Skip to main content
Glama
googleapis

MCP Toolbox for Databases

by googleapis
lookerupdateprojectfile.go5.94 kB
// Copyright 2025 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package lookerupdateprojectfile import ( "context" "fmt" yaml "github.com/goccy/go-yaml" "github.com/googleapis/genai-toolbox/internal/sources" "github.com/googleapis/genai-toolbox/internal/tools" "github.com/googleapis/genai-toolbox/internal/tools/looker/lookercommon" "github.com/googleapis/genai-toolbox/internal/util/parameters" "github.com/looker-open-source/sdk-codegen/go/rtl" v4 "github.com/looker-open-source/sdk-codegen/go/sdk/v4" ) const kind string = "looker-update-project-file" func init() { if !tools.Register(kind, newConfig) { panic(fmt.Sprintf("tool kind %q already registered", kind)) } } func newConfig(ctx context.Context, name string, decoder *yaml.Decoder) (tools.ToolConfig, error) { actual := Config{Name: name} if err := decoder.DecodeContext(ctx, &actual); err != nil { return nil, err } return actual, nil } type compatibleSource interface { UseClientAuthorization() bool GetAuthTokenHeaderName() string LookerClient() *v4.LookerSDK LookerApiSettings() *rtl.ApiSettings } type Config struct { Name string `yaml:"name" validate:"required"` Kind string `yaml:"kind" validate:"required"` Source string `yaml:"source" validate:"required"` Description string `yaml:"description" validate:"required"` AuthRequired []string `yaml:"authRequired"` Annotations *tools.ToolAnnotations `yaml:"annotations,omitempty"` } // validate interface var _ tools.ToolConfig = Config{} func (cfg Config) ToolConfigKind() string { return kind } func (cfg Config) Initialize(srcs map[string]sources.Source) (tools.Tool, error) { projectIdParameter := parameters.NewStringParameter("project_id", "The id of the project containing the files") filePathParameter := parameters.NewStringParameter("file_path", "The path of the file within the project") fileContentParameter := parameters.NewStringParameter("file_content", "The content of the file") params := parameters.Parameters{projectIdParameter, filePathParameter, fileContentParameter} annotations := cfg.Annotations if annotations == nil { readOnlyHint := false destructiveHint := true annotations = &tools.ToolAnnotations{ ReadOnlyHint: &readOnlyHint, DestructiveHint: &destructiveHint, } } mcpManifest := tools.GetMcpManifest(cfg.Name, cfg.Description, cfg.AuthRequired, params, annotations) // finish tool setup return Tool{ Config: cfg, Parameters: params, manifest: tools.Manifest{ Description: cfg.Description, Parameters: params.Manifest(), AuthRequired: cfg.AuthRequired, }, mcpManifest: mcpManifest, }, nil } // validate interface var _ tools.Tool = Tool{} type Tool struct { Config Parameters parameters.Parameters `yaml:"parameters"` manifest tools.Manifest mcpManifest tools.McpManifest } func (t Tool) ToConfig() tools.ToolConfig { return t.Config } func (t Tool) Invoke(ctx context.Context, resourceMgr tools.SourceProvider, params parameters.ParamValues, accessToken tools.AccessToken) (any, error) { source, err := tools.GetCompatibleSource[compatibleSource](resourceMgr, t.Source, t.Name, t.Kind) if err != nil { return nil, err } sdk, err := lookercommon.GetLookerSDK(source.UseClientAuthorization(), source.LookerApiSettings(), source.LookerClient(), accessToken) if err != nil { return nil, fmt.Errorf("error getting sdk: %w", err) } mapParams := params.AsMap() projectId, ok := mapParams["project_id"].(string) if !ok { return nil, fmt.Errorf("'project_id' must be a string, got %T", mapParams["project_id"]) } filePath, ok := mapParams["file_path"].(string) if !ok { return nil, fmt.Errorf("'file_path' must be a string, got %T", mapParams["file_path"]) } fileContent, ok := mapParams["file_content"].(string) if !ok { return nil, fmt.Errorf("'file_content' must be a string, got %T", mapParams["file_content"]) } req := lookercommon.FileContent{ Path: filePath, Content: fileContent, } err = lookercommon.UpdateProjectFile(sdk, projectId, req, source.LookerApiSettings()) if err != nil { return nil, fmt.Errorf("error making update_project_file request: %s", err) } data := make(map[string]any) data["type"] = "text" data["text"] = fmt.Sprintf("updated file %s in project %s", filePath, projectId) return data, nil } func (t Tool) ParseParams(data map[string]any, claims map[string]map[string]any) (parameters.ParamValues, error) { return parameters.ParseParams(t.Parameters, data, claims) } func (t Tool) Manifest() tools.Manifest { return t.manifest } func (t Tool) McpManifest() tools.McpManifest { return t.mcpManifest } func (t Tool) Authorized(verifiedAuthServices []string) bool { return tools.IsAuthorized(t.AuthRequired, verifiedAuthServices) } func (t Tool) RequiresClientAuthorization(resourceMgr tools.SourceProvider) (bool, error) { source, err := tools.GetCompatibleSource[compatibleSource](resourceMgr, t.Source, t.Name, t.Kind) if err != nil { return false, err } return source.UseClientAuthorization(), nil } func (t Tool) GetAuthTokenHeaderName(resourceMgr tools.SourceProvider) (string, error) { source, err := tools.GetCompatibleSource[compatibleSource](resourceMgr, t.Source, t.Name, t.Kind) if err != nil { return "", err } return source.GetAuthTokenHeaderName(), nil }

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/googleapis/genai-toolbox'

If you have feedback or need assistance with the MCP directory API, please join our Discord server