
Security News
NVD Concedes Inability to Keep Pace with Surging CVE Disclosures in 2025
Security experts warn that recent classification changes obscure the true scope of the NVD backlog as CVE volume hits all-time highs.
CLI tool for uploading data to the Human Cell Atlas AWS S3 buckets.
Users need to have
The hca-util tool is available to install from PyPi.
$ pip install hca-util
Note there is a version of this tool published as covid-util in PyPi for uploading data to the European COVID-19 data platform. This version uses its own separate data storage and access credentials.
Display help and list of commands.
$ hca-util -h
usage: hca-util [-h] [--version] [--profile PROFILE] {config,create,select,list,upload,download,delete} ...
hca-util
optional arguments:
-h, --help show this help message and exit
--version, -v show program's version number and exit
--profile PROFILE use PROFILE instead of default 'hca-util' profile
command:
{config,create,select,list,upload,download,delete}
config configure AWS credentials
create create an upload area (authorised users only)
select select or show the active upload area
list list contents of the area
upload upload files to the area
download download files from the area
delete delete files from the area
In the above, optional arguments are between []
and choices between {}
.
The basic usage is as follows:
$ hca-util cmd ARG1 ARG2 -o1 -o2
Use the tool by specifying a command (cmd
- see list below) to run, any mandatory (positional) arguments (e.g. ARG1
and ARG2
- see positional args for each command), and any optional arguments (e.g. -o1
and o2
- see options for each command).
Help with specific command:
$ hca-util <cmd> -h
Some commands or options/flags are restricted to authorised users (admin) only.
config
commandConfigure AWS credentials
$ hca-util config ACCESS_KEY SECRET_KEY
positional arguments:
ACCESS_KEY AWS Access Key ID
SECRET_KEY AWS Secret Access Key
The tool uses the profile name hca-util in local AWS config files.
Once configured, the set up can be checked by running the command again, this time without credentials (hca-util config
), to verify if the previously entered credentials are valid or not.
create
commandCreate an upload area (authorised users only)
$ hca-util create NAME [-p {u,ud,ux,udx}]
positional arguments:
NAME name for the new area
optional arguments:
-p {u,ud,ux,udx} allowed actions (permissions) on new area. u for
upload, x for delete and d for download. Default is ux
select
commandShow or select the active upload area
$ hca-util select AREA
positional arguments:
AREA area uuid.
If AREA is not specified, the selected area is shown.
list
commandList contents of selected area
$ hca-util list [-b]
optional arguments:
-b list all areas in bucket **(authorised users only)**
upload
commandUpload files to the selected area
$ hca-util upload PATH [PATH ...] [-o]
positional arguments:
PATH valid file or directory
optional arguments:
-o overwrite files with same names
download
commandDownload files from the selected area
$ hca-util download (-a | -f file [file ...])
optional arguments:
-a download all files from selected area
-f file [file ...] download specified file(s) only
delete
commandDelete files from the selected area
$ hca-util delete [-a | -d] [PATH [PATH ...]]
positional arguments:
PATH path to file or directory to delete
optional arguments:
-a delete all files from the area
-d delete upload area and contents (authorised users only)
sync
commandTransfer files from the selected area to Ingest upload area
$ hca-util sync INGEST_UPLOAD_AREA
positional arguments:
INGEST_UPLOAD_AREA Ingest upload area
INGEST_UPLOAD_AREA format: s3://org-hca-data-archive-upload-_ENV_/_UUID_/
Download dependencies
pip install -r requirements.txt
Run
python3 -m ait.commons.util
Run tests
nosetests
FAQs
CLI tool for uploading data to the HCA data platform
We found that hca-util demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Security experts warn that recent classification changes obscure the true scope of the NVD backlog as CVE volume hits all-time highs.
Security Fundamentals
Attackers use obfuscation to hide malware in open source packages. Learn how to spot these techniques across npm, PyPI, Maven, and more.
Security News
Join Socket for exclusive networking events, rooftop gatherings, and one-on-one meetings during BSidesSF and RSA 2025 in San Francisco.