1 write to FullPath
Microsoft.DotNet.SignTool (1)
src\PathWithHash.cs (1)
37
FullPath
= fullPath;
36 references to FullPath
Microsoft.DotNet.SignTool (36)
src\Configuration.cs (34)
209
_log.LogMessage($"Tracking file '{file.
FullPath
}' isNested={isNested}");
222
_filesToCopy.Add(new KeyValuePair<string, string>(existingSignInfo.FullPath, file.
FullPath
));
238
_log.LogMessage(MessageImportance.Normal, "Skipping container unpacking for '{0}' due to DoNotUnpack flag", file.
FullPath
);
324
ExecutableType executableType = ContentUtil.GetExecutableType(file.
FullPath
);
330
_log.LogMessage(MessageImportance.Low, $"Ignoring zero length file: {file.
FullPath
}");
345
Debug.Assert(parentContainer.
FullPath
!= file.
FullPath
);
392
if (FileSignInfo.IsPEFile(file.
FullPath
))
394
isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedPE(file.
FullPath
));
397
peInfo = GetPEInfo(file.
FullPath
);
443
else if (FileSignInfo.IsPkg(file.
FullPath
) || FileSignInfo.IsAppBundle(file.
FullPath
))
445
isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedPkgOrAppBundle(_log, file.
FullPath
, _pkgToolPath));
447
else if (FileSignInfo.IsNupkg(file.
FullPath
))
449
isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedNupkg(file.
FullPath
));
451
else if (FileSignInfo.IsWixInstaller(file.
FullPath
))
453
isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsWixSigned(file.
FullPath
));
455
else if (FileSignInfo.IsDeb(file.
FullPath
))
457
isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedDeb(_log, file.
FullPath
));
459
else if (FileSignInfo.IsRpm(file.
FullPath
))
461
isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedRpm(_log, file.
FullPath
));;
463
else if (FileSignInfo.IsPowerShellScript(file.
FullPath
))
465
isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedPowershellFile(file.
FullPath
));
500
_log.LogMessage(MessageImportance.Low, $"File configured to not be signed: {file.
FullPath
}{fileSpec}");
537
_log.LogWarning($"Skipping file '{file.
FullPath
}' because .js files are no longer signed by default. " +
576
_log.LogMessage(MessageImportance.Low, $"Ignoring non-signable file: {file.
FullPath
}");
586
_log.LogMessage(MessageImportance.Low, $"File '{file.
FullPath
}' is already signed.");
589
_log.LogMessage(MessageImportance.Low, $"File '{file.
FullPath
}' is not signed.");
592
_log.LogMessage(MessageImportance.Low, $"File '{file.
FullPath
}' signing status is unknown, treating as unsigned.");
601
bool isAlreadyStrongNamed = StrongNameHelper.IsSigned(file.
FullPath
, snPath: _snPath);
604
_log.LogMessage(MessageImportance.Low, $"PE file {file.
FullPath
} does not have a valid strong name signature.");
608
_log.LogMessage(MessageImportance.Low, $"PE file {file.
FullPath
} has a valid strong name signature.");
643
warning = $"Signing Microsoft library '{file.
FullPath
}' with 3rd party certificate '{signInfo.Certificate}'. The library is considered Microsoft library due to its copyright: '{peInfo.Copyright}'.";
648
warning = $"Signing 3rd party library '{file.
FullPath
}' with Microsoft certificate '{signInfo.Certificate}'. The library is considered 3rd party library due to its copyright: '{peInfo.Copyright}'.";
src\FileSignInfo.cs (2)
16
internal string FullPath => File.
FullPath
;
136
Debug.Assert(pathWithHash.
FullPath
!= null);