Files
geutebruck/Analyze-GeViSet.ps1
Administrator 14893e62a5 feat: Geutebruck GeViScope/GeViSoft Action Mapping System - MVP
This MVP release provides a complete full-stack solution for managing action mappings
in Geutebruck's GeViScope and GeViSoft video surveillance systems.

## Features

### Flutter Web Application (Port 8081)
- Modern, responsive UI for managing action mappings
- Action picker dialog with full parameter configuration
- Support for both GSC (GeViScope) and G-Core server actions
- Consistent UI for input and output actions with edit/delete capabilities
- Real-time action mapping creation, editing, and deletion
- Server categorization (GSC: prefix for GeViScope, G-Core: prefix for G-Core servers)

### FastAPI REST Backend (Port 8000)
- RESTful API for action mapping CRUD operations
- Action template service with comprehensive action catalog (247 actions)
- Server management (G-Core and GeViScope servers)
- Configuration tree reading and writing
- JWT authentication with role-based access control
- PostgreSQL database integration

### C# SDK Bridge (gRPC, Port 50051)
- Native integration with GeViSoft SDK (GeViProcAPINET_4_0.dll)
- Action mapping creation with correct binary format
- Support for GSC and G-Core action types
- Proper Camera parameter inclusion in action strings (fixes CrossSwitch bug)
- Action ID lookup table with server-specific action IDs
- Configuration reading/writing via SetupClient

## Bug Fixes
- **CrossSwitch Bug**: GSC and G-Core actions now correctly display camera/PTZ head parameters in GeViSet
- Action strings now include Camera parameter: `@ PanLeft (Comment: "", Camera: 101028)`
- Proper filter flags and VideoInput=0 for action mappings
- Correct action ID assignment (4198 for GSC, 9294 for G-Core PanLeft)

## Technical Stack
- **Frontend**: Flutter Web, Dart, Dio HTTP client
- **Backend**: Python FastAPI, PostgreSQL, Redis
- **SDK Bridge**: C# .NET 8.0, gRPC, GeViSoft SDK
- **Authentication**: JWT tokens
- **Configuration**: GeViSoft .set files (binary format)

## Credentials
- GeViSoft/GeViScope: username=sysadmin, password=masterkey
- Default admin: username=admin, password=admin123

## Deployment
All services run on localhost:
- Flutter Web: http://localhost:8081
- FastAPI: http://localhost:8000
- SDK Bridge gRPC: localhost:50051
- GeViServer: localhost (default port)

Generated with Claude Code (https://claude.com/claude-code)

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2025-12-31 18:10:54 +01:00

120 lines
3.7 KiB
PowerShell

# Analyze GeViSet configuration file format
$filePath = "C:\Users\Administrator\Desktop\GeViSoft.set"
Write-Host "=" * 80
Write-Host "GEVISET FILE STRUCTURE ANALYSIS"
Write-Host "=" * 80
Write-Host ""
$file = Get-Item $filePath
Write-Host "File: $($file.FullName)"
Write-Host "Size: $($file.Length) bytes"
Write-Host ""
# Read all bytes
$data = [System.IO.File]::ReadAllBytes($filePath)
# Hex dump of first 512 bytes
Write-Host "First 512 bytes (hex dump):"
Write-Host ("-" * 80)
for ($i = 0; $i -lt [Math]::Min(512, $data.Length); $i += 16) {
$offset = "{0:x8}" -f $i
$hexBytes = @()
$asciiBytes = ""
for ($j = 0; $j -lt 16 -and ($i + $j) -lt $data.Length; $j++) {
$byte = $data[$i + $j]
$hexBytes += "{0:x2}" -f $byte
if ($byte -ge 32 -and $byte -lt 127) {
$asciiBytes += [char]$byte
} else {
$asciiBytes += "."
}
}
$hexStr = $hexBytes -join ' '
Write-Host ("{0} {1,-48} {2}" -f $offset, $hexStr, $asciiBytes)
}
Write-Host ""
Write-Host "Searching for text patterns..."
Write-Host ("-" * 80)
# Convert to text (Latin-1 encoding to preserve all bytes)
$text = [System.Text.Encoding]::GetEncoding("ISO-8859-1").GetString($data)
# Find checksums (32 hex chars)
Write-Host ""
Write-Host "MD5-like checksums found:"
$checksumPattern = [regex]'[0-9a-f]{32}'
$matches = $checksumPattern.Matches($text)
foreach ($match in $matches) {
$offset = $match.Index
$checksum = $match.Value
$beforeStart = [Math]::Max(0, $offset - 30)
$beforeText = $text.Substring($beforeStart, $offset - $beforeStart)
$afterText = $text.Substring($offset + 32, [Math]::Min(30, $text.Length - $offset - 32))
Write-Host (" Offset 0x{0:x8}: {1}" -f $offset, $checksum)
Write-Host (" Before: {0}" -f ($beforeText.Substring([Math]::Max(0, $beforeText.Length - 30)) -replace '[^\x20-\x7E]', '.'))
Write-Host (" After: {0}" -f ($afterText -replace '[^\x20-\x7E]', '.'))
Write-Host ""
}
# Look for structure patterns
Write-Host ""
Write-Host "Section markers (length-prefixed strings):"
Write-Host ("-" * 80)
$pos = 0
$sections = @()
while ($pos -lt ($data.Length - 4)) {
# Try reading as little-endian 16-bit length
if ($pos + 2 -le $data.Length) {
$length = [BitConverter]::ToUInt16($data, $pos)
# Reasonable string length
if ($length -ge 2 -and $length -le 100 -and ($pos + 2 + $length) -le $data.Length) {
try {
$textBytes = $data[($pos + 2)..($pos + 2 + $length - 1)]
$decodedText = [System.Text.Encoding]::UTF8.GetString($textBytes)
# Check if printable and looks like a section name
if ($decodedText -match '^[\x20-\x7E]+$' -and ($decodedText -match ' ' -or $decodedText -match '^[A-Z]')) {
$nextBytes = ""
for ($k = 0; $k -lt [Math]::Min(10, $data.Length - ($pos + 2 + $length)); $k++) {
$nextBytes += "{0:x2}" -f $data[$pos + 2 + $length + $k]
}
$sections += [PSCustomObject]@{
Offset = $pos
Length = $length
Name = $decodedText
NextBytes = $nextBytes
}
$pos += 2 + $length
continue
}
} catch {
# Not valid UTF-8, continue
}
}
}
$pos++
}
Write-Host "Found $($sections.Count) potential sections (showing first 50):"
$sections | Select-Object -First 50 | ForEach-Object {
Write-Host (" 0x{0:x8}: len={1,3} name='{2}' next={3}" -f $_.Offset, $_.Length, $_.Name, $_.NextBytes)
}
Write-Host ""
Write-Host "Analysis complete."