@@ -48,6 +48,8 @@ type VulnerabilityAttributes struct {
4848 RepoDigests []string `json:"repo_digests,omitempty"`
4949 // Vulnerability risks.
5050 Risks VulnerabilityRisks `json:"risks"`
51+ // True if the vulnerability affects a package in the host’s running kernel, false if it affects a non-running kernel, and omit if it is not kernel-related.
52+ RunningKernel * bool `json:"running_kernel,omitempty"`
5153 // The vulnerability status.
5254 Status VulnerabilityStatus `json:"status"`
5355 // Vulnerability title.
@@ -542,6 +544,34 @@ func (o *VulnerabilityAttributes) SetRisks(v VulnerabilityRisks) {
542544 o .Risks = v
543545}
544546
547+ // GetRunningKernel returns the RunningKernel field value if set, zero value otherwise.
548+ func (o * VulnerabilityAttributes ) GetRunningKernel () bool {
549+ if o == nil || o .RunningKernel == nil {
550+ var ret bool
551+ return ret
552+ }
553+ return * o .RunningKernel
554+ }
555+
556+ // GetRunningKernelOk returns a tuple with the RunningKernel field value if set, nil otherwise
557+ // and a boolean to check if the value has been set.
558+ func (o * VulnerabilityAttributes ) GetRunningKernelOk () (* bool , bool ) {
559+ if o == nil || o .RunningKernel == nil {
560+ return nil , false
561+ }
562+ return o .RunningKernel , true
563+ }
564+
565+ // HasRunningKernel returns a boolean if a field has been set.
566+ func (o * VulnerabilityAttributes ) HasRunningKernel () bool {
567+ return o != nil && o .RunningKernel != nil
568+ }
569+
570+ // SetRunningKernel gets a reference to the given bool and assigns it to the RunningKernel field.
571+ func (o * VulnerabilityAttributes ) SetRunningKernel (v bool ) {
572+ o .RunningKernel = & v
573+ }
574+
545575// GetStatus returns the Status field value.
546576func (o * VulnerabilityAttributes ) GetStatus () VulnerabilityStatus {
547577 if o == nil {
@@ -672,6 +702,9 @@ func (o VulnerabilityAttributes) MarshalJSON() ([]byte, error) {
672702 toSerialize ["repo_digests" ] = o .RepoDigests
673703 }
674704 toSerialize ["risks" ] = o .Risks
705+ if o .RunningKernel != nil {
706+ toSerialize ["running_kernel" ] = o .RunningKernel
707+ }
675708 toSerialize ["status" ] = o .Status
676709 toSerialize ["title" ] = o .Title
677710 toSerialize ["tool" ] = o .Tool
@@ -704,6 +737,7 @@ func (o *VulnerabilityAttributes) UnmarshalJSON(bytes []byte) (err error) {
704737 Remediations * []Remediation `json:"remediations"`
705738 RepoDigests []string `json:"repo_digests,omitempty"`
706739 Risks * VulnerabilityRisks `json:"risks"`
740+ RunningKernel * bool `json:"running_kernel,omitempty"`
707741 Status * VulnerabilityStatus `json:"status"`
708742 Title * string `json:"title"`
709743 Tool * VulnerabilityTool `json:"tool"`
@@ -759,7 +793,7 @@ func (o *VulnerabilityAttributes) UnmarshalJSON(bytes []byte) (err error) {
759793 }
760794 additionalProperties := make (map [string ]interface {})
761795 if err = datadog .Unmarshal (bytes , & additionalProperties ); err == nil {
762- datadog .DeleteKeys (additionalProperties , & []string {"advisory" , "advisory_id" , "code_location" , "cve_list" , "cvss" , "dependency_locations" , "description" , "ecosystem" , "exposure_time" , "first_detection" , "fix_available" , "language" , "last_detection" , "library" , "origin" , "remediations" , "repo_digests" , "risks" , "status" , "title" , "tool" , "type" })
796+ datadog .DeleteKeys (additionalProperties , & []string {"advisory" , "advisory_id" , "code_location" , "cve_list" , "cvss" , "dependency_locations" , "description" , "ecosystem" , "exposure_time" , "first_detection" , "fix_available" , "language" , "last_detection" , "library" , "origin" , "remediations" , "repo_digests" , "risks" , "running_kernel" , " status" , "title" , "tool" , "type" })
763797 } else {
764798 return err
765799 }
@@ -805,6 +839,7 @@ func (o *VulnerabilityAttributes) UnmarshalJSON(bytes []byte) (err error) {
805839 hasInvalidField = true
806840 }
807841 o .Risks = * all .Risks
842+ o .RunningKernel = all .RunningKernel
808843 if ! all .Status .IsValid () {
809844 hasInvalidField = true
810845 } else {
0 commit comments