package seccomp import ( "fmt" "strconv" rspec "github.com/opencontainers/runtime-spec/specs-go" ) // parseArguments takes a list of arguments (delimArgs). It parses and fills out // the argument information and returns a slice of arg structs func parseArguments(delimArgs []string) ([]rspec.LinuxSeccompArg, error) { nilArgSlice := []rspec.LinuxSeccompArg{} numberOfArgs := len(delimArgs) // No parameters passed with syscall if numberOfArgs == 1 { return nilArgSlice, nil } // Correct number of parameters passed with syscall if numberOfArgs == 5 { syscallIndex, err := strconv.ParseUint(delimArgs[1], 10, 0) if err != nil { return nilArgSlice, err } syscallValue, err := strconv.ParseUint(delimArgs[2], 10, 64) if err != nil { return nilArgSlice, err } syscallValueTwo, err := strconv.ParseUint(delimArgs[3], 10, 64) if err != nil { return nilArgSlice, err } syscallOp, err := parseOperator(delimArgs[4]) if err != nil { return nilArgSlice, err } argStruct := rspec.LinuxSeccompArg{ Index: uint(syscallIndex), Value: syscallValue, ValueTwo: syscallValueTwo, Op: syscallOp, } argSlice := []rspec.LinuxSeccompArg{} argSlice = append(argSlice, argStruct) return argSlice, nil } return nilArgSlice, fmt.Errorf("incorrect number of arguments passed with syscall: %d", numberOfArgs) } func parseOperator(operator string) (rspec.LinuxSeccompOperator, error) { operators := map[string]rspec.LinuxSeccompOperator{ "NE": rspec.OpNotEqual, "LT": rspec.OpLessThan, "LE": rspec.OpLessEqual, "EQ": rspec.OpEqualTo, "GE": rspec.OpGreaterEqual, "GT": rspec.OpGreaterThan, "ME": rspec.OpMaskedEqual, } o, ok := operators[operator] if !ok { return "", fmt.Errorf("unrecognized operator: %s", operator) } return o, nil }