]> Cypherpunks.ru repositories - gocheese.git/blobdiff - main.go
Fatal(err) is enough
[gocheese.git] / main.go
diff --git a/main.go b/main.go
index 89aa5a62b6e59aa4e6a6174d5315a406ba24383a..c3342c78e3d164ea2f2d0203f3754e9239ca2d3d 100644 (file)
--- a/main.go
+++ b/main.go
@@ -151,7 +151,7 @@ func main() {
        }
        Root = flag.Args()[0]
        if _, err := os.Stat(Root); err != nil {
-               log.Fatalln(err)
+               log.Fatal(err)
        }
 
        if *FSCK {
@@ -178,7 +178,7 @@ func main() {
                                        os.FileMode(0666),
                                )
                                if err != nil {
-                                       log.Fatalln(err)
+                                       log.Fatal(err)
                                }
                                passwdReader(fd)
                                fd.Close()
@@ -194,7 +194,7 @@ func main() {
                                        os.FileMode(0666),
                                )
                                if err != nil {
-                                       log.Fatalln(err)
+                                       log.Fatal(err)
                                }
                                passwdLister(fd)
                                fd.Close()
@@ -203,7 +203,7 @@ func main() {
        }
 
        if (*TLSCert != "" && *TLSKey == "") || (*TLSCert == "" && *TLSKey != "") {
-               log.Fatalln("Both -tls-cert and -tls-key are required")
+               log.Fatal("Both -tls-cert and -tls-key are required")
        }
 
        UmaskCur = syscall.Umask(0)
@@ -212,7 +212,7 @@ func main() {
        var err error
        PyPIURLParsed, err = url.Parse(*PyPIURL)
        if err != nil {
-               log.Fatalln(err)
+               log.Fatal(err)
        }
        tlsConfig := tls.Config{
                ClientSessionCache: tls.NewLRUClientSessionCache(16),
@@ -225,7 +225,7 @@ func main() {
        if *PyPICertHash != "" {
                ourDgst, err := hex.DecodeString(*PyPICertHash)
                if err != nil {
-                       log.Fatalln(err)
+                       log.Fatal(err)
                }
                tlsConfig.VerifyConnection = func(s tls.ConnectionState) error {
                        spki := s.VerifiedChains[0][0].RawSubjectPublicKeyInfo
@@ -253,7 +253,7 @@ func main() {
                server.ConnState = connStater
                err := server.Serve(ln)
                if _, ok := err.(UCSPIAlreadyAccepted); !ok {
-                       log.Fatalln(err)
+                       log.Fatal(err)
                }
                UCSPIJob.Wait()
                return