Skip to content

Commit 0cd63f8

Browse files
authored
Merge pull request #479 from rishabh96b/rm-ioutil
2 parents c915c5c + b8cebd3 commit 0cd63f8

File tree

5 files changed

+16
-19
lines changed

5 files changed

+16
-19
lines changed

controllers/kustomization_controller.go

+1-2
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@ import (
2020
"bytes"
2121
"context"
2222
"fmt"
23-
"io/ioutil"
2423
"net/http"
2524
"net/url"
2625
"os"
@@ -284,7 +283,7 @@ func (r *KustomizationReconciler) reconcile(
284283
revision := source.GetArtifact().Revision
285284

286285
// create tmp dir
287-
tmpDir, err := ioutil.TempDir("", kustomization.Name)
286+
tmpDir, err := os.MkdirTemp("", kustomization.Name)
288287
if err != nil {
289288
err = fmt.Errorf("tmp dir error: %w", err)
290289
return kustomizev1.KustomizationNotReady(

controllers/kustomization_decryptor.go

+6-7
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@ import (
2121
"context"
2222
"encoding/base64"
2323
"fmt"
24-
"io/ioutil"
2524
"os"
2625
"os/exec"
2726
"path/filepath"
@@ -65,7 +64,7 @@ func NewDecryptor(kubeClient client.Client,
6564

6665
func NewTempDecryptor(kubeClient client.Client,
6766
kustomization kustomizev1.Kustomization) (*KustomizeDecryptor, func(), error) {
68-
tmpDir, err := ioutil.TempDir("", fmt.Sprintf("decryptor-%s-", kustomization.Name))
67+
tmpDir, err := os.MkdirTemp("", fmt.Sprintf("decryptor-%s-", kustomization.Name))
6968
if err != nil {
7069
return nil, nil, fmt.Errorf("tmp dir error: %w", err)
7170
}
@@ -140,7 +139,7 @@ func (kd *KustomizeDecryptor) ImportKeys(ctx context.Context) error {
140139
return fmt.Errorf("decryption secret error: %w", err)
141140
}
142141

143-
tmpDir, err := ioutil.TempDir("", kd.kustomization.Name)
142+
tmpDir, err := os.MkdirTemp("", kd.kustomization.Name)
144143
if err != nil {
145144
return fmt.Errorf("tmp dir error: %w", err)
146145
}
@@ -154,7 +153,7 @@ func (kd *KustomizeDecryptor) ImportKeys(ctx context.Context) error {
154153
if err != nil {
155154
return err
156155
}
157-
if err := ioutil.WriteFile(keyPath, file, os.ModePerm); err != nil {
156+
if err := os.WriteFile(keyPath, file, os.ModePerm); err != nil {
158157
return fmt.Errorf("unable to write key to storage: %w", err)
159158
}
160159
if err := kd.gpgImport(keyPath); err != nil {
@@ -185,7 +184,7 @@ func (kd *KustomizeDecryptor) gpgImport(path string) error {
185184

186185
func (kd *KustomizeDecryptor) decryptDotEnvFiles(dirpath string) error {
187186
kustomizePath := filepath.Join(dirpath, konfig.DefaultKustomizationFileName())
188-
ksData, err := ioutil.ReadFile(kustomizePath)
187+
ksData, err := os.ReadFile(kustomizePath)
189188
if err != nil {
190189
return nil
191190
}
@@ -224,7 +223,7 @@ func (kd *KustomizeDecryptor) decryptDotEnvFiles(dirpath string) error {
224223
}
225224

226225
envPath := filepath.Join(dirpath, envFile)
227-
data, err := ioutil.ReadFile(envPath)
226+
data, err := os.ReadFile(envPath)
228227
if err != nil {
229228
return err
230229
}
@@ -235,7 +234,7 @@ func (kd *KustomizeDecryptor) decryptDotEnvFiles(dirpath string) error {
235234
return err
236235
}
237236

238-
err = ioutil.WriteFile(envPath, out, 0644)
237+
err = os.WriteFile(envPath, out, 0644)
239238
if err != nil {
240239
return fmt.Errorf("error writing to file: %w", err)
241240
}

controllers/kustomization_decryptor_test.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ package controllers
1919
import (
2020
"context"
2121
"fmt"
22-
"io/ioutil"
22+
"os"
2323
"testing"
2424
"time"
2525

@@ -71,9 +71,9 @@ func TestKustomizationReconciler_Decryptor(t *testing.T) {
7171
err = applyGitRepository(overlayRepositoryName, overlayArtifactUrl, "main/"+overlayChecksum, overlayChecksum)
7272
g.Expect(err).NotTo(HaveOccurred())
7373

74-
pgpKey, err := ioutil.ReadFile("testdata/sops/pgp.asc")
74+
pgpKey, err := os.ReadFile("testdata/sops/pgp.asc")
7575
g.Expect(err).ToNot(HaveOccurred())
76-
ageKey, err := ioutil.ReadFile("testdata/sops/age.txt")
76+
ageKey, err := os.ReadFile("testdata/sops/age.txt")
7777
g.Expect(err).ToNot(HaveOccurred())
7878

7979
sopsSecretKey := types.NamespacedName{

controllers/kustomization_generator.go

+3-4
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ package controllers
1919
import (
2020
"encoding/json"
2121
"fmt"
22-
"io/ioutil"
2322
"os"
2423
"path/filepath"
2524
"strings"
@@ -54,7 +53,7 @@ func (kg *KustomizeGenerator) WriteFile(dirPath string) error {
5453

5554
kfile := filepath.Join(dirPath, konfig.DefaultKustomizationFileName())
5655

57-
data, err := ioutil.ReadFile(kfile)
56+
data, err := os.ReadFile(kfile)
5857
if err != nil {
5958
return err
6059
}
@@ -114,7 +113,7 @@ func (kg *KustomizeGenerator) WriteFile(dirPath string) error {
114113
return err
115114
}
116115

117-
return ioutil.WriteFile(kfile, kd, os.ModePerm)
116+
return os.WriteFile(kfile, kd, os.ModePerm)
118117
}
119118

120119
func checkKustomizeImageExists(images []kustypes.Image, imageName string) (bool, int) {
@@ -215,7 +214,7 @@ func (kg *KustomizeGenerator) generateKustomization(dirPath string) error {
215214
return err
216215
}
217216

218-
return ioutil.WriteFile(kfile, kd, os.ModePerm)
217+
return os.WriteFile(kfile, kd, os.ModePerm)
219218
}
220219

221220
func adaptSelector(selector *kustomize.Selector) (output *kustypes.Selector) {

internal/sops/pgp/keysource.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ import (
88
"bytes"
99
"encoding/hex"
1010
"fmt"
11-
"io/ioutil"
11+
"io"
1212
"net/http"
1313
"os"
1414
"os/exec"
@@ -162,7 +162,7 @@ func (key *MasterKey) encryptWithCryptoOpenPGP(dataKey []byte) error {
162162
if err != nil {
163163
return err
164164
}
165-
b, err := ioutil.ReadAll(encbuf)
165+
b, err := io.ReadAll(encbuf)
166166
if err != nil {
167167
return err
168168
}
@@ -229,7 +229,7 @@ func (key *MasterKey) decryptWithCryptoOpenpgp() ([]byte, error) {
229229
if err != nil {
230230
return nil, fmt.Errorf("Reading PGP message failed: %s", err)
231231
}
232-
if b, err := ioutil.ReadAll(md.UnverifiedBody); err == nil {
232+
if b, err := io.ReadAll(md.UnverifiedBody); err == nil {
233233
return b, nil
234234
}
235235
return nil, fmt.Errorf("The key could not be decrypted with any of the PGP entries")

0 commit comments

Comments
 (0)