![Maven Central Adds Sigstore Signature Validation](https://cdn.sanity.io/images/cgdhsj6q/production/7da3bc8a946cfb5df15d7fcf49767faedc72b483-1024x1024.webp?w=400&fit=max&auto=format)
Security News
Maven Central Adds Sigstore Signature Validation
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.
lizard-raster-reducer
Advanced tools
Lizard raster reducer is a tool to auto-generate regional reports from Lizard data.
Lizard raster reducer is a tool to auto-generate regional reports from Lizard data. It "reduces" raster data to aggregate statistics for multiple regions. Lizard API endpoints are used to retrieve data. The main ones are search, rasters, regions and raster-aggregates. To prevent API overload, the tool creates and fills a 'lizard_cache' folder by default.
Multiple rasters can be specified. The first raster will act as the scope raster. The scope raster determines the spatial extent and temporal behaviour of the result. Rasters can be temporal or static. Rasters can contain continuous values or discrete classes. Regions of one region type are used for the result. Regions within the spatial extent of the scope raster are used in the result. A configuration file is used to customize the output.
The results are aggregate numbers of data per region. When the data type is interval or ratio, the average of the region is returned. When data are classes, the area fraction per class are returned. The output format can be specified to be CSV, JSON or HTML.
We can be installed with::
$ pip install lizard-raster-reducer
This example notebook (link) <https://github.com/nens/lizard-raster-reducer/blob/master/notebook_examples/example_use_lizard_raster_reducer.ipynb>
_ exemplifies how the Lizard raster reducer can be used.
Create .yml configuration files from templates::
$ run-lizard-raster-reducer
Specify reducer options in reducer_options.yml.
Specify Lizard credentials in credentials.yml
Review optional arguments to pass: run-lizard-raster-reducer -h
Run the code: run-lizard-raster-reducer
Find result(s) in local sub-folder /reducer_results
We're installed with pipenv <https://docs.pipenv.org/>
_, a handy wrapper
around pip and virtualenv. Install that first with pip install pipenv
. Then run::
$ PIPENV_VENV_IN_PROJECT=1 pipenv --three $ pipenv install --dev
There will be a script you can run like this::
$ pipenv run run-lizard-raster-reducer
It runs the main()
function in lizard-raster-reducer/scripts.py
,
adjust that if necessary. The script is configured in setup.py
(see
entry_points
).
In order to get nicely formatted python files without having to spend manual work on it, run the following command periodically::
$ pipenv run black lizard_raster_reducer
Run the tests regularly. This also checks with pyflakes, black and it reports coverage. Pure luxury::
$ pipenv run pytest
The tests are also run automatically on travis-ci <https://travis-ci.com/nens/lizard-raster-reducer>
, you'll see it
in the pull requests. There's also coverage reporting <https://coveralls.io/github/nens/lizard-raster-reducer>
on
coveralls.io (once it has been set up).
If you need a new dependency (like requests
), add it in setup.py
in
install_requires
. Afterwards, run install again to actually install your
dependency::
$ pipenv install --dev
FAQs
Lizard raster reducer is a tool to auto-generate regional reports from Lizard data.
We found that lizard-raster-reducer demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.
Security News
CISOs are racing to adopt AI for cybersecurity, but hurdles in budgets and governance may leave some falling behind in the fight against cyber threats.
Research
Security News
Socket researchers uncovered a backdoored typosquat of BoltDB in the Go ecosystem, exploiting Go Module Proxy caching to persist undetected for years.