All checks were successful
CI / go-lint (push) Has been skipped
CI / python-lint (push) Has been skipped
CI / nodejs-lint (push) Has been skipped
CI / test-go-ai-compliance (push) Successful in 35s
CI / test-python-backend-compliance (push) Successful in 26s
CI / test-python-document-crawler (push) Successful in 22s
CI / test-python-dsms-gateway (push) Successful in 19s
Add legal context enrichment from Qdrant vector corpus to the two highest-priority modules (Requirements AI assistant and DSFA drafting engine). Go SDK: - Add SearchCollection() with collection override + whitelist validation - Refactor Search() to delegate to shared searchInternal() Python backend: - New ComplianceRAGClient proxying POST /sdk/v1/rag/search (error-tolerant) - AI assistant: enrich interpret_requirement() and suggest_controls() with RAG - Requirements API: add ?include_legal_context=true query parameter Admin (Next.js): - Extract shared queryRAG() utility from chat route - Inject RAG legal context into v1 and v2 draft pipelines Tests for all three layers (Go, Python, TypeScript shared utility). Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
157 lines
4.5 KiB
Go
157 lines
4.5 KiB
Go
package handlers
|
|
|
|
import (
|
|
"net/http"
|
|
|
|
"github.com/breakpilot/ai-compliance-sdk/internal/ucca"
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
// RAGHandlers handles RAG search API endpoints.
|
|
type RAGHandlers struct {
|
|
ragClient *ucca.LegalRAGClient
|
|
corpusVersionStore *ucca.CorpusVersionStore
|
|
}
|
|
|
|
// NewRAGHandlers creates new RAG handlers.
|
|
func NewRAGHandlers(corpusVersionStore *ucca.CorpusVersionStore) *RAGHandlers {
|
|
return &RAGHandlers{
|
|
ragClient: ucca.NewLegalRAGClient(),
|
|
corpusVersionStore: corpusVersionStore,
|
|
}
|
|
}
|
|
|
|
// AllowedCollections is the whitelist of Qdrant collections that can be queried.
|
|
var AllowedCollections = map[string]bool{
|
|
"bp_compliance_ce": true,
|
|
"bp_compliance_recht": true,
|
|
"bp_compliance_gesetze": true,
|
|
"bp_compliance_datenschutz": true,
|
|
"bp_dsfa_corpus": true,
|
|
"bp_legal_templates": true,
|
|
}
|
|
|
|
// SearchRequest represents a RAG search request.
|
|
type SearchRequest struct {
|
|
Query string `json:"query" binding:"required"`
|
|
Collection string `json:"collection,omitempty"`
|
|
Regulations []string `json:"regulations,omitempty"`
|
|
TopK int `json:"top_k,omitempty"`
|
|
}
|
|
|
|
// Search performs a semantic search across the compliance regulation corpus.
|
|
// POST /sdk/v1/rag/search
|
|
func (h *RAGHandlers) Search(c *gin.Context) {
|
|
var req SearchRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
if req.TopK <= 0 || req.TopK > 20 {
|
|
req.TopK = 5
|
|
}
|
|
|
|
// Validate collection if specified
|
|
if req.Collection != "" {
|
|
if !AllowedCollections[req.Collection] {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Unknown collection: " + req.Collection + ". Allowed: bp_compliance_ce, bp_compliance_recht, bp_compliance_gesetze, bp_compliance_datenschutz, bp_dsfa_corpus, bp_legal_templates"})
|
|
return
|
|
}
|
|
}
|
|
|
|
results, err := h.ragClient.SearchCollection(c.Request.Context(), req.Collection, req.Query, req.Regulations, req.TopK)
|
|
if err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "RAG search failed: " + err.Error()})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
"query": req.Query,
|
|
"results": results,
|
|
"count": len(results),
|
|
})
|
|
}
|
|
|
|
// ListRegulations returns the list of available regulations in the corpus.
|
|
// GET /sdk/v1/rag/regulations
|
|
func (h *RAGHandlers) ListRegulations(c *gin.Context) {
|
|
regs := h.ragClient.ListAvailableRegulations()
|
|
|
|
// Optionally filter by category
|
|
category := c.Query("category")
|
|
if category != "" {
|
|
filtered := make([]ucca.CERegulationInfo, 0)
|
|
for _, r := range regs {
|
|
if r.Category == category {
|
|
filtered = append(filtered, r)
|
|
}
|
|
}
|
|
regs = filtered
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
"regulations": regs,
|
|
"count": len(regs),
|
|
})
|
|
}
|
|
|
|
// CorpusStatus returns the current version status of all RAG collections.
|
|
// GET /sdk/v1/rag/corpus-status
|
|
func (h *RAGHandlers) CorpusStatus(c *gin.Context) {
|
|
if h.corpusVersionStore == nil {
|
|
c.JSON(http.StatusServiceUnavailable, gin.H{"error": "corpus version store not configured"})
|
|
return
|
|
}
|
|
|
|
versions, err := h.corpusVersionStore.GetAllLatestVersions(c.Request.Context())
|
|
if err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "failed to fetch corpus versions: " + err.Error()})
|
|
return
|
|
}
|
|
|
|
collections := make(map[string]gin.H)
|
|
for _, v := range versions {
|
|
collections[v.CollectionName] = gin.H{
|
|
"id": v.ID,
|
|
"current_version": v.Version,
|
|
"documents_count": v.DocumentsCount,
|
|
"chunks_count": v.ChunksCount,
|
|
"regulations": v.Regulations,
|
|
"last_updated": v.CreatedAt,
|
|
"digest": v.Digest,
|
|
}
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
"collections": collections,
|
|
})
|
|
}
|
|
|
|
// CorpusVersionHistory returns the version history for a specific collection.
|
|
// GET /sdk/v1/rag/corpus-versions/:collection
|
|
func (h *RAGHandlers) CorpusVersionHistory(c *gin.Context) {
|
|
if h.corpusVersionStore == nil {
|
|
c.JSON(http.StatusServiceUnavailable, gin.H{"error": "corpus version store not configured"})
|
|
return
|
|
}
|
|
|
|
collection := c.Param("collection")
|
|
if collection == "" {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "collection name required"})
|
|
return
|
|
}
|
|
|
|
versions, err := h.corpusVersionStore.ListCorpusVersions(c.Request.Context(), collection)
|
|
if err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "failed to fetch corpus versions: " + err.Error()})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
"collection": collection,
|
|
"versions": versions,
|
|
"count": len(versions),
|
|
})
|
|
}
|