vault/api/sys_reporting_scan.go
Vault Automation e7133e83f2
VAULT-40965 async option for scan API (#11011) (#11751)
* VAULT-40965 async option for scan API

* whoopsie

* whoopsie

* add test, return accepted (for real), fix docs

* Add extra time

* make test more resilient

Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
2026-01-13 17:40:37 +00:00

59 lines
1.4 KiB
Go

// Copyright IBM Corp. 2016, 2025
// SPDX-License-Identifier: MPL-2.0
package api
import (
"context"
"errors"
"net/http"
"github.com/mitchellh/mapstructure"
)
func (c *Sys) ReportingScan(opts *ReportingScanRequest) (*ReportingScanOutput, error) {
return c.ReportingScanWithContext(context.Background(), opts)
}
func (c *Sys) ReportingScanWithContext(ctx context.Context, opts *ReportingScanRequest) (*ReportingScanOutput, error) {
ctx, cancelFunc := c.c.withConfiguredTimeout(ctx)
defer cancelFunc()
r := c.c.NewRequest(http.MethodPost, "/v1/sys/reporting/scan")
if err := r.SetJSONBody(opts); err != nil {
return nil, err
}
resp, err := c.c.rawRequestWithContext(ctx, r)
if err != nil {
return nil, err
}
defer resp.Body.Close()
secret, err := ParseSecret(resp.Body)
if err != nil {
return nil, err
}
if secret == nil || secret.Data == nil {
return nil, errors.New("data from server response is empty")
}
var result ReportingScanOutput
err = mapstructure.Decode(secret.Data, &result)
if err != nil {
return nil, err
}
return &result, err
}
// ReportingScanRequest represents the parameters consumed by the reporting scan API
type ReportingScanRequest struct {
Async bool `json:"async"`
}
type ReportingScanOutput struct {
Timestamp string `json:"timestamp" structs:"timestamp" mapstructure:"timestamp"`
FullDirectoryPath string `json:"full_directory_path" structs:"full_directory_path" mapstructure:"full_directory_path"`
}