feat: Geutebruck GeViScope/GeViSoft Action Mapping System - MVP
This MVP release provides a complete full-stack solution for managing action mappings in Geutebruck's GeViScope and GeViSoft video surveillance systems. ## Features ### Flutter Web Application (Port 8081) - Modern, responsive UI for managing action mappings - Action picker dialog with full parameter configuration - Support for both GSC (GeViScope) and G-Core server actions - Consistent UI for input and output actions with edit/delete capabilities - Real-time action mapping creation, editing, and deletion - Server categorization (GSC: prefix for GeViScope, G-Core: prefix for G-Core servers) ### FastAPI REST Backend (Port 8000) - RESTful API for action mapping CRUD operations - Action template service with comprehensive action catalog (247 actions) - Server management (G-Core and GeViScope servers) - Configuration tree reading and writing - JWT authentication with role-based access control - PostgreSQL database integration ### C# SDK Bridge (gRPC, Port 50051) - Native integration with GeViSoft SDK (GeViProcAPINET_4_0.dll) - Action mapping creation with correct binary format - Support for GSC and G-Core action types - Proper Camera parameter inclusion in action strings (fixes CrossSwitch bug) - Action ID lookup table with server-specific action IDs - Configuration reading/writing via SetupClient ## Bug Fixes - **CrossSwitch Bug**: GSC and G-Core actions now correctly display camera/PTZ head parameters in GeViSet - Action strings now include Camera parameter: `@ PanLeft (Comment: "", Camera: 101028)` - Proper filter flags and VideoInput=0 for action mappings - Correct action ID assignment (4198 for GSC, 9294 for G-Core PanLeft) ## Technical Stack - **Frontend**: Flutter Web, Dart, Dio HTTP client - **Backend**: Python FastAPI, PostgreSQL, Redis - **SDK Bridge**: C# .NET 8.0, gRPC, GeViSoft SDK - **Authentication**: JWT tokens - **Configuration**: GeViSoft .set files (binary format) ## Credentials - GeViSoft/GeViScope: username=sysadmin, password=masterkey - Default admin: username=admin, password=admin123 ## Deployment All services run on localhost: - Flutter Web: http://localhost:8081 - FastAPI: http://localhost:8000 - SDK Bridge gRPC: localhost:50051 - GeViServer: localhost (default port) Generated with Claude Code (https://claude.com/claude-code) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
133
verify_config_via_grpc.py
Normal file
133
verify_config_via_grpc.py
Normal file
@@ -0,0 +1,133 @@
|
||||
"""
|
||||
Verify configuration changes via gRPC ReadConfigurationTree
|
||||
"""
|
||||
import asyncio
|
||||
import sys
|
||||
sys.path.insert(0, r'C:\DEV\COPILOT\geutebruck-api\src\api\protos')
|
||||
|
||||
import grpc
|
||||
import configuration_pb2
|
||||
import configuration_pb2_grpc
|
||||
|
||||
|
||||
async def verify_config():
|
||||
"""Verify configuration by reading tree"""
|
||||
channel = grpc.aio.insecure_channel('localhost:50051')
|
||||
stub = configuration_pb2_grpc.ConfigurationServiceStub(channel)
|
||||
|
||||
print("=" * 80)
|
||||
print("CONFIGURATION VERIFICATION VIA GRPC")
|
||||
print("=" * 80)
|
||||
|
||||
try:
|
||||
# Read configuration tree
|
||||
request = configuration_pb2.ReadConfigurationTreeRequest()
|
||||
response = await stub.ReadConfigurationTree(request, timeout=10.0)
|
||||
|
||||
# Parse servers
|
||||
servers = []
|
||||
for child in response.root.children:
|
||||
if child.name == "GeViGCoreServer":
|
||||
for server in child.children:
|
||||
if server.type == "folder":
|
||||
server_dict = {c.name: c for c in server.children}
|
||||
|
||||
# Determine enabled value and type
|
||||
enabled_node = server_dict.get("Enabled")
|
||||
if enabled_node:
|
||||
if hasattr(enabled_node, 'bool_value'):
|
||||
enabled_val = enabled_node.bool_value
|
||||
enabled_type = "bool"
|
||||
elif hasattr(enabled_node, 'int_value'):
|
||||
enabled_val = bool(enabled_node.int_value)
|
||||
enabled_type = f"int32 (value={enabled_node.int_value})"
|
||||
else:
|
||||
enabled_val = False
|
||||
enabled_type = f"unknown (type={enabled_node.type})"
|
||||
else:
|
||||
enabled_val = False
|
||||
enabled_type = "missing"
|
||||
|
||||
servers.append({
|
||||
'id': server.name,
|
||||
'alias': server_dict.get("Alias", type('', (), {'string_value': ''})()).string_value,
|
||||
'host': server_dict.get("Host", type('', (), {'string_value': ''})()).string_value,
|
||||
'enabled': enabled_val,
|
||||
'enabled_type': enabled_type
|
||||
})
|
||||
break
|
||||
|
||||
# Parse action mappings
|
||||
mappings_request = configuration_pb2.ReadActionMappingsRequest()
|
||||
mappings_response = await stub.ReadActionMappings(mappings_request, timeout=10.0)
|
||||
|
||||
mappings = []
|
||||
for i, mapping in enumerate(mappings_response.mappings, 1):
|
||||
mappings.append({
|
||||
'id': i,
|
||||
'name': mapping.name,
|
||||
'input_count': len(mapping.input_actions),
|
||||
'output_count': len(mapping.output_actions)
|
||||
})
|
||||
|
||||
# Display results
|
||||
print("\n1. SERVERS:")
|
||||
print("-" * 80)
|
||||
for s in servers:
|
||||
print(f" ID: {s['id']:5s} | Alias: {s['alias']:30s} | "
|
||||
f"Host: {s['host']:15s} | Enabled: {s['enabled']} ({s['enabled_type']})")
|
||||
|
||||
claude_servers = [s for s in servers if "Claude" in s['alias']]
|
||||
print(f"\n Total servers: {len(servers)}")
|
||||
print(f" Claude servers: {len(claude_servers)}")
|
||||
|
||||
print("\n2. ACTION MAPPINGS:")
|
||||
print("-" * 80)
|
||||
claude_mappings = [m for m in mappings if "Claude" in m['name']]
|
||||
test_mappings = [m for m in mappings if "TEST" in m['name']]
|
||||
|
||||
print(f" Total mappings: {len(mappings)}")
|
||||
print(f"\n Claude mappings ({len(claude_mappings)}):")
|
||||
for m in claude_mappings:
|
||||
print(f" #{m['id']:3d}: {m['name']} (In:{m['input_count']}, Out:{m['output_count']})")
|
||||
|
||||
print(f"\n TEST mappings ({len(test_mappings)}):")
|
||||
if test_mappings:
|
||||
for m in test_mappings:
|
||||
print(f" #{m['id']:3d}: {m['name']} (In:{m['input_count']}, Out:{m['output_count']})")
|
||||
else:
|
||||
print(f" (None - all cleaned up)")
|
||||
|
||||
print("\n3. BOOL TYPE VERIFICATION:")
|
||||
print("-" * 80)
|
||||
bool_servers = [s for s in servers if s['enabled_type'] == "bool"]
|
||||
if len(bool_servers) == len(servers):
|
||||
print(f" [PASS] All {len(servers)} servers use correct 'bool' type")
|
||||
else:
|
||||
print(f" [WARN] {len(servers) - len(bool_servers)} servers not using 'bool' type:")
|
||||
for s in servers:
|
||||
if s['enabled_type'] != "bool":
|
||||
print(f" Server {s['id']}: {s['enabled_type']}")
|
||||
|
||||
print("\n" + "=" * 80)
|
||||
print("VERIFICATION SUMMARY")
|
||||
print("=" * 80)
|
||||
print(f" Servers: {len(servers)} total, {len(claude_servers)} Claude servers")
|
||||
print(f" Mappings: {len(mappings)} total, {len(claude_mappings)} Claude mappings")
|
||||
print(f" Bool types: {len(bool_servers)}/{len(servers)} correct")
|
||||
print(f" TEST cleanup: {'PASS' if len(test_mappings) == 0 else f'INCOMPLETE ({len(test_mappings)} remain)'}")
|
||||
|
||||
await channel.close()
|
||||
return True
|
||||
|
||||
except Exception as e:
|
||||
print(f"\n[ERROR] Verification failed: {e}")
|
||||
import traceback
|
||||
traceback.print_exc()
|
||||
await channel.close()
|
||||
return False
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
result = asyncio.run(verify_config())
|
||||
sys.exit(0 if result else 1)
|
||||
Reference in New Issue
Block a user