Marc Kupietz | fd9e749 | 2019-11-08 15:45:18 +0100 | [diff] [blame] | 1 | ################################################################################ |
| 2 | # Use setClassUnion to define the unholy NULL-data union as a virtual class. |
| 3 | ################################################################################ |
| 4 | setClassUnion("characterOrNULL", c("character", "NULL")) |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 5 | setClassUnion("listOrNULL", c("list", "NULL")) |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 6 | # setOldClass("httr2_oauth_client") |
Marc Kupietz | fd9e749 | 2019-11-08 15:45:18 +0100 | [diff] [blame] | 7 | |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 8 | #' Class KorAPConnection |
Marc Kupietz | 25aebc3 | 2019-09-16 18:40:50 +0200 | [diff] [blame] | 9 | #' |
Marc Kupietz | 67edcb5 | 2021-09-20 21:54:24 +0200 | [diff] [blame] | 10 | #' `KorAPConnection` objects represent the connection to a KorAP server. |
| 11 | #' New `KorAPConnection` objects can be created by `new("KorAPConnection")`. |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 12 | #' |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 13 | #' @import R.cache |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 14 | #' @import utils |
| 15 | #' @import methods |
Marc Kupietz | a81343d | 2022-09-06 12:32:10 +0200 | [diff] [blame] | 16 | #' @slot KorAPUrl URL of the web user interface of the KorAP server used in the connection. |
| 17 | #' @slot apiVersion requested KorAP API version. |
| 18 | #' @slot indexRevision indexRevision code as reported from API via `X-Index-Revision` HTTP header. |
| 19 | #' @slot apiUrl full URL of API including version. |
| 20 | #' @slot accessToken OAuth2 access token. |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 21 | #' @slot oauthClient OAuth2 client object. |
| 22 | #' @slot oauthScope OAuth2 scope. |
Marc Kupietz | a81343d | 2022-09-06 12:32:10 +0200 | [diff] [blame] | 23 | #' @slot userAgent user agent string used for connection the API. |
| 24 | #' @slot timeout tineout in seconds for API requests (this does not influence server internal timeouts) |
| 25 | #' @slot verbose logical that decides whether operations will default to be verbose. |
| 26 | #' @slot cache logical that decides if API calls are cached locally. |
| 27 | #' @slot welcome list containing HTTP response received from KorAP server welcome function. |
| 28 | |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 29 | #' @export |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 30 | KorAPConnection <- setClass("KorAPConnection", slots=c(KorAPUrl="character", apiVersion="character", indexRevision="characterOrNULL", apiUrl="character", accessToken="characterOrNULL", oauthClient="ANY", oauthScope="characterOrNULL", userAgent="character", timeout="numeric", verbose="logical", cache="logical", welcome="listOrNULL")) |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 31 | |
| 32 | #' @param .Object KorAPConnection object |
Marc Kupietz | a81343d | 2022-09-06 12:32:10 +0200 | [diff] [blame] | 33 | #' @param KorAPUrl URL of the web user interface of the KorAP server instance you want to access. |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 34 | #' @param apiVersion which version of KorAP's API you want to connect to. |
| 35 | #' @param apiUrl URL of the KorAP web service. |
Marc Kupietz | 132f005 | 2023-04-16 14:23:05 +0200 | [diff] [blame] | 36 | #' @param accessToken OAuth2 access token. For queries on corpus parts with restricted |
| 37 | #' access (e.g. textual queries on IPR protected data), you need to authorize |
| 38 | #' your application with an access token. |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 39 | #' You can obtain an access token using the [auth()] method. |
| 40 | #' |
| 41 | #' More details are explained in the |
Marc Kupietz | 132f005 | 2023-04-16 14:23:05 +0200 | [diff] [blame] | 42 | #' [authorization section](https://github.com/KorAP/RKorAPClient#authorization) |
| 43 | #' of the RKorAPClient Readme on GitHub. |
| 44 | #' |
| 45 | #' To use authorization based on an access token |
| 46 | #' in subsequent queries, initialize your KorAP connection with: |
| 47 | #' |
| 48 | #' ``` |
| 49 | #' kco <- new("KorAPConnection", accessToken="<access token>") |
| 50 | #' ``` |
| 51 | #' |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 52 | #' In order to make the API |
Marc Kupietz | 67edcb5 | 2021-09-20 21:54:24 +0200 | [diff] [blame] | 53 | #' token persistent for the currently used `KorAPUrl` (you can have one |
Marc Kupietz | 132f005 | 2023-04-16 14:23:05 +0200 | [diff] [blame] | 54 | #' token per KorAPUrl / KorAP server instance), use: |
| 55 | #' |
| 56 | #' ``` |
| 57 | #' persistAccessToken(kco) |
| 58 | #' ``` |
| 59 | #' |
| 60 | #' This will store it in your keyring using the |
Marc Kupietz | 6a02e4c | 2025-01-09 21:22:30 +0100 | [diff] [blame] | 61 | #' [keyring::keyring-package]. Subsequent new("KorAPConnection") calls will |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 62 | #' then automatically retrieve the token from your keying. To stop using a |
Marc Kupietz | 67edcb5 | 2021-09-20 21:54:24 +0200 | [diff] [blame] | 63 | #' persisted token, call `clearAccessToken(kco)`. Please note that for |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 64 | #' DeReKo, authorized queries will behave differently inside and outside the |
| 65 | #' IDS, because of the special license situation. This concerns also cached |
| 66 | #' results which do not take into account from where a request was issued. If |
Marc Kupietz | 67edcb5 | 2021-09-20 21:54:24 +0200 | [diff] [blame] | 67 | #' you experience problems or unexpected results, please try `kco <- |
| 68 | #' new("KorAPConnection", cache=FALSE)` or use |
| 69 | #' [clearCache()] to clear the cache completely. |
Marc Kupietz | 132f005 | 2023-04-16 14:23:05 +0200 | [diff] [blame] | 70 | #' |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 71 | #' An alternative to using an access token is to use a browser-based oauth2 workflow |
| 72 | #' to obtain an access token. This can be done with the [auth()] method. |
| 73 | #' |
| 74 | #' @param oauthClient OAuth2 client object. |
| 75 | #' @param oauthScope OAuth2 scope. |
| 76 | #' @param authorizationPossible logical that indicates if authorization is possible/necessary for the current KorAP instance. Automatically set during initialization. |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 77 | #' @param userAgent user agent string. |
Marc Kupietz | a81343d | 2022-09-06 12:32:10 +0200 | [diff] [blame] | 78 | #' @param timeout tineout in seconds for API requests (this does not influence server internal timeouts). |
| 79 | #' @param verbose logical that decides whether following operations will default to |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 80 | #' be verbose. |
Marc Kupietz | a81343d | 2022-09-06 12:32:10 +0200 | [diff] [blame] | 81 | #' @param cache logical that decides if API calls are cached locally. You can clear |
Marc Kupietz | 67edcb5 | 2021-09-20 21:54:24 +0200 | [diff] [blame] | 82 | #' the cache with [clearCache()]. |
| 83 | #' @return [KorAPConnection()] object that can be used e.g. with |
| 84 | #' [corpusQuery()] |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 85 | #' |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 86 | #' @import httr2 |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 87 | #' @examples |
Marc Kupietz | 6ae7605 | 2021-09-21 10:34:00 +0200 | [diff] [blame] | 88 | #' \dontrun{ |
| 89 | #' |
Marc Kupietz | 5a51982 | 2019-09-20 21:43:52 +0200 | [diff] [blame] | 90 | #' kcon <- new("KorAPConnection", verbose = TRUE) |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 91 | #' kq <- corpusQuery(kcon, "Ameisenplage") |
Marc Kupietz | 5a51982 | 2019-09-20 21:43:52 +0200 | [diff] [blame] | 92 | #' kq <- fetchAll(kq) |
Marc Kupietz | 05b2277 | 2020-02-18 21:58:42 +0100 | [diff] [blame] | 93 | #' } |
Marc Kupietz | 7915dc4 | 2019-09-12 17:44:58 +0200 | [diff] [blame] | 94 | #' |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 95 | #' \dontrun{ |
Marc Kupietz | 6ae7605 | 2021-09-21 10:34:00 +0200 | [diff] [blame] | 96 | #' |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 97 | #' kcon <- new("KorAPConnection", verbose = TRUE, accessToken="e739u6eOzkwADQPdVChxFg") |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 98 | #' kq <- corpusQuery(kcon, "Ameisenplage", metadataOnly=FALSE) |
| 99 | #' kq <- fetchAll(kq) |
| 100 | #' kq@collectedMatches$snippet |
| 101 | #' } |
Marc Kupietz | 7915dc4 | 2019-09-12 17:44:58 +0200 | [diff] [blame] | 102 | #' |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 103 | #' @rdname KorAPConnection-class |
Marc Kupietz | 632cbd4 | 2019-09-06 16:04:51 +0200 | [diff] [blame] | 104 | #' @export |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 105 | setMethod("initialize", "KorAPConnection", |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 106 | function(.Object, KorAPUrl = "https://korap.ids-mannheim.de/", apiVersion = 'v1.0', apiUrl, accessToken = getAccessToken(KorAPUrl), oauthClient = NULL, oauthScope = "search match_info", userAgent = "R-KorAP-Client", timeout=240, verbose = FALSE, cache = TRUE) { |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 107 | .Object <- callNextMethod() |
| 108 | m <- regexpr("https?://[^?]+", KorAPUrl, perl = TRUE) |
| 109 | .Object@KorAPUrl <- regmatches(KorAPUrl, m) |
| 110 | if (!endsWith(.Object@KorAPUrl, '/')) { |
| 111 | .Object@KorAPUrl <- paste0(.Object@KorAPUrl, "/") |
| 112 | } |
| 113 | if (missing(apiUrl)) { |
| 114 | .Object@apiUrl = paste0(.Object@KorAPUrl, 'api/', apiVersion, '/') |
| 115 | } else { |
| 116 | .Object@apiUrl = apiUrl |
| 117 | } |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 118 | .Object@accessToken = accessToken |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 119 | .Object@oauthClient = oauthClient |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 120 | .Object@apiVersion = apiVersion |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 121 | .Object@userAgent = userAgent |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 122 | .Object@oauthScope = oauthScope |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 123 | .Object@timeout = timeout |
Marc Kupietz | 5a51982 | 2019-09-20 21:43:52 +0200 | [diff] [blame] | 124 | .Object@verbose = verbose |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 125 | .Object@cache = cache |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 126 | .Object@welcome = apiCall(.Object, .Object@apiUrl, json = FALSE, cache = FALSE, getHeaders = TRUE) |
| 127 | if (!is.null(.Object@welcome)) { |
| 128 | message(.Object@welcome[[2]]) |
| 129 | } |
| 130 | .Object@indexRevision <- .Object@welcome[[1]][["x-index-revision"]] |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 131 | .Object |
| 132 | }) |
| 133 | |
Marc Kupietz | a96537f | 2019-11-09 23:07:44 +0100 | [diff] [blame] | 134 | |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 135 | accessTokenServiceName <- "RKorAPClientAccessToken" |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 136 | |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 137 | setGeneric("persistAccessToken", function(kco, ...) standardGeneric("persistAccessToken") ) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 138 | |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 139 | #' Persist current access token in keyring |
| 140 | #' |
| 141 | #' @param kco KorAPConnection object |
| 142 | #' @param accessToken access token to be persisted. If not supplied, the current access token of the KorAPConnection object will be used. |
| 143 | #' @return KorAPConnection object. |
| 144 | #' |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 145 | #' @aliases persistAccessToken |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 146 | #' |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 147 | #' @import keyring |
| 148 | #' @export |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 149 | #' |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 150 | #' @examples |
| 151 | #' \dontrun{ |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 152 | #' kco <- new("KorAPConnection", accessToken="e739u6eOzkwADQPdVChxFg") |
| 153 | #' persistAccessToken(kco) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 154 | #' |
| 155 | #' kco <- new("KorAPConnection") %>% auth(app_id="<my application id>") %>% persistAccessToken() |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 156 | #' } |
| 157 | #' |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 158 | #' @seealso [clearAccessToken()], [auth()] |
| 159 | #' |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 160 | setMethod("persistAccessToken", "KorAPConnection", function(kco, accessToken = kco@accessToken) { |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 161 | if (! is.null(kco@oauthClient)) { |
| 162 | warning("Short lived access tokens from a confidential application cannot be persisted.") |
| 163 | return(kco) |
| 164 | } |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 165 | if (is.null(accessToken)) |
| 166 | stop("It seems that you have not supplied any access token that could be persisted.", call. = FALSE) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 167 | |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 168 | kco@accessToken <- accessToken |
| 169 | key_set_with_value(accessTokenServiceName, kco@KorAPUrl, accessToken) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 170 | return(kco) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 171 | }) |
| 172 | |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 173 | setGeneric("clearAccessToken", function(kco) standardGeneric("clearAccessToken") ) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 174 | |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 175 | #' Clear access token from keyring and KorAPConnection object |
| 176 | #' |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 177 | #' @aliases clearAccessToken |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 178 | #' @import keyring |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 179 | #' @param kco KorAPConnection object |
| 180 | #' @return KorAPConnection object with access token set to `NULL`. |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 181 | #' @export |
| 182 | #' @examples |
Marc Kupietz | 6ae7605 | 2021-09-21 10:34:00 +0200 | [diff] [blame] | 183 | #' |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 184 | #' \dontrun{ |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 185 | #' kco <- new("KorAPConnection") |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 186 | #' kco <- clearAccessToken(kco) |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 187 | #' } |
| 188 | #' |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 189 | #' @seealso [persistAccessToken()] |
| 190 | #' |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 191 | setMethod("clearAccessToken", "KorAPConnection", function(kco) { |
| 192 | key_delete(accessTokenServiceName, kco@KorAPUrl) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 193 | kco@accessToken <- NULL |
| 194 | kco |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 195 | }) |
| 196 | |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 197 | generic_kor_app_id = "99FbPHH7RrN36hbndF7b6f" |
| 198 | |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 199 | kustvakt_redirekt_uri = "http://localhost:1410/" |
| 200 | kustvakt_auth_path = "settings/oauth/authorize" |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 201 | |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 202 | oauthRefresh <- function(req, client, scope, kco) { |
| 203 | httr2::req_oauth_auth_code(req, client, scope = scope, |
| 204 | auth_url = paste0(kco@KorAPUrl, kustvakt_auth_path), |
| 205 | redirect_uri = kustvakt_redirekt_uri, |
| 206 | cache_key = kco@KorAPUrl) |
| 207 | } |
| 208 | |
| 209 | setGeneric("auth", function(kco, app_id = generic_kor_app_id, app_secret = NULL, scope = kco@oauthScope) standardGeneric("auth") ) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 210 | |
| 211 | #' Authorize RKorAPClient |
| 212 | #' |
| 213 | #' @aliases auth |
| 214 | #' |
| 215 | #' @description |
| 216 | #' `r lifecycle::badge("experimental")` |
| 217 | #' |
| 218 | #' Authorize RKorAPClient to make KorAP queries and download results on behalf of the user. |
| 219 | #' |
| 220 | #' @param kco KorAPConnection object |
| 221 | #' @param app_id OAuth2 application id. Defaults to the generic KorAP client application id. |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 222 | #' @param app_secret OAuth2 application secret. Used with confidential client applications. Defaults to `NULL`. |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 223 | #' @param scope OAuth2 scope. Defaults to "search match_info". |
| 224 | #' @return KorAPConnection object with access token set in `@accessToken`. |
| 225 | #' |
| 226 | #' @importFrom httr2 oauth_client oauth_flow_auth_code |
| 227 | #' @examples |
| 228 | #' \dontrun{ |
| 229 | #' kco <- new("KorAPConnection", verbose = TRUE) %>% auth() |
Marc Kupietz | a550165 | 2025-01-28 20:25:42 +0100 | [diff] [blame] | 230 | #' df <- collocationAnalysis(kco, "focus([marmot/p=ADJA] {Ameisenplage})", |
| 231 | #' leftContextSize=1, rightContextSize=0) |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 232 | #' } |
| 233 | #' |
| 234 | #' @seealso [persistAccessToken()], [clearAccessToken()] |
| 235 | #' |
| 236 | #' @export |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 237 | setMethod("auth", "KorAPConnection", function(kco, app_id = generic_kor_app_id, app_secret = NULL, scope = kco@oauthScope) { |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 238 | if ( kco@KorAPUrl != "https://korap.ids-mannheim.de/" & app_id == generic_kor_app_id) { |
| 239 | warning(paste("You can use the default app_id only for the IDS Mannheim KorAP main instance for querying DeReKo. Please provide your own app_id for accesing", kco@KorAPUrl)) |
| 240 | return(kco) |
| 241 | } |
| 242 | if (is.null(kco@accessToken) || is.null(kco@welcome)) { # if access token is not set or invalid |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 243 | client <- if (! is.null(kco@oauthClient)) kco@oauthClient else |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 244 | httr2::oauth_client( |
| 245 | id = app_id, |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 246 | secret = app_secret, |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 247 | token_url = paste0(kco@apiUrl, "oauth2/token") |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 248 | ) |
| 249 | if (is.null(app_secret)) { |
| 250 | kco@accessToken <- ( client |> |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 251 | httr2::oauth_flow_auth_code( |
| 252 | scope = scope, |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 253 | auth_url = paste0(kco@KorAPUrl, kustvakt_auth_path), |
| 254 | redirect_uri = kustvakt_redirekt_uri |
| 255 | ))$access_token |
| 256 | log_info(kco@verbose, "Client authorized. New access token set.") |
| 257 | } else { |
| 258 | kco@oauthClient <- client |
| 259 | kco@oauthScope <- scope |
| 260 | req <- request(kco@apiUrl) |> |
| 261 | oauthRefresh(client, scope, kco) |> |
| 262 | req_perform() |
| 263 | log_info(kco@verbose, "Client authorized. Short lived access token will be refreshed automatically.") |
| 264 | } |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 265 | } else { |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 266 | log_info(kco@verbose, "Access token already set.") |
Marc Kupietz | a4f51d7 | 2025-01-25 16:23:18 +0100 | [diff] [blame] | 267 | } |
| 268 | return(kco) |
| 269 | }) |
| 270 | |
| 271 | |
| 272 | |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 273 | #' @import keyring |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 274 | getAccessToken <- function(KorAPUrl) { |
Marc Kupietz | 59e449b | 2019-12-12 12:53:54 +0100 | [diff] [blame] | 275 | keyList <- tryCatch(withCallingHandlers(key_list(service = accessTokenServiceName), |
Marc Kupietz | ddce556 | 2019-11-24 15:45:38 +0100 | [diff] [blame] | 276 | warning = function(w) invokeRestart("muffleWarning"), |
Marc Kupietz | 59e449b | 2019-12-12 12:53:54 +0100 | [diff] [blame] | 277 | error = function(e) return(NULL)), |
| 278 | error = function(e) { }) |
Marc Kupietz | 01c2477 | 2021-07-14 18:27:36 +0200 | [diff] [blame] | 279 | if (KorAPUrl %in% keyList$username) |
Marc Kupietz | b956b81 | 2019-11-25 17:53:13 +0100 | [diff] [blame] | 280 | key_get(accessTokenServiceName, KorAPUrl) |
Marc Kupietz | fd9e749 | 2019-11-08 15:45:18 +0100 | [diff] [blame] | 281 | else |
| 282 | NULL |
Marc Kupietz | 4862b86 | 2019-11-07 10:13:53 +0100 | [diff] [blame] | 283 | } |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 284 | |
Marc Kupietz | 581a29b | 2021-09-04 20:51:04 +0200 | [diff] [blame] | 285 | |
| 286 | warnIfNoAccessToken <- function(kco) { |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 287 | if (is.null(kco@accessToken) & is.null(kco@oauthClient)) { |
Marc Kupietz | 581a29b | 2021-09-04 20:51:04 +0200 | [diff] [blame] | 288 | warning( |
| 289 | paste0( |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 290 | "In order to receive KWICSs also from corpora with restricted licenses, you may need to\n", |
| 291 | "authorize your application with an access token or the auth() method.\n", |
| 292 | "To generate an access token, login to KorAP and navigate to KorAP's OAuth settings <", |
Marc Kupietz | 581a29b | 2021-09-04 20:51:04 +0200 | [diff] [blame] | 293 | kco@KorAPUrl, |
| 294 | "settings/oauth#page-top>" |
| 295 | ) |
| 296 | ) |
| 297 | } |
| 298 | } |
| 299 | |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 300 | KorAPCacheSubDir <- function() { |
Marc Kupietz | 70b2c72 | 2020-02-18 13:32:09 +0100 | [diff] [blame] | 301 | paste0("RKorAPClient_", |
| 302 | gsub( |
| 303 | "^([0-9]+\\.[0-9]+).*", |
| 304 | "\\1", |
| 305 | packageVersion("RKorAPClient"), |
| 306 | perl = TRUE |
| 307 | )) |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 308 | } |
| 309 | |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 310 | setGeneric("apiCall", function(kco, ...) standardGeneric("apiCall") ) |
| 311 | |
Marc Kupietz | 4de53ec | 2019-10-04 09:12:00 +0200 | [diff] [blame] | 312 | ## quiets concerns of R CMD check re: the .'s that appear in pipelines |
| 313 | if(getRversion() >= "2.15.1") utils::globalVariables(c(".")) |
| 314 | |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 315 | #' @aliases apiCall |
| 316 | #' @rdname KorAPConnection-class |
| 317 | #' @param kco KorAPConnection object |
| 318 | #' @param url request url |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 319 | #' @param json logical that determines if JSON result is expected |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 320 | #' @param getHeaders logical that determines if headers and content should be returned (as a list) |
Marc Kupietz | 69cc54a | 2019-09-30 12:06:54 +0200 | [diff] [blame] | 321 | #' @importFrom jsonlite fromJSON |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 322 | #' @importFrom curl has_internet |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 323 | #' @import httr2 |
Marc Kupietz | 69cc54a | 2019-09-30 12:06:54 +0200 | [diff] [blame] | 324 | #' @export |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 325 | setMethod("apiCall", "KorAPConnection", function(kco, url, json = TRUE, getHeaders = FALSE, cache = kco@cache, timeout = kco@timeout) { |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 326 | result <- "" |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 327 | |
| 328 | # Handle caching if enabled |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 329 | if (cache) { |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 330 | result <- R.cache::loadCache(dir = KorAPCacheSubDir(), key = list(url, kco@accessToken, kco@indexRevision)) |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 331 | if (!is.null(result)) { |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 332 | if (!is.null(result$meta)) result$meta$cached <- "local" |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 333 | return(result) |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 334 | } |
| 335 | } |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 336 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 337 | # Check for internet connection |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 338 | if (!curl::has_internet()) { |
| 339 | message("No internet connection.") |
| 340 | return(invisible(NULL)) |
| 341 | } |
| 342 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 343 | # Create the request |
| 344 | req <- httr2::request(url) |> |
| 345 | httr2::req_user_agent(kco@userAgent) |> |
| 346 | httr2::req_timeout(timeout) |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 347 | |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 348 | if (! is.null(kco@oauthClient)) { |
| 349 | req <- req |> oauthRefresh(kco@oauthClient, scope = kco@oauthScope, kco) |
| 350 | } else if (!is.null(kco@accessToken)) { |
| 351 | req <- req |> httr2::req_auth_bearer_token(kco@accessToken) |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 352 | } |
| 353 | |
| 354 | # Perform the request and handle errors |
| 355 | resp <- tryCatch( |
| 356 | req |> httr2::req_perform(), |
| 357 | error = function(e) { |
| 358 | message(if(kco@verbose) "\n" else "", "Request failed: ", paste(e$message, e$parent$message, sep = " ")) |
| 359 | e$resp |
| 360 | } |
| 361 | ) |
Marc Kupietz | f83d59a | 2025-02-01 14:48:30 +0100 | [diff] [blame^] | 362 | # |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 363 | if (is.null(resp)) return(invisible(NULL)) |
| 364 | |
| 365 | # Check response status |
| 366 | if (resp |> httr2::resp_status() != 200) { |
| 367 | |
| 368 | message("API request failed with status: ", resp |> httr2::resp_status()) |
| 369 | |
| 370 | result <- tryCatch( |
| 371 | resp |> httr2::resp_body_json(), |
| 372 | error = function(e) { |
| 373 | message("Failed to parse json with error details: ", e$message) |
| 374 | return(NULL) |
| 375 | } |
| 376 | ) |
| 377 | # Handle errors in the response (if any) |
| 378 | if (!is.null(result$errors)) { |
| 379 | errors <- result$errors |
| 380 | warning_msgs <- if (is.data.frame(errors)) { |
| 381 | apply(errors, 1, function(warning) paste(warning[1], ": ", warning[2])) |
| 382 | } else { |
| 383 | lapply(errors, function(error) paste(error, collapse = " ")) |
| 384 | } |
| 385 | message(paste(warning_msgs, collapse = "\n")) |
| 386 | } |
| 387 | |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 388 | return(invisible(NULL)) |
| 389 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 390 | |
| 391 | # Process JSON response or raw text based on `json` parameter |
| 392 | if (json) { |
| 393 | content_type <- resp |> httr2::resp_content_type() |
| 394 | if (!content_type %in% c("application/json", "application/ld+json")) { |
| 395 | message("API did not return JSON") |
Marc Kupietz | a467572 | 2022-02-23 23:55:15 +0100 | [diff] [blame] | 396 | return(invisible(NULL)) |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 397 | } |
Marc Kupietz | 04814f2 | 2023-04-16 17:13:27 +0200 | [diff] [blame] | 398 | |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 399 | result <- tryCatch( |
| 400 | resp |> httr2::resp_body_string() |> jsonlite::fromJSON(), |
| 401 | error = function(e) { |
| 402 | message("Failed to parse JSON: ", e$message) |
| 403 | return(NULL) |
| 404 | } |
| 405 | ) |
| 406 | |
| 407 | # Handle warnings in the response (if any) |
| 408 | if (!is.null(result$warnings)) { |
| 409 | warnings <- result$warnings |
| 410 | warning_msgs <- if (is.data.frame(warnings)) { |
| 411 | apply(warnings, 1, function(warning) paste(warning[1], ": ", warning[2])) |
| 412 | } else { |
| 413 | lapply(warnings, function(warning) paste(warning, collapse = " ")) |
| 414 | } |
| 415 | message(paste(warning_msgs, collapse = "\n")) |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 416 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 417 | } else { |
| 418 | result <- resp |> httr2::resp_body_string() |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 419 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 420 | |
| 421 | # Save to cache if enabled |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 422 | if (cache) { |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 423 | R.cache::saveCache(result, key = list(url, kco@accessToken, kco@indexRevision), dir = KorAPCacheSubDir(), compress = TRUE) |
Marc Kupietz | b2b32a3 | 2020-03-24 13:56:50 +0100 | [diff] [blame] | 424 | } |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 425 | |
| 426 | # Return headers and content as a list if `getHeaders` is TRUE |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 427 | if (getHeaders) { |
Marc Kupietz | f912959 | 2025-01-26 19:17:54 +0100 | [diff] [blame] | 428 | list(headers = resp |> httr2::resp_headers(), content = result) |
Marc Kupietz | b49afa0 | 2020-06-04 15:50:29 +0200 | [diff] [blame] | 429 | } else { |
| 430 | result |
| 431 | } |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 432 | }) |
| 433 | |
Marc Kupietz | 0a96b28 | 2019-10-01 11:05:31 +0200 | [diff] [blame] | 434 | setGeneric("clearCache", function(kco) standardGeneric("clearCache") ) |
| 435 | |
| 436 | #' @aliases clearCache |
| 437 | #' @rdname KorAPConnection-class |
| 438 | #' @export |
| 439 | setMethod("clearCache", "KorAPConnection", function(kco) { |
| 440 | R.cache::clearCache(dir=KorAPCacheSubDir()) |
| 441 | }) |
| 442 | |
Marc Kupietz | e95108e | 2019-09-18 13:23:58 +0200 | [diff] [blame] | 443 | #' @rdname KorAPConnection-class |
| 444 | #' @param object KorAPConnection object |
| 445 | #' @export |
| 446 | setMethod("show", "KorAPConnection", function(object) { |
| 447 | cat("<KorAPConnection>", "\n") |
| 448 | cat("apiUrl: ", object@apiUrl, "\n") |
| 449 | }) |
| 450 | |
Marc Kupietz | d0d3e9b | 2019-09-24 17:36:03 +0200 | [diff] [blame] | 451 | ##' Funtion KorAPConnection() |
| 452 | ##' |
| 453 | ##' Wrappper function for new("KorAPConnection") |
| 454 | ##' |
| 455 | ##' @rdname KorAPConnection-constructor |
| 456 | ##' @name KorAPConnection-constructor |
| 457 | ##' @export |
| 458 | ## XKorAPConnection <- function(...) new("KorAPConnection", ...) |