1 write to _log
Microsoft.DotNet.SignTool (1)
src\BatchSignUtil.cs (1)
44_log = log;
39 references to _log
Microsoft.DotNet.SignTool (39)
src\BatchSignUtil.cs (39)
56VerifyCertificates(_log); 58if (_log.HasLoggedErrors) 71_log.LogError("Error during execution of signing process."); 90VerifyAfterSign(_log, file); 93if (_log.HasLoggedErrors) 98_log.LogMessage(MessageImportance.High, "Build artifacts signed and validated."); 107_log.LogMessage($"Removing strong name signing from: '{fileSignInfo.FileName}'"); 132_log.LogMessage(MessageImportance.High, $"Round {round}: Signing {filesToSign.Length} files."); 146_log.LogMessage(MessageImportance.Low, $"{file} {collisionIdInfo}"); 165_log.LogMessage(MessageImportance.High, $"Round {round}: Signing {enginesToSign.Length} engines."); 174_log.LogMessage(MessageImportance.Normal, $"Extracting engine from {file.FullPath}"); 176workingDirectory, _signTool.WixToolsPath, _log)) 178_log.LogError($"Failed to extract engine from {file.FullPath}"); 193_log.LogError($"Failed to sign engines"); 200_log.LogMessage(MessageImportance.Normal, $"Attaching engine {engine.Key.FileName} to {engine.Value.FullPath}"); 206_signTool.WixToolsPath, _log)) 208_log.LogError($"Failed to attach engine to {engine.Value.FullPath}"); 233_log.LogMessage(MessageImportance.High, $"Repacking {repackCount} containers."); 258_log.LogMessage(MessageImportance.High, $"Repacking {smallRepackList.Count} containers in parallel."); 271_log.LogMessage(MessageImportance.High, $"Repacking {largeRepackList.Count} large containers in serial."); 284_log.LogMessage($"Repacking container: '{file.FileName}'"); 285_batchData.ZipDataMap[file.FileContentKey].Repack(_log, _signTool.TempDir, _signTool.WixToolsPath, _signTool.TarToolPath, _signTool.PkgToolPath); 289_log.LogMessage($"Packing wix container: '{file.FileName}'"); 290_batchData.ZipDataMap[file.FileContentKey].Repack(_log, _signTool.TempDir, _signTool.WixToolsPath, _signTool.TarToolPath, _signTool.PkgToolPath); 294_log.LogError($"Don't know how to repack file '{file.FullPath}'"); 457_log.LogMessage($"Updating '{dst}' with signed content"); 462_log.LogError($"Updating '{dst}' with signed content failed: '{e.Message}'"); 584_log.LogError($"Assembly {file.FullPath} is NOT signed properly"); 588_log.LogMessage(MessageImportance.Low, $"Assembly {file.FullPath} is signed properly"); 596_log.LogMessage(MessageImportance.Low, $"Skipping signature verification of {file.FullPath} on non-Linux platform."); 600_log.LogError($"Deb package {file.FullPath} is not signed properly."); 607_log.LogError($"Powershell file {file.FullPath} does not have a signature mark."); 615foreach (var (relativeName, _, _) in ZipData.ReadEntries(_log, file.FullPath, _signTool.TempDir, _signTool.TarToolPath, _signTool.PkgToolPath, ignoreContent: true)) 639VerifyAfterSign(_log, zipPart.Value.FileSignInfo); 646_log.LogError($"Container {file.FullPath} does not have signature marker."); 650_log.LogMessage(MessageImportance.Low, $"Container {file.FullPath} has a signature marker."); 662_log.LogMessage($"Skipping strong-name validation for {file.FullPath}."); 668_log.LogError($"Assembly {file.FullPath} is not strong-name signed correctly."); 672_log.LogMessage(MessageImportance.Low, $"Assembly {file.FullPath} strong-name signature is valid.");