@@ -15,7 +15,6 @@ import (
1515 "crypto/x509/pkix"
1616 "encoding/asn1"
1717 "encoding/pem"
18- "io/ioutil"
1918 "log"
2019 "math/big"
2120 "net"
@@ -113,19 +112,19 @@ func (m *mkcert) makeCert(hosts []string) {
113112 privPEM := pem .EncodeToMemory (& pem.Block {Type : "PRIVATE KEY" , Bytes : privDER })
114113
115114 if certFile == keyFile {
116- err = ioutil .WriteFile (keyFile , append (certPEM , privPEM ... ), 0600 )
115+ err = os .WriteFile (keyFile , append (certPEM , privPEM ... ), 0600 )
117116 fatalIfErr (err , "failed to save certificate and key" )
118117 } else {
119- err = ioutil .WriteFile (certFile , certPEM , 0644 )
118+ err = os .WriteFile (certFile , certPEM , 0644 )
120119 fatalIfErr (err , "failed to save certificate" )
121- err = ioutil .WriteFile (keyFile , privPEM , 0600 )
120+ err = os .WriteFile (keyFile , privPEM , 0600 )
122121 fatalIfErr (err , "failed to save certificate key" )
123122 }
124123 } else {
125124 domainCert , _ := x509 .ParseCertificate (cert )
126125 pfxData , err := pkcs12 .Encode (rand .Reader , priv , domainCert , []* x509.Certificate {m .caCert }, "changeit" )
127126 fatalIfErr (err , "failed to generate PKCS#12" )
128- err = ioutil .WriteFile (p12File , pfxData , 0644 )
127+ err = os .WriteFile (p12File , pfxData , 0644 )
129128 fatalIfErr (err , "failed to save PKCS#12" )
130129 }
131130
@@ -211,7 +210,7 @@ func (m *mkcert) makeCertFromCSR() {
211210 log .Fatalln ("ERROR: can't create new certificates because the CA key (rootCA-key.pem) is missing" )
212211 }
213212
214- csrPEMBytes , err := ioutil .ReadFile (m .csrPath )
213+ csrPEMBytes , err := os .ReadFile (m .csrPath )
215214 fatalIfErr (err , "failed to read the CSR" )
216215 csrPEM , _ := pem .Decode (csrPEMBytes )
217216 if csrPEM == nil {
@@ -267,7 +266,7 @@ func (m *mkcert) makeCertFromCSR() {
267266 }
268267 certFile , _ , _ := m .fileNames (hosts )
269268
270- err = ioutil .WriteFile (certFile , pem .EncodeToMemory (
269+ err = os .WriteFile (certFile , pem .EncodeToMemory (
271270 & pem.Block {Type : "CERTIFICATE" , Bytes : cert }), 0644 )
272271 fatalIfErr (err , "failed to save certificate" )
273272
@@ -284,7 +283,7 @@ func (m *mkcert) loadCA() {
284283 m .newCA ()
285284 }
286285
287- certPEMBlock , err := ioutil .ReadFile (filepath .Join (m .CAROOT , rootName ))
286+ certPEMBlock , err := os .ReadFile (filepath .Join (m .CAROOT , rootName ))
288287 fatalIfErr (err , "failed to read the CA certificate" )
289288 certDERBlock , _ := pem .Decode (certPEMBlock )
290289 if certDERBlock == nil || certDERBlock .Type != "CERTIFICATE" {
@@ -297,7 +296,7 @@ func (m *mkcert) loadCA() {
297296 return // keyless mode, where only -install works
298297 }
299298
300- keyPEMBlock , err := ioutil .ReadFile (filepath .Join (m .CAROOT , rootKeyName ))
299+ keyPEMBlock , err := os .ReadFile (filepath .Join (m .CAROOT , rootKeyName ))
301300 fatalIfErr (err , "failed to read the CA key" )
302301 keyDERBlock , _ := pem .Decode (keyPEMBlock )
303302 if keyDERBlock == nil || keyDERBlock .Type != "PRIVATE KEY" {
@@ -352,11 +351,11 @@ func (m *mkcert) newCA() {
352351
353352 privDER , err := x509 .MarshalPKCS8PrivateKey (priv )
354353 fatalIfErr (err , "failed to encode CA key" )
355- err = ioutil .WriteFile (filepath .Join (m .CAROOT , rootKeyName ), pem .EncodeToMemory (
354+ err = os .WriteFile (filepath .Join (m .CAROOT , rootKeyName ), pem .EncodeToMemory (
356355 & pem.Block {Type : "PRIVATE KEY" , Bytes : privDER }), 0400 )
357356 fatalIfErr (err , "failed to save CA key" )
358357
359- err = ioutil .WriteFile (filepath .Join (m .CAROOT , rootName ), pem .EncodeToMemory (
358+ err = os .WriteFile (filepath .Join (m .CAROOT , rootName ), pem .EncodeToMemory (
360359 & pem.Block {Type : "CERTIFICATE" , Bytes : cert }), 0644 )
361360 fatalIfErr (err , "failed to save CA certificate" )
362361
0 commit comments