Skip to content
This repository was archived by the owner on Aug 2, 2024. It is now read-only.

Commit 4f59cf8

Browse files
committed
Fix infinite loop
1 parent 8f17bfa commit 4f59cf8

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

security/formatter.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import (
1313
// Format formats the vulnerabilities in the given format
1414
func Format(vulns *Vulnerabilities, format string) ([]byte, error) {
1515
if format == "ansi" {
16-
return ToANSI(vulns), nil
16+
return ToANSI(vulns, false), nil
1717
} else if format == "text" || format == "txt" || format == "markdown" || format == "md" {
1818
return ToMarkdown(vulns), nil
1919
} else if format == "json" {
@@ -29,8 +29,8 @@ func Format(vulns *Vulnerabilities, format string) ([]byte, error) {
2929
}
3030

3131
// ToANSI returns vulnerabilities as text with ANSI code for colors
32-
func ToANSI(vulns *Vulnerabilities) []byte {
33-
if !hasPosixColorSupport() {
32+
func ToANSI(vulns *Vulnerabilities, forceANSICodes bool) []byte {
33+
if !hasPosixColorSupport() && !forceANSICodes {
3434
return ToMarkdown(vulns)
3535
}
3636

@@ -81,7 +81,7 @@ var ansiRe = regexp.MustCompile("(\u001B\\[\\d+m|\u001B\\]8;;.*?\u0007)")
8181

8282
// ToMarkdown returns vulnerabilities as Markdown
8383
func ToMarkdown(vulns *Vulnerabilities) []byte {
84-
return ansiRe.ReplaceAll(ToANSI(vulns), nil)
84+
return ansiRe.ReplaceAll(ToANSI(vulns, true), nil)
8585
}
8686

8787
// ToJSON outputs vulnerabilities as JSON

0 commit comments

Comments
 (0)