1 write to FullPath
Microsoft.DotNet.SignTool (1)
src\PathWithHash.cs (1)
37
FullPath
= fullPath;
35 references to FullPath
Microsoft.DotNet.SignTool (35)
src\Configuration.cs (33)
210
_log.LogMessage($"Tracking file '{file.
FullPath
}' isNested={isNested}");
223
_filesToCopy.Add(new KeyValuePair<string, string>(existingSignInfo.FullPath, file.
FullPath
));
312
_log.LogMessage(MessageImportance.Low, $"Ignoring zero length file: {file.
FullPath
}");
327
Debug.Assert(parentContainer.
FullPath
!= file.
FullPath
);
374
if (FileSignInfo.IsPEFile(file.
FullPath
))
376
isAlreadyAuthenticodeSigned = ContentUtil.IsAuthenticodeSigned(file.
FullPath
);
377
isAlreadyStrongNamed = StrongName.IsSigned(file.
FullPath
, snPath:_snPath, log: _log);
382
_log.LogMessage(MessageImportance.Low, $"PE file {file.
FullPath
} does not have a signature marker.");
386
_log.LogMessage(MessageImportance.Low, $"PE file {file.
FullPath
} has a signature marker.");
391
_log.LogMessage(MessageImportance.Low, $"PE file {file.
FullPath
} does not have a valid strong name signature.");
395
_log.LogMessage(MessageImportance.Low, $"PE file {file.
FullPath
} has a valid strong name signature.");
398
peInfo = GetPEInfo(file.
FullPath
);
443
else if (FileSignInfo.IsPackage(file.
FullPath
))
445
isAlreadyAuthenticodeSigned = VerifySignatures.IsSignedContainer(_log, file.
FullPath
, _pathToContainerUnpackingDirectory, _tarToolPath, _pkgToolPath);
448
_log.LogMessage(MessageImportance.Low, $"Container {file.
FullPath
} does not have a signature marker.");
452
_log.LogMessage(MessageImportance.Low, $"Container {file.
FullPath
} has a signature marker.");
455
else if (FileSignInfo.IsWix(file.
FullPath
))
457
isAlreadyAuthenticodeSigned = VerifySignatures.IsDigitallySigned(file.
FullPath
);
460
_log.LogMessage(MessageImportance.Low, $"File {file.
FullPath
} is not digitally signed.");
464
_log.LogMessage(MessageImportance.Low, $"File {file.
FullPath
} is digitally signed.");
467
else if(FileSignInfo.IsDeb(file.
FullPath
))
469
isAlreadyAuthenticodeSigned = VerifySignatures.VerifySignedDeb(_log, file.
FullPath
);
472
_log.LogMessage(MessageImportance.Low, $"File {file.
FullPath
} is not signed.");
476
_log.LogMessage(MessageImportance.Low, $"File {file.
FullPath
} is signed.");
479
else if(FileSignInfo.IsPowerShellScript(file.
FullPath
))
481
isAlreadyAuthenticodeSigned = VerifySignatures.VerifySignedPowerShellFile(file.
FullPath
);
484
_log.LogMessage(MessageImportance.Low, $"File {file.
FullPath
} does not have a signature block.");
488
_log.LogMessage(MessageImportance.Low, $"File {file.
FullPath
} has a signature block.");
502
_log.LogMessage(MessageImportance.Low, $"File configured to not be signed: {file.
FullPath
}{fileSpec}");
556
warning = $"Signing Microsoft library '{file.
FullPath
}' with 3rd party certificate '{signInfo.Certificate}'. The library is considered Microsoft library due to its copyright: '{peInfo.Copyright}'.";
561
warning = $"Signing 3rd party library '{file.
FullPath
}' with Microsoft certificate '{signInfo.Certificate}'. The library is considered 3rd party library due to its copyright: '{peInfo.Copyright}'.";
587
_log.LogMessage(MessageImportance.Low, $"Ignoring non-signable file: {file.
FullPath
}");
src\FileSignInfo.cs (2)
16
internal string FullPath => File.
FullPath
;
126
Debug.Assert(pathWithHash.
FullPath
!= null);