Skip to content

Commit a16e92c

Browse files
committed
feat: generate SDKs for Looker 24.2
Release-As: 24.2.0
1 parent c687692 commit a16e92c

25 files changed

+518
-187
lines changed

csharp/rtl/Constants.cs

+1-1
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ public struct Constants
6161

6262
public const string DefaultApiVersion = "4.0";
6363
public const string AgentPrefix = "CS-SDK";
64-
public const string LookerVersion = "24.0";
64+
public const string LookerVersion = "24.2";
6565

6666
public const string Bearer = "Bearer";
6767
public const string LookerAppiId = "x-looker-appid";

csharp/sdk/4.0/methods.cs

+9-9
Original file line numberDiff line numberDiff line change
@@ -705,7 +705,7 @@ public async Task<SdkResponse<EmbedUrlResponse, Exception>> create_sso_embed_url
705705
/// "Powered by Looker" (PBL) web application.
706706
///
707707
/// This is similar to Private Embedding (https://cloud.google.com/looker/docs/r/admin/embed/private-embed). Instead of
708-
/// of logging into the Web UI to authenticate, the user has already authenticated against the API to be able to
708+
/// logging into the Web UI to authenticate, the user has already authenticated against the API to be able to
709709
/// make this call. However, unlike Private Embed where the user has access to any other part of the Looker UI,
710710
/// the embed web session created by requesting the EmbedUrlResponse.url in a browser only has access to
711711
/// content visible under the `/embed` context.
@@ -771,7 +771,7 @@ public async Task<SdkResponse<EmbedUrlResponse, Exception>> validate_embed_url(
771771
/// If the `session_reference_token` is provided but the session has expired, the token will be ignored and a
772772
/// new embed session will be created. Note that the embed user definition will be updated in this scenario.
773773
///
774-
/// If the credentials do not match the credentials associated with an exisiting session_reference_token, a
774+
/// If the credentials do not match the credentials associated with an existing session_reference_token, a
775775
/// 404 will be returned.
776776
///
777777
/// The endpoint returns the following:
@@ -1252,7 +1252,7 @@ public async Task<SdkResponse<string, Exception>> deactivate_app_user(
12521252
///
12531253
/// Configuring OIDC impacts authentication for all users. This configuration should be done carefully.
12541254
///
1255-
/// Looker maintains a single OIDC configuation. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct).
1255+
/// Looker maintains a single OIDC configuration. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct).
12561256
///
12571257
/// OIDC is enabled or disabled for Looker using the **enabled** field.
12581258
///
@@ -1392,7 +1392,7 @@ public async Task<SdkResponse<string, Exception>> force_password_reset_at_next_l
13921392
///
13931393
/// Configuring SAML impacts authentication for all users. This configuration should be done carefully.
13941394
///
1395-
/// Looker maintains a single SAML configuation. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct).
1395+
/// Looker maintains a single SAML configuration. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct).
13961396
///
13971397
/// SAML is enabled or disabled for Looker using the **enabled** field.
13981398
///
@@ -3356,7 +3356,7 @@ public async Task<SdkResponse<ContentSearch[], Exception>> search_content(
33563356

33573357
/// ### Get an image representing the contents of a dashboard or look.
33583358
///
3359-
/// The returned thumbnail is an abstract representation of the contents of a dashbord or look and does not
3359+
/// The returned thumbnail is an abstract representation of the contents of a dashboard or look and does not
33603360
/// reflect the actual data displayed in the respective visualizations.
33613361
///
33623362
/// GET /content_thumbnail/{type}/{resource_id} -> string
@@ -3489,7 +3489,7 @@ public async Task<SdkResponse<ContentView[], Exception>> search_content_views(
34893489
///
34903490
/// # DEPRECATED: Use [content_thumbnail()](#!/Content/content_thumbnail)
34913491
///
3492-
/// The returned thumbnail is an abstract representation of the contents of a dashbord or look and does not
3492+
/// The returned thumbnail is an abstract representation of the contents of a dashboard or look and does not
34933493
/// reflect the actual data displayed in the respective visualizations.
34943494
///
34953495
/// GET /vector_thumbnail/{type}/{resource_id} -> string
@@ -3794,7 +3794,7 @@ public async Task<SdkResponse<string, Exception>> delete_dashboard(
37943794
return await AuthRequest<string, Exception>(HttpMethod.Delete, $"/dashboards/{dashboard_id}", null,null,options);
37953795
}
37963796

3797-
/// ### Get Aggregate Table LookML for Each Query on a Dahboard
3797+
/// ### Get Aggregate Table LookML for Each Query on a Dashboard
37983798
///
37993799
/// Returns a JSON object that contains the dashboard id and Aggregate Table lookml
38003800
///
@@ -6756,8 +6756,6 @@ public async Task<SdkResponse<LookmlTestResult[], Exception>> run_lookml_test(
67566756

67576757
/// ### Creates a tag for the most recent commit, or a specific ref is a SHA is provided
67586758
///
6759-
/// This is an internal-only, undocumented route.
6760-
///
67616759
/// POST /projects/{project_id}/tag -> Project
67626760
///
67636761
/// <returns>
@@ -7920,6 +7918,7 @@ public async Task<SdkResponse<PermissionSet, Exception>> permission_set(
79207918
}
79217919

79227920
/// ### Update information about the permission set with a specific id.
7921+
/// Providing save_content permission alone will also provide you the abilities of save_looks and save_dashboards.
79237922
///
79247923
/// PATCH /permission_sets/{permission_set_id} -> PermissionSet
79257924
///
@@ -7966,6 +7965,7 @@ public async Task<SdkResponse<PermissionSet[], Exception>> all_permission_sets(
79667965
}
79677966

79687967
/// ### Create a permission set with the specified information. Permission sets are used by Roles.
7968+
/// Providing save_content permission alone will also provide you the abilities of save_looks and save_dashboards.
79697969
///
79707970
/// POST /permission_sets -> PermissionSet
79717971
///

csharp/sdk/4.0/models.cs

+2
Original file line numberDiff line numberDiff line change
@@ -3654,6 +3654,8 @@ public class MergeQuerySourceQuery : SdkModel
36543654
public string? name { get; set; } = null;
36553655
/// <summary>Id of the query to merge</summary>
36563656
public string? query_id { get; set; } = null;
3657+
/// <summary>Slug of the query to merge</summary>
3658+
public string? query_slug { get; set; } = null;
36573659
}
36583660

36593661
public class MobileFeatureFlags : SdkModel

go/sdk/v4/methods.go

+15-15
Original file line numberDiff line numberDiff line change
@@ -576,7 +576,7 @@ func (l *LookerSDK) CreateSsoEmbedUrl(
576576
// "Powered by Looker" (PBL) web application.
577577
//
578578
// This is similar to Private Embedding (https://cloud.google.com/looker/docs/r/admin/embed/private-embed). Instead of
579-
// of logging into the Web UI to authenticate, the user has already authenticated against the API to be able to
579+
// logging into the Web UI to authenticate, the user has already authenticated against the API to be able to
580580
// make this call. However, unlike Private Embed where the user has access to any other part of the Looker UI,
581581
// the embed web session created by requesting the EmbedUrlResponse.url in a browser only has access to
582582
// content visible under the `/embed` context.
@@ -637,7 +637,7 @@ func (l *LookerSDK) ValidateEmbedUrl(
637637
// If the `session_reference_token` is provided but the session has expired, the token will be ignored and a
638638
// new embed session will be created. Note that the embed user definition will be updated in this scenario.
639639
//
640-
// If the credentials do not match the credentials associated with an exisiting session_reference_token, a
640+
// If the credentials do not match the credentials associated with an existing session_reference_token, a
641641
// 404 will be returned.
642642
//
643643
// The endpoint returns the following:
@@ -1074,7 +1074,7 @@ func (l *LookerSDK) DeactivateAppUser(
10741074
//
10751075
// Configuring OIDC impacts authentication for all users. This configuration should be done carefully.
10761076
//
1077-
// Looker maintains a single OIDC configuation. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct).
1077+
// Looker maintains a single OIDC configuration. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct).
10781078
//
10791079
// OIDC is enabled or disabled for Looker using the **enabled** field.
10801080
//
@@ -1204,7 +1204,7 @@ func (l *LookerSDK) ForcePasswordResetAtNextLoginForAllUsers(
12041204
//
12051205
// Configuring SAML impacts authentication for all users. This configuration should be done carefully.
12061206
//
1207-
// Looker maintains a single SAML configuation. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct).
1207+
// Looker maintains a single SAML configuration. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct).
12081208
//
12091209
// SAML is enabled or disabled for Looker using the **enabled** field.
12101210
//
@@ -2802,7 +2802,7 @@ func (l *LookerSDK) SearchContent(request RequestSearchContent,
28022802

28032803
// ### Get an image representing the contents of a dashboard or look.
28042804
//
2805-
// The returned thumbnail is an abstract representation of the contents of a dashbord or look and does not
2805+
// The returned thumbnail is an abstract representation of the contents of a dashboard or look and does not
28062806
// reflect the actual data displayed in the respective visualizations.
28072807
//
28082808
// GET /content_thumbnail/{type}/{resource_id} -> string
@@ -2869,7 +2869,7 @@ func (l *LookerSDK) SearchContentViews(request RequestSearchContentViews,
28692869
//
28702870
// # DEPRECATED: Use [content_thumbnail()](#!/Content/content_thumbnail)
28712871
//
2872-
// The returned thumbnail is an abstract representation of the contents of a dashbord or look and does not
2872+
// The returned thumbnail is an abstract representation of the contents of a dashboard or look and does not
28732873
// reflect the actual data displayed in the respective visualizations.
28742874
//
28752875
// GET /vector_thumbnail/{type}/{resource_id} -> string
@@ -3087,7 +3087,7 @@ func (l *LookerSDK) DeleteDashboard(
30873087

30883088
}
30893089

3090-
// ### Get Aggregate Table LookML for Each Query on a Dahboard
3090+
// ### Get Aggregate Table LookML for Each Query on a Dashboard
30913091
//
30923092
// # Returns a JSON object that contains the dashboard id and Aggregate Table lookml
30933093
//
@@ -3872,7 +3872,7 @@ func (l *LookerSDK) SearchGroups(request RequestSearchGroups,
38723872
// Boolean search params accept only "true" and "false" as values.
38733873
//
38743874
// GET /groups/search/with_roles -> []GroupSearch
3875-
func (l *LookerSDK) SearchGroupsWithRoles(request RequestSearchGroups,
3875+
func (l *LookerSDK) SearchGroupsWithRoles(request RequestSearchGroupsWithRoles,
38763876
options *rtl.ApiSettings) ([]GroupSearch, error) {
38773877
var result []GroupSearch
38783878
err := l.session.Do(&result, "GET", "/4.0", "/groups/search/with_roles", map[string]interface{}{"fields": request.Fields, "limit": request.Limit, "offset": request.Offset, "sorts": request.Sorts, "filter_or": request.FilterOr, "id": request.Id, "name": request.Name, "external_group_id": request.ExternalGroupId, "externally_managed": request.ExternallyManaged, "externally_orphaned": request.ExternallyOrphaned}, nil, options)
@@ -3907,7 +3907,7 @@ func (l *LookerSDK) SearchGroupsWithRoles(request RequestSearchGroups,
39073907
// Boolean search params accept only "true" and "false" as values.
39083908
//
39093909
// GET /groups/search/with_hierarchy -> []GroupHierarchy
3910-
func (l *LookerSDK) SearchGroupsWithHierarchy(request RequestSearchGroups,
3910+
func (l *LookerSDK) SearchGroupsWithHierarchy(request RequestSearchGroupsWithHierarchy,
39113911
options *rtl.ApiSettings) ([]GroupHierarchy, error) {
39123912
var result []GroupHierarchy
39133913
err := l.session.Do(&result, "GET", "/4.0", "/groups/search/with_hierarchy", map[string]interface{}{"fields": request.Fields, "limit": request.Limit, "offset": request.Offset, "sorts": request.Sorts, "filter_or": request.FilterOr, "id": request.Id, "name": request.Name, "external_group_id": request.ExternalGroupId, "externally_managed": request.ExternallyManaged, "externally_orphaned": request.ExternallyOrphaned}, nil, options)
@@ -4467,7 +4467,7 @@ func (l *LookerSDK) MoveLook(
44674467
// ### Get information about all lookml models.
44684468
//
44694469
// GET /lookml_models -> []LookmlModel
4470-
func (l *LookerSDK) AllLookmlModels(request RequestArtifactNamespaces,
4470+
func (l *LookerSDK) AllLookmlModels(request RequestAllLookmlModels,
44714471
options *rtl.ApiSettings) ([]LookmlModel, error) {
44724472
var result []LookmlModel
44734473
err := l.session.Do(&result, "GET", "/4.0", "/lookml_models", map[string]interface{}{"fields": request.Fields, "limit": request.Limit, "offset": request.Offset}, nil, options)
@@ -5214,8 +5214,6 @@ func (l *LookerSDK) RunLookmlTest(request RequestRunLookmlTest,
52145214

52155215
// ### Creates a tag for the most recent commit, or a specific ref is a SHA is provided
52165216
//
5217-
// This is an internal-only, undocumented route.
5218-
//
52195217
// POST /projects/{project_id}/tag -> Project
52205218
func (l *LookerSDK) TagRef(request RequestTagRef,
52215219
options *rtl.ApiSettings) (Project, error) {
@@ -6016,7 +6014,7 @@ func (l *LookerSDK) AllPermissions(
60166014
// Boolean search params accept only "true" and "false" as values.
60176015
//
60186016
// GET /permission_sets/search -> []PermissionSet
6019-
func (l *LookerSDK) SearchPermissionSets(request RequestSearchModelSets,
6017+
func (l *LookerSDK) SearchPermissionSets(request RequestSearchPermissionSets,
60206018
options *rtl.ApiSettings) ([]PermissionSet, error) {
60216019
var result []PermissionSet
60226020
err := l.session.Do(&result, "GET", "/4.0", "/permission_sets/search", map[string]interface{}{"fields": request.Fields, "limit": request.Limit, "offset": request.Offset, "sorts": request.Sorts, "id": request.Id, "name": request.Name, "all_access": request.AllAccess, "built_in": request.BuiltIn, "filter_or": request.FilterOr}, nil, options)
@@ -6039,6 +6037,7 @@ func (l *LookerSDK) PermissionSet(
60396037
}
60406038

60416039
// ### Update information about the permission set with a specific id.
6040+
// Providing save_content permission alone will also provide you the abilities of save_looks and save_dashboards.
60426041
//
60436042
// PATCH /permission_sets/{permission_set_id} -> PermissionSet
60446043
func (l *LookerSDK) UpdatePermissionSet(
@@ -6078,6 +6077,7 @@ func (l *LookerSDK) AllPermissionSets(
60786077
}
60796078

60806079
// ### Create a permission set with the specified information. Permission sets are used by Roles.
6080+
// Providing save_content permission alone will also provide you the abilities of save_looks and save_dashboards.
60816081
//
60826082
// POST /permission_sets -> PermissionSet
60836083
func (l *LookerSDK) CreatePermissionSet(
@@ -6173,7 +6173,7 @@ func (l *LookerSDK) SearchRoles(request RequestSearchRoles,
61736173
// Boolean search params accept only "true" and "false" as values.
61746174
//
61756175
// GET /roles/search/with_user_count -> []RoleSearch
6176-
func (l *LookerSDK) SearchRolesWithUserCount(request RequestSearchRoles,
6176+
func (l *LookerSDK) SearchRolesWithUserCount(request RequestSearchRolesWithUserCount,
61776177
options *rtl.ApiSettings) ([]RoleSearch, error) {
61786178
var result []RoleSearch
61796179
err := l.session.Do(&result, "GET", "/4.0", "/roles/search/with_user_count", map[string]interface{}{"fields": request.Fields, "limit": request.Limit, "offset": request.Offset, "sorts": request.Sorts, "id": request.Id, "name": request.Name, "built_in": request.BuiltIn, "filter_or": request.FilterOr}, nil, options)
@@ -7835,7 +7835,7 @@ func (l *LookerSDK) CreateEmbedUser(
78357835
// ### Get information about all user attributes.
78367836
//
78377837
// GET /user_attributes -> []UserAttribute
7838-
func (l *LookerSDK) AllUserAttributes(request RequestAllBoardSections,
7838+
func (l *LookerSDK) AllUserAttributes(request RequestAllUserAttributes,
78397839
options *rtl.ApiSettings) ([]UserAttribute, error) {
78407840
var result []UserAttribute
78417841
err := l.session.Do(&result, "GET", "/4.0", "/user_attributes", map[string]interface{}{"fields": request.Fields, "sorts": request.Sorts}, nil, options)

0 commit comments

Comments
 (0)