@@ -6,7 +6,6 @@ package scan
66
77import (
88 _ "embed"
9- "fmt"
109 "sort"
1110 "strings"
1211
@@ -34,12 +33,12 @@ type tmplResult struct {
3433
3534// createTmplResult transforms Result r into a
3635// template structure for printing.
37- func createTmplResult (vulns []* govulncheck.Vuln , verbose , source bool ) tmplResult {
36+ func createTmplResult (vulns []* govulncheck.Vuln , source bool ) tmplResult {
3837 // unaffected are (imported) OSVs, none of which vulnerabilities are called.
3938 var r tmplResult
4039 var vInfos []tmplVulnInfo
4140 for _ , v := range vulns {
42- vInfos = append (vInfos , createTmplVulnInfo (v , verbose , source ))
41+ vInfos = append (vInfos , createTmplVulnInfo (v , source ))
4342 }
4443 r .Affected , r .Unaffected = splitVulns (vInfos )
4544 r .AffectedModules = affectedModules (vInfos )
@@ -103,23 +102,19 @@ type tmplVulnInfo struct {
103102// createTmplVulnInfo creates a template vuln info for
104103// a vulnerability that is called by source code or
105104// present in the binary.
106- func createTmplVulnInfo (v * govulncheck.Vuln , verbose , source bool ) tmplVulnInfo {
105+ func createTmplVulnInfo (v * govulncheck.Vuln , source bool ) tmplVulnInfo {
107106 vInfo := tmplVulnInfo {
108107 ID : v .OSV .ID ,
109108 Details : v .OSV .Details ,
110109 Affected : ! source || IsCalled (v ),
111110 }
112111
113112 // stacks returns call stack info of p as a
114- // string depending on verbose and source mode.
113+ // string depending on source mode.
115114 stacks := func (p * govulncheck.Package ) string {
116115 if ! source {
117116 return ""
118117 }
119-
120- if verbose {
121- return verboseCallStacks (p .CallStacks )
122- }
123118 return defaultCallStacks (p .CallStacks )
124119 }
125120
@@ -208,23 +203,6 @@ func defaultCallStacks(css []govulncheck.CallStack) string {
208203 return b .String ()
209204}
210205
211- func verboseCallStacks (css []govulncheck.CallStack ) string {
212- // Display one full call stack for each vuln.
213- i := 1
214- var b strings.Builder
215- for _ , cs := range css {
216- b .WriteString (fmt .Sprintf ("#%d: for function %s\n " , i , cs .Symbol ))
217- for _ , e := range cs .Frames {
218- b .WriteString (fmt .Sprintf (" %s\n " , FuncName (e )))
219- if pos := AbsRelShorter (Pos (e )); pos != "" {
220- b .WriteString (fmt .Sprintf (" %s\n " , pos ))
221- }
222- }
223- i ++
224- }
225- return b .String ()
226- }
227-
228206// platforms returns a string describing the GOOS, GOARCH,
229207// or GOOS/GOARCH pairs that the vuln affects for a particular
230208// module mod. If it affects all of them, it returns the empty
0 commit comments