Marc Kupietz | fd9e749 | 2019-11-08 15:45:18 +0100 | [diff] [blame] | 1 | ################################################################################ |
| 2 | # Use setClassUnion to define the unholy NULL-data union as a virtual class. |
| 3 | ################################################################################ |
| 4 | setClassUnion("characterOrNULL", c("character", "NULL")) |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 5 | setClassUnion("listOrNULL", c("list", "NULL")) |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 6 | # setOldClass("httr2_oauth_client") |
Marc Kupietz | fd9e749 | 2019-11-08 15:45:18 +0100 | [diff] [blame] | 7 | |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 8 | #' Connect to KorAP Server |
Marc Kupietz | 25aebc3 | 2019-09-16 18:40:50 +0200 | [diff] [blame] | 9 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 10 | #' `KorAPConnection()` creates a connection to a KorAP server for corpus queries. |
| 11 | #' This is your starting point for all corpus analysis tasks. |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 12 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 13 | #' Use `KorAPConnection()` to connect, then `corpusQuery()` to search, and |
| 14 | #' `fetchAll()` to retrieve results. For authorized access to restricted corpora, |
| 15 | #' use `auth()` or provide an `accessToken`. |
| 16 | #' |
| 17 | #' @section Basic Workflow: |
| 18 | #' ```r |
| 19 | #' # Connect to KorAP |
| 20 | #' kcon <- KorAPConnection() |
| 21 | #' |
| 22 | #' # Search for a term |
| 23 | #' query <- corpusQuery(kcon, "Ameisenplage") |
| 24 | #' |
| 25 | #' # Get all results |
| 26 | #' results <- fetchAll(query) |
| 27 | #' ``` |
| 28 | #' |
| 29 | #' @section Authorization: |
| 30 | #' For access to restricted corpora, authorize your connection: |
| 31 | #' ```r |
| 32 | #' kcon <- KorAPConnection() |> auth() |
| 33 | #' ``` |
| 34 | #' |
Marc Kupietz | f9914bb | 2025-06-25 09:57:55 +0200 | [diff] [blame] | 35 | #' @param KorAPUrl URL of the web user interface of the KorAP server instance you want to access. |
| 36 | #' Defaults to the environment variable `KORAP_URL` if set and to the IDS Mannheim KorAP main instance |
Marc Kupietz | 36117de | 2025-06-25 12:46:10 +0200 | [diff] [blame] | 37 | #' to query DeReKo, otherwise. In order to access the KorAP instance at the German |
| 38 | #' National Library (DNB) to query the contemporary fiction corpus DeLiKo@@DNB, |
| 39 | #' for example, set `KorAPUrl` to <https://korap.dnb.de/>. |
Marc Kupietz | f9914bb | 2025-06-25 09:57:55 +0200 | [diff] [blame] | 40 | #' @param apiVersion which version of KorAP's API you want to connect to. Defaults to "v1.0". |
| 41 | #' @param apiUrl URL of the KorAP web service. If not provided, it will be constructed from KorAPUrl and apiVersion. |
| 42 | #' @param accessToken OAuth2 access token. For queries on corpus parts with restricted |
| 43 | #' access (e.g. textual queries on IPR protected data), you need to authorize |
| 44 | #' your application with an access token. |
| 45 | #' You can obtain an access token in the OAuth settings of your KorAP web interface. |
| 46 | #' |
| 47 | #' More details are explained in the |
| 48 | #' [authorization section](https://github.com/KorAP/RKorAPClient#authorization) |
| 49 | #' of the RKorAPClient Readme on GitHub. |
| 50 | #' |
| 51 | #' To use authorization based on an access token |
| 52 | #' in subsequent queries, initialize your KorAP connection with: |
| 53 | #' |
| 54 | #' ``` |
| 55 | #' kco <- KorAPConnection(accessToken="<access token>") |
| 56 | #' ``` |
| 57 | #' |
| 58 | #' In order to make the API |
| 59 | #' token persistent for the currently used `KorAPUrl` (you can have one |
| 60 | #' token per KorAPUrl / KorAP server instance), use: |
| 61 | #' |
| 62 | #' ``` |
| 63 | #' persistAccessToken(kco) |
| 64 | #' ``` |
| 65 | #' |
| 66 | #' This will store it in your keyring using the |
| 67 | #' [keyring::keyring-package]. Subsequent KorAPConnection() calls will |
| 68 | #' then automatically retrieve the token from your keying. To stop using a |
| 69 | #' persisted token, call `clearAccessToken(kco)`. Please note that for |
| 70 | #' DeReKo, authorized queries will behave differently inside and outside the |
| 71 | #' IDS, because of the special license situation. This concerns also cached |
| 72 | #' results which do not take into account from where a request was issued. If |
| 73 | #' you experience problems or unexpected results, please try `kco <- |
| 74 | #' KorAPConnection(cache=FALSE)` or use |
| 75 | #' [clearCache()] to clear the cache completely. |
| 76 | #' |
| 77 | #' An alternative to using an access token is to use a browser-based oauth2 workflow |
| 78 | #' to obtain an access token. This can be done with the [auth()] method. |
Marc Kupietz | 36117de | 2025-06-25 12:46:10 +0200 | [diff] [blame] | 79 | #' @param oauthClient OAuth2 client object. |
Marc Kupietz | f9914bb | 2025-06-25 09:57:55 +0200 | [diff] [blame] | 80 | #' @param oauthScope OAuth2 scope. Defaults to "search match_info". |
| 81 | #' @param authorizationSupported logical that indicates if authorization is supported/necessary for the current KorAP instance. Automatically set during initialization. |
| 82 | #' @param userAgent user agent string. Defaults to "R-KorAP-Client". |
| 83 | #' @param timeout timeout in seconds for API requests (this does not influence server internal timeouts). Defaults to 240 seconds. |
| 84 | #' @param verbose logical that decides whether following operations will default to |
| 85 | #' be verbose. Defaults to FALSE. |
| 86 | #' @param cache logical that decides if API calls are cached locally. You can clear |
| 87 | #' the cache with [clearCache()]. Defaults to TRUE. |
| 88 | #' |
| 89 | #' @return [KorAPConnection()] object that can be used e.g. with [corpusQuery()] |
| 90 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 91 | #' @details |
| 92 | #' The KorAPConnection object contains various configuration slots for advanced users: |
| 93 | #' KorAPUrl (server URL), apiVersion, accessToken (OAuth2 token), |
| 94 | #' timeout (request timeout), verbose (logging), cache (local caching), |
| 95 | #' and other technical parameters. Most users can ignore these implementation details. |
| 96 | #' |
| 97 | #' @family initialization functions |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 98 | #' @import R.cache |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 99 | #' @import utils |
| 100 | #' @import methods |
Marc Kupietz | 6dfeed9 | 2025-06-03 11:58:06 +0200 | [diff] [blame] | 101 | #' @include logging.R |
Marc Kupietz | a81343d | 2022-09-06 12:32:10 +0200 | [diff] [blame] | 102 | |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 103 | #' @export |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 104 | KorAPConnection <- setClass("KorAPConnection", slots = c(KorAPUrl = "character", apiVersion = "character", indexRevision = "characterOrNULL", apiUrl = "character", accessToken = "characterOrNULL", oauthClient = "ANY", oauthScope = "characterOrNULL", authorizationSupported = "logical", userAgent = "character", timeout = "numeric", verbose = "logical", cache = "logical", welcome = "listOrNULL")) |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 105 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 106 | generic_kor_app_id <- "99FbPHH7RrN36hbndF7b6f" |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 107 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 108 | kustvakt_redirect_uri <- "http://localhost:1410/" |
| 109 | kustvakt_auth_path <- "settings/oauth/authorize" |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 110 | |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 111 | |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 112 | #' Initialize KorAPConnection object |
| 113 | #' @keywords internal |
Marc Kupietz | 632cbd4 | 2019-09-06 16:04:51 +0200 | [diff] [blame] | 114 | #' @export |
Marc Kupietz | 36117de | 2025-06-25 12:46:10 +0200 | [diff] [blame] | 115 | #' |
Marc Kupietz | b79fd44 | 2025-03-26 10:25:03 +0100 | [diff] [blame] | 116 | setMethod("initialize", "KorAPConnection", function(.Object, |
| 117 | KorAPUrl = if (is.null(Sys.getenv("KORAP_URL")) | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 118 | Sys.getenv("KORAP_URL") == "") { |
Marc Kupietz | b79fd44 | 2025-03-26 10:25:03 +0100 | [diff] [blame] | 119 | "https://korap.ids-mannheim.de/" |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 120 | } else { |
| 121 | Sys.getenv("KORAP_URL") |
| 122 | }, |
| 123 | apiVersion = "v1.0", |
Marc Kupietz | b79fd44 | 2025-03-26 10:25:03 +0100 | [diff] [blame] | 124 | apiUrl, |
| 125 | accessToken = getAccessToken(KorAPUrl), |
| 126 | oauthClient = NULL, |
| 127 | oauthScope = "search match_info", |
| 128 | authorizationSupported = TRUE, |
| 129 | userAgent = "R-KorAP-Client", |
| 130 | timeout = 240, |
| 131 | verbose = FALSE, |
| 132 | cache = TRUE) { |
| 133 | .Object <- callNextMethod() |
| 134 | m <- regexpr("https?://[^?]+", KorAPUrl, perl = TRUE) |
| 135 | .Object@KorAPUrl <- regmatches(KorAPUrl, m) |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 136 | if (!endsWith(.Object@KorAPUrl, "/")) { |
Marc Kupietz | b79fd44 | 2025-03-26 10:25:03 +0100 | [diff] [blame] | 137 | .Object@KorAPUrl <- paste0(.Object@KorAPUrl, "/") |
| 138 | } |
| 139 | if (missing(apiUrl)) { |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 140 | .Object@apiUrl <- paste0(.Object@KorAPUrl, "api/", apiVersion, "/") |
| 141 | } else { |
| 142 | .Object@apiUrl <- apiUrl |
| 143 | } |
| 144 | .Object@accessToken <- accessToken |
| 145 | .Object@oauthClient <- oauthClient |
| 146 | .Object@apiVersion <- apiVersion |
| 147 | .Object@userAgent <- userAgent |
| 148 | .Object@oauthScope <- oauthScope |
| 149 | .Object@authorizationSupported <- authorizationSupported |
| 150 | .Object@timeout <- timeout |
| 151 | .Object@verbose <- verbose |
| 152 | .Object@cache <- cache |
| 153 | .Object@welcome <- apiCall(.Object, .Object@apiUrl, json = FALSE, cache = FALSE, getHeaders = TRUE) |
| 154 | if (!is.null(.Object@welcome)) { |
| 155 | message(.Object@welcome[[2]]) |
| 156 | resp <- httr2::request(.Object@KorAPUrl) |> |
| 157 | httr2::req_url_path_append(kustvakt_auth_path) |> |
| 158 | httr2::req_error(is_error = \(resp) FALSE) |> |
| 159 | httr2::req_perform() |
| 160 | .Object@authorizationSupported <- (httr2::resp_status(resp) == 200) |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 161 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 162 | .Object@indexRevision <- .Object@welcome[[1]][["x-index-revision"]] |
| 163 | } else { |
| 164 | if (grepl(.Object@KorAPUrl, .Object@apiUrl)) { |
| 165 | message("Could not connect to KorAP instance ", .Object@KorAPUrl) |
| 166 | } else { |
| 167 | message("Could not connect to KorAP API at ", .Object@apiUrl) |
| 168 | } |
| 169 | } |
| 170 | .Object |
| 171 | }) |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 172 | |
Marc Kupietz | a96537f | 2019-11-09 23:07:44 +0100 | [diff] [blame] | 173 | |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 174 | accessTokenServiceName <- "RKorAPClientAccessToken" |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 175 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 176 | setGeneric("persistAccessToken", function(kco, ...) standardGeneric("persistAccessToken")) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 177 | |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 178 | #' Persist current access token in keyring |
| 179 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 180 | #' @family initialization functions |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 181 | #' @param kco KorAPConnection object |
| 182 | #' @param accessToken access token to be persisted. If not supplied, the current access token of the KorAPConnection object will be used. |
| 183 | #' @return KorAPConnection object. |
| 184 | #' |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 185 | #' @aliases persistAccessToken |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 186 | #' |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 187 | #' @import keyring |
| 188 | #' @export |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 189 | #' |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 190 | #' @examples |
| 191 | #' \dontrun{ |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 192 | #' kco <- KorAPConnection(accessToken = "e739u6eOzkwADQPdVChxFg") |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 193 | #' persistAccessToken(kco) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 194 | #' |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 195 | #' kco <- KorAPConnection() %>% |
| 196 | #' auth(app_id = "<my application id>") %>% |
| 197 | #' persistAccessToken() |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 198 | #' } |
| 199 | #' |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 200 | #' @seealso [clearAccessToken()], [auth()] |
| 201 | #' |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 202 | setMethod("persistAccessToken", "KorAPConnection", function(kco, accessToken = kco@accessToken) { |
| 203 | if (!is.null(kco@oauthClient)) { |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 204 | warning("Short lived access tokens from a confidential application cannot be persisted.") |
| 205 | return(kco) |
| 206 | } |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 207 | if (is.null(accessToken)) { |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 208 | stop("It seems that you have not supplied any access token that could be persisted.", call. = FALSE) |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 209 | } |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 210 | |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 211 | kco@accessToken <- accessToken |
| 212 | key_set_with_value(accessTokenServiceName, kco@KorAPUrl, accessToken) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 213 | return(kco) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 214 | }) |
| 215 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 216 | setGeneric("clearAccessToken", function(kco) standardGeneric("clearAccessToken")) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 217 | |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 218 | #' Clear access token from keyring and KorAPConnection object |
| 219 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 220 | #' @family initialization functions |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 221 | #' @aliases clearAccessToken |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 222 | #' @import keyring |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 223 | #' @param kco KorAPConnection object |
| 224 | #' @return KorAPConnection object with access token set to `NULL`. |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 225 | #' @export |
| 226 | #' @examples |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 227 | #' \dontrun{ |
Marc Kupietz | 617266d | 2025-02-27 10:43:07 +0100 | [diff] [blame] | 228 | #' kco <- KorAPConnection() |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 229 | #' kco <- clearAccessToken(kco) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 230 | #' } |
| 231 | #' |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 232 | #' @seealso [persistAccessToken()] |
| 233 | #' |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 234 | setMethod("clearAccessToken", "KorAPConnection", function(kco) { |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 235 | key_delete(accessTokenServiceName, kco@KorAPUrl) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 236 | kco@accessToken <- NULL |
| 237 | kco |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 238 | }) |
| 239 | |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 240 | |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 241 | oauthRefresh <- function(req, client, scope, kco) { |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 242 | httr2::req_oauth_auth_code(req, client, |
| 243 | scope = scope, |
| 244 | auth_url = paste0(kco@KorAPUrl, kustvakt_auth_path), |
| 245 | redirect_uri = kustvakt_redirect_uri, |
| 246 | cache_key = kco@KorAPUrl |
| 247 | ) |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 248 | } |
| 249 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 250 | setGeneric("auth", function(kco, app_id = generic_kor_app_id, app_secret = NULL, scope = kco@oauthScope) standardGeneric("auth")) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 251 | |
| 252 | #' Authorize RKorAPClient |
| 253 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 254 | #' @family initialization functions |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 255 | #' @aliases auth |
| 256 | #' |
| 257 | #' @description |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 258 | #' |
| 259 | #' Authorize RKorAPClient to make KorAP queries and download results on behalf of the user. |
| 260 | #' |
| 261 | #' @param kco KorAPConnection object |
| 262 | #' @param app_id OAuth2 application id. Defaults to the generic KorAP client application id. |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 263 | #' @param app_secret OAuth2 application secret. Used with confidential client applications. Defaults to `NULL`. |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 264 | #' @param scope OAuth2 scope. Defaults to "search match_info". |
| 265 | #' @return KorAPConnection object with access token set in `@accessToken`. |
| 266 | #' |
| 267 | #' @importFrom httr2 oauth_client oauth_flow_auth_code |
| 268 | #' @examples |
| 269 | #' \dontrun{ |
Marc Kupietz | 617266d | 2025-02-27 10:43:07 +0100 | [diff] [blame] | 270 | #' kco <- KorAPConnection(verbose = TRUE) %>% auth() |
Marc Kupietz | a550165 | 2025-01-28 20:25:42 +0100 | [diff] [blame] | 271 | #' df <- collocationAnalysis(kco, "focus([marmot/p=ADJA] {Ameisenplage})", |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 272 | #' leftContextSize = 1, rightContextSize = 0 |
| 273 | #' ) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 274 | #' } |
| 275 | #' |
| 276 | #' @seealso [persistAccessToken()], [clearAccessToken()] |
| 277 | #' |
| 278 | #' @export |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 279 | setMethod("auth", "KorAPConnection", function(kco, app_id = generic_kor_app_id, app_secret = NULL, scope = kco@oauthScope) { |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 280 | if (kco@authorizationSupported == FALSE) { |
| 281 | log_info(kco@verbose, "Authorization is not supported by this KorAP instance.") |
| 282 | return(kco) |
| 283 | } |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 284 | if (kco@KorAPUrl != "https://korap.ids-mannheim.de/" & app_id == generic_kor_app_id) { |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 285 | warning(paste("You can use the default app_id only for the IDS Mannheim KorAP main instance for querying DeReKo. Please provide your own app_id for accesing", kco@KorAPUrl)) |
| 286 | return(kco) |
| 287 | } |
| 288 | if (is.null(kco@accessToken) || is.null(kco@welcome)) { # if access token is not set or invalid |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 289 | client <- if (!is.null(kco@oauthClient)) { |
| 290 | kco@oauthClient |
| 291 | } else { |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 292 | httr2::oauth_client( |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 293 | id = app_id, |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 294 | secret = app_secret, |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 295 | token_url = paste0(kco@apiUrl, "oauth2/token") |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 296 | ) |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 297 | } |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 298 | if (is.null(app_secret)) { |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 299 | kco@accessToken <- (client |> |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 300 | httr2::oauth_flow_auth_code( |
| 301 | scope = scope, |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 302 | auth_url = paste0(kco@KorAPUrl, kustvakt_auth_path), |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 303 | redirect_uri = kustvakt_redirect_uri |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 304 | ))$access_token |
| 305 | log_info(kco@verbose, "Client authorized. New access token set.") |
| 306 | } else { |
| 307 | kco@oauthClient <- client |
| 308 | kco@oauthScope <- scope |
| 309 | req <- request(kco@apiUrl) |> |
| 310 | oauthRefresh(client, scope, kco) |> |
| 311 | req_perform() |
| 312 | log_info(kco@verbose, "Client authorized. Short lived access token will be refreshed automatically.") |
| 313 | } |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 314 | } else { |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 315 | log_info(kco@verbose, "Access token already set.") |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 316 | } |
| 317 | return(kco) |
| 318 | }) |
| 319 | |
| 320 | |
| 321 | |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 322 | #' @import keyring |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 323 | getAccessToken <- function(KorAPUrl) { |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 324 | keyList <- tryCatch( |
| 325 | withCallingHandlers(key_list(service = accessTokenServiceName), |
| 326 | warning = function(w) invokeRestart("muffleWarning"), |
| 327 | error = function(e) { |
| 328 | return(NULL) |
| 329 | } |
| 330 | ), |
| 331 | error = function(e) { } |
| 332 | ) |
| 333 | if (KorAPUrl %in% keyList$username) { |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 334 | key_get(accessTokenServiceName, KorAPUrl) |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 335 | } else { |
Marc Kupietz | fd9e749 | 2019-11-08 15:45:18 +0100 | [diff] [blame] | 336 | NULL |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 337 | } |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 338 | } |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 339 | |
Marc Kupietz | 581a29b | 2021-09-04 20:51:04 +0200 | [diff] [blame] | 340 | |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 341 | warnIfNotAuthorized <- function(kco) { |
| 342 | if (kco@authorizationSupported & is.null(kco@accessToken) & is.null(kco@oauthClient)) { |
Marc Kupietz | 581a29b | 2021-09-04 20:51:04 +0200 | [diff] [blame] | 343 | warning( |
| 344 | paste0( |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 345 | "In order to receive KWICSs also from corpora with restricted licenses, you may need to\n", |
| 346 | "authorize your application with an access token or the auth() method.\n", |
| 347 | "To generate an access token, login to KorAP and navigate to KorAP's OAuth settings <", |
Marc Kupietz | 581a29b | 2021-09-04 20:51:04 +0200 | [diff] [blame] | 348 | kco@KorAPUrl, |
| 349 | "settings/oauth#page-top>" |
| 350 | ) |
| 351 | ) |
| 352 | } |
| 353 | } |
| 354 | |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 355 | KorAPCacheSubDir <- function() { |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 356 | paste0( |
| 357 | "RKorAPClient_", |
| 358 | gsub( |
| 359 | "^([0-9]+\\.[0-9]+).*", |
| 360 | "\\1", |
| 361 | packageVersion("RKorAPClient"), |
| 362 | perl = TRUE |
| 363 | ) |
| 364 | ) |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 365 | } |
| 366 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 367 | setGeneric("apiCall", function(kco, ...) standardGeneric("apiCall")) |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 368 | |
Marc Kupietz | 4de53ec | 2019-10-04 09:12:00 +0200 | [diff] [blame] | 369 | ## quiets concerns of R CMD check re: the .'s that appear in pipelines |
Marc Kupietz | ef1ef4a | 2025-02-19 12:12:40 +0100 | [diff] [blame] | 370 | utils::globalVariables(c(".")) |
Marc Kupietz | 4de53ec | 2019-10-04 09:12:00 +0200 | [diff] [blame] | 371 | |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 372 | #' Internal API call method |
| 373 | #' @keywords internal |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 374 | #' @aliases apiCall |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 375 | #' @param kco KorAPConnection object |
| 376 | #' @param url request url |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 377 | #' @param json logical that determines if JSON result is expected |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 378 | #' @param getHeaders logical that determines if headers and content should be returned (as a list) |
Marc Kupietz | 69cc54a | 2019-09-30 12:06:54 +0200 | [diff] [blame] | 379 | #' @importFrom jsonlite fromJSON |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 380 | #' @importFrom curl has_internet |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 381 | #' @import httr2 |
Marc Kupietz | 69cc54a | 2019-09-30 12:06:54 +0200 | [diff] [blame] | 382 | #' @export |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 383 | setMethod("apiCall", "KorAPConnection", function(kco, url, json = TRUE, getHeaders = FALSE, cache = kco@cache, timeout = kco@timeout) { |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 384 | result <- "" |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 385 | |
| 386 | # Handle caching if enabled |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 387 | if (cache) { |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 388 | result <- R.cache::loadCache(dir = KorAPCacheSubDir(), key = list(url, kco@accessToken, kco@indexRevision)) |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 389 | if (!is.null(result)) { |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 390 | if (!is.null(result$meta)) result$meta$cached <- "local" |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 391 | return(result) |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 392 | } |
| 393 | } |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 394 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 395 | # Check for internet connection |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 396 | if (!curl::has_internet()) { |
| 397 | message("No internet connection.") |
| 398 | return(invisible(NULL)) |
| 399 | } |
| 400 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 401 | # Create the request |
| 402 | req <- httr2::request(url) |> |
| 403 | httr2::req_user_agent(kco@userAgent) |> |
| 404 | httr2::req_timeout(timeout) |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 405 | |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 406 | if (!is.null(kco@oauthClient)) { |
| 407 | req <- req |> oauthRefresh(kco@oauthClient, scope = kco@oauthScope, kco) |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 408 | } else if (!is.null(kco@accessToken)) { |
| 409 | req <- req |> httr2::req_auth_bearer_token(kco@accessToken) |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 410 | } |
| 411 | |
Marc Kupietz | d36ee55 | 2025-05-02 20:42:50 +0200 | [diff] [blame] | 412 | resp <- tryCatch(req |> httr2::req_perform(), |
| 413 | error = function(e) { |
| 414 | if (is.null(e$resp)) { |
| 415 | message(paste("Error: ", e$message, collapse = " "), if ("parent" %in% names(e)) paste0("\n", e$parent$message) else "") |
| 416 | return(invisible(NULL)) |
| 417 | } |
| 418 | return(e$resp) |
| 419 | } |
| 420 | ) |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 421 | |
| 422 | if (is.null(resp)) { |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 423 | return(invisible(NULL)) |
| 424 | } |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 425 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 426 | if (resp |> httr2::resp_status() != 200) { |
Marc Kupietz | d36ee55 | 2025-05-02 20:42:50 +0200 | [diff] [blame] | 427 | message("Error: Request failed with status ", resp |> httr2::resp_status(), ": ", resp |> httr2::resp_status_desc()) |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 428 | if (resp |> httr2::resp_content_type() == "application/json") { |
| 429 | result <- tryCatch( |
| 430 | resp |> httr2::resp_body_json(), |
| 431 | error = function(e) { |
| 432 | message("Failed to parse json with error details: ", e$message) |
| 433 | return(NULL) |
| 434 | } |
| 435 | ) |
| 436 | # Handle errors in the response (if any) |
| 437 | if (!is.null(result$errors)) { |
| 438 | errors <- result$errors |
| 439 | warning_msgs <- if (is.data.frame(errors)) { |
| 440 | apply(errors, 1, function(warning) paste(warning[1], ": ", warning[2])) |
| 441 | } else { |
| 442 | lapply(errors, function(error) paste(error, collapse = " ")) |
| 443 | } |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 444 | message(paste("Warning: ", warning_msgs, collapse = "\n")) |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 445 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 446 | } |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 447 | return(invisible(NULL)) |
| 448 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 449 | |
| 450 | # Process JSON response or raw text based on `json` parameter |
| 451 | if (json) { |
| 452 | content_type <- resp |> httr2::resp_content_type() |
| 453 | if (!content_type %in% c("application/json", "application/ld+json")) { |
| 454 | message("API did not return JSON") |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 455 | return(invisible(NULL)) |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 456 | } |
Marc Kupietz | 04814f2 | 2023-04-16 17:13:27 +0200 | [diff] [blame] | 457 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 458 | result <- tryCatch( |
| 459 | resp |> httr2::resp_body_string() |> jsonlite::fromJSON(), |
| 460 | error = function(e) { |
| 461 | message("Failed to parse JSON: ", e$message) |
| 462 | return(NULL) |
| 463 | } |
| 464 | ) |
| 465 | |
| 466 | # Handle warnings in the response (if any) |
| 467 | if (!is.null(result$warnings)) { |
| 468 | warnings <- result$warnings |
| 469 | warning_msgs <- if (is.data.frame(warnings)) { |
| 470 | apply(warnings, 1, function(warning) paste(warning[1], ": ", warning[2])) |
| 471 | } else { |
| 472 | lapply(warnings, function(warning) paste(warning, collapse = " ")) |
| 473 | } |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 474 | message(paste0("\nWarning: ", paste(warning_msgs, collapse = " "))) |
| 475 | if (cache & any(grepl("682", warning_msgs))) { |
| 476 | cache <- FALSE |
Marc Kupietz | d36ee55 | 2025-05-02 20:42:50 +0200 | [diff] [blame] | 477 | log_info(kco@verbose, "Caching will be skipped because of warnings ") |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 478 | } |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 479 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 480 | } else { |
| 481 | result <- resp |> httr2::resp_body_string() |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 482 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 483 | |
| 484 | # Save to cache if enabled |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 485 | if (cache && resp |> httr2::resp_status() == 200) { |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 486 | R.cache::saveCache(result, key = list(url, kco@accessToken, kco@indexRevision), dir = KorAPCacheSubDir(), compress = TRUE) |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 487 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 488 | |
| 489 | # Return headers and content as a list if `getHeaders` is TRUE |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 490 | if (getHeaders) { |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 491 | list(headers = resp |> httr2::resp_headers(), content = result) |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 492 | } else { |
| 493 | result |
| 494 | } |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 495 | }) |
| 496 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 497 | setGeneric("clearCache", function(kco) standardGeneric("clearCache")) |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 498 | |
Marc Kupietz | dc880ac | 2025-06-24 20:34:43 +0200 | [diff] [blame] | 499 | #' Clear local cache |
| 500 | #' |
| 501 | #' Clears the local cache of API responses for the current RKorAPClient version. |
| 502 | #' Useful when you want to force fresh data retrieval or free up disk space. |
| 503 | #' |
| 504 | #' @family connection-initialization |
| 505 | #' @param kco KorAPConnection object |
| 506 | #' @return Invisible NULL (function called for side effects) |
| 507 | #' @examples |
| 508 | #' \dontrun{ |
| 509 | #' kco <- KorAPConnection() |
| 510 | #' clearCache(kco) |
| 511 | #' } |
Marc Kupietz | f9914bb | 2025-06-25 09:57:55 +0200 | [diff] [blame] | 512 | #' |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 513 | #' @aliases clearCache |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 514 | #' @export |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 515 | setMethod("clearCache", "KorAPConnection", function(kco) { |
| 516 | R.cache::clearCache(dir = KorAPCacheSubDir()) |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 517 | }) |
| 518 | |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 519 | #' Display KorAPConnection object |
| 520 | #' @keywords internal |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 521 | #' @param object KorAPConnection object |
| 522 | #' @export |
| 523 | setMethod("show", "KorAPConnection", function(object) { |
| 524 | cat("<KorAPConnection>", "\n") |
| 525 | cat("apiUrl: ", object@apiUrl, "\n") |
| 526 | }) |
| 527 | |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 528 | ##' Funtion KorAPConnection() |
| 529 | ##' |
Marc Kupietz | 617266d | 2025-02-27 10:43:07 +0100 | [diff] [blame] | 530 | ##' Wrappper function for KorAPConnection() |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 531 | ##' |
| 532 | ##' @rdname KorAPConnection-constructor |
| 533 | ##' @name KorAPConnection-constructor |
| 534 | ##' @export |
Marc Kupietz | 617266d | 2025-02-27 10:43:07 +0100 | [diff] [blame] | 535 | ## XKorAPConnection <- function(...) KorAPConnection(...) |