| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
|
| package objects |
|
|
| import ( |
| "context" |
| "fmt" |
|
|
| "github.com/weaviate/weaviate/entities/additional" |
| "github.com/weaviate/weaviate/entities/filters" |
| "github.com/weaviate/weaviate/entities/models" |
| "github.com/weaviate/weaviate/usecases/auth/authorization" |
| "github.com/weaviate/weaviate/usecases/auth/authorization/filter" |
| ) |
|
|
| type QueryInput struct { |
| Class string |
| Offset int |
| Limit int |
| Cursor *filters.Cursor |
| Filters *filters.LocalFilter |
| Sort []filters.Sort |
| Tenant string |
| Additional additional.Properties |
| } |
|
|
| type QueryParams struct { |
| Class string |
| Offset *int64 |
| Limit *int64 |
| After *string |
| Sort *string |
| Order *string |
| Tenant *string |
| Additional additional.Properties |
| } |
|
|
| func (q *QueryParams) inputs(m *Manager) (*QueryInput, error) { |
| smartOffset, smartLimit, err := m.localOffsetLimit(q.Offset, q.Limit) |
| if err != nil { |
| return nil, err |
| } |
| sort := m.getSort(q.Sort, q.Order) |
| cursor := m.getCursor(q.After, q.Limit) |
| tenant := "" |
| if q.Tenant != nil { |
| tenant = *q.Tenant |
| } |
| return &QueryInput{ |
| Class: q.Class, |
| Offset: smartOffset, |
| Limit: smartLimit, |
| Sort: sort, |
| Cursor: cursor, |
| Tenant: tenant, |
| Additional: q.Additional, |
| }, nil |
| } |
|
|
| func (m *Manager) Query(ctx context.Context, principal *models.Principal, params *QueryParams, |
| ) ([]*models.Object, *Error) { |
| class := "*" |
|
|
| if params != nil && params.Class != "" { |
| params.Class, _ = m.resolveAlias(params.Class) |
| class = params.Class |
| } |
|
|
| if err := m.authorizer.Authorize(ctx, principal, authorization.READ, authorization.CollectionsData(class)...); err != nil { |
| return nil, &Error{err.Error(), StatusForbidden, err} |
| } |
|
|
| m.metrics.GetObjectInc() |
| defer m.metrics.GetObjectDec() |
|
|
| q, err := params.inputs(m) |
| if err != nil { |
| return nil, &Error{"offset or limit", StatusBadRequest, err} |
| } |
|
|
| filteredQuery := filter.New[*QueryInput](m.authorizer, m.config.Config.Authorization.Rbac).Filter( |
| ctx, |
| m.logger, |
| principal, |
| []*QueryInput{q}, |
| authorization.READ, |
| func(qi *QueryInput) string { |
| return authorization.CollectionsData(qi.Class)[0] |
| }, |
| ) |
| if len(filteredQuery) == 0 { |
| err = fmt.Errorf("unauthorized to access collection %s", q.Class) |
| return nil, &Error{err.Error(), StatusForbidden, err} |
| } |
|
|
| res, rerr := m.vectorRepo.Query(ctx, filteredQuery[0]) |
| if rerr != nil { |
| return nil, rerr |
| } |
|
|
| if m.modulesProvider != nil { |
| res, err = m.modulesProvider.ListObjectsAdditionalExtend(ctx, res, q.Additional.ModuleParams) |
| if err != nil { |
| return nil, &Error{"extend results", StatusInternalServerError, err} |
| } |
| } |
|
|
| if q.Additional.Vector { |
| m.trackUsageList(res) |
| } |
|
|
| return res.ObjectsWithVector(q.Additional.Vector), nil |
| } |
|
|