Conversation
Added Script to Convert Sensor Data to ROS ".bag" Files
feat: logs management
A1 control
Infra a analyze
Remove ibeo msg in setup_this_machine.sh
…into A4_planning_patrick
…t2 yeilding logic" This reverts commit 0300ba9.
Finish klampt_visualization and mpl_visualization in GEMstack/scripts/visualization.py
…and other vehicles
Integrate with log_dashboard and add visualization of traffic lights and other vehicles
…into sr_viz_shiyang
fix model not rendered error in production
|
| # fit a line/plane/hyperplane in a pointcloud | ||
| # pc: np array (N,D). the pointcloud | ||
| # tol: the tolerance. default 0.01 | ||
| model = RANSACRegressor(LinearRegression(), residual_threshold=tol) |
Check notice
Code scanning / SonarCloud
Results that depend on random number generation should be reproducible
| target_frame = 3 | ||
| # Define output plot directory | ||
| plot_dir = os.path.join("./plots", log_folder, "viz") | ||
| os.makedirs(plot_dir, exist_ok=True) |
Check failure
Code scanning / SonarCloud
I/O function calls should not be vulnerable to path injection attacks
|
|
||
| # Check if plots have been previously generated | ||
| if os.path.exists(cache_file): | ||
| with open(cache_file, "r") as f: |
Check failure
Code scanning / SonarCloud
I/O function calls should not be vulnerable to path injection attacks
| trajectory_data = [] | ||
|
|
||
| # Parse behavior file | ||
| with open(behavior_file, "r") as f: |
Check failure
Code scanning / SonarCloud
I/O function calls should not be vulnerable to path injection attacks
|
|
||
| # Cache plot file paths | ||
| plot_files = {"comprehensive": plot_path} | ||
| with open(cache_file, "w") as f: |
Check failure
Code scanning / SonarCloud
I/O function calls should not be vulnerable to path injection attacks
|
|
||
| try: | ||
| if platform.system() == "Windows": | ||
| os.system(f'explorer "{full_path}"') |
Check failure
Code scanning / SonarCloud
OS commands should not be vulnerable to command injection attacks
| if platform.system() == "Windows": | ||
| os.system(f'explorer "{full_path}"') | ||
| elif platform.system() == "Linux": | ||
| os.system(f'xdg-open "{full_path}"') |
Check failure
Code scanning / SonarCloud
OS commands should not be vulnerable to command injection attacks
| elif platform.system() == "Linux": | ||
| os.system(f'xdg-open "{full_path}"') | ||
| elif platform.system() == "Darwin": | ||
| os.system(f'open "{full_path}"') |
Check failure
Code scanning / SonarCloud
OS commands should not be vulnerable to command injection attacks
| page = request.args.get("page", 1, type=int) | ||
|
|
||
| try: | ||
| with open(file_path, "r") as f: |
Check failure
Code scanning / SonarCloud
I/O function calls should not be vulnerable to path injection attacks
| </div> | ||
|
|
||
| <script> | ||
| const folder = "{{ log_folder|safe }}"; // Flask passes the folder variable |
Check failure
Code scanning / SonarCloud
Endpoints should not be vulnerable to reflected cross-site scripting (XSS) attacks
|
This is to the wrong branch. It will need to go into s2025 |




No description provided.