Marc Kupietz | fd9e749 | 2019-11-08 15:45:18 +0100 | [diff] [blame] | 1 | ################################################################################ |
| 2 | # Use setClassUnion to define the unholy NULL-data union as a virtual class. |
| 3 | ################################################################################ |
| 4 | setClassUnion("characterOrNULL", c("character", "NULL")) |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 5 | setClassUnion("listOrNULL", c("list", "NULL")) |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 6 | # setOldClass("httr2_oauth_client") |
Marc Kupietz | fd9e749 | 2019-11-08 15:45:18 +0100 | [diff] [blame] | 7 | |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 8 | #' Connect to KorAP Server |
Marc Kupietz | 25aebc3 | 2019-09-16 18:40:50 +0200 | [diff] [blame] | 9 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 10 | #' `KorAPConnection()` creates a connection to a KorAP server for corpus queries. |
| 11 | #' This is your starting point for all corpus analysis tasks. |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 12 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 13 | #' Use `KorAPConnection()` to connect, then `corpusQuery()` to search, and |
| 14 | #' `fetchAll()` to retrieve results. For authorized access to restricted corpora, |
| 15 | #' use `auth()` or provide an `accessToken`. |
| 16 | #' |
| 17 | #' @section Basic Workflow: |
| 18 | #' ```r |
| 19 | #' # Connect to KorAP |
| 20 | #' kcon <- KorAPConnection() |
| 21 | #' |
| 22 | #' # Search for a term |
| 23 | #' query <- corpusQuery(kcon, "Ameisenplage") |
| 24 | #' |
| 25 | #' # Get all results |
| 26 | #' results <- fetchAll(query) |
| 27 | #' ``` |
| 28 | #' |
| 29 | #' @section Authorization: |
| 30 | #' For access to restricted corpora, authorize your connection: |
| 31 | #' ```r |
| 32 | #' kcon <- KorAPConnection() |> auth() |
| 33 | #' ``` |
| 34 | #' |
Marc Kupietz | f9914bb | 2025-06-25 09:57:55 +0200 | [diff] [blame] | 35 | #' @param KorAPUrl URL of the web user interface of the KorAP server instance you want to access. |
| 36 | #' Defaults to the environment variable `KORAP_URL` if set and to the IDS Mannheim KorAP main instance |
Marc Kupietz | 36117de | 2025-06-25 12:46:10 +0200 | [diff] [blame] | 37 | #' to query DeReKo, otherwise. In order to access the KorAP instance at the German |
| 38 | #' National Library (DNB) to query the contemporary fiction corpus DeLiKo@@DNB, |
| 39 | #' for example, set `KorAPUrl` to <https://korap.dnb.de/>. |
Marc Kupietz | f9914bb | 2025-06-25 09:57:55 +0200 | [diff] [blame] | 40 | #' @param apiVersion which version of KorAP's API you want to connect to. Defaults to "v1.0". |
| 41 | #' @param apiUrl URL of the KorAP web service. If not provided, it will be constructed from KorAPUrl and apiVersion. |
| 42 | #' @param accessToken OAuth2 access token. For queries on corpus parts with restricted |
| 43 | #' access (e.g. textual queries on IPR protected data), you need to authorize |
| 44 | #' your application with an access token. |
| 45 | #' You can obtain an access token in the OAuth settings of your KorAP web interface. |
| 46 | #' |
| 47 | #' More details are explained in the |
| 48 | #' [authorization section](https://github.com/KorAP/RKorAPClient#authorization) |
| 49 | #' of the RKorAPClient Readme on GitHub. |
| 50 | #' |
| 51 | #' To use authorization based on an access token |
| 52 | #' in subsequent queries, initialize your KorAP connection with: |
| 53 | #' |
| 54 | #' ``` |
| 55 | #' kco <- KorAPConnection(accessToken="<access token>") |
| 56 | #' ``` |
| 57 | #' |
| 58 | #' In order to make the API |
| 59 | #' token persistent for the currently used `KorAPUrl` (you can have one |
| 60 | #' token per KorAPUrl / KorAP server instance), use: |
| 61 | #' |
| 62 | #' ``` |
| 63 | #' persistAccessToken(kco) |
| 64 | #' ``` |
| 65 | #' |
| 66 | #' This will store it in your keyring using the |
| 67 | #' [keyring::keyring-package]. Subsequent KorAPConnection() calls will |
| 68 | #' then automatically retrieve the token from your keying. To stop using a |
| 69 | #' persisted token, call `clearAccessToken(kco)`. Please note that for |
| 70 | #' DeReKo, authorized queries will behave differently inside and outside the |
| 71 | #' IDS, because of the special license situation. This concerns also cached |
| 72 | #' results which do not take into account from where a request was issued. If |
| 73 | #' you experience problems or unexpected results, please try `kco <- |
| 74 | #' KorAPConnection(cache=FALSE)` or use |
| 75 | #' [clearCache()] to clear the cache completely. |
| 76 | #' |
| 77 | #' An alternative to using an access token is to use a browser-based oauth2 workflow |
| 78 | #' to obtain an access token. This can be done with the [auth()] method. |
Marc Kupietz | 36117de | 2025-06-25 12:46:10 +0200 | [diff] [blame] | 79 | #' @param oauthClient OAuth2 client object. |
Marc Kupietz | f9914bb | 2025-06-25 09:57:55 +0200 | [diff] [blame] | 80 | #' @param oauthScope OAuth2 scope. Defaults to "search match_info". |
| 81 | #' @param authorizationSupported logical that indicates if authorization is supported/necessary for the current KorAP instance. Automatically set during initialization. |
| 82 | #' @param userAgent user agent string. Defaults to "R-KorAP-Client". |
| 83 | #' @param timeout timeout in seconds for API requests (this does not influence server internal timeouts). Defaults to 240 seconds. |
| 84 | #' @param verbose logical that decides whether following operations will default to |
Marc Kupietz | 39da9dc | 2025-09-10 13:54:40 +0200 | [diff] [blame] | 85 | #' be verbose. Defaults to FALSE. If not explicitly provided, this can be overridden |
| 86 | #' via environment variable `KORAP_VERBOSE` (accepted true-ish values: 1, true, yes, on) |
| 87 | #' or R option `rkorap.verbose` (logical). |
Marc Kupietz | f9914bb | 2025-06-25 09:57:55 +0200 | [diff] [blame] | 88 | #' @param cache logical that decides if API calls are cached locally. You can clear |
| 89 | #' the cache with [clearCache()]. Defaults to TRUE. |
| 90 | #' |
| 91 | #' @return [KorAPConnection()] object that can be used e.g. with [corpusQuery()] |
| 92 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 93 | #' @details |
| 94 | #' The KorAPConnection object contains various configuration slots for advanced users: |
| 95 | #' KorAPUrl (server URL), apiVersion, accessToken (OAuth2 token), |
| 96 | #' timeout (request timeout), verbose (logging), cache (local caching), |
| 97 | #' and other technical parameters. Most users can ignore these implementation details. |
| 98 | #' |
| 99 | #' @family initialization functions |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 100 | #' @import R.cache |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 101 | #' @import utils |
| 102 | #' @import methods |
Marc Kupietz | 6dfeed9 | 2025-06-03 11:58:06 +0200 | [diff] [blame] | 103 | #' @include logging.R |
Marc Kupietz | a81343d | 2022-09-06 12:32:10 +0200 | [diff] [blame] | 104 | |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 105 | #' @export |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 106 | KorAPConnection <- setClass("KorAPConnection", slots = c(KorAPUrl = "character", apiVersion = "character", indexRevision = "characterOrNULL", apiUrl = "character", accessToken = "characterOrNULL", oauthClient = "ANY", oauthScope = "characterOrNULL", authorizationSupported = "logical", userAgent = "character", timeout = "numeric", verbose = "logical", cache = "logical", welcome = "listOrNULL")) |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 107 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 108 | generic_kor_app_id <- "99FbPHH7RrN36hbndF7b6f" |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 109 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 110 | kustvakt_redirect_uri <- "http://localhost:1410/" |
| 111 | kustvakt_auth_path <- "settings/oauth/authorize" |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 112 | |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 113 | |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 114 | #' Initialize KorAPConnection object |
| 115 | #' @keywords internal |
Marc Kupietz | 632cbd4 | 2019-09-06 16:04:51 +0200 | [diff] [blame] | 116 | #' @export |
Marc Kupietz | 36117de | 2025-06-25 12:46:10 +0200 | [diff] [blame] | 117 | #' |
Marc Kupietz | b79fd44 | 2025-03-26 10:25:03 +0100 | [diff] [blame] | 118 | setMethod("initialize", "KorAPConnection", function(.Object, |
| 119 | KorAPUrl = if (is.null(Sys.getenv("KORAP_URL")) | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 120 | Sys.getenv("KORAP_URL") == "") { |
Marc Kupietz | b79fd44 | 2025-03-26 10:25:03 +0100 | [diff] [blame] | 121 | "https://korap.ids-mannheim.de/" |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 122 | } else { |
| 123 | Sys.getenv("KORAP_URL") |
| 124 | }, |
| 125 | apiVersion = "v1.0", |
Marc Kupietz | b79fd44 | 2025-03-26 10:25:03 +0100 | [diff] [blame] | 126 | apiUrl, |
| 127 | accessToken = getAccessToken(KorAPUrl), |
| 128 | oauthClient = NULL, |
| 129 | oauthScope = "search match_info", |
| 130 | authorizationSupported = TRUE, |
| 131 | userAgent = "R-KorAP-Client", |
| 132 | timeout = 240, |
| 133 | verbose = FALSE, |
| 134 | cache = TRUE) { |
| 135 | .Object <- callNextMethod() |
| 136 | m <- regexpr("https?://[^?]+", KorAPUrl, perl = TRUE) |
| 137 | .Object@KorAPUrl <- regmatches(KorAPUrl, m) |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 138 | if (!endsWith(.Object@KorAPUrl, "/")) { |
Marc Kupietz | b79fd44 | 2025-03-26 10:25:03 +0100 | [diff] [blame] | 139 | .Object@KorAPUrl <- paste0(.Object@KorAPUrl, "/") |
| 140 | } |
| 141 | if (missing(apiUrl)) { |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 142 | .Object@apiUrl <- paste0(.Object@KorAPUrl, "api/", apiVersion, "/") |
| 143 | } else { |
| 144 | .Object@apiUrl <- apiUrl |
| 145 | } |
| 146 | .Object@accessToken <- accessToken |
| 147 | .Object@oauthClient <- oauthClient |
| 148 | .Object@apiVersion <- apiVersion |
| 149 | .Object@userAgent <- userAgent |
| 150 | .Object@oauthScope <- oauthScope |
| 151 | .Object@authorizationSupported <- authorizationSupported |
| 152 | .Object@timeout <- timeout |
Marc Kupietz | 39da9dc | 2025-09-10 13:54:40 +0200 | [diff] [blame] | 153 | # Allow environment/option override only if user did not pass `verbose` |
| 154 | if (missing(verbose)) { |
| 155 | ev <- Sys.getenv("KORAP_VERBOSE", unset = "") |
| 156 | if (nzchar(ev)) { |
| 157 | verbose <- tolower(ev) %in% c("1", "true", "t", "yes", "y", "on") |
| 158 | } else { |
| 159 | opt <- getOption("rkorap.verbose", NULL) |
| 160 | if (!is.null(opt)) verbose <- isTRUE(opt) |
| 161 | } |
| 162 | } |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 163 | .Object@verbose <- verbose |
| 164 | .Object@cache <- cache |
| 165 | .Object@welcome <- apiCall(.Object, .Object@apiUrl, json = FALSE, cache = FALSE, getHeaders = TRUE) |
| 166 | if (!is.null(.Object@welcome)) { |
| 167 | message(.Object@welcome[[2]]) |
| 168 | resp <- httr2::request(.Object@KorAPUrl) |> |
| 169 | httr2::req_url_path_append(kustvakt_auth_path) |> |
| 170 | httr2::req_error(is_error = \(resp) FALSE) |> |
| 171 | httr2::req_perform() |
| 172 | .Object@authorizationSupported <- (httr2::resp_status(resp) == 200) |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 173 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 174 | .Object@indexRevision <- .Object@welcome[[1]][["x-index-revision"]] |
| 175 | } else { |
| 176 | if (grepl(.Object@KorAPUrl, .Object@apiUrl)) { |
| 177 | message("Could not connect to KorAP instance ", .Object@KorAPUrl) |
| 178 | } else { |
| 179 | message("Could not connect to KorAP API at ", .Object@apiUrl) |
| 180 | } |
| 181 | } |
| 182 | .Object |
| 183 | }) |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 184 | |
Marc Kupietz | a96537f | 2019-11-09 23:07:44 +0100 | [diff] [blame] | 185 | |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 186 | accessTokenServiceName <- "RKorAPClientAccessToken" |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 187 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 188 | setGeneric("persistAccessToken", function(kco, ...) standardGeneric("persistAccessToken")) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 189 | |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 190 | #' Persist current access token in keyring |
| 191 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 192 | #' @family initialization functions |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 193 | #' @param kco KorAPConnection object |
| 194 | #' @param accessToken access token to be persisted. If not supplied, the current access token of the KorAPConnection object will be used. |
| 195 | #' @return KorAPConnection object. |
| 196 | #' |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 197 | #' @aliases persistAccessToken |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 198 | #' |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 199 | #' @import keyring |
| 200 | #' @export |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 201 | #' |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 202 | #' @examples |
| 203 | #' \dontrun{ |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 204 | #' kco <- KorAPConnection(accessToken = "e739u6eOzkwADQPdVChxFg") |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 205 | #' persistAccessToken(kco) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 206 | #' |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 207 | #' kco <- KorAPConnection() %>% |
| 208 | #' auth(app_id = "<my application id>") %>% |
| 209 | #' persistAccessToken() |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 210 | #' } |
| 211 | #' |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 212 | #' @seealso [clearAccessToken()], [auth()] |
| 213 | #' |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 214 | setMethod("persistAccessToken", "KorAPConnection", function(kco, accessToken = kco@accessToken) { |
| 215 | if (!is.null(kco@oauthClient)) { |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 216 | warning("Short lived access tokens from a confidential application cannot be persisted.") |
| 217 | return(kco) |
| 218 | } |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 219 | if (is.null(accessToken)) { |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 220 | stop("It seems that you have not supplied any access token that could be persisted.", call. = FALSE) |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 221 | } |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 222 | |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 223 | kco@accessToken <- accessToken |
| 224 | key_set_with_value(accessTokenServiceName, kco@KorAPUrl, accessToken) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 225 | return(kco) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 226 | }) |
| 227 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 228 | setGeneric("clearAccessToken", function(kco) standardGeneric("clearAccessToken")) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 229 | |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 230 | #' Clear access token from keyring and KorAPConnection object |
| 231 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 232 | #' @family initialization functions |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 233 | #' @aliases clearAccessToken |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 234 | #' @import keyring |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 235 | #' @param kco KorAPConnection object |
| 236 | #' @return KorAPConnection object with access token set to `NULL`. |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 237 | #' @export |
| 238 | #' @examples |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 239 | #' \dontrun{ |
Marc Kupietz | 617266d | 2025-02-27 10:43:07 +0100 | [diff] [blame] | 240 | #' kco <- KorAPConnection() |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 241 | #' kco <- clearAccessToken(kco) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 242 | #' } |
| 243 | #' |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 244 | #' @seealso [persistAccessToken()] |
| 245 | #' |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 246 | setMethod("clearAccessToken", "KorAPConnection", function(kco) { |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 247 | key_delete(accessTokenServiceName, kco@KorAPUrl) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 248 | kco@accessToken <- NULL |
| 249 | kco |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 250 | }) |
| 251 | |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 252 | |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 253 | oauthRefresh <- function(req, client, scope, kco) { |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 254 | httr2::req_oauth_auth_code(req, client, |
| 255 | scope = scope, |
| 256 | auth_url = paste0(kco@KorAPUrl, kustvakt_auth_path), |
| 257 | redirect_uri = kustvakt_redirect_uri, |
| 258 | cache_key = kco@KorAPUrl |
| 259 | ) |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 260 | } |
| 261 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 262 | setGeneric("auth", function(kco, app_id = generic_kor_app_id, app_secret = NULL, scope = kco@oauthScope) standardGeneric("auth")) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 263 | |
| 264 | #' Authorize RKorAPClient |
| 265 | #' |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 266 | #' @family initialization functions |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 267 | #' @aliases auth |
| 268 | #' |
| 269 | #' @description |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 270 | #' |
| 271 | #' Authorize RKorAPClient to make KorAP queries and download results on behalf of the user. |
| 272 | #' |
| 273 | #' @param kco KorAPConnection object |
| 274 | #' @param app_id OAuth2 application id. Defaults to the generic KorAP client application id. |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 275 | #' @param app_secret OAuth2 application secret. Used with confidential client applications. Defaults to `NULL`. |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 276 | #' @param scope OAuth2 scope. Defaults to "search match_info". |
| 277 | #' @return KorAPConnection object with access token set in `@accessToken`. |
| 278 | #' |
| 279 | #' @importFrom httr2 oauth_client oauth_flow_auth_code |
| 280 | #' @examples |
| 281 | #' \dontrun{ |
Marc Kupietz | 617266d | 2025-02-27 10:43:07 +0100 | [diff] [blame] | 282 | #' kco <- KorAPConnection(verbose = TRUE) %>% auth() |
Marc Kupietz | a550165 | 2025-01-28 20:25:42 +0100 | [diff] [blame] | 283 | #' df <- collocationAnalysis(kco, "focus([marmot/p=ADJA] {Ameisenplage})", |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 284 | #' leftContextSize = 1, rightContextSize = 0 |
| 285 | #' ) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 286 | #' } |
| 287 | #' |
| 288 | #' @seealso [persistAccessToken()], [clearAccessToken()] |
| 289 | #' |
| 290 | #' @export |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 291 | setMethod("auth", "KorAPConnection", function(kco, app_id = generic_kor_app_id, app_secret = NULL, scope = kco@oauthScope) { |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 292 | if (kco@authorizationSupported == FALSE) { |
| 293 | log_info(kco@verbose, "Authorization is not supported by this KorAP instance.") |
| 294 | return(kco) |
| 295 | } |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 296 | if (kco@KorAPUrl != "https://korap.ids-mannheim.de/" & app_id == generic_kor_app_id) { |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 297 | warning(paste("You can use the default app_id only for the IDS Mannheim KorAP main instance for querying DeReKo. Please provide your own app_id for accesing", kco@KorAPUrl)) |
| 298 | return(kco) |
| 299 | } |
| 300 | if (is.null(kco@accessToken) || is.null(kco@welcome)) { # if access token is not set or invalid |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 301 | client <- if (!is.null(kco@oauthClient)) { |
| 302 | kco@oauthClient |
| 303 | } else { |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 304 | httr2::oauth_client( |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 305 | id = app_id, |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 306 | secret = app_secret, |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 307 | token_url = paste0(kco@apiUrl, "oauth2/token") |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 308 | ) |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 309 | } |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 310 | if (is.null(app_secret)) { |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 311 | kco@accessToken <- (client |> |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 312 | httr2::oauth_flow_auth_code( |
| 313 | scope = scope, |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 314 | auth_url = paste0(kco@KorAPUrl, kustvakt_auth_path), |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 315 | redirect_uri = kustvakt_redirect_uri |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 316 | ))$access_token |
| 317 | log_info(kco@verbose, "Client authorized. New access token set.") |
| 318 | } else { |
| 319 | kco@oauthClient <- client |
| 320 | kco@oauthScope <- scope |
| 321 | req <- request(kco@apiUrl) |> |
| 322 | oauthRefresh(client, scope, kco) |> |
| 323 | req_perform() |
| 324 | log_info(kco@verbose, "Client authorized. Short lived access token will be refreshed automatically.") |
| 325 | } |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 326 | } else { |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 327 | log_info(kco@verbose, "Access token already set.") |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 328 | } |
| 329 | return(kco) |
| 330 | }) |
| 331 | |
| 332 | |
| 333 | |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 334 | #' @import keyring |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 335 | getAccessToken <- function(KorAPUrl) { |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 336 | keyList <- tryCatch( |
| 337 | withCallingHandlers(key_list(service = accessTokenServiceName), |
| 338 | warning = function(w) invokeRestart("muffleWarning"), |
| 339 | error = function(e) { |
| 340 | return(NULL) |
| 341 | } |
| 342 | ), |
| 343 | error = function(e) { } |
| 344 | ) |
| 345 | if (KorAPUrl %in% keyList$username) { |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 346 | key_get(accessTokenServiceName, KorAPUrl) |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 347 | } else { |
Marc Kupietz | fd9e749 | 2019-11-08 15:45:18 +0100 | [diff] [blame] | 348 | NULL |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 349 | } |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 350 | } |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 351 | |
Marc Kupietz | 581a29b | 2021-09-04 20:51:04 +0200 | [diff] [blame] | 352 | |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 353 | warnIfNotAuthorized <- function(kco) { |
| 354 | if (kco@authorizationSupported & is.null(kco@accessToken) & is.null(kco@oauthClient)) { |
Marc Kupietz | 581a29b | 2021-09-04 20:51:04 +0200 | [diff] [blame] | 355 | warning( |
| 356 | paste0( |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 357 | "In order to receive KWICSs also from corpora with restricted licenses, you may need to\n", |
| 358 | "authorize your application with an access token or the auth() method.\n", |
| 359 | "To generate an access token, login to KorAP and navigate to KorAP's OAuth settings <", |
Marc Kupietz | 581a29b | 2021-09-04 20:51:04 +0200 | [diff] [blame] | 360 | kco@KorAPUrl, |
| 361 | "settings/oauth#page-top>" |
| 362 | ) |
| 363 | ) |
| 364 | } |
| 365 | } |
| 366 | |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 367 | KorAPCacheSubDir <- function() { |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 368 | paste0( |
| 369 | "RKorAPClient_", |
| 370 | gsub( |
| 371 | "^([0-9]+\\.[0-9]+).*", |
| 372 | "\\1", |
| 373 | packageVersion("RKorAPClient"), |
| 374 | perl = TRUE |
| 375 | ) |
| 376 | ) |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 377 | } |
| 378 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 379 | setGeneric("apiCall", function(kco, ...) standardGeneric("apiCall")) |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 380 | |
Marc Kupietz | 4de53ec | 2019-10-04 09:12:00 +0200 | [diff] [blame] | 381 | ## quiets concerns of R CMD check re: the .'s that appear in pipelines |
Marc Kupietz | ef1ef4a | 2025-02-19 12:12:40 +0100 | [diff] [blame] | 382 | utils::globalVariables(c(".")) |
Marc Kupietz | 4de53ec | 2019-10-04 09:12:00 +0200 | [diff] [blame] | 383 | |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 384 | #' Internal API call method |
| 385 | #' @keywords internal |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 386 | #' @aliases apiCall |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 387 | #' @param kco KorAPConnection object |
| 388 | #' @param url request url |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 389 | #' @param json logical that determines if JSON result is expected |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 390 | #' @param getHeaders logical that determines if headers and content should be returned (as a list) |
Marc Kupietz | 69cc54a | 2019-09-30 12:06:54 +0200 | [diff] [blame] | 391 | #' @importFrom jsonlite fromJSON |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 392 | #' @importFrom curl has_internet |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 393 | #' @import httr2 |
Marc Kupietz | 69cc54a | 2019-09-30 12:06:54 +0200 | [diff] [blame] | 394 | #' @export |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 395 | setMethod("apiCall", "KorAPConnection", function(kco, url, json = TRUE, getHeaders = FALSE, cache = kco@cache, timeout = kco@timeout) { |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 396 | result <- "" |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 397 | |
| 398 | # Handle caching if enabled |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 399 | if (cache) { |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 400 | result <- R.cache::loadCache(dir = KorAPCacheSubDir(), key = list(url, kco@accessToken, kco@indexRevision)) |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 401 | if (!is.null(result)) { |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 402 | if (!is.null(result$meta)) result$meta$cached <- "local" |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 403 | return(result) |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 404 | } |
| 405 | } |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 406 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 407 | # Check for internet connection |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 408 | if (!curl::has_internet()) { |
| 409 | message("No internet connection.") |
| 410 | return(invisible(NULL)) |
| 411 | } |
| 412 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 413 | # Create the request |
| 414 | req <- httr2::request(url) |> |
| 415 | httr2::req_user_agent(kco@userAgent) |> |
| 416 | httr2::req_timeout(timeout) |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 417 | |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 418 | if (!is.null(kco@oauthClient)) { |
| 419 | req <- req |> oauthRefresh(kco@oauthClient, scope = kco@oauthScope, kco) |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame] | 420 | } else if (!is.null(kco@accessToken)) { |
| 421 | req <- req |> httr2::req_auth_bearer_token(kco@accessToken) |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 422 | } |
| 423 | |
Marc Kupietz | d36ee55 | 2025-05-02 20:42:50 +0200 | [diff] [blame] | 424 | resp <- tryCatch(req |> httr2::req_perform(), |
| 425 | error = function(e) { |
| 426 | if (is.null(e$resp)) { |
| 427 | message(paste("Error: ", e$message, collapse = " "), if ("parent" %in% names(e)) paste0("\n", e$parent$message) else "") |
| 428 | return(invisible(NULL)) |
| 429 | } |
| 430 | return(e$resp) |
| 431 | } |
| 432 | ) |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 433 | |
| 434 | if (is.null(resp)) { |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 435 | return(invisible(NULL)) |
| 436 | } |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 437 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 438 | if (resp |> httr2::resp_status() != 200) { |
Marc Kupietz | d36ee55 | 2025-05-02 20:42:50 +0200 | [diff] [blame] | 439 | message("Error: Request failed with status ", resp |> httr2::resp_status(), ": ", resp |> httr2::resp_status_desc()) |
Marc Kupietz | 62b1789 | 2025-02-01 18:26:45 +0100 | [diff] [blame] | 440 | if (resp |> httr2::resp_content_type() == "application/json") { |
| 441 | result <- tryCatch( |
| 442 | resp |> httr2::resp_body_json(), |
| 443 | error = function(e) { |
| 444 | message("Failed to parse json with error details: ", e$message) |
| 445 | return(NULL) |
| 446 | } |
| 447 | ) |
| 448 | # Handle errors in the response (if any) |
| 449 | if (!is.null(result$errors)) { |
| 450 | errors <- result$errors |
| 451 | warning_msgs <- if (is.data.frame(errors)) { |
| 452 | apply(errors, 1, function(warning) paste(warning[1], ": ", warning[2])) |
| 453 | } else { |
| 454 | lapply(errors, function(error) paste(error, collapse = " ")) |
| 455 | } |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 456 | message(paste("Warning: ", warning_msgs, collapse = "\n")) |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 457 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 458 | } |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 459 | return(invisible(NULL)) |
| 460 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 461 | |
| 462 | # Process JSON response or raw text based on `json` parameter |
| 463 | if (json) { |
| 464 | content_type <- resp |> httr2::resp_content_type() |
| 465 | if (!content_type %in% c("application/json", "application/ld+json")) { |
| 466 | message("API did not return JSON") |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 467 | return(invisible(NULL)) |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 468 | } |
Marc Kupietz | 04814f2 | 2023-04-16 17:13:27 +0200 | [diff] [blame] | 469 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 470 | result <- tryCatch( |
| 471 | resp |> httr2::resp_body_string() |> jsonlite::fromJSON(), |
| 472 | error = function(e) { |
| 473 | message("Failed to parse JSON: ", e$message) |
| 474 | return(NULL) |
| 475 | } |
| 476 | ) |
| 477 | |
| 478 | # Handle warnings in the response (if any) |
| 479 | if (!is.null(result$warnings)) { |
| 480 | warnings <- result$warnings |
| 481 | warning_msgs <- if (is.data.frame(warnings)) { |
| 482 | apply(warnings, 1, function(warning) paste(warning[1], ": ", warning[2])) |
| 483 | } else { |
| 484 | lapply(warnings, function(warning) paste(warning, collapse = " ")) |
| 485 | } |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 486 | message(paste0("\nWarning: ", paste(warning_msgs, collapse = " "))) |
| 487 | if (cache & any(grepl("682", warning_msgs))) { |
| 488 | cache <- FALSE |
Marc Kupietz | d36ee55 | 2025-05-02 20:42:50 +0200 | [diff] [blame] | 489 | log_info(kco@verbose, "Caching will be skipped because of warnings ") |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 490 | } |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 491 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 492 | } else { |
| 493 | result <- resp |> httr2::resp_body_string() |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 494 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 495 | |
| 496 | # Save to cache if enabled |
Marc Kupietz | 03402e7 | 2025-05-02 15:39:40 +0200 | [diff] [blame] | 497 | if (cache && resp |> httr2::resp_status() == 200) { |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 498 | R.cache::saveCache(result, key = list(url, kco@accessToken, kco@indexRevision), dir = KorAPCacheSubDir(), compress = TRUE) |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 499 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 500 | |
| 501 | # Return headers and content as a list if `getHeaders` is TRUE |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 502 | if (getHeaders) { |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 503 | list(headers = resp |> httr2::resp_headers(), content = result) |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 504 | } else { |
| 505 | result |
| 506 | } |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 507 | }) |
| 508 | |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 509 | setGeneric("clearCache", function(kco) standardGeneric("clearCache")) |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 510 | |
Marc Kupietz | dc880ac | 2025-06-24 20:34:43 +0200 | [diff] [blame] | 511 | #' Clear local cache |
| 512 | #' |
| 513 | #' Clears the local cache of API responses for the current RKorAPClient version. |
| 514 | #' Useful when you want to force fresh data retrieval or free up disk space. |
| 515 | #' |
| 516 | #' @family connection-initialization |
| 517 | #' @param kco KorAPConnection object |
| 518 | #' @return Invisible NULL (function called for side effects) |
| 519 | #' @examples |
| 520 | #' \dontrun{ |
| 521 | #' kco <- KorAPConnection() |
| 522 | #' clearCache(kco) |
| 523 | #' } |
Marc Kupietz | f9914bb | 2025-06-25 09:57:55 +0200 | [diff] [blame] | 524 | #' |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 525 | #' @aliases clearCache |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 526 | #' @export |
Marc Kupietz | a824d50 | 2025-05-02 15:40:23 +0200 | [diff] [blame] | 527 | setMethod("clearCache", "KorAPConnection", function(kco) { |
| 528 | R.cache::clearCache(dir = KorAPCacheSubDir()) |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 529 | }) |
| 530 | |
Marc Kupietz | a8c40f4 | 2025-06-24 15:49:52 +0200 | [diff] [blame] | 531 | #' Display KorAPConnection object |
| 532 | #' @keywords internal |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 533 | #' @param object KorAPConnection object |
| 534 | #' @export |
| 535 | setMethod("show", "KorAPConnection", function(object) { |
| 536 | cat("<KorAPConnection>", "\n") |
| 537 | cat("apiUrl: ", object@apiUrl, "\n") |
| 538 | }) |
| 539 | |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 540 | ##' Funtion KorAPConnection() |
| 541 | ##' |
Marc Kupietz | 617266d | 2025-02-27 10:43:07 +0100 | [diff] [blame] | 542 | ##' Wrappper function for KorAPConnection() |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 543 | ##' |
| 544 | ##' @rdname KorAPConnection-constructor |
| 545 | ##' @name KorAPConnection-constructor |
| 546 | ##' @export |
Marc Kupietz | 617266d | 2025-02-27 10:43:07 +0100 | [diff] [blame] | 547 | ## XKorAPConnection <- function(...) KorAPConnection(...) |