Skip to main content

The Next Generation of Microbial Variant Calling with Snippy

Project description

Snippy-NG

PyPI - Version PyPI - Python Version Test Coverage Benchmark

🚨 Snippy-NG is under construction and should not replace Snippy 🚨

Table of Contents

Installation

snippy is available on PyPI and can be installed using pip (without external dependencies):

pip install snippy-nextgen

The complete snippy-ng environment (including all dependencies) can be installed using the snippy-ng installer script. This script will install the latest version of snippy-ng and all its dependencies.

curl -sSL https://github.com/centre-pathogen-genomics/snippy-ng/releases/latest/download/install.sh | bash

License

snippy-ng is distributed under the terms of the MIT license.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

snippy_nextgen-1.0.0.tar.gz (6.8 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

snippy_nextgen-1.0.0-py3-none-any.whl (21.1 kB view details)

Uploaded Python 3

File details

Details for the file snippy_nextgen-1.0.0.tar.gz.

File metadata

  • Download URL: snippy_nextgen-1.0.0.tar.gz
  • Upload date:
  • Size: 6.8 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: python-httpx/0.28.1

File hashes

Hashes for snippy_nextgen-1.0.0.tar.gz
Algorithm Hash digest
SHA256 7fb1a815c5b46b8923071e0c5fb5e7d445ad40423b9818c5c0a7d0e2c817fb7a
MD5 94d82b11d573b6aa0bab461445b7cfb5
BLAKE2b-256 48cfdaf8525539632d1529ec63cef39a476d89746fdcfdde90ffe63afb9b1e99

See more details on using hashes here.

File details

Details for the file snippy_nextgen-1.0.0-py3-none-any.whl.

File metadata

File hashes

Hashes for snippy_nextgen-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 7e6e79d510f48f62dd150aae09f6354d74d70bac26ea5e60208903bf640d67c4
MD5 d108519595acab72ea7b0483deb37d08
BLAKE2b-256 f3e6b8fcf8a24cb320d4bf13f77d7c6d6fb8a866a320a12e08a462ba7addeb39

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page