Skip to content

Commit 68d8358

Browse files
Isaac ROS 4.0 (#218)
1 parent 2338f7e commit 68d8358

File tree

94 files changed

+910
-13809
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

94 files changed

+910
-13809
lines changed

README.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,13 @@
11
# Isaac ROS Common
22

3-
Dockerfiles and scripts for development using the Isaac ROS suite.
3+
Essential utilities, packages, scripts, and testing infrastructure for Isaac ROS packages.
44

55
## Overview
66

77
The Isaac ROS Common
8-
repository contains a number of scripts and Dockerfiles to help
9-
streamline development and testing with the Isaac ROS suite.
8+
repository contains an array of essential packages for building, testing, and using Isaac ROS.
109

11-
<div align="center"><a class="reference internal image-reference" href="https://media.githubusercontent.com/media/NVIDIA-ISAAC-ROS/.github/main/resources/isaac_ros_docs/repositories_and_packages/isaac_ros_common/isaac_ros_common_tools.png/"><img alt="Isaac ROS DevOps tools" src="https://media.githubusercontent.com/media/NVIDIA-ISAAC-ROS/.github/main/resources/isaac_ros_docs/repositories_and_packages/isaac_ros_common/isaac_ros_common_tools.png/" width="auto"/></a></div>
12-
13-
Docker containers allow you to quickly set up a sensitive set of frameworks
14-
and dependencies to ensure a smooth experience with Isaac ROS packages.
15-
The Dockerfiles for x86_64 are based on the version 23.10 image from [Deep Learning
16-
Frameworks Containers](https://docs.nvidia.com/deeplearning/frameworks/support-matrix/index.html).
17-
On Jetson platforms, JetPack manages all of these dependencies for you.
18-
19-
Use of Docker images enables CI|CD systems to scale with DevOps work and
20-
run automated testing in cloud native platforms on Kubernetes.
10+
<div align="center"><a class="reference internal image-reference" href="https://media.githubusercontent.com/media/NVIDIA-ISAAC-ROS/.github/release-4.0/resources/isaac_ros_docs/repositories_and_packages/isaac_ros_common/isaac_ros_common_tools.png/"><img alt="Isaac ROS DevOps tools" src="https://media.githubusercontent.com/media/NVIDIA-ISAAC-ROS/.github/release-4.0/resources/isaac_ros_docs/repositories_and_packages/isaac_ros_common/isaac_ros_common_tools.png/" width="auto"/></a></div>
2111

2212
For solutions to known issues, see the [Troubleshooting](https://nvidia-isaac-ros.github.io/troubleshooting/index.html) section.
2313

@@ -31,4 +21,4 @@ Please visit the [Isaac ROS Documentation](https://nvidia-isaac-ros.github.io/re
3121

3222
## Latest
3323

34-
Update 2024-12-10: Refactored Dockerfiles
24+
Update 2025-10-24: Support for ROS 2 Jazzy, moved Docker dev container functionality to Isaac ROS CLI

SECURITY.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
## Security
2+
3+
NVIDIA is dedicated to the security and trust of our software products and services, including all source code repositories managed through our organization.
4+
5+
If you need to report a security issue, please use the appropriate contact points outlined below. **Please do not report security vulnerabilities through GitHub.**
6+
7+
## Reporting Potential Security Vulnerability in an NVIDIA Product
8+
9+
To report a potential security vulnerability in any NVIDIA product:
10+
- Web: [Security Vulnerability Submission Form](https://www.nvidia.com/object/submit-security-vulnerability.html)
11+
- E-Mail: psirt@nvidia.com
12+
- We encourage you to use the following PGP key for secure email communication: [NVIDIA public PGP Key for communication](https://www.nvidia.com/en-us/security/pgp-key)
13+
- Please include the following information:
14+
- Product/Driver name and version/branch that contains the vulnerability
15+
- Type of vulnerability (code execution, denial of service, buffer overflow, etc.)
16+
- Instructions to reproduce the vulnerability
17+
- Proof-of-concept or exploit code
18+
- Potential impact of the vulnerability, including how an attacker could exploit the vulnerability
19+
20+
While NVIDIA currently does not have a bug bounty program, we do offer acknowledgement when an externally reported security issue is addressed under our coordinated vulnerability disclosure policy. Please visit our [Product Security Incident Response Team (PSIRT)](https://www.nvidia.com/en-us/security/psirt-policies/) policies page for more information.
21+
22+
## NVIDIA Product Security
23+
24+
For all security-related concerns, please visit NVIDIA's Product Security portal at https://www.nvidia.com/en-us/security

docker/Dockerfile.aarch64

Lines changed: 0 additions & 1 deletion
This file was deleted.

0 commit comments

Comments
 (0)