1 write to FullPath
Microsoft.DotNet.SignTool (1)
src\PathWithHash.cs (1)
37FullPath = fullPath;
35 references to FullPath
Microsoft.DotNet.SignTool (35)
src\Configuration.cs (33)
210_log.LogMessage($"Tracking file '{file.FullPath}' isNested={isNested}"); 223_filesToCopy.Add(new KeyValuePair<string, string>(existingSignInfo.FullPath, file.FullPath)); 312_log.LogMessage(MessageImportance.Low, $"Ignoring zero length file: {file.FullPath}"); 327Debug.Assert(parentContainer.FullPath != file.FullPath); 374if (FileSignInfo.IsPEFile(file.FullPath)) 376isAlreadyAuthenticodeSigned = ContentUtil.IsAuthenticodeSigned(file.FullPath); 377isAlreadyStrongNamed = StrongName.IsSigned(file.FullPath, snPath:_snPath, log: _log); 382_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} does not have a signature marker."); 386_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} has a signature marker."); 391_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} does not have a valid strong name signature."); 395_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} has a valid strong name signature."); 398peInfo = GetPEInfo(file.FullPath); 443else if (FileSignInfo.IsPackage(file.FullPath)) 445isAlreadyAuthenticodeSigned = VerifySignatures.IsSignedContainer(_log, file.FullPath, _pathToContainerUnpackingDirectory, _tarToolPath, _pkgToolPath); 448_log.LogMessage(MessageImportance.Low, $"Container {file.FullPath} does not have a signature marker."); 452_log.LogMessage(MessageImportance.Low, $"Container {file.FullPath} has a signature marker."); 455else if (FileSignInfo.IsWix(file.FullPath)) 457isAlreadyAuthenticodeSigned = VerifySignatures.IsDigitallySigned(file.FullPath); 460_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} is not digitally signed."); 464_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} is digitally signed."); 467else if(FileSignInfo.IsDeb(file.FullPath)) 469isAlreadyAuthenticodeSigned = VerifySignatures.VerifySignedDeb(_log, file.FullPath); 472_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} is not signed."); 476_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} is signed."); 479else if(FileSignInfo.IsPowerShellScript(file.FullPath)) 481isAlreadyAuthenticodeSigned = VerifySignatures.VerifySignedPowerShellFile(file.FullPath); 484_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} does not have a signature block."); 488_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} has a signature block."); 502_log.LogMessage(MessageImportance.Low, $"File configured to not be signed: {file.FullPath}{fileSpec}"); 556warning = $"Signing Microsoft library '{file.FullPath}' with 3rd party certificate '{signInfo.Certificate}'. The library is considered Microsoft library due to its copyright: '{peInfo.Copyright}'."; 561warning = $"Signing 3rd party library '{file.FullPath}' with Microsoft certificate '{signInfo.Certificate}'. The library is considered 3rd party library due to its copyright: '{peInfo.Copyright}'."; 587_log.LogMessage(MessageImportance.Low, $"Ignoring non-signable file: {file.FullPath}");
src\FileSignInfo.cs (2)
16internal string FullPath => File.FullPath; 126Debug.Assert(pathWithHash.FullPath != null);