1 write to Log
Microsoft.Build.Utilities.Core (1)
AppDomainIsolatedTask.cs (1)
31Log = new TaskLoggingHelper(this);
66 references to Log
Microsoft.Build.Utilities.Core (6)
AppDomainIsolatedTask.cs (6)
41Log.TaskResources = taskResources; 55Log.HelpKeywordPrefix = helpKeywordPrefix; 87get => Log.TaskResources; 88set => Log.TaskResources = value; 100get => Log.HelpKeywordPrefix; 101set => Log.HelpKeywordPrefix = value;
Microsoft.DotNet.SignCheckTask (5)
src\SignCheckTask.cs (5)
108Microsoft.DotNet.AssemblyResolution.Log = Log; 113return succeeded && !Log.HasLoggedErrors; 162Log.LogError($"Unable to find file '{checkFile}' in folder '{ArtifactFolder}'. Try specifying 'Recursive=true` to include subfolders"); 166Log.LogError($"found multiple files matching pattern '{checkFile}'"); 169Log.LogError($" - {file}");
Microsoft.DotNet.SignTool (38)
src\SignToolTask.cs (38)
174AssemblyResolution.Log = Log; 179return !Log.HasLoggedErrors; 186Log.LogMessage(MessageImportance.High, "SignToolTask execution finished."); 194Log.LogWarning(subcategory: null, 209Log.LogError($"DotNet was not found at this path: '{DotNetPath}'."); 215Log.LogWarning($"TempDir ('{TempDir}' is not rooted, this can cause unexpected behavior in signtool. Please provide a fully qualified 'TempDir' path."); 220Log.LogError($"PkgToolPath ('{PkgToolPath}') does not exist & is required for unpacking, repacking, and notarizing .pkg files and .app bundles on MacOS."); 225Log.LogError($"WixToolsPath ('{WixToolsPath}') does not exist."); 231if (Log.HasLoggedErrors) return; 238if (Log.HasLoggedErrors) return; 241var signTool = DryRun ? new ValidationOnlySignTool(signToolArgs, Log) : (SignTool)new RealSignTool(signToolArgs, Log); 258Log, 264Log.LogError($"Existing signing container cache no longer supported."); 270if (Log.HasLoggedErrors) return; 274Log, 283if (Log.HasLoggedErrors) return; 295Log.LogMessage(MessageImportance.High, "SignToolTask starting."); 296Log.LogMessage(MessageImportance.High, $"DryRun: {DryRun}"); 297Log.LogMessage(MessageImportance.High, $"Signing mode: { (TestSign ? "Test" : "Real") }"); 298Log.LogMessage(MessageImportance.High, $"MicroBuild signing logs will be in (Signing*.binlog): {LogDir}"); 299Log.LogMessage(MessageImportance.High, $"MicroBuild signing configuration will be in (Round*.proj): {TempDir}"); 325Log.LogError($"Both MacCertificate and MacNotarizationAppName must be specified"); 330Log.LogError($"DualSigningAllowed must be 'true' or 'false"); 370Log.LogError($"Paths specified in {nameof(ItemsToSign)} must be absolute: '{itemToSign}'."); 386Log.LogError($"All {nameof(ItemsToSign)} must be within the cone of a single directory."); 428Log.LogError($"Value of {nameof(FileExtensionSignInfo)} is invalid: '{extension}'"); 434Log.LogError($"CertificateName metadata of {nameof(FileExtensionSignInfo)} is invalid: '{certificate}'"); 446Log.LogError($"Multiple certificates for extension '{extension}' defined for CollisionPriorityId '{signInfo.CollisionPriorityId}'. There should be one certificate per extension per collision priority id."); 475Log.LogError($"An invalid strong name was specified in {nameof(StrongNameSignInfo)}: '{strongName}'"); 481Log.LogError($"PublicKeyToken metadata of {nameof(StrongNameSignInfo)} is invalid: '{publicKeyToken}'"); 487Log.LogMessage($"CertificateName metadata of {nameof(StrongNameSignInfo)} is invalid or empty: '{certificateName}'"); 494Log.LogWarning($"CertificateName & ItemSpec metadata of {nameof(StrongNameSignInfo)} shouldn't be both '{SignToolConstants.IgnoreFileCertificateSentinel}'"); 532Log.LogError($"{nameof(FileSignInfo)} should specify file name and extension, not a full path: '{fileName}'"); 538Log.LogError($"TargetFramework metadata of {nameof(FileSignInfo)} is invalid: '{targetFramework}'"); 544Log.LogError($"CertificateName metadata of {nameof(FileSignInfo)} is invalid: '{certificateName}'"); 550Log.LogError($"PublicKeyToken metadata for {nameof(FileSignInfo)} is invalid: '{publicKeyToken}'"); 557Log.LogError($"Duplicate entries in {nameof(FileSignInfo)} with the same key ('{fileName}', '{publicKeyToken}', '{targetFramework}'): '{existingCert}', '{certificateName}'.");
Microsoft.DotNet.SignTool.Tests (17)
SignToolTests.cs (17)
340var signTool = new FakeSignTool(signToolArgs, task.Log); 341var configuration = new Configuration(signToolArgs.TempDir, itemsToSign, strongNameSignInfo, fileSignInfo, extensionsSignInfo, additionalCertificateInfo, tarToolPath: s_tarToolPath, pkgToolPath: s_pkgToolPath, snPath: s_snPath, task.Log); 345task.Log, 371task.Log.HasLoggedErrors.Should().BeFalse(); 387var signingInput = new Configuration(_tmpDir, itemsToSign, strongNameSignInfo, fileSignInfo, extensionsSignInfo, additionalCertificateInfo, tarToolPath: s_tarToolPath, pkgToolPath: s_pkgToolPath, snPath: s_snPath, task.Log).GenerateListOfFiles(); 523var signingInput = new Configuration(_tmpDir, itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, null, tarToolPath: s_tarToolPath, pkgToolPath: s_pkgToolPath, snPath: s_snPath, task.Log).GenerateListOfFiles(); 527task.Log.HasLoggedErrors.Should().BeFalse(); 2033task.Log.HasLoggedErrors.Should().BeTrue(); 2863task.Log) 2866task.Log.HasLoggedErrors.Should().BeTrue(); 2913task.Log) 2916task.Log.HasLoggedErrors.Should().BeFalse(); 2976BatchSignUtil.RunWixTool(createFileName, outputDir, workingDir, wixToolsPath, task.Log).Should().Be(!deleteWixobjBeforeRunningTool); 2995BatchSignUtil.RunWixTool("create.cmd", "foodir", "bardir", null, task.Log).Should().BeFalse(); 2996task.Log.HasLoggedErrors.Should().BeTrue(); 3011BatchSignUtil.RunWixTool("create.cmd", "foodir", "bardir", "totally/wix/tools", task.Log).Should().BeFalse(); 3012task.Log.HasLoggedErrors.Should().BeTrue();