mirror of
https://github.com/Set-OutlookSignatures/Set-OutlookSignatures.git
synced 2026-04-26 10:45:52 +03:00
-
v4.20.4 Stable
released this
2025-08-12 13:17:22 +03:00 | 17 commits to main since this release📅 Originally published on GitHub: Tue, 12 Aug 2025 10:18:49 GMT
🏷️ Git tag created: Tue, 12 Aug 2025 10:17:22 GMTv4.20.4 - 2025-08-12
Changed
- Update dependency MSAL.Net to v4.74.1.
- Update dependency HtmlAgilityPack to v1.12.2.
- Update dependency UTF.Unknown to v2.6.0.
- Update Outlook add-in dependency @azure-msalbrowser to v4.19.0.
Added
- Add workaround for Microsoft internal problems with roaming signatures API, which would result in the following error when uploading roaming signatures to mailboxes which are not the one of the logged-on user (especially in SimulateAndDeploy mode). The log would contain the error "The response status code for https://localhost:444/owa/service.svc?action=SanitizeHtml action \u0027SanitizeHtml\u0027 is InternalServerError. ReasonPhrase:Internal Server Error".
- Add hints about probable root causes of empty signatures lists in the log output of the Outlook add-in.
Removed
Fixed
File hashes and code signing
- SHA256 hash of 'Set-OutlookSignatures_v4.20.4.zip': D996D8FB1128E318E210EAE1342DEC9110AD182AE724989FDC981A7F772A011C
- See 'hashes.txt' in 'Set-OutlookSignatures_v4.20.4.zip' for the hash value of every single file in the release.
- Compare these hashes with the output of '
Get-ChildItem -Recurse | Get-FileHash -Algorithm SHA256'.
- Compare these hashes with the output of '
- Files are code signed with ExplicIT Consulting's Extended Validation (EV) certificate.
- Check the signature with '
Get-ChildItem -Include '*.ps*1', '*.dll' -Recurse | Get-AuthenticodeSignature'.
- Check the signature with '
Downloads
-
Source code (ZIP)
0 downloads
-
Source code (TAR.GZ)
0 downloads
-
Set-OutlookSignatures_v4.20.4.zip
0 downloads ·
2026-02-27 20:30:26 +03:00 · 27 MiB