1 write to Log
Microsoft.Build.Utilities.Core (1)
AppDomainIsolatedTask.cs (1)
31
Log
= new TaskLoggingHelper(this);
66 references to Log
Microsoft.Build.Utilities.Core (6)
AppDomainIsolatedTask.cs (6)
41
Log
.TaskResources = taskResources;
55
Log
.HelpKeywordPrefix = helpKeywordPrefix;
87
get =>
Log
.TaskResources;
88
set =>
Log
.TaskResources = value;
100
get =>
Log
.HelpKeywordPrefix;
101
set =>
Log
.HelpKeywordPrefix = value;
Microsoft.DotNet.SignCheckTask (5)
src\SignCheckTask.cs (5)
108
Microsoft.DotNet.AssemblyResolution.Log =
Log
;
113
return succeeded && !
Log
.HasLoggedErrors;
162
Log
.LogError($"Unable to find file '{checkFile}' in folder '{ArtifactFolder}'. Try specifying 'Recursive=true` to include subfolders");
166
Log
.LogError($"found multiple files matching pattern '{checkFile}'");
169
Log
.LogError($" - {file}");
Microsoft.DotNet.SignTool (38)
src\SignToolTask.cs (38)
174
AssemblyResolution.Log =
Log
;
179
return !
Log
.HasLoggedErrors;
186
Log
.LogMessage(MessageImportance.High, "SignToolTask execution finished.");
194
Log
.LogWarning(subcategory: null,
209
Log
.LogError($"DotNet was not found at this path: '{DotNetPath}'.");
215
Log
.LogWarning($"TempDir ('{TempDir}' is not rooted, this can cause unexpected behavior in signtool. Please provide a fully qualified 'TempDir' path.");
220
Log
.LogError($"PkgToolPath ('{PkgToolPath}') does not exist & is required for unpacking, repacking, and notarizing .pkg files and .app bundles on MacOS.");
225
Log
.LogError($"WixToolsPath ('{WixToolsPath}') does not exist.");
231
if (
Log
.HasLoggedErrors) return;
238
if (
Log
.HasLoggedErrors) return;
241
var signTool = DryRun ? new ValidationOnlySignTool(signToolArgs,
Log
) : (SignTool)new RealSignTool(signToolArgs,
Log
);
258
Log
,
264
Log
.LogError($"Existing signing container cache no longer supported.");
270
if (
Log
.HasLoggedErrors) return;
274
Log
,
283
if (
Log
.HasLoggedErrors) return;
295
Log
.LogMessage(MessageImportance.High, "SignToolTask starting.");
296
Log
.LogMessage(MessageImportance.High, $"DryRun: {DryRun}");
297
Log
.LogMessage(MessageImportance.High, $"Signing mode: { (TestSign ? "Test" : "Real") }");
298
Log
.LogMessage(MessageImportance.High, $"MicroBuild signing logs will be in (Signing*.binlog): {LogDir}");
299
Log
.LogMessage(MessageImportance.High, $"MicroBuild signing configuration will be in (Round*.proj): {TempDir}");
325
Log
.LogError($"Both MacCertificate and MacNotarizationAppName must be specified");
330
Log
.LogError($"DualSigningAllowed must be 'true' or 'false");
370
Log
.LogError($"Paths specified in {nameof(ItemsToSign)} must be absolute: '{itemToSign}'.");
386
Log
.LogError($"All {nameof(ItemsToSign)} must be within the cone of a single directory.");
428
Log
.LogError($"Value of {nameof(FileExtensionSignInfo)} is invalid: '{extension}'");
434
Log
.LogError($"CertificateName metadata of {nameof(FileExtensionSignInfo)} is invalid: '{certificate}'");
446
Log
.LogError($"Multiple certificates for extension '{extension}' defined for CollisionPriorityId '{signInfo.CollisionPriorityId}'. There should be one certificate per extension per collision priority id.");
475
Log
.LogError($"An invalid strong name was specified in {nameof(StrongNameSignInfo)}: '{strongName}'");
481
Log
.LogError($"PublicKeyToken metadata of {nameof(StrongNameSignInfo)} is invalid: '{publicKeyToken}'");
487
Log
.LogMessage($"CertificateName metadata of {nameof(StrongNameSignInfo)} is invalid or empty: '{certificateName}'");
494
Log
.LogWarning($"CertificateName & ItemSpec metadata of {nameof(StrongNameSignInfo)} shouldn't be both '{SignToolConstants.IgnoreFileCertificateSentinel}'");
532
Log
.LogError($"{nameof(FileSignInfo)} should specify file name and extension, not a full path: '{fileName}'");
538
Log
.LogError($"TargetFramework metadata of {nameof(FileSignInfo)} is invalid: '{targetFramework}'");
544
Log
.LogError($"CertificateName metadata of {nameof(FileSignInfo)} is invalid: '{certificateName}'");
550
Log
.LogError($"PublicKeyToken metadata for {nameof(FileSignInfo)} is invalid: '{publicKeyToken}'");
557
Log
.LogError($"Duplicate entries in {nameof(FileSignInfo)} with the same key ('{fileName}', '{publicKeyToken}', '{targetFramework}'): '{existingCert}', '{certificateName}'.");
Microsoft.DotNet.SignTool.Tests (17)
SignToolTests.cs (17)
340
var signTool = new FakeSignTool(signToolArgs, task.
Log
);
341
var configuration = new Configuration(signToolArgs.TempDir, itemsToSign, strongNameSignInfo, fileSignInfo, extensionsSignInfo, additionalCertificateInfo, tarToolPath: s_tarToolPath, pkgToolPath: s_pkgToolPath, snPath: s_snPath, task.
Log
);
345
task.
Log
,
371
task.
Log
.HasLoggedErrors.Should().BeFalse();
387
var signingInput = new Configuration(_tmpDir, itemsToSign, strongNameSignInfo, fileSignInfo, extensionsSignInfo, additionalCertificateInfo, tarToolPath: s_tarToolPath, pkgToolPath: s_pkgToolPath, snPath: s_snPath, task.
Log
).GenerateListOfFiles();
523
var signingInput = new Configuration(_tmpDir, itemsToSign, strongNameSignInfo, fileSignInfo, s_fileExtensionSignInfo, null, tarToolPath: s_tarToolPath, pkgToolPath: s_pkgToolPath, snPath: s_snPath, task.
Log
).GenerateListOfFiles();
527
task.
Log
.HasLoggedErrors.Should().BeFalse();
2033
task.
Log
.HasLoggedErrors.Should().BeTrue();
2863
task.
Log
)
2866
task.
Log
.HasLoggedErrors.Should().BeTrue();
2913
task.
Log
)
2916
task.
Log
.HasLoggedErrors.Should().BeFalse();
2976
BatchSignUtil.RunWixTool(createFileName, outputDir, workingDir, wixToolsPath, task.
Log
).Should().Be(!deleteWixobjBeforeRunningTool);
2995
BatchSignUtil.RunWixTool("create.cmd", "foodir", "bardir", null, task.
Log
).Should().BeFalse();
2996
task.
Log
.HasLoggedErrors.Should().BeTrue();
3011
BatchSignUtil.RunWixTool("create.cmd", "foodir", "bardir", "totally/wix/tools", task.
Log
).Should().BeFalse();
3012
task.
Log
.HasLoggedErrors.Should().BeTrue();