feat: Geutebruck GeViScope/GeViSoft Action Mapping System - MVP
This MVP release provides a complete full-stack solution for managing action mappings in Geutebruck's GeViScope and GeViSoft video surveillance systems. ## Features ### Flutter Web Application (Port 8081) - Modern, responsive UI for managing action mappings - Action picker dialog with full parameter configuration - Support for both GSC (GeViScope) and G-Core server actions - Consistent UI for input and output actions with edit/delete capabilities - Real-time action mapping creation, editing, and deletion - Server categorization (GSC: prefix for GeViScope, G-Core: prefix for G-Core servers) ### FastAPI REST Backend (Port 8000) - RESTful API for action mapping CRUD operations - Action template service with comprehensive action catalog (247 actions) - Server management (G-Core and GeViScope servers) - Configuration tree reading and writing - JWT authentication with role-based access control - PostgreSQL database integration ### C# SDK Bridge (gRPC, Port 50051) - Native integration with GeViSoft SDK (GeViProcAPINET_4_0.dll) - Action mapping creation with correct binary format - Support for GSC and G-Core action types - Proper Camera parameter inclusion in action strings (fixes CrossSwitch bug) - Action ID lookup table with server-specific action IDs - Configuration reading/writing via SetupClient ## Bug Fixes - **CrossSwitch Bug**: GSC and G-Core actions now correctly display camera/PTZ head parameters in GeViSet - Action strings now include Camera parameter: `@ PanLeft (Comment: "", Camera: 101028)` - Proper filter flags and VideoInput=0 for action mappings - Correct action ID assignment (4198 for GSC, 9294 for G-Core PanLeft) ## Technical Stack - **Frontend**: Flutter Web, Dart, Dio HTTP client - **Backend**: Python FastAPI, PostgreSQL, Redis - **SDK Bridge**: C# .NET 8.0, gRPC, GeViSoft SDK - **Authentication**: JWT tokens - **Configuration**: GeViSoft .set files (binary format) ## Credentials - GeViSoft/GeViScope: username=sysadmin, password=masterkey - Default admin: username=admin, password=admin123 ## Deployment All services run on localhost: - Flutter Web: http://localhost:8081 - FastAPI: http://localhost:8000 - SDK Bridge gRPC: localhost:50051 - GeViServer: localhost (default port) Generated with Claude Code (https://claude.com/claude-code) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
119
Analyze-GeViSet.ps1
Normal file
119
Analyze-GeViSet.ps1
Normal file
@@ -0,0 +1,119 @@
|
||||
# Analyze GeViSet configuration file format
|
||||
|
||||
$filePath = "C:\Users\Administrator\Desktop\GeViSoft.set"
|
||||
|
||||
Write-Host "=" * 80
|
||||
Write-Host "GEVISET FILE STRUCTURE ANALYSIS"
|
||||
Write-Host "=" * 80
|
||||
Write-Host ""
|
||||
|
||||
$file = Get-Item $filePath
|
||||
Write-Host "File: $($file.FullName)"
|
||||
Write-Host "Size: $($file.Length) bytes"
|
||||
Write-Host ""
|
||||
|
||||
# Read all bytes
|
||||
$data = [System.IO.File]::ReadAllBytes($filePath)
|
||||
|
||||
# Hex dump of first 512 bytes
|
||||
Write-Host "First 512 bytes (hex dump):"
|
||||
Write-Host ("-" * 80)
|
||||
|
||||
for ($i = 0; $i -lt [Math]::Min(512, $data.Length); $i += 16) {
|
||||
$offset = "{0:x8}" -f $i
|
||||
$hexBytes = @()
|
||||
$asciiBytes = ""
|
||||
|
||||
for ($j = 0; $j -lt 16 -and ($i + $j) -lt $data.Length; $j++) {
|
||||
$byte = $data[$i + $j]
|
||||
$hexBytes += "{0:x2}" -f $byte
|
||||
|
||||
if ($byte -ge 32 -and $byte -lt 127) {
|
||||
$asciiBytes += [char]$byte
|
||||
} else {
|
||||
$asciiBytes += "."
|
||||
}
|
||||
}
|
||||
|
||||
$hexStr = $hexBytes -join ' '
|
||||
Write-Host ("{0} {1,-48} {2}" -f $offset, $hexStr, $asciiBytes)
|
||||
}
|
||||
|
||||
Write-Host ""
|
||||
Write-Host "Searching for text patterns..."
|
||||
Write-Host ("-" * 80)
|
||||
|
||||
# Convert to text (Latin-1 encoding to preserve all bytes)
|
||||
$text = [System.Text.Encoding]::GetEncoding("ISO-8859-1").GetString($data)
|
||||
|
||||
# Find checksums (32 hex chars)
|
||||
Write-Host ""
|
||||
Write-Host "MD5-like checksums found:"
|
||||
$checksumPattern = [regex]'[0-9a-f]{32}'
|
||||
$matches = $checksumPattern.Matches($text)
|
||||
|
||||
foreach ($match in $matches) {
|
||||
$offset = $match.Index
|
||||
$checksum = $match.Value
|
||||
$beforeStart = [Math]::Max(0, $offset - 30)
|
||||
$beforeText = $text.Substring($beforeStart, $offset - $beforeStart)
|
||||
$afterText = $text.Substring($offset + 32, [Math]::Min(30, $text.Length - $offset - 32))
|
||||
|
||||
Write-Host (" Offset 0x{0:x8}: {1}" -f $offset, $checksum)
|
||||
Write-Host (" Before: {0}" -f ($beforeText.Substring([Math]::Max(0, $beforeText.Length - 30)) -replace '[^\x20-\x7E]', '.'))
|
||||
Write-Host (" After: {0}" -f ($afterText -replace '[^\x20-\x7E]', '.'))
|
||||
Write-Host ""
|
||||
}
|
||||
|
||||
# Look for structure patterns
|
||||
Write-Host ""
|
||||
Write-Host "Section markers (length-prefixed strings):"
|
||||
Write-Host ("-" * 80)
|
||||
|
||||
$pos = 0
|
||||
$sections = @()
|
||||
|
||||
while ($pos -lt ($data.Length - 4)) {
|
||||
# Try reading as little-endian 16-bit length
|
||||
if ($pos + 2 -le $data.Length) {
|
||||
$length = [BitConverter]::ToUInt16($data, $pos)
|
||||
|
||||
# Reasonable string length
|
||||
if ($length -ge 2 -and $length -le 100 -and ($pos + 2 + $length) -le $data.Length) {
|
||||
try {
|
||||
$textBytes = $data[($pos + 2)..($pos + 2 + $length - 1)]
|
||||
$decodedText = [System.Text.Encoding]::UTF8.GetString($textBytes)
|
||||
|
||||
# Check if printable and looks like a section name
|
||||
if ($decodedText -match '^[\x20-\x7E]+$' -and ($decodedText -match ' ' -or $decodedText -match '^[A-Z]')) {
|
||||
$nextBytes = ""
|
||||
for ($k = 0; $k -lt [Math]::Min(10, $data.Length - ($pos + 2 + $length)); $k++) {
|
||||
$nextBytes += "{0:x2}" -f $data[$pos + 2 + $length + $k]
|
||||
}
|
||||
|
||||
$sections += [PSCustomObject]@{
|
||||
Offset = $pos
|
||||
Length = $length
|
||||
Name = $decodedText
|
||||
NextBytes = $nextBytes
|
||||
}
|
||||
|
||||
$pos += 2 + $length
|
||||
continue
|
||||
}
|
||||
} catch {
|
||||
# Not valid UTF-8, continue
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
$pos++
|
||||
}
|
||||
|
||||
Write-Host "Found $($sections.Count) potential sections (showing first 50):"
|
||||
$sections | Select-Object -First 50 | ForEach-Object {
|
||||
Write-Host (" 0x{0:x8}: len={1,3} name='{2}' next={3}" -f $_.Offset, $_.Length, $_.Name, $_.NextBytes)
|
||||
}
|
||||
|
||||
Write-Host ""
|
||||
Write-Host "Analysis complete."
|
||||
Reference in New Issue
Block a user