Skip to content

Commit

Permalink
Merge pull request #5560 from mohamedawnallah/fixNullPointerDereferen…
Browse files Browse the repository at this point in the history
…ceInAltNamesMutators

operator/pkg/certs: mitigate potential null pointer dereference in AltNames Mutators for both the `APIServer` and `EtcdServer`
  • Loading branch information
karmada-bot authored Oct 17, 2024
2 parents a96390e + 89794f1 commit c230b14
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions operator/pkg/certs/certs.go
Original file line number Diff line number Diff line change
Expand Up @@ -455,7 +455,7 @@ func etcdServerAltNamesMutator(cfg *AltNamesMutatorConfig) (*certutil.AltNames,
IPs: []net.IP{net.IPv4(127, 0, 0, 1)},
}

if cfg.Components.Etcd.Local != nil {
if cfg.Components != nil && cfg.Components.Etcd != nil && cfg.Components.Etcd.Local != nil {
appendSANsToAltNames(altNames, cfg.Components.Etcd.Local.ServerCertSANs)
}

Expand Down Expand Up @@ -488,7 +488,7 @@ func apiServerAltNamesMutator(cfg *AltNamesMutatorConfig) (*certutil.AltNames, e
fmt.Sprintf("*.%s.svc", cfg.Namespace)})
}

if len(cfg.Components.KarmadaAPIServer.CertSANs) > 0 {
if cfg.Components != nil && cfg.Components.KarmadaAPIServer != nil && len(cfg.Components.KarmadaAPIServer.CertSANs) > 0 {
appendSANsToAltNames(altNames, cfg.Components.KarmadaAPIServer.CertSANs)
}
if len(cfg.ControlplaneAddress) > 0 {
Expand Down

0 comments on commit c230b14

Please sign in to comment.