From cc105aa53d2b304b433bfa6c2863a56a14502dc4 Mon Sep 17 00:00:00 2001 From: Andreas Deininger Date: Sun, 17 Nov 2024 11:14:36 +0100 Subject: [PATCH] Remove deprecated package 'ioutil' --- cert.go | 21 ++++++++++----------- truststore_linux.go | 3 +-- 2 files changed, 11 insertions(+), 13 deletions(-) diff --git a/cert.go b/cert.go index 4ce36ccf..7e5a3c2e 100644 --- a/cert.go +++ b/cert.go @@ -15,7 +15,6 @@ import ( "crypto/x509/pkix" "encoding/asn1" "encoding/pem" - "io/ioutil" "log" "math/big" "net" @@ -113,19 +112,19 @@ func (m *mkcert) makeCert(hosts []string) { privPEM := pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: privDER}) if certFile == keyFile { - err = ioutil.WriteFile(keyFile, append(certPEM, privPEM...), 0600) + err = os.WriteFile(keyFile, append(certPEM, privPEM...), 0600) fatalIfErr(err, "failed to save certificate and key") } else { - err = ioutil.WriteFile(certFile, certPEM, 0644) + err = os.WriteFile(certFile, certPEM, 0644) fatalIfErr(err, "failed to save certificate") - err = ioutil.WriteFile(keyFile, privPEM, 0600) + err = os.WriteFile(keyFile, privPEM, 0600) fatalIfErr(err, "failed to save certificate key") } } else { domainCert, _ := x509.ParseCertificate(cert) pfxData, err := pkcs12.Encode(rand.Reader, priv, domainCert, []*x509.Certificate{m.caCert}, "changeit") fatalIfErr(err, "failed to generate PKCS#12") - err = ioutil.WriteFile(p12File, pfxData, 0644) + err = os.WriteFile(p12File, pfxData, 0644) fatalIfErr(err, "failed to save PKCS#12") } @@ -211,7 +210,7 @@ func (m *mkcert) makeCertFromCSR() { log.Fatalln("ERROR: can't create new certificates because the CA key (rootCA-key.pem) is missing") } - csrPEMBytes, err := ioutil.ReadFile(m.csrPath) + csrPEMBytes, err := os.ReadFile(m.csrPath) fatalIfErr(err, "failed to read the CSR") csrPEM, _ := pem.Decode(csrPEMBytes) if csrPEM == nil { @@ -267,7 +266,7 @@ func (m *mkcert) makeCertFromCSR() { } certFile, _, _ := m.fileNames(hosts) - err = ioutil.WriteFile(certFile, pem.EncodeToMemory( + err = os.WriteFile(certFile, pem.EncodeToMemory( &pem.Block{Type: "CERTIFICATE", Bytes: cert}), 0644) fatalIfErr(err, "failed to save certificate") @@ -284,7 +283,7 @@ func (m *mkcert) loadCA() { m.newCA() } - certPEMBlock, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName)) + certPEMBlock, err := os.ReadFile(filepath.Join(m.CAROOT, rootName)) fatalIfErr(err, "failed to read the CA certificate") certDERBlock, _ := pem.Decode(certPEMBlock) if certDERBlock == nil || certDERBlock.Type != "CERTIFICATE" { @@ -297,7 +296,7 @@ func (m *mkcert) loadCA() { return // keyless mode, where only -install works } - keyPEMBlock, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootKeyName)) + keyPEMBlock, err := os.ReadFile(filepath.Join(m.CAROOT, rootKeyName)) fatalIfErr(err, "failed to read the CA key") keyDERBlock, _ := pem.Decode(keyPEMBlock) if keyDERBlock == nil || keyDERBlock.Type != "PRIVATE KEY" { @@ -352,11 +351,11 @@ func (m *mkcert) newCA() { privDER, err := x509.MarshalPKCS8PrivateKey(priv) fatalIfErr(err, "failed to encode CA key") - err = ioutil.WriteFile(filepath.Join(m.CAROOT, rootKeyName), pem.EncodeToMemory( + err = os.WriteFile(filepath.Join(m.CAROOT, rootKeyName), pem.EncodeToMemory( &pem.Block{Type: "PRIVATE KEY", Bytes: privDER}), 0400) fatalIfErr(err, "failed to save CA key") - err = ioutil.WriteFile(filepath.Join(m.CAROOT, rootName), pem.EncodeToMemory( + err = os.WriteFile(filepath.Join(m.CAROOT, rootName), pem.EncodeToMemory( &pem.Block{Type: "CERTIFICATE", Bytes: cert}), 0644) fatalIfErr(err, "failed to save CA certificate") diff --git a/truststore_linux.go b/truststore_linux.go index 2c4e5a37..809a524e 100644 --- a/truststore_linux.go +++ b/truststore_linux.go @@ -7,7 +7,6 @@ package main import ( "bytes" "fmt" - "io/ioutil" "log" "os" "path/filepath" @@ -59,7 +58,7 @@ func (m *mkcert) installPlatform() bool { return false } - cert, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName)) + cert, err := os.ReadFile(filepath.Join(m.CAROOT, rootName)) fatalIfErr(err, "failed to read root certificate") cmd := commandWithSudo("tee", m.systemTrustFilename())