1 write to _log
Microsoft.DotNet.SignTool (1)
src\Configuration.cs (1)
133_log = log;
26 references to _log
Microsoft.DotNet.SignTool (26)
src\Configuration.cs (26)
191_log.LogError("Could not determine certificate name for signable file(s):"); 198_log.LogError($"\tFile: {erroredFile.FileName}"); 203_log.LogError($"\t\t{containerName}"); 215_log.LogMessage($"Tracking file '{file.FullPath}' isNested={isNested}"); 234_log.LogMessage(MessageImportance.Low, $"Will copy detached signature from '{existingSignInfo.DetachedSignatureFullPath}' to '{fileSignInfo.DetachedSignatureFullPath}'"); 244_log.LogMessage($"Trying to gather data for wix container {fileSignInfo.FullPath}"); 251_log.LogError($"Failed to build wix data for {fileSignInfo.FullPath}"); 262_log.LogError($"Failed to build zip data for {fileSignInfo.FullPath}"); 266_log.LogMessage(MessageImportance.Low, $"Caching file {fileSignInfo.FileContentKey.FileName} {fileSignInfo.FileContentKey.StringHash}"); 328_log.LogMessage(MessageImportance.Low, $"Ignoring zero length file: {file.FullPath}"); 443isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedPkgOrAppBundle(_log, file.FullPath, _dotNetPathTooling, _pkgToolPath)); 455isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedDeb(_log, file.FullPath)); 459isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedRpm(_log, file.FullPath));; 488_log.LogMessage(MessageImportance.Low, $"File configured to not be signed: {file.FullPath}{fileSpec}"); 519_log.LogWarning($"Skipping file '{file.FullPath}' because .js files are no longer signed by default. " + 558_log.LogMessage(MessageImportance.Low, $"Ignoring non-signable file: {file.FullPath}"); 568_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' is already signed."); 571_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' is not signed."); 574_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' signing status is unknown, treating as unsigned."); 586_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} does not have a valid strong name signature."); 590_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} has a valid strong name signature."); 641_log.LogMessage(MessageImportance.High, $"{code.ToString()}: {warning}"); 648=> _log.LogWarning(subcategory: null, warningCode: code.ToString(), helpKeyword: null, file: null, lineNumber: 0, columnNumber: 0, endLineNumber: 0, endColumnNumber: 0, message: message); 837_log.LogMessage($"Extracting file '{fileName}' from '{archivePath}' to '{tempPath}'."); 861_log.LogErrorFromException(e, true); 897_log.LogMessage(MessageImportance.Low, $"File {file.FileName} will use detached signatures based on certificate configuration");