Skip to content

Commit 40bdbc5

Browse files
committed
Remove deprecated package 'ioutil'
1 parent 1c1dc4e commit 40bdbc5

File tree

5 files changed

+16
-20
lines changed

5 files changed

+16
-20
lines changed

cert.go

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ import (
1515
"crypto/x509/pkix"
1616
"encoding/asn1"
1717
"encoding/pem"
18-
"io/ioutil"
1918
"log"
2019
"math/big"
2120
"net"
@@ -113,19 +112,19 @@ func (m *mkcert) makeCert(hosts []string) {
113112
privPEM := pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: privDER})
114113

115114
if certFile == keyFile {
116-
err = ioutil.WriteFile(keyFile, append(certPEM, privPEM...), 0600)
115+
err = os.WriteFile(keyFile, append(certPEM, privPEM...), 0600)
117116
fatalIfErr(err, "failed to save certificate and key")
118117
} else {
119-
err = ioutil.WriteFile(certFile, certPEM, 0644)
118+
err = os.WriteFile(certFile, certPEM, 0644)
120119
fatalIfErr(err, "failed to save certificate")
121-
err = ioutil.WriteFile(keyFile, privPEM, 0600)
120+
err = os.WriteFile(keyFile, privPEM, 0600)
122121
fatalIfErr(err, "failed to save certificate key")
123122
}
124123
} else {
125124
domainCert, _ := x509.ParseCertificate(cert)
126125
pfxData, err := pkcs12.Encode(rand.Reader, priv, domainCert, []*x509.Certificate{m.caCert}, "changeit")
127126
fatalIfErr(err, "failed to generate PKCS#12")
128-
err = ioutil.WriteFile(p12File, pfxData, 0644)
127+
err = os.WriteFile(p12File, pfxData, 0644)
129128
fatalIfErr(err, "failed to save PKCS#12")
130129
}
131130

@@ -211,7 +210,7 @@ func (m *mkcert) makeCertFromCSR() {
211210
log.Fatalln("ERROR: can't create new certificates because the CA key (rootCA-key.pem) is missing")
212211
}
213212

214-
csrPEMBytes, err := ioutil.ReadFile(m.csrPath)
213+
csrPEMBytes, err := os.ReadFile(m.csrPath)
215214
fatalIfErr(err, "failed to read the CSR")
216215
csrPEM, _ := pem.Decode(csrPEMBytes)
217216
if csrPEM == nil {
@@ -267,7 +266,7 @@ func (m *mkcert) makeCertFromCSR() {
267266
}
268267
certFile, _, _ := m.fileNames(hosts)
269268

270-
err = ioutil.WriteFile(certFile, pem.EncodeToMemory(
269+
err = os.WriteFile(certFile, pem.EncodeToMemory(
271270
&pem.Block{Type: "CERTIFICATE", Bytes: cert}), 0644)
272271
fatalIfErr(err, "failed to save certificate")
273272

@@ -284,7 +283,7 @@ func (m *mkcert) loadCA() {
284283
m.newCA()
285284
}
286285

287-
certPEMBlock, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName))
286+
certPEMBlock, err := os.ReadFile(filepath.Join(m.CAROOT, rootName))
288287
fatalIfErr(err, "failed to read the CA certificate")
289288
certDERBlock, _ := pem.Decode(certPEMBlock)
290289
if certDERBlock == nil || certDERBlock.Type != "CERTIFICATE" {
@@ -297,7 +296,7 @@ func (m *mkcert) loadCA() {
297296
return // keyless mode, where only -install works
298297
}
299298

300-
keyPEMBlock, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootKeyName))
299+
keyPEMBlock, err := os.ReadFile(filepath.Join(m.CAROOT, rootKeyName))
301300
fatalIfErr(err, "failed to read the CA key")
302301
keyDERBlock, _ := pem.Decode(keyPEMBlock)
303302
if keyDERBlock == nil || keyDERBlock.Type != "PRIVATE KEY" {
@@ -352,11 +351,11 @@ func (m *mkcert) newCA() {
352351

353352
privDER, err := x509.MarshalPKCS8PrivateKey(priv)
354353
fatalIfErr(err, "failed to encode CA key")
355-
err = ioutil.WriteFile(filepath.Join(m.CAROOT, rootKeyName), pem.EncodeToMemory(
354+
err = os.WriteFile(filepath.Join(m.CAROOT, rootKeyName), pem.EncodeToMemory(
356355
&pem.Block{Type: "PRIVATE KEY", Bytes: privDER}), 0400)
357356
fatalIfErr(err, "failed to save CA key")
358357

359-
err = ioutil.WriteFile(filepath.Join(m.CAROOT, rootName), pem.EncodeToMemory(
358+
err = os.WriteFile(filepath.Join(m.CAROOT, rootName), pem.EncodeToMemory(
360359
&pem.Block{Type: "CERTIFICATE", Bytes: cert}), 0644)
361360
fatalIfErr(err, "failed to save CA certificate")
362361

truststore_darwin.go

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ package main
77
import (
88
"bytes"
99
"encoding/asn1"
10-
"io/ioutil"
1110
"log"
1211
"os"
1312
"path/filepath"
@@ -57,15 +56,15 @@ func (m *mkcert) installPlatform() bool {
5756
// Make trustSettings explicit, as older Go does not know the defaults.
5857
// https://github.com/golang/go/issues/24652
5958

60-
plistFile, err := ioutil.TempFile("", "trust-settings")
59+
plistFile, err := os.CreateTemp("", "trust-settings")
6160
fatalIfErr(err, "failed to create temp file")
6261
defer os.Remove(plistFile.Name())
6362

6463
cmd = commandWithSudo("security", "trust-settings-export", "-d", plistFile.Name())
6564
out, err = cmd.CombinedOutput()
6665
fatalIfCmdErr(err, "security trust-settings-export", out)
6766

68-
plistData, err := ioutil.ReadFile(plistFile.Name())
67+
plistData, err := os.ReadFile(plistFile.Name())
6968
fatalIfErr(err, "failed to read trust settings")
7069
var plistRoot map[string]interface{}
7170
_, err = plist.Unmarshal(plistData, &plistRoot)
@@ -92,7 +91,7 @@ func (m *mkcert) installPlatform() bool {
9291

9392
plistData, err = plist.MarshalIndent(plistRoot, plist.XMLFormat, "\t")
9493
fatalIfErr(err, "failed to serialize trust settings")
95-
err = ioutil.WriteFile(plistFile.Name(), plistData, 0600)
94+
err = os.WriteFile(plistFile.Name(), plistData, 0600)
9695
fatalIfErr(err, "failed to write trust settings")
9796

9897
cmd = commandWithSudo("security", "trust-settings-import", "-d", plistFile.Name())

truststore_java.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ var (
2525
javaHome string
2626
cacertsPath string
2727
keytoolPath string
28-
storePass string = "changeit"
28+
storePass = "changeit"
2929
)
3030

3131
func init() {

truststore_linux.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ package main
77
import (
88
"bytes"
99
"fmt"
10-
"io/ioutil"
1110
"log"
1211
"os"
1312
"path/filepath"
@@ -59,7 +58,7 @@ func (m *mkcert) installPlatform() bool {
5958
return false
6059
}
6160

62-
cert, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName))
61+
cert, err := os.ReadFile(filepath.Join(m.CAROOT, rootName))
6362
fatalIfErr(err, "failed to read root certificate")
6463

6564
cmd := commandWithSudo("tee", m.systemTrustFilename())

truststore_windows.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ import (
88
"crypto/x509"
99
"encoding/pem"
1010
"fmt"
11-
"io/ioutil"
1211
"math/big"
1312
"os"
1413
"path/filepath"
@@ -34,7 +33,7 @@ var (
3433

3534
func (m *mkcert) installPlatform() bool {
3635
// Load cert
37-
cert, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName))
36+
cert, err := os.ReadFile(filepath.Join(m.CAROOT, rootName))
3837
fatalIfErr(err, "failed to read root certificate")
3938
// Decode PEM
4039
if certBlock, _ := pem.Decode(cert); certBlock == nil || certBlock.Type != "CERTIFICATE" {

0 commit comments

Comments
 (0)