8000 Expose exe internals by sarlinpe · Pull Request #1366 · colmap/colmap · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Expose exe internals #1366

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Jan 4, 2022
Merged

Expose exe internals #1366

merged 2 commits into from
Jan 4, 2022

Conversation

sarlinpe
Copy link
Member
@sarlinpe sarlinpe commented Jan 3, 2022

In pycolmap we now bind some of the exe functions like RunPointTriangulator. See pycolmap/pipeline.cc. We therefore need COLMAP to expose some exe code that is currently hidden in anonymous namespace or argc-argv functions. Most of this code is likely useful for others and worthy to be publicly exposed, but src/exe is probably not the right place for it.

Any advice on where these bits should be moved?

@ahojnnes @mihaidusmanu @Phil26AT

@ahojnnes
Copy link
Contributor
ahojnnes commented Jan 4, 2022

I am fine with the proposed changes. Thanks!

@ahojnnes ahojnnes merged commit 7d61a08 into colmap:dev Jan 4, 2022
lucasthahn pushed a commit to tne-ai/colmap that referenced this pull request Aug 17, 2022
* Expose CameraMode and UpdateImageReaderOptionsFromCameraMode

* Expose the internals of RunPointTriangulator
@sarlinpe sarlinpe deleted the expose-exe-internals branch February 8, 2024 14:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants
0