1 write to _log
Microsoft.DotNet.SignTool (1)
src\Configuration.cs (1)
130_log = log;
31 references to _log
Microsoft.DotNet.SignTool (31)
src\Configuration.cs (31)
186_log.LogError("Could not determine certificate name for signable file(s):"); 193_log.LogError($"\tFile: {erroredFile.FileName}"); 198_log.LogError($"\t\t{containerName}"); 210_log.LogMessage($"Tracking file '{file.FullPath}' isNested={isNested}"); 237_log.LogError($"Failed to build zip data for {fileSignInfo.FullPath}"); 242_log.LogMessage($"Trying to gather data for wix container {fileSignInfo.FullPath}"); 249_log.LogError($"Failed to build wix data for {fileSignInfo.FullPath}"); 253_log.LogMessage(MessageImportance.Low, $"Caching file {fileSignInfo.FileContentKey.FileName} {fileSignInfo.FileContentKey.StringHash}"); 312_log.LogMessage(MessageImportance.Low, $"Ignoring zero length file: {file.FullPath}"); 377isAlreadyStrongNamed = StrongName.IsSigned(file.FullPath, snPath:_snPath, log: _log); 382_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} does not have a signature marker."); 386_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} has a signature marker."); 391_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} does not have a valid strong name signature."); 395_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} has a valid strong name signature."); 445isAlreadyAuthenticodeSigned = VerifySignatures.IsSignedContainer(_log, file.FullPath, _pathToContainerUnpackingDirectory, _tarToolPath, _pkgToolPath); 448_log.LogMessage(MessageImportance.Low, $"Container {file.FullPath} does not have a signature marker."); 452_log.LogMessage(MessageImportance.Low, $"Container {file.FullPath} has a signature marker."); 460_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} is not digitally signed."); 464_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} is digitally signed."); 469isAlreadyAuthenticodeSigned = VerifySignatures.VerifySignedDeb(_log, file.FullPath); 472_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} is not signed."); 476_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} is signed."); 484_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} does not have a signature block."); 488_log.LogMessage(MessageImportance.Low, $"File {file.FullPath} has a signature block."); 502_log.LogMessage(MessageImportance.Low, $"File configured to not be signed: {file.FullPath}{fileSpec}"); 572_log.LogMessage(MessageImportance.High, $"{code.ToString()}: {warning}"); 587_log.LogMessage(MessageImportance.Low, $"Ignoring non-signable file: {file.FullPath}"); 594=> _log.LogWarning(subcategory: null, warningCode: code.ToString(), helpKeyword: null, file: null, lineNumber: 0, columnNumber: 0, endLineNumber: 0, endColumnNumber: 0, message: message); 756foreach (var (relativePath, contentStream, contentSize) in ZipData.ReadEntries(_log, archivePath, _pathToContainerUnpackingDirectory, _tarToolPath, _pkgToolPath)) 785_log.LogMessage($"Extracting file '{fileName}' from '{archivePath}' to '{tempPath}'."); 812_log.LogErrorFromException(e, true);