1 write to FullPath
Microsoft.DotNet.SignTool (1)
src\PathWithHash.cs (1)
37FullPath = fullPath;
36 references to FullPath
Microsoft.DotNet.SignTool (36)
src\Configuration.cs (34)
213_log.LogMessage($"Tracking file '{file.FullPath}' isNested={isNested}"); 226_filesToCopy.Add(new KeyValuePair<string, string>(existingSignInfo.FullPath, file.FullPath)); 244_log.LogMessage(MessageImportance.Normal, "Skipping container unpacking for '{0}' due to DoNotUnpack flag", file.FullPath); 330ExecutableType executableType = ContentUtil.GetExecutableType(file.FullPath); 336_log.LogMessage(MessageImportance.Low, $"Ignoring zero length file: {file.FullPath}"); 351Debug.Assert(parentContainer.FullPath != file.FullPath); 398if (FileSignInfo.IsPEFile(file.FullPath)) 400isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedPE(file.FullPath)); 403peInfo = GetPEInfo(file.FullPath); 449else if (FileSignInfo.IsPkg(file.FullPath) || FileSignInfo.IsAppBundle(file.FullPath)) 451isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedPkgOrAppBundle(_log, file.FullPath, _pkgToolPath)); 453else if (FileSignInfo.IsNupkg(file.FullPath)) 455isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedNupkg(file.FullPath)); 457else if (FileSignInfo.IsWixInstaller(file.FullPath)) 459isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsWixSigned(file.FullPath)); 461else if (FileSignInfo.IsDeb(file.FullPath)) 463isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedDeb(_log, file.FullPath)); 465else if (FileSignInfo.IsRpm(file.FullPath)) 467isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedRpm(_log, file.FullPath));; 469else if (FileSignInfo.IsPowerShellScript(file.FullPath)) 471isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedPowershellFile(file.FullPath)); 506_log.LogMessage(MessageImportance.Low, $"File configured to not be signed: {file.FullPath}{fileSpec}"); 543_log.LogWarning($"Skipping file '{file.FullPath}' because .js files are no longer signed by default. " + 582_log.LogMessage(MessageImportance.Low, $"Ignoring non-signable file: {file.FullPath}"); 592_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' is already signed."); 595_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' is not signed."); 598_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' signing status is unknown, treating as unsigned."); 607bool isAlreadyStrongNamed = StrongNameHelper.IsSigned(file.FullPath, snPath: _snPath); 610_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} does not have a valid strong name signature."); 614_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} has a valid strong name signature."); 649warning = $"Signing Microsoft library '{file.FullPath}' with 3rd party certificate '{signInfo.Certificate}'. The library is considered Microsoft library due to its copyright: '{peInfo.Copyright}'."; 654warning = $"Signing 3rd party library '{file.FullPath}' with Microsoft certificate '{signInfo.Certificate}'. The library is considered 3rd party library due to its copyright: '{peInfo.Copyright}'.";
src\FileSignInfo.cs (2)
16internal string FullPath => File.FullPath; 136Debug.Assert(pathWithHash.FullPath != null);