1 write to _log
Microsoft.DotNet.SignTool (1)
src\Configuration.cs (1)
129_log = log;
30 references to _log
Microsoft.DotNet.SignTool (30)
src\Configuration.cs (30)
185_log.LogError("Could not determine certificate name for signable file(s):"); 192_log.LogError($"\tFile: {erroredFile.FileName}"); 197_log.LogError($"\t\t{containerName}"); 209_log.LogMessage($"Tracking file '{file.FullPath}' isNested={isNested}"); 228_log.LogMessage(MessageImportance.Low, $"Will copy detached signature from '{existingSignInfo.DetachedSignatureFullPath}' to '{fileSignInfo.DetachedSignatureFullPath}'"); 238_log.LogMessage(MessageImportance.Normal, "Skipping container unpacking for '{0}' due to DoNotUnpack flag", file.FullPath); 244_log.LogMessage($"Trying to gather data for wix container {fileSignInfo.FullPath}"); 251_log.LogError($"Failed to build wix data for {fileSignInfo.FullPath}"); 262_log.LogError($"Failed to build zip data for {fileSignInfo.FullPath}"); 268_log.LogMessage(MessageImportance.Low, $"Caching file {fileSignInfo.FileContentKey.FileName} {fileSignInfo.FileContentKey.StringHash}"); 330_log.LogMessage(MessageImportance.Low, $"Ignoring zero length file: {file.FullPath}"); 445isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedPkgOrAppBundle(_log, file.FullPath, _pkgToolPath)); 457isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedDeb(_log, file.FullPath)); 461isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedRpm(_log, file.FullPath));; 500_log.LogMessage(MessageImportance.Low, $"File configured to not be signed: {file.FullPath}{fileSpec}"); 537_log.LogWarning($"Skipping file '{file.FullPath}' because .js files are no longer signed by default. " + 576_log.LogMessage(MessageImportance.Low, $"Ignoring non-signable file: {file.FullPath}"); 586_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' is already signed."); 589_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' is not signed."); 592_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' signing status is unknown, treating as unsigned."); 604_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} does not have a valid strong name signature."); 608_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} has a valid strong name signature."); 659_log.LogMessage(MessageImportance.High, $"{code.ToString()}: {warning}"); 666=> _log.LogWarning(subcategory: null, warningCode: code.ToString(), helpKeyword: null, file: null, lineNumber: 0, columnNumber: 0, endLineNumber: 0, endColumnNumber: 0, message: message); 828foreach (var entry in ZipData.ReadEntries(archivePath, _pathToContainerUnpackingDirectory, _pkgToolPath, _log)) 856_log.LogMessage($"Extracting file '{fileName}' from '{archivePath}' to '{tempPath}'. (Caching with perms: {entryPerms})"); 861ZipData.SetUnixFileMode(_log, entry.UnixFileMode, tempPath); 869_log.LogMessage($"Reusing previously extracted file '{fileName}' for '{archivePath}'. (Archival perms: {entryPerms})"); 885_log.LogErrorFromException(e, true); 921_log.LogMessage(MessageImportance.Low, $"File {file.FileName} will use detached signatures based on certificate configuration");