable the Branch-Protection check on a *public* repository, or
# - you are installing Scorecard on a *private* repository
# To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
# repo_token: ${{ secrets.SCORECARD_TOKEN }}

# Public repositories:
# - Publish results to OpenSSF REST API for easy access by consumers
# - Allows the repository to include the Scorecard badge.
# - See https://github.com/ossf/scorecard-action#publishing-results.
# For private repositories:
# - `publish_results` will always be set to `false`, regardless
# of the value entered here.
publish_results: true

# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# format to the repository Actions tab.
- name: "Upload artifact"
uses: actions/upload-artifact@v4
with:
name: SARIF file
path: results.sarif
retention-days: 5

# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
uses: github/codeql-action/[email protected]
with:
sarif_file: results.sarif
8 changes: 3 additions & 5 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -16,11 +16,9 @@
*.idb
*.pdb
*.pyc
.vs/
.vscode/
omaha/common/omaha_customization_proxy_clsid.h
omaha/proxy_clsids.txt
omaha/scons-out/**
third_party/breakpad/**
third_party/googletest/**
third_party/libzip/**
third_party/zlib/**
omaha/scons-out/
third_party/lzma/files/**/obj/
12 changes: 12 additions & 0 deletions .gitmodules
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
[submodule "third_party/breakpad"]
path = third_party/breakpad
url = https://github.com/google/breakpad.git
[submodule "third_party/googletest"]
path = third_party/googletest
url = https://github.com/google/googletest.git
[submodule "third_party/libzip"]
path = third_party/libzip
url = https://github.com/nih-at/libzip.git
[submodule "third_party/zlib"]
path = third_party/zlib
url = https://github.com/madler/zlib.git
3 changes: 3 additions & 0 deletions CHANGELOG.txt
Original file line number Diff line number Diff line change
@@ -1,3 +1,6 @@
# CHANGELOG.txt is not going to be be updated beyond this point
# To see what is being changed, please inspect the git log.

## 2019-06-05 @247089589,251531419

### Changes
Expand Down
6 changes: 3 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@

## This is not an official Google product.

Omaha is the open-source version of Google Update, a program to install requested software and keep it up to date. The Google-branded version of Omaha is used to support software patching (both background updating, and on-demand update checks) for Google Chrome, Earth, and a variety of other Google products on Windows.
Omaha is the open-source version of Google Update, a program to install requested software and keep it up to date. The Google-branded version of Omaha is used to support software patching (both background updating, and on-demand update checks) for Google Chrome, Earth, and a variety of other Google products on Windows 7, 8, and 10.

We know that keeping software updated is both important and hard, and so by open-sourcing this project, our hope is that perhaps we can help others solve this problem. So, if you'd like to get involved, or even use Omaha to support your own software projects, then just follow the instructions in the [Developer Setup Guide](https://github.com/google/omaha/blob/master/doc/DeveloperSetupGuide.md), and you'll be good to go!
For a quick overview of how Omaha works, you can see [this unofficial tutorial](https://fman.io/blog/google-omaha-tutorial/). Please note that it was written by a third party so we cannot guarantee its availability, accuracy or safety.

There is also an unofficial [tutorial](https://fman.io/blog/google-omaha-tutorial/). Please note that it was written by a third party so we cannot guarantee its availability, accuracy or safety.
We know that keeping software updated is both important and hard, and so by open-sourcing this project, our hope is that perhaps we can help others solve this problem. So, if you'd like to get involved, or even use Omaha to support your own software projects, then just follow the instructions in the [Developer Setup Guide](https://github.com/google/omaha/blob/master/doc/DeveloperSetupGuide.md), and you'll be good to go!
6 changes: 6 additions & 0 deletions common/certificate_tag/README
Original file line number Diff line number Diff line change
Expand Up @@ -13,3 +13,9 @@ arbitrary data in extensions. Since they are also not hashed when verifying
signatures, that data can also be changed without invalidating it.

More details are here: http://b/12236017

The tool was updated in 2020 to support MSI files: b/172261939, b/165818147.

The test file is integrated from google3, but is modified here to make it
easier to run outside of google3; see the comment near the beginning of
certificate_tag_test.go
Loading