Security News
Supply Chain Attack Detected in @solana/web3.js Library
A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.
@cumulus/api
Advanced tools
This module builds the Cumulus API for the Cumulus framework. It uses a combination of AWS services to create an API interface for configuring, managing and monitoring the Cumulus framework.
For the full documentation of the API see https://nasa.github.io/cumulus-api.
To run the API locally using Localstack for AWS services without Earthdata authentication required:
npm run serve
To run the API locally using Localstack for AWS services with Earthdata authentication required:
EARTHDATA_CLIENT_ID=<your_client_id> \
EARTHDATA_CLIENT_PASSWORD=<your_password> \
USERNAME=<username> \
npm run serve-oauth
Note: The Cumulus API checks whether the username used to login with Earthdata is an allowed user for the API. In order to add your Earthdata username as an allowed user when running the API against Localstack, you must specify it using the USERNAME
environment variable.
To run the API locally using your deployed stack with Earthdata authentication required:
stackName=<your_stack_name> \
system_bucket=<your_system_bucket> \
EARTHDATA_CLIENT_ID=<your_client_id> \
EARTHDATA_CLIENT_PASSWORD=<your_password> \
ES_HOST=<your_elasticsearch_host> \
npm run serve-remote
Please note that if your Elasticsearch instance is deployed behind a VPC, your local endpoints will not be able to interact with it.
If Elasticsearch is not deployed behind a VPC and you want endpoints that interact with Elasticsearch to work, you must specify the ES_HOST
environment variable for this command.
You can get the value for ES_HOST
for your stack using the AWS CLI, where <your_es_domain_name>
is the value of <stackName>-<es.name>
for your app deployment in config.yml:
aws es describe-elasticsearch-domain --domain-name <your_es_domain_name> --query 'DomainStatus.Endpoint'
To run the distribution API locally using Localstack for AWS services without Earthdata authentication required:
npm run serve-dist
To run the distribution API locally using Localstack for AWS services with Earthdata authentication required:
EARTHDATA_CLIENT_ID=<your_client_id> EARTHDATA_CLIENT_PASSWORD=<your_password> npm run serve-dist-oauth
To run the distribution API locally using your deployed stack with Earthdata authentication required:
stackName=<your_stack_name> \
EARTHDATA_CLIENT_ID=<your_client_id> \
EARTHDATA_CLIENT_PASSWORD=<your_password> \
npm run serve-dist-remote
In order for the locally running API to interact with your deployed stack, you must set the stackName
environment variable for this command, which should match the stack name in Cloudformation for your app deployment. (default: prefix
in config.yml)
A command line interface is available to provide some additional API functionality. To see the available commands, install the Cumulus API package and run cumulus-api --help
.
Running tests for message-consumer depends on localstack. Once you have installed localstack, start it:
localstack start
Then you can run tests locally via:
LOCALSTACK_HOST=localhost IS_LOCAL=true npm run test
Cumulus is a cloud-based data ingest, archive, distribution and management prototype for NASA's future Earth science data streams.
To make a contribution, please see our contributing guidelines.
FAQs
Lambda functions for handling all daac's API operations
The npm package @cumulus/api receives a total of 1,953 weekly downloads. As such, @cumulus/api popularity was classified as popular.
We found that @cumulus/api demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.