feat: Geutebruck GeViScope/GeViSoft Action Mapping System - MVP
This MVP release provides a complete full-stack solution for managing action mappings in Geutebruck's GeViScope and GeViSoft video surveillance systems. ## Features ### Flutter Web Application (Port 8081) - Modern, responsive UI for managing action mappings - Action picker dialog with full parameter configuration - Support for both GSC (GeViScope) and G-Core server actions - Consistent UI for input and output actions with edit/delete capabilities - Real-time action mapping creation, editing, and deletion - Server categorization (GSC: prefix for GeViScope, G-Core: prefix for G-Core servers) ### FastAPI REST Backend (Port 8000) - RESTful API for action mapping CRUD operations - Action template service with comprehensive action catalog (247 actions) - Server management (G-Core and GeViScope servers) - Configuration tree reading and writing - JWT authentication with role-based access control - PostgreSQL database integration ### C# SDK Bridge (gRPC, Port 50051) - Native integration with GeViSoft SDK (GeViProcAPINET_4_0.dll) - Action mapping creation with correct binary format - Support for GSC and G-Core action types - Proper Camera parameter inclusion in action strings (fixes CrossSwitch bug) - Action ID lookup table with server-specific action IDs - Configuration reading/writing via SetupClient ## Bug Fixes - **CrossSwitch Bug**: GSC and G-Core actions now correctly display camera/PTZ head parameters in GeViSet - Action strings now include Camera parameter: `@ PanLeft (Comment: "", Camera: 101028)` - Proper filter flags and VideoInput=0 for action mappings - Correct action ID assignment (4198 for GSC, 9294 for G-Core PanLeft) ## Technical Stack - **Frontend**: Flutter Web, Dart, Dio HTTP client - **Backend**: Python FastAPI, PostgreSQL, Redis - **SDK Bridge**: C# .NET 8.0, gRPC, GeViSoft SDK - **Authentication**: JWT tokens - **Configuration**: GeViSoft .set files (binary format) ## Credentials - GeViSoft/GeViScope: username=sysadmin, password=masterkey - Default admin: username=admin, password=admin123 ## Deployment All services run on localhost: - Flutter Web: http://localhost:8081 - FastAPI: http://localhost:8000 - SDK Bridge gRPC: localhost:50051 - GeViServer: localhost (default port) Generated with Claude Code (https://claude.com/claude-code) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
100
analyze_geviset.py
Normal file
100
analyze_geviset.py
Normal file
@@ -0,0 +1,100 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
Analyze GeViSet configuration file format
|
||||
"""
|
||||
import struct
|
||||
import hashlib
|
||||
from pathlib import Path
|
||||
|
||||
def hex_dump(data, offset=0, length=512):
|
||||
"""Create a hex dump of binary data"""
|
||||
for i in range(0, min(length, len(data)), 16):
|
||||
hex_str = ' '.join(f'{b:02x}' for b in data[i:i+16])
|
||||
ascii_str = ''.join(chr(b) if 32 <= b < 127 else '.' for b in data[i:i+16])
|
||||
print(f'{offset+i:08x} {hex_str:<48} {ascii_str}')
|
||||
|
||||
def analyze_structure(data):
|
||||
"""Analyze the binary structure of the .set file"""
|
||||
print("=" * 80)
|
||||
print("GEVISET FILE STRUCTURE ANALYSIS")
|
||||
print("=" * 80)
|
||||
print()
|
||||
|
||||
# First, let's dump the beginning
|
||||
print("First 512 bytes (hex dump):")
|
||||
print("-" * 80)
|
||||
hex_dump(data, 0, 512)
|
||||
print()
|
||||
|
||||
# Try to identify sections
|
||||
print("\nSearching for section markers...")
|
||||
print("-" * 80)
|
||||
|
||||
pos = 0
|
||||
sections = []
|
||||
|
||||
while pos < len(data) - 4:
|
||||
# Check if this looks like a length-prefixed string
|
||||
try:
|
||||
# Try reading as 2-byte length prefix
|
||||
if pos + 2 <= len(data):
|
||||
length = struct.unpack('<H', data[pos:pos+2])[0]
|
||||
|
||||
# Reasonable string length (not too long, not zero)
|
||||
if 2 <= length <= 100 and pos + 2 + length <= len(data):
|
||||
# Try to decode as string
|
||||
try:
|
||||
text = data[pos+2:pos+2+length].decode('utf-8', errors='strict')
|
||||
# Check if it looks like a section name
|
||||
if text.isprintable() and ' ' in text or text[0].isupper():
|
||||
sections.append({
|
||||
'offset': pos,
|
||||
'length': length,
|
||||
'name': text,
|
||||
'next_bytes': data[pos+2+length:pos+2+length+10].hex()
|
||||
})
|
||||
pos += 2 + length
|
||||
continue
|
||||
except UnicodeDecodeError:
|
||||
pass
|
||||
except:
|
||||
pass
|
||||
|
||||
pos += 1
|
||||
|
||||
print(f"Found {len(sections)} potential sections:")
|
||||
for i, sec in enumerate(sections[:50]): # Show first 50
|
||||
print(f" {sec['offset']:08x}: len={sec['length']:3d} name='{sec['name']}' next={sec['next_bytes']}")
|
||||
|
||||
print()
|
||||
|
||||
# Look for the checksum pattern
|
||||
print("\nSearching for MD5 checksums (32 hex chars)...")
|
||||
print("-" * 80)
|
||||
|
||||
text_data = data.decode('latin-1', errors='replace')
|
||||
import re
|
||||
checksums = re.finditer(r'[0-9a-f]{32}', text_data)
|
||||
|
||||
for match in checksums:
|
||||
offset = match.start()
|
||||
checksum = match.group()
|
||||
context_before = text_data[max(0, offset-30):offset]
|
||||
context_after = text_data[offset+32:offset+62]
|
||||
print(f" {offset:08x}: {checksum}")
|
||||
print(f" Before: {repr(context_before[-20:])}")
|
||||
print(f" After: {repr(context_after[:20])}")
|
||||
print()
|
||||
|
||||
def main():
|
||||
file_path = Path(r'C:\Users\Administrator\Desktop\GeViSoft.set')
|
||||
|
||||
print(f"Analyzing: {file_path}")
|
||||
print(f"File size: {file_path.stat().st_size:,} bytes")
|
||||
print()
|
||||
|
||||
data = file_path.read_bytes()
|
||||
analyze_structure(data)
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
||||
Reference in New Issue
Block a user