Load the retriever from local storage.
load_local(
cls,
folder_path: str,
*,
allow_dangerous_deserialization: bool = False,
file_name: str = 'tfidf_vectorizer'
) -> TFIDFRetriever| Name | Type | Description |
|---|---|---|
folder_path* | str | Folder path to load from. |
allow_dangerous_deserialization | bool | Default: FalseWhether to allow dangerous deserialization.
Defaults to False.
The deserialization relies on .joblib and .pkl files, which can be
modified to deliver a malicious payload that results in execution of
arbitrary code on your machine. You will need to set this to |
file_name | str | Default: 'tfidf_vectorizer'File name to load from. Defaults to "tfidf_vectorizer". |