@@ -11,7 +11,6 @@ import (
11
11
"encoding/hex"
12
12
"encoding/pem"
13
13
"fmt"
14
- "io/ioutil"
15
14
"net"
16
15
"os"
17
16
"sync"
@@ -79,7 +78,7 @@ func TestMain(m *testing.M) {
79
78
}
80
79
81
80
func TestCreateRootCASaveRootCA (t * testing.T ) {
82
- tempBaseDir , err := ioutil . TempDir ("" , "swarm-ca-test-" )
81
+ tempBaseDir , err := os . MkdirTemp ("" , "swarm-ca-test-" )
83
82
assert .NoError (t , err )
84
83
defer os .RemoveAll (tempBaseDir )
85
84
@@ -100,7 +99,7 @@ func TestCreateRootCASaveRootCA(t *testing.T) {
100
99
assert .True (t , os .IsNotExist (err ))
101
100
102
101
// ensure that the cert that was written is already normalized
103
- written , err := ioutil .ReadFile (paths .RootCA .Cert )
102
+ written , err := os .ReadFile (paths .RootCA .Cert )
104
103
assert .NoError (t , err )
105
104
assert .Equal (t , written , ca .NormalizePEMs (written ))
106
105
}
@@ -118,7 +117,7 @@ func TestCreateRootCAExpiry(t *testing.T) {
118
117
}
119
118
120
119
func TestGetLocalRootCA (t * testing.T ) {
121
- tempBaseDir , err := ioutil . TempDir ("" , "swarm-ca-test-" )
120
+ tempBaseDir , err := os . MkdirTemp ("" , "swarm-ca-test-" )
122
121
assert .NoError (t , err )
123
122
defer os .RemoveAll (tempBaseDir )
124
123
@@ -144,7 +143,7 @@ func TestGetLocalRootCA(t *testing.T) {
144
143
assert .Equal (t , err , ca .ErrNoValidSigner )
145
144
146
145
// write private key and assert we can load it and sign
147
- assert .NoError (t , ioutil .WriteFile (paths .RootCA .Key , s .Key , os .FileMode (0600 )))
146
+ assert .NoError (t , os .WriteFile (paths .RootCA .Key , s .Key , os .FileMode (0o600 )))
148
147
rootCA3 , err := ca .GetLocalRootCA (paths .RootCA )
149
148
assert .NoError (t , err )
150
149
assert .Equal (t , rootCA .Certs , rootCA3 .Certs )
@@ -160,30 +159,30 @@ func TestGetLocalRootCA(t *testing.T) {
160
159
Type : "EC PRIVATE KEY" ,
161
160
Bytes : privKeyBytes ,
162
161
})
163
- assert .NoError (t , ioutil .WriteFile (paths .RootCA .Key , privKeyPem , os .FileMode (0600 )))
162
+ assert .NoError (t , os .WriteFile (paths .RootCA .Key , privKeyPem , os .FileMode (0o600 )))
164
163
165
164
_ , err = ca .GetLocalRootCA (paths .RootCA )
166
165
assert .EqualError (t , err , "certificate key mismatch" )
167
166
}
168
167
169
168
func TestGetLocalRootCAInvalidCert (t * testing.T ) {
170
- tempBaseDir , err := ioutil . TempDir ("" , "swarm-ca-test-" )
169
+ tempBaseDir , err := os . MkdirTemp ("" , "swarm-ca-test-" )
171
170
assert .NoError (t , err )
172
171
defer os .RemoveAll (tempBaseDir )
173
172
174
173
paths := ca .NewConfigPaths (tempBaseDir )
175
174
176
175
// Write some garbage to the CA cert
177
- require .NoError (t , ioutil .WriteFile (paths .RootCA .Cert , []byte (`-----BEGIN CERTIFICATE-----\n
176
+ require .NoError (t , os .WriteFile (paths .RootCA .Cert , []byte (`-----BEGIN CERTIFICATE-----\n
178
177
some random garbage\n
179
- -----END CERTIFICATE-----` ), 0644 ))
178
+ -----END CERTIFICATE-----` ), 0o644 ))
180
179
181
180
_ , err = ca .GetLocalRootCA (paths .RootCA )
182
181
require .Error (t , err )
183
182
}
184
183
185
184
func TestGetLocalRootCAInvalidKey (t * testing.T ) {
186
- tempBaseDir , err := ioutil . TempDir ("" , "swarm-ca-test-" )
185
+ tempBaseDir , err := os . MkdirTemp ("" , "swarm-ca-test-" )
187
186
assert .NoError (t , err )
188
187
defer os .RemoveAll (tempBaseDir )
189
188
@@ -194,9 +193,9 @@ func TestGetLocalRootCAInvalidKey(t *testing.T) {
194
193
require .NoError (t , ca .SaveRootCA (rootCA , paths .RootCA ))
195
194
196
195
// Write some garbage to the root key - this will cause the loading to fail
197
- require .NoError (t , ioutil .WriteFile (paths .RootCA .Key , []byte (`-----BEGIN PRIVATE KEY-----\n
196
+ require .NoError (t , os .WriteFile (paths .RootCA .Key , []byte (`-----BEGIN PRIVATE KEY-----\n
198
197
some random garbage\n
199
- -----END PRIVATE KEY-----` ), 0600 ))
198
+ -----END PRIVATE KEY-----` ), 0o600 ))
200
199
201
200
_ , err = ca .GetLocalRootCA (paths .RootCA )
202
201
require .Error (t , err )
@@ -261,7 +260,7 @@ func TestGetRemoteCA(t *testing.T) {
261
260
262
261
// update the test CA to include a multi-certificate bundle as the root - the digest
263
262
// we use to verify with must be the digest of the whole bundle
264
- tmpDir , err := ioutil . TempDir ("" , "GetRemoteCA" )
263
+ tmpDir , err := os . MkdirTemp ("" , "GetRemoteCA" )
265
264
require .NoError (t , err )
266
265
defer os .RemoveAll (tmpDir )
267
266
paths := ca .NewConfigPaths (tmpDir )
@@ -338,7 +337,7 @@ func testRequestAndSaveNewCertificates(t *testing.T, tc *cautils.TestCA) (*ca.Is
338
337
require .False (t , perms .GroupWrite ())
339
338
require .False (t , perms .OtherWrite ())
340
339
341
- certs , err := ioutil .ReadFile (tc .Paths .Node .Cert )
340
+ certs , err := os .ReadFile (tc .Paths .Node .Cert )
342
341
require .NoError (t , err )
343
342
require .Equal (t , certs , ca .NormalizePEMs (certs ))
344
343
@@ -374,7 +373,7 @@ func TestRequestAndSaveNewCertificatesWithIntermediates(t *testing.T) {
374
373
CrossSignedCACert : concat ([]byte (" " ), cautils .ECDSACertChain [1 ]),
375
374
},
376
375
}
377
- tempdir , err := ioutil . TempDir ("" , "test-request-and-save-new-certificates" )
376
+ tempdir , err := os . MkdirTemp ("" , "test-request-and-save-new-certificates" )
378
377
require .NoError (t , err )
379
378
defer os .RemoveAll (tempdir )
380
379
@@ -453,7 +452,7 @@ func TestRequestAndSaveNewCertificatesWithKEKUpdate(t *testing.T) {
453
452
454
453
// returns the issuer of the issued certificate and the parsed certs of the issued certificate
455
454
func testIssueAndSaveNewCertificates (t * testing.T , rca * ca.RootCA ) {
456
- tempdir , err := ioutil . TempDir ("" , "test-issue-and-save-new-certificates" )
455
+ tempdir , err := os . MkdirTemp ("" , "test-issue-and-save-new-certificates" )
457
456
require .NoError (t , err )
458
457
defer os .RemoveAll (tempdir )
459
458
paths := ca .NewConfigPaths (tempdir )
@@ -485,7 +484,7 @@ func testIssueAndSaveNewCertificates(t *testing.T, rca *ca.RootCA) {
485
484
require .False (t , perms .GroupWrite ())
486
485
require .False (t , perms .OtherWrite ())
487
486
488
- certBytes , err := ioutil .ReadFile (paths .Node .Cert )
487
+ certBytes , err := os .ReadFile (paths .Node .Cert )
489
488
require .NoError (t , err )
490
489
parsed := checkLeafCert (t , certBytes , issuer .Subject .CommonName , "CN" , role , "org" , additionalNames ... )
491
490
if len (rca .Intermediates ) > 0 {
@@ -926,7 +925,7 @@ func TestNewRootCA(t *testing.T) {
926
925
}
927
926
928
927
func TestNewRootCABundle (t * testing.T ) {
929
- tempBaseDir , err := ioutil . TempDir ("" , "swarm-ca-test-" )
928
+ tempBaseDir , err := os . MkdirTemp ("" , "swarm-ca-test-" )
930
929
assert .NoError (t , err )
931
930
defer os .RemoveAll (tempBaseDir )
932
931
@@ -944,7 +943,7 @@ func TestNewRootCABundle(t *testing.T) {
944
943
945
944
// Overwrite the bytes of the second Root CA with the bundle, creating a valid 2 cert bundle
946
945
bundle := append (firstRootCA .Certs , secondRootCA .Certs ... )
947
- err = ioutil .WriteFile (paths .RootCA .Cert , bundle , 0644 )
946
+ err = os .WriteFile (paths .RootCA .Cert , bundle , 0o644 )
948
947
assert .NoError (t , err )
949
948
950
949
newRootCA , err := ca .NewRootCA (bundle , firstRootCA .Certs , s .Key , ca .DefaultNodeCertExpiration , nil )
@@ -957,7 +956,7 @@ func TestNewRootCABundle(t *testing.T) {
957
956
_ , _ , err = newRootCA .IssueAndSaveNewCertificates (kw , "CN" , "OU" , "ORG" )
958
957
assert .NoError (t , err )
959
958
960
- certBytes , err := ioutil .ReadFile (paths .Node .Cert )
959
+ certBytes , err := os .ReadFile (paths .Node .Cert )
961
960
assert .NoError (t , err )
962
961
assert .Len (t , checkLeafCert (t , certBytes , "rootCN1" , "CN" , "OU" , "ORG" ), 1 )
963
962
}
@@ -1189,7 +1188,7 @@ func TestNewRootCAInvalidCertAndKeys(t *testing.T) {
1189
1188
}
1190
1189
1191
1190
func TestRootCAWithCrossSignedIntermediates (t * testing.T ) {
1192
- tempdir , err := ioutil . TempDir ("" , "swarm-ca-test-" )
1191
+ tempdir , err := os . MkdirTemp ("" , "swarm-ca-test-" )
1193
1192
require .NoError (t , err )
1194
1193
defer os .RemoveAll (tempdir )
1195
1194
@@ -1485,7 +1484,7 @@ func TestRootCACrossSignCACertificate(t *testing.T) {
1485
1484
},
1486
1485
}
1487
1486
1488
- tempdir , err := ioutil . TempDir ("" , "cross-sign-cert" )
1487
+ tempdir , err := os . MkdirTemp ("" , "cross-sign-cert" )
1489
1488
require .NoError (t , err )
1490
1489
defer os .RemoveAll (tempdir )
1491
1490
paths := ca .NewConfigPaths (tempdir )
0 commit comments