@@ -15,7 +15,6 @@ import (
15
15
"crypto/x509/pkix"
16
16
"encoding/asn1"
17
17
"encoding/pem"
18
- "io/ioutil"
19
18
"log"
20
19
"math/big"
21
20
"net"
@@ -113,19 +112,19 @@ func (m *mkcert) makeCert(hosts []string) {
113
112
privPEM := pem .EncodeToMemory (& pem.Block {Type : "PRIVATE KEY" , Bytes : privDER })
114
113
115
114
if certFile == keyFile {
116
- err = ioutil .WriteFile (keyFile , append (certPEM , privPEM ... ), 0600 )
115
+ err = os .WriteFile (keyFile , append (certPEM , privPEM ... ), 0600 )
117
116
fatalIfErr (err , "failed to save certificate and key" )
118
117
} else {
119
- err = ioutil .WriteFile (certFile , certPEM , 0644 )
118
+ err = os .WriteFile (certFile , certPEM , 0644 )
120
119
fatalIfErr (err , "failed to save certificate" )
121
- err = ioutil .WriteFile (keyFile , privPEM , 0600 )
120
+ err = os .WriteFile (keyFile , privPEM , 0600 )
122
121
fatalIfErr (err , "failed to save certificate key" )
123
122
}
124
123
} else {
125
124
domainCert , _ := x509 .ParseCertificate (cert )
126
125
pfxData , err := pkcs12 .Encode (rand .Reader , priv , domainCert , []* x509.Certificate {m .caCert }, "changeit" )
127
126
fatalIfErr (err , "failed to generate PKCS#12" )
128
- err = ioutil .WriteFile (p12File , pfxData , 0644 )
127
+ err = os .WriteFile (p12File , pfxData , 0644 )
129
128
fatalIfErr (err , "failed to save PKCS#12" )
130
129
}
131
130
@@ -211,7 +210,7 @@ func (m *mkcert) makeCertFromCSR() {
211
210
log .Fatalln ("ERROR: can't create new certificates because the CA key (rootCA-key.pem) is missing" )
212
211
}
213
212
214
- csrPEMBytes , err := ioutil .ReadFile (m .csrPath )
213
+ csrPEMBytes , err := os .ReadFile (m .csrPath )
215
214
fatalIfErr (err , "failed to read the CSR" )
216
215
csrPEM , _ := pem .Decode (csrPEMBytes )
217
216
if csrPEM == nil {
@@ -267,7 +266,7 @@ func (m *mkcert) makeCertFromCSR() {
267
266
}
268
267
certFile , _ , _ := m .fileNames (hosts )
269
268
270
- err = ioutil .WriteFile (certFile , pem .EncodeToMemory (
269
+ err = os .WriteFile (certFile , pem .EncodeToMemory (
271
270
& pem.Block {Type : "CERTIFICATE" , Bytes : cert }), 0644 )
272
271
fatalIfErr (err , "failed to save certificate" )
273
272
@@ -284,7 +283,7 @@ func (m *mkcert) loadCA() {
284
283
m .newCA ()
285
284
}
286
285
287
- certPEMBlock , err := ioutil .ReadFile (filepath .Join (m .CAROOT , rootName ))
286
+ certPEMBlock , err := os .ReadFile (filepath .Join (m .CAROOT , rootName ))
288
287
fatalIfErr (err , "failed to read the CA certificate" )
289
288
certDERBlock , _ := pem .Decode (certPEMBlock )
290
289
if certDERBlock == nil || certDERBlock .Type != "CERTIFICATE" {
@@ -297,7 +296,7 @@ func (m *mkcert) loadCA() {
297
296
return // keyless mode, where only -install works
298
297
}
299
298
300
- keyPEMBlock , err := ioutil .ReadFile (filepath .Join (m .CAROOT , rootKeyName ))
299
+ keyPEMBlock , err := os .ReadFile (filepath .Join (m .CAROOT , rootKeyName ))
301
300
fatalIfErr (err , "failed to read the CA key" )
302
301
keyDERBlock , _ := pem .Decode (keyPEMBlock )
303
302
if keyDERBlock == nil || keyDERBlock .Type != "PRIVATE KEY" {
@@ -352,11 +351,11 @@ func (m *mkcert) newCA() {
352
351
353
352
privDER , err := x509 .MarshalPKCS8PrivateKey (priv )
354
353
fatalIfErr (err , "failed to encode CA key" )
355
- err = ioutil .WriteFile (filepath .Join (m .CAROOT , rootKeyName ), pem .EncodeToMemory (
354
+ err = os .WriteFile (filepath .Join (m .CAROOT , rootKeyName ), pem .EncodeToMemory (
356
355
& pem.Block {Type : "PRIVATE KEY" , Bytes : privDER }), 0400 )
357
356
fatalIfErr (err , "failed to save CA key" )
358
357
359
- err = ioutil .WriteFile (filepath .Join (m .CAROOT , rootName ), pem .EncodeToMemory (
358
+ err = os .WriteFile (filepath .Join (m .CAROOT , rootName ), pem .EncodeToMemory (
360
359
& pem.Block {Type : "CERTIFICATE" , Bytes : cert }), 0644 )
361
360
fatalIfErr (err , "failed to save CA certificate" )
362
361
0 commit comments