B: matrix metadata filter — post-retrieval structured gate
Addresses the reality-test gap surfaced by the candidates and
multi-corpus e2e runs (0d1553c, a97881d): semantic-only retrieval
can't gate by status / state / availability. SearchRequest now
takes an optional MetadataFilter map; results whose metadata
doesn't match every key are dropped before top-K truncation.
Filter value semantics:
string|number|bool → exact equality (JSON-canonical, so 1 ≡ 1.0)
[]any → OR within key (any element matching wins)
AND across keys: every filter key must match.
Missing key in metadata = drop. Malformed metadata = drop. Filter
absent or empty = pass through (zero overhead).
The response now reports MetadataFilterDropped so callers can see
how aggressive the filter was without re-querying.
Caveat (also captured in code comment): this is POST-retrieval, not
PRE-filtering via SQL. Aggressive filters can shrink the result set
below K; caller should bump PerCorpusK to compensate. A queryd-
backed pre-filter is a future commit; this lands the user-visible
fix today.
Tests:
- 7 unit tests (internal/matrix/filter_test.go) covering: nil/
empty filter pass-through, missing-metadata always-fails,
single-value exact match (incl. numeric 5 ≡ 5.0), AND across
keys, OR within list, bool match, malformed JSON metadata
- matrix_smoke.sh: new assertion #7 — filter
label∈{"a near","b near"} drops the 4 mid/far entries from the
6-entry pool, keeping exactly 2 (one per corpus, both with the
matching label). Dropped count surfaces in the response.
15-smoke regression all green. vet clean.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
parent
be65f85f17
commit
b199093d1f
95
internal/matrix/filter_test.go
Normal file
95
internal/matrix/filter_test.go
Normal file
@ -0,0 +1,95 @@
|
|||||||
|
package matrix
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestMatchesMetadataFilter_NoFilter_KeepsAll(t *testing.T) {
|
||||||
|
meta := json.RawMessage(`{"role":"Forklift Operator","state":"IL"}`)
|
||||||
|
if !matchesMetadataFilter(meta, nil) {
|
||||||
|
t.Error("nil filter should match everything")
|
||||||
|
}
|
||||||
|
if !matchesMetadataFilter(meta, map[string]any{}) {
|
||||||
|
t.Error("empty filter should match everything")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestMatchesMetadataFilter_NoMetadata_AlwaysFails(t *testing.T) {
|
||||||
|
if matchesMetadataFilter(nil, map[string]any{"x": "y"}) {
|
||||||
|
t.Error("missing metadata should fail any filter")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestMatchesMetadataFilter_SingleValueExactMatch(t *testing.T) {
|
||||||
|
meta := json.RawMessage(`{"state":"IL","status":"active","years":5}`)
|
||||||
|
cases := []struct {
|
||||||
|
filter map[string]any
|
||||||
|
want bool
|
||||||
|
}{
|
||||||
|
{map[string]any{"state": "IL"}, true},
|
||||||
|
{map[string]any{"state": "TX"}, false},
|
||||||
|
{map[string]any{"status": "active"}, true},
|
||||||
|
{map[string]any{"status": "inactive"}, false},
|
||||||
|
// JSON normalizes both sides, so 5 matches 5.0
|
||||||
|
{map[string]any{"years": 5.0}, true},
|
||||||
|
{map[string]any{"years": 5}, true},
|
||||||
|
// Missing key = fail
|
||||||
|
{map[string]any{"city": "Chicago"}, false},
|
||||||
|
}
|
||||||
|
for _, c := range cases {
|
||||||
|
got := matchesMetadataFilter(meta, c.filter)
|
||||||
|
if got != c.want {
|
||||||
|
t.Errorf("filter %v on %s: want %v, got %v", c.filter, meta, c.want, got)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestMatchesMetadataFilter_AllKeysAND(t *testing.T) {
|
||||||
|
meta := json.RawMessage(`{"state":"IL","status":"active","role":"Forklift Operator"}`)
|
||||||
|
if !matchesMetadataFilter(meta, map[string]any{
|
||||||
|
"state": "IL",
|
||||||
|
"status": "active",
|
||||||
|
}) {
|
||||||
|
t.Error("both keys match: should pass")
|
||||||
|
}
|
||||||
|
if matchesMetadataFilter(meta, map[string]any{
|
||||||
|
"state": "IL",
|
||||||
|
"status": "inactive", // mismatch
|
||||||
|
}) {
|
||||||
|
t.Error("one key mismatches: should fail (AND across keys)")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestMatchesMetadataFilter_ListValueOR(t *testing.T) {
|
||||||
|
meta := json.RawMessage(`{"state":"IL"}`)
|
||||||
|
// state in {"IL","WI","IN"} → match
|
||||||
|
if !matchesMetadataFilter(meta, map[string]any{
|
||||||
|
"state": []any{"IL", "WI", "IN"},
|
||||||
|
}) {
|
||||||
|
t.Error("list with matching element: should pass")
|
||||||
|
}
|
||||||
|
// state in {"TX","CA"} → fail
|
||||||
|
if matchesMetadataFilter(meta, map[string]any{
|
||||||
|
"state": []any{"TX", "CA"},
|
||||||
|
}) {
|
||||||
|
t.Error("list with no matching element: should fail")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestMatchesMetadataFilter_BoolMatch(t *testing.T) {
|
||||||
|
meta := json.RawMessage(`{"available":true,"placed":false}`)
|
||||||
|
if !matchesMetadataFilter(meta, map[string]any{"available": true}) {
|
||||||
|
t.Error("bool true match")
|
||||||
|
}
|
||||||
|
if matchesMetadataFilter(meta, map[string]any{"available": false}) {
|
||||||
|
t.Error("bool true should not match false filter")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestMatchesMetadataFilter_MalformedMetadataFails(t *testing.T) {
|
||||||
|
meta := json.RawMessage(`{not valid json}`)
|
||||||
|
if matchesMetadataFilter(meta, map[string]any{"x": "y"}) {
|
||||||
|
t.Error("malformed metadata should fail")
|
||||||
|
}
|
||||||
|
}
|
||||||
@ -55,17 +55,29 @@ type Result struct {
|
|||||||
// DefaultPlaybookTopK.
|
// DefaultPlaybookTopK.
|
||||||
// PlaybookMaxDistance: cosine ceiling for "similar enough"; 0 =
|
// PlaybookMaxDistance: cosine ceiling for "similar enough"; 0 =
|
||||||
// DefaultPlaybookMaxDistance.
|
// DefaultPlaybookMaxDistance.
|
||||||
|
//
|
||||||
|
// Metadata filter (post-retrieval structured gate):
|
||||||
|
// MetadataFilter: map of metadata-field → expected value. Results
|
||||||
|
// whose metadata doesn't match every key are dropped. Addresses
|
||||||
|
// the reality-test gap surfaced in the candidates/workers
|
||||||
|
// experiments — pure semantic retrieval can't gate by status,
|
||||||
|
// state, etc. Caller can compensate for filter shrinkage by
|
||||||
|
// requesting larger PerCorpusK.
|
||||||
|
// Each filter value can be a single value (string|number|bool —
|
||||||
|
// whatever JSON unmarshals to `any`) or a []any meaning "any
|
||||||
|
// of these values" (OR semantics within one key, AND across keys).
|
||||||
type SearchRequest struct {
|
type SearchRequest struct {
|
||||||
QueryText string `json:"query_text,omitempty"`
|
QueryText string `json:"query_text,omitempty"`
|
||||||
QueryVector []float32 `json:"query_vector,omitempty"`
|
QueryVector []float32 `json:"query_vector,omitempty"`
|
||||||
Corpora []string `json:"corpora"`
|
Corpora []string `json:"corpora"`
|
||||||
K int `json:"k"`
|
K int `json:"k"`
|
||||||
PerCorpusK int `json:"per_corpus_k,omitempty"`
|
PerCorpusK int `json:"per_corpus_k,omitempty"`
|
||||||
Model string `json:"model,omitempty"`
|
Model string `json:"model,omitempty"`
|
||||||
UsePlaybook bool `json:"use_playbook,omitempty"`
|
UsePlaybook bool `json:"use_playbook,omitempty"`
|
||||||
PlaybookCorpus string `json:"playbook_corpus,omitempty"`
|
PlaybookCorpus string `json:"playbook_corpus,omitempty"`
|
||||||
PlaybookTopK int `json:"playbook_top_k,omitempty"`
|
PlaybookTopK int `json:"playbook_top_k,omitempty"`
|
||||||
PlaybookMaxDistance float64 `json:"playbook_max_distance,omitempty"`
|
PlaybookMaxDistance float64 `json:"playbook_max_distance,omitempty"`
|
||||||
|
MetadataFilter map[string]any `json:"metadata_filter,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// SearchResponse wraps the merged results plus per-corpus return
|
// SearchResponse wraps the merged results plus per-corpus return
|
||||||
@ -73,10 +85,13 @@ type SearchRequest struct {
|
|||||||
// without re-querying. PlaybookBoosted is the count of results that
|
// without re-querying. PlaybookBoosted is the count of results that
|
||||||
// received a boost from playbook memory; useful for telemetry on
|
// received a boost from playbook memory; useful for telemetry on
|
||||||
// "how much the learning loop influenced this query."
|
// "how much the learning loop influenced this query."
|
||||||
|
// MetadataFilterDropped is the count of results dropped by the
|
||||||
|
// post-retrieval structured filter (when set in the request).
|
||||||
type SearchResponse struct {
|
type SearchResponse struct {
|
||||||
Results []Result `json:"results"`
|
Results []Result `json:"results"`
|
||||||
PerCorpusCounts map[string]int `json:"per_corpus_counts"`
|
PerCorpusCounts map[string]int `json:"per_corpus_counts"`
|
||||||
PlaybookBoosted int `json:"playbook_boosted,omitempty"`
|
PlaybookBoosted int `json:"playbook_boosted,omitempty"`
|
||||||
|
MetadataFilterDropped int `json:"metadata_filter_dropped,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Retriever holds the HTTP clients to embedd and vectord. Stateless
|
// Retriever holds the HTTP clients to embedd and vectord. Stateless
|
||||||
@ -176,10 +191,32 @@ func (r *Retriever) Search(ctx context.Context, req SearchRequest) (*SearchRespo
|
|||||||
sort.SliceStable(allHits, func(i, j int) bool {
|
sort.SliceStable(allHits, func(i, j int) bool {
|
||||||
return allHits[i].Distance < allHits[j].Distance
|
return allHits[i].Distance < allHits[j].Distance
|
||||||
})
|
})
|
||||||
|
|
||||||
|
// Metadata filter (component B — staffing-side structured gate).
|
||||||
|
// Applied BEFORE top-K truncation so the filter doesn't accidentally
|
||||||
|
// reduce coverage further. Caller can request larger PerCorpusK to
|
||||||
|
// compensate when filters are aggressive.
|
||||||
|
var dropped int
|
||||||
|
if len(req.MetadataFilter) > 0 {
|
||||||
|
filtered := make([]Result, 0, len(allHits))
|
||||||
|
for _, h := range allHits {
|
||||||
|
if matchesMetadataFilter(h.Metadata, req.MetadataFilter) {
|
||||||
|
filtered = append(filtered, h)
|
||||||
|
} else {
|
||||||
|
dropped++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
allHits = filtered
|
||||||
|
}
|
||||||
|
|
||||||
if len(allHits) > req.K {
|
if len(allHits) > req.K {
|
||||||
allHits = allHits[:req.K]
|
allHits = allHits[:req.K]
|
||||||
}
|
}
|
||||||
resp := &SearchResponse{Results: allHits, PerCorpusCounts: perCorpus}
|
resp := &SearchResponse{
|
||||||
|
Results: allHits,
|
||||||
|
PerCorpusCounts: perCorpus,
|
||||||
|
MetadataFilterDropped: dropped,
|
||||||
|
}
|
||||||
|
|
||||||
// Playbook boost (component 5). Reuses the query vector — no
|
// Playbook boost (component 5). Reuses the query vector — no
|
||||||
// extra embed call. If the playbook corpus doesn't exist (first
|
// extra embed call. If the playbook corpus doesn't exist (first
|
||||||
@ -352,6 +389,68 @@ func (r *Retriever) addItem(ctx context.Context, corpus, id string, vec []float3
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// matchesMetadataFilter reports whether a result's metadata satisfies
|
||||||
|
// the filter. Each filter key must be present in the metadata; the
|
||||||
|
// value must equal (or for a list filter, contain) the metadata
|
||||||
|
// value. Missing key = drop. Type mismatches are JSON-equality
|
||||||
|
// checked (e.g. filter wants 1 but metadata has 1.0 → match via
|
||||||
|
// canonical JSON form).
|
||||||
|
//
|
||||||
|
// Filter value semantics:
|
||||||
|
// string|number|bool → exact equality (after JSON normalization)
|
||||||
|
// []any → OR within key (any element matching wins)
|
||||||
|
//
|
||||||
|
// AND across keys: every filter key must match.
|
||||||
|
func matchesMetadataFilter(rawMeta json.RawMessage, filter map[string]any) bool {
|
||||||
|
if len(filter) == 0 {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if len(rawMeta) == 0 {
|
||||||
|
return false // no metadata can't satisfy any filter
|
||||||
|
}
|
||||||
|
var meta map[string]any
|
||||||
|
if err := json.Unmarshal(rawMeta, &meta); err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
for k, expected := range filter {
|
||||||
|
got, present := meta[k]
|
||||||
|
if !present {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if !valueMatches(got, expected) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// valueMatches handles single-value and list-value filter semantics.
|
||||||
|
// JSON-canonical equality so 1 ≡ 1.0 and "true" != true.
|
||||||
|
func valueMatches(got, expected any) bool {
|
||||||
|
if list, ok := expected.([]any); ok {
|
||||||
|
for _, e := range list {
|
||||||
|
if jsonEqual(got, e) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return jsonEqual(got, expected)
|
||||||
|
}
|
||||||
|
|
||||||
|
// jsonEqual marshals both sides and compares the canonical forms.
|
||||||
|
// Handles the float64-vs-int problem inherent to encoding/json
|
||||||
|
// (which decodes all numbers as float64) — both sides go through
|
||||||
|
// the same encoder so 1 == 1.0 if both came in as numbers.
|
||||||
|
func jsonEqual(a, b any) bool {
|
||||||
|
ab, errA := json.Marshal(a)
|
||||||
|
bb, errB := json.Marshal(b)
|
||||||
|
if errA != nil || errB != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return string(ab) == string(bb)
|
||||||
|
}
|
||||||
|
|
||||||
// Corpora returns the list of vectord index names. Thin proxy to
|
// Corpora returns the list of vectord index names. Thin proxy to
|
||||||
// GET /vectors/index — exposed at the matrix layer so callers don't
|
// GET /vectors/index — exposed at the matrix layer so callers don't
|
||||||
// need direct vectord access.
|
// need direct vectord access.
|
||||||
|
|||||||
@ -204,6 +204,23 @@ else
|
|||||||
FAILED=1
|
FAILED=1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# ── 7. metadata filter (component B — staffing-side structured gate)
|
||||||
|
echo "[matrix-smoke] metadata_filter drops non-matching results:"
|
||||||
|
RESP="$(curl -sS -X POST http://127.0.0.1:3110/v1/matrix/search \
|
||||||
|
-H 'Content-Type: application/json' \
|
||||||
|
-d '{"query_vector":[1,0,0,0],"corpora":["corpus_a","corpus_b"],"k":4,"per_corpus_k":3,
|
||||||
|
"metadata_filter":{"label":["a near","b near"]}}')"
|
||||||
|
RESULTS_LEN="$(echo "$RESP" | jq -r '.results | length')"
|
||||||
|
DROPPED="$(echo "$RESP" | jq -r '.metadata_filter_dropped')"
|
||||||
|
KEPT_LABELS="$(echo "$RESP" | jq -r '[.results[].metadata.label] | sort | join(",")')"
|
||||||
|
if [ "$RESULTS_LEN" = "2" ] && [ "$DROPPED" = "4" ] && [ "$KEPT_LABELS" = "a near,b near" ]; then
|
||||||
|
echo " ✓ filter kept 2 ('a near' + 'b near'), dropped 4 mid/far entries"
|
||||||
|
else
|
||||||
|
echo " ✗ len=$RESULTS_LEN dropped=$DROPPED labels=$KEPT_LABELS"
|
||||||
|
echo " full: $RESP"
|
||||||
|
FAILED=1
|
||||||
|
fi
|
||||||
|
|
||||||
if [ "$FAILED" -eq 0 ]; then
|
if [ "$FAILED" -eq 0 ]; then
|
||||||
echo "[matrix-smoke] Matrix acceptance gate: PASSED"
|
echo "[matrix-smoke] Matrix acceptance gate: PASSED"
|
||||||
exit 0
|
exit 0
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user