Security News
Supply Chain Attack Detected in Solana's web3.js Library
A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.
This package provides a Python API to inspect and validate NeXus files written in the HDF5 format.
The latest development version is always available from NeXpy's GitHub repository.
Released versions of nxvalidate
can be installed using
% pip install nxvalidate
The source code can be downloaded from the NeXpy Git repository:
% git clone http://github.com/nexpy/nxvalidate.git
The only prerequisite required to install the nxvalidate
package is
the nexusformat package. There
are more details of further dependencies in the NeXpy
documentation.
At the moment, the nxvalidate
package provides a single command-line script.
% nxinspect -h
usage: nxinspect [-h] [-f FILENAME] [-p PATH] [-a [APPLICATION]]
[-b BASECLASS] [-i] [-w] [-e] [-v]
Inspects and validates NeXus files.
options:
-h, --help show this help message and exit
-f FILENAME, --filename FILENAME
name of the NeXus file to be validated
-p PATH, --path PATH path to group to be validated in the NeXus file
-b BASECLASS, --baseclass BASECLASS
name of the base class to be listed
-a [APPLICATION], --application [APPLICATION]
validate the NeXus file against its application definition
-d DEFINITIONS, --definitions DEFINITIONS
path to the directory containing NeXus definitions
-i, --info output info messages in addition to warnings and errors
-w, --warning output info messages in addition to warnings and errors
-e, --error output info messages in addition to warnings and errors
-v, --version show program's version number and exit
N.B., the command is
nxinspect
, rather thannxvalidate
to avoid confusion with the C-library.
% nxinspect -f <filename.nxs> -e
The --info
, --warning
and --error
switches control how much
information is output. The default is --warning
.% nxinspect -f <filename.nxs> -d /path/to/definitions
The directory should contain two sub-directories, applications
and
base_classes
containing the NXDL files needed to validate the
specified NeXus file.% nxinspect -f <filename.nxs> -a
% nxinspect -f <filename.nxs> -a <application.nxdl.xml>
% nxinspect -b <base-class-name>
Information about the Python API for reading and writing NeXus files is available as part of the NeXpy documentation. If you have any general questions concerning the use of this package, please address them to the NeXus Mailing List. If you discover any bugs, please submit a Github issue, preferably with relevant tracebacks.
This package was developed jointly by Kaitlyn Marlor, Justin Wozniak, and Ray Osborn. The NeXus data format standard has been developed under the supervision of the NeXus International Advisory Committee.
FAQs
A Python package for validating NeXus files
We found that nxvalidate demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.