1 write to _log
Microsoft.DotNet.SignTool (1)
src\Configuration.cs (1)
132_log = log;
30 references to _log
Microsoft.DotNet.SignTool (30)
src\Configuration.cs (30)
189_log.LogError("Could not determine certificate name for signable file(s):"); 196_log.LogError($"\tFile: {erroredFile.FileName}"); 201_log.LogError($"\t\t{containerName}"); 213_log.LogMessage($"Tracking file '{file.FullPath}' isNested={isNested}"); 232_log.LogMessage(MessageImportance.Low, $"Will copy detached signature from '{existingSignInfo.DetachedSignatureFullPath}' to '{fileSignInfo.DetachedSignatureFullPath}'"); 242_log.LogMessage(MessageImportance.Normal, "Skipping container unpacking for '{0}' due to DoNotUnpack flag", file.FullPath); 248_log.LogMessage($"Trying to gather data for wix container {fileSignInfo.FullPath}"); 255_log.LogError($"Failed to build wix data for {fileSignInfo.FullPath}"); 266_log.LogError($"Failed to build zip data for {fileSignInfo.FullPath}"); 272_log.LogMessage(MessageImportance.Low, $"Caching file {fileSignInfo.FileContentKey.FileName} {fileSignInfo.FileContentKey.StringHash}"); 334_log.LogMessage(MessageImportance.Low, $"Ignoring zero length file: {file.FullPath}"); 449isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedPkgOrAppBundle(_log, file.FullPath, _pkgToolPath)); 461isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedDeb(_log, file.FullPath)); 465isAlreadyAuthenticodeSigned = IsSigned(file, VerifySignatures.IsSignedRpm(_log, file.FullPath));; 504_log.LogMessage(MessageImportance.Low, $"File configured to not be signed: {file.FullPath}{fileSpec}"); 541_log.LogWarning($"Skipping file '{file.FullPath}' because .js files are no longer signed by default. " + 580_log.LogMessage(MessageImportance.Low, $"Ignoring non-signable file: {file.FullPath}"); 590_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' is already signed."); 593_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' is not signed."); 596_log.LogMessage(MessageImportance.Low, $"File '{file.FullPath}' signing status is unknown, treating as unsigned."); 608_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} does not have a valid strong name signature."); 612_log.LogMessage(MessageImportance.Low, $"PE file {file.FullPath} has a valid strong name signature."); 663_log.LogMessage(MessageImportance.High, $"{code.ToString()}: {warning}"); 670=> _log.LogWarning(subcategory: null, warningCode: code.ToString(), helpKeyword: null, file: null, lineNumber: 0, columnNumber: 0, endLineNumber: 0, endColumnNumber: 0, message: message); 832foreach (var entry in ZipData.ReadEntries(archivePath, _pathToContainerUnpackingDirectory, _tarToolPath, _pkgToolPath, _log)) 860_log.LogMessage($"Extracting file '{fileName}' from '{archivePath}' to '{tempPath}'. (Caching with perms: {entryPerms})"); 865ZipData.SetUnixFileMode(_log, entry.UnixFileMode, tempPath); 873_log.LogMessage($"Reusing previously extracted file '{fileName}' for '{archivePath}'. (Archival perms: {entryPerms})"); 889_log.LogErrorFromException(e, true); 925_log.LogMessage(MessageImportance.Low, $"File {file.FileName} will use detached signatures based on certificate configuration");