1 write to _log
Microsoft.DotNet.SignTool (1)
src\Configuration.cs (1)
129
_log
= log;
30 references to _log
Microsoft.DotNet.SignTool (30)
src\Configuration.cs (30)
185
_log
.LogError("Could not determine certificate name for signable file(s):");
192
_log
.LogError($"\tFile: {erroredFile.FileName}");
197
_log
.LogError($"\t\t{containerName}");
209
_log
.LogMessage($"Tracking file '{file.FullPath}' isNested={isNested}");
228
_log
.LogMessage(MessageImportance.Low, $"Will copy detached signature from '{existingSignInfo.DetachedSignatureFullPath}' to '{fileSignInfo.DetachedSignatureFullPath}'");
238
_log
.LogMessage(MessageImportance.Normal, "Skipping container unpacking for '{0}' due to DoNotUnpack flag", file.FullPath);
244
_log
.LogMessage($"Trying to gather data for wix container {fileSignInfo.FullPath}");
251
_log
.LogError($"Failed to build wix data for {fileSignInfo.FullPath}");
262
_log
.LogError($"Failed to build zip data for {fileSignInfo.FullPath}");
268
_log
.LogMessage(MessageImportance.Low, $"Caching file {fileSignInfo.FileContentKey.FileName} {fileSignInfo.FileContentKey.StringHash}");
330
_log
.LogMessage(MessageImportance.Low, $"Ignoring zero length file: {file.FullPath}");
445
isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedPkgOrAppBundle(
_log
, file.FullPath, _pkgToolPath));
457
isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedDeb(
_log
, file.FullPath));
461
isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedRpm(
_log
, file.FullPath));;
500
_log
.LogMessage(MessageImportance.Low, $"File configured to not be signed: {file.FullPath}{fileSpec}");
537
_log
.LogWarning($"Skipping file '{file.FullPath}' because .js files are no longer signed by default. " +
576
_log
.LogMessage(MessageImportance.Low, $"Ignoring non-signable file: {file.FullPath}");
586
_log
.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' is already signed.");
589
_log
.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' is not signed.");
592
_log
.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' signing status is unknown, treating as unsigned.");
604
_log
.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} does not have a valid strong name signature.");
608
_log
.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} has a valid strong name signature.");
659
_log
.LogMessage(MessageImportance.High, $"{code.ToString()}: {warning}");
666
=>
_log
.LogWarning(subcategory: null, warningCode: code.ToString(), helpKeyword: null, file: null, lineNumber: 0, columnNumber: 0, endLineNumber: 0, endColumnNumber: 0, message: message);
828
foreach (var entry in ZipData.ReadEntries(archivePath, _pathToContainerUnpackingDirectory, _pkgToolPath,
_log
))
856
_log
.LogMessage($"Extracting file '{fileName}' from '{archivePath}' to '{tempPath}'. (Caching with perms: {entryPerms})");
861
ZipData.SetUnixFileMode(
_log
, entry.UnixFileMode, tempPath);
869
_log
.LogMessage($"Reusing previously extracted file '{fileName}' for '{archivePath}'. (Archival perms: {entryPerms})");
885
_log
.LogErrorFromException(e, true);
921
_log
.LogMessage(MessageImportance.Low, $"File {file.FileName} will use detached signatures based on certificate configuration");