diff --git a/cert.go b/cert.go index 4ce36cc..7e5a3c2 100644 --- a/cert.go +++ b/cert.go @@ -15,7 +15,6 @@ import ( "crypto/x509/pkix" "encoding/asn1" "encoding/pem" - "io/ioutil" "log" "math/big" "net" @@ -113,19 +112,19 @@ func (m *mkcert) makeCert(hosts []string) { privPEM := pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: privDER}) if certFile == keyFile { - err = ioutil.WriteFile(keyFile, append(certPEM, privPEM...), 0600) + err = os.WriteFile(keyFile, append(certPEM, privPEM...), 0600) fatalIfErr(err, "failed to save certificate and key") } else { - err = ioutil.WriteFile(certFile, certPEM, 0644) + err = os.WriteFile(certFile, certPEM, 0644) fatalIfErr(err, "failed to save certificate") - err = ioutil.WriteFile(keyFile, privPEM, 0600) + err = os.WriteFile(keyFile, privPEM, 0600) fatalIfErr(err, "failed to save certificate key") } } else { domainCert, _ := x509.ParseCertificate(cert) pfxData, err := pkcs12.Encode(rand.Reader, priv, domainCert, []*x509.Certificate{m.caCert}, "changeit") fatalIfErr(err, "failed to generate PKCS#12") - err = ioutil.WriteFile(p12File, pfxData, 0644) + err = os.WriteFile(p12File, pfxData, 0644) fatalIfErr(err, "failed to save PKCS#12") } @@ -211,7 +210,7 @@ func (m *mkcert) makeCertFromCSR() { log.Fatalln("ERROR: can't create new certificates because the CA key (rootCA-key.pem) is missing") } - csrPEMBytes, err := ioutil.ReadFile(m.csrPath) + csrPEMBytes, err := os.ReadFile(m.csrPath) fatalIfErr(err, "failed to read the CSR") csrPEM, _ := pem.Decode(csrPEMBytes) if csrPEM == nil { @@ -267,7 +266,7 @@ func (m *mkcert) makeCertFromCSR() { } certFile, _, _ := m.fileNames(hosts) - err = ioutil.WriteFile(certFile, pem.EncodeToMemory( + err = os.WriteFile(certFile, pem.EncodeToMemory( &pem.Block{Type: "CERTIFICATE", Bytes: cert}), 0644) fatalIfErr(err, "failed to save certificate") @@ -284,7 +283,7 @@ func (m *mkcert) loadCA() { m.newCA() } - certPEMBlock, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName)) + certPEMBlock, err := os.ReadFile(filepath.Join(m.CAROOT, rootName)) fatalIfErr(err, "failed to read the CA certificate") certDERBlock, _ := pem.Decode(certPEMBlock) if certDERBlock == nil || certDERBlock.Type != "CERTIFICATE" { @@ -297,7 +296,7 @@ func (m *mkcert) loadCA() { return // keyless mode, where only -install works } - keyPEMBlock, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootKeyName)) + keyPEMBlock, err := os.ReadFile(filepath.Join(m.CAROOT, rootKeyName)) fatalIfErr(err, "failed to read the CA key") keyDERBlock, _ := pem.Decode(keyPEMBlock) if keyDERBlock == nil || keyDERBlock.Type != "PRIVATE KEY" { @@ -352,11 +351,11 @@ func (m *mkcert) newCA() { privDER, err := x509.MarshalPKCS8PrivateKey(priv) fatalIfErr(err, "failed to encode CA key") - err = ioutil.WriteFile(filepath.Join(m.CAROOT, rootKeyName), pem.EncodeToMemory( + err = os.WriteFile(filepath.Join(m.CAROOT, rootKeyName), pem.EncodeToMemory( &pem.Block{Type: "PRIVATE KEY", Bytes: privDER}), 0400) fatalIfErr(err, "failed to save CA key") - err = ioutil.WriteFile(filepath.Join(m.CAROOT, rootName), pem.EncodeToMemory( + err = os.WriteFile(filepath.Join(m.CAROOT, rootName), pem.EncodeToMemory( &pem.Block{Type: "CERTIFICATE", Bytes: cert}), 0644) fatalIfErr(err, "failed to save CA certificate") diff --git a/truststore_darwin.go b/truststore_darwin.go index 83b8fac..385911c 100644 --- a/truststore_darwin.go +++ b/truststore_darwin.go @@ -7,7 +7,6 @@ package main import ( "bytes" "encoding/asn1" - "io/ioutil" "log" "os" "path/filepath" @@ -57,7 +56,7 @@ func (m *mkcert) installPlatform() bool { // Make trustSettings explicit, as older Go does not know the defaults. // https://github.com/golang/go/issues/24652 - plistFile, err := ioutil.TempFile("", "trust-settings") + plistFile, err := os.CreateTemp("", "trust-settings") fatalIfErr(err, "failed to create temp file") defer os.Remove(plistFile.Name()) @@ -65,7 +64,7 @@ func (m *mkcert) installPlatform() bool { out, err = cmd.CombinedOutput() fatalIfCmdErr(err, "security trust-settings-export", out) - plistData, err := ioutil.ReadFile(plistFile.Name()) + plistData, err := os.ReadFile(plistFile.Name()) fatalIfErr(err, "failed to read trust settings") var plistRoot map[string]interface{} _, err = plist.Unmarshal(plistData, &plistRoot) @@ -92,7 +91,7 @@ func (m *mkcert) installPlatform() bool { plistData, err = plist.MarshalIndent(plistRoot, plist.XMLFormat, "\t") fatalIfErr(err, "failed to serialize trust settings") - err = ioutil.WriteFile(plistFile.Name(), plistData, 0600) + err = os.WriteFile(plistFile.Name(), plistData, 0600) fatalIfErr(err, "failed to write trust settings") cmd = commandWithSudo("security", "trust-settings-import", "-d", plistFile.Name()) diff --git a/truststore_java.go b/truststore_java.go index 8ad84bb..95ae819 100644 --- a/truststore_java.go +++ b/truststore_java.go @@ -25,7 +25,7 @@ var ( javaHome string cacertsPath string keytoolPath string - storePass string = "changeit" + storePass = "changeit" ) func init() { diff --git a/truststore_linux.go b/truststore_linux.go index 2c4e5a3..809a524 100644 --- a/truststore_linux.go +++ b/truststore_linux.go @@ -7,7 +7,6 @@ package main import ( "bytes" "fmt" - "io/ioutil" "log" "os" "path/filepath" @@ -59,7 +58,7 @@ func (m *mkcert) installPlatform() bool { return false } - cert, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName)) + cert, err := os.ReadFile(filepath.Join(m.CAROOT, rootName)) fatalIfErr(err, "failed to read root certificate") cmd := commandWithSudo("tee", m.systemTrustFilename()) diff --git a/truststore_windows.go b/truststore_windows.go index a4c9fcb..3b9ea8a 100644 --- a/truststore_windows.go +++ b/truststore_windows.go @@ -8,7 +8,6 @@ import ( "crypto/x509" "encoding/pem" "fmt" - "io/ioutil" "math/big" "os" "path/filepath" @@ -34,7 +33,7 @@ var ( func (m *mkcert) installPlatform() bool { // Load cert - cert, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName)) + cert, err := os.ReadFile(filepath.Join(m.CAROOT, rootName)) fatalIfErr(err, "failed to read root certificate") // Decode PEM if certBlock, _ := pem.Decode(cert); certBlock == nil || certBlock.Type != "CERTIFICATE" {