
Security News
vlt Launches "reproduce": A New Tool Challenging the Limits of Package Provenance
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
empaia-app-test-suite
Advanced tools
There are different possibilities to install the EMPAIA App Test Suite depending on your intended use:
Installation via pip
from Python Package Index (PyPI).
# create virtual environment (recommended)
python3 -m venv .venv
source .venv/bin/activate
# install with pip
pip install empaia-app-test-suite
Installation via pip
from Python Package Index Test Repository (Test.PyPI).
# create virtual environment (recommended)
python3 -m venv .venv
source .venv/bin/activate
# install with pip from test.pypi.org
pip install -i https://test.pypi.org/simple/ --extra-index-url https://pypi.org/simple/ empaia-app-test-suite
Clone the EATS source code repository.
This module uses submodules, i.e. references to other git repositories. Add --recurse-submodule
to your clone command to also get all submodules, e.g.
git clone --recurse-submodule https://gitlab.com/empaia/integration/empaia-app-test-suite.git
cd empaia-app-test-suite
### also after changing branch
git submodule update --init --recursive
Build the EATS CLI app and install all needed dependencies:
# create virtual environment (recommended)
python3 -m venv .venv
source .venv/bin/activate
# build / install EATS and dependencies
poetry install
Run the EATS CLI app with
eats
To force pull and build services:
eats services up <wsi-mount-points-path> --build --pull
For detailed instructions take a look at the App Developer Documentation
Start all backend services in Docker containers using the eats services up
command. WSI directories are mounted into the WSI Service container. Only WSIs contained in one of the specified directories can be used as a job input.
eats services up <wsi-mount-points-path>
You can perform health checks of running backend services.
eats services health
Register your app with its <docker-image-name>
(can be fully qualified docker registry url, e.g. registry.gitlab.com/empaia/integration/sample-apps/v3/org-empaia-vendor_name-tutorial_app_01:v3.0
). Also provide the path to your ead.json
. If your app required configuration parameters, use the --global-config-file
and / or --customer-config-file
flag to specify the path to you configuration.
eats apps register <path-to-ead.json> <docker-image-name> > app.env
# or with configuration
eats apps register <path-to-ead.json> <docker-image-name> --global-config-file <path-to-configuration.json> --customer-config-file <path-to-configuration.json> > app.env
# export the app id for later use
export $(xargs < app.env)
echo $APP_ID
Use the APP_ID together with your JSON files for your data inputs in a job-inputs
directory to register ar new job.
eats jobs register $APP_ID <path-to-job-inputs> > job.env
The generated job.env
file contains the EMPAIA_JOB_ID
, EMPAIA_TOKEN
, and EMPAIA_APP_API
environment variables, that are handed to your app during the eats jobs run
step.
eats jobs run ./job.env
The job ID can be retrieved from the job.env
file to be used in other commands.
export $(xargs < job.env)
echo $EMPAIA_JOB_ID
Regularly check the jobs status until it is COMPLETED
.
eats jobs status $EMPAIA_JOB_ID
The job ID is used as the container name. It can be used to retrieved docker logs.
docker logs $EMPAIA_JOB_ID
Open localhost:8888/wbc3
in a Browser to review job results using the Workbench Client 3.0.
In addition, the job results can be exported to JSON files in a job-outputs
directory.
eats jobs export $EMPAIA_JOB_ID ./job-outputs
If a job is taking too long or is stuck, the job can be aborted.
eats jobs abort $EMPAIA_JOB_ID
To inspect backend service logs the docker logs
command can be used directly. The names of all service containers can be retrieved using the eats services list
command.
eats services list # print list of service names
docker logs <SERVICE_NAME>
It is possible to register and run multiple jobs without restart backend services. The services can be stopped, if they are not needed anymore. All created data is available when the services are started again.
eats services down
To erase all created data use eats services down -v
to remove all created docker volumes or docker volume rm
directly.
eats services down -v
# or
docker volume rm $(eats services volumes)
Check your code before committing.
black
and isort
pycodestyle
and pylint
black
formatting should resolve most issues for pycodestyle
isort .
black empaia_app_test_suite tests check_version.py
pycodestyle empaia_app_test_suite tests check_version.py
pylint empaia_app_test_suite tests check_version.py
Create a directory in which the WSI CMU-1.svs is located in a subdirectory "Aperio":
WSI_BASE_PATH
└── Aperio
└── CMU-1.svs
# run cli command tests
pytest tests/commands --maxfail=1 -s -v --mount-point <WSI_BASE_PATH>
eats services up <WSI_BASE_PATH> --build --pull
# run sample apps tests
pytest tests/sample_apps_tests --maxfail=1 -s -v
If a test from tests/sample_apps
fails, use docker logs <servicename>
for debugging.
eats services up <WSI_BASE_PATH> --build --pull --gpu-driver nvidia
# run gpu sample apps test
pytest tests/gpu_support_test
If docker is locally installed with support for CUDA and a supported GPU is available on the host system the test must succeed. If the test fails please check if docker is correctly installed.
FAQs
The EMPAIA App Test Suite (EATS)
We found that empaia-app-test-suite demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
Research
Security News
Socket researchers uncovered a malicious PyPI package exploiting Deezer’s API to enable coordinated music piracy through API abuse and C2 server control.
Research
The Socket Research Team discovered a malicious npm package, '@ton-wallet/create', stealing cryptocurrency wallet keys from developers and users in the TON ecosystem.