This MVP release provides a complete full-stack solution for managing action mappings in Geutebruck's GeViScope and GeViSoft video surveillance systems. ## Features ### Flutter Web Application (Port 8081) - Modern, responsive UI for managing action mappings - Action picker dialog with full parameter configuration - Support for both GSC (GeViScope) and G-Core server actions - Consistent UI for input and output actions with edit/delete capabilities - Real-time action mapping creation, editing, and deletion - Server categorization (GSC: prefix for GeViScope, G-Core: prefix for G-Core servers) ### FastAPI REST Backend (Port 8000) - RESTful API for action mapping CRUD operations - Action template service with comprehensive action catalog (247 actions) - Server management (G-Core and GeViScope servers) - Configuration tree reading and writing - JWT authentication with role-based access control - PostgreSQL database integration ### C# SDK Bridge (gRPC, Port 50051) - Native integration with GeViSoft SDK (GeViProcAPINET_4_0.dll) - Action mapping creation with correct binary format - Support for GSC and G-Core action types - Proper Camera parameter inclusion in action strings (fixes CrossSwitch bug) - Action ID lookup table with server-specific action IDs - Configuration reading/writing via SetupClient ## Bug Fixes - **CrossSwitch Bug**: GSC and G-Core actions now correctly display camera/PTZ head parameters in GeViSet - Action strings now include Camera parameter: `@ PanLeft (Comment: "", Camera: 101028)` - Proper filter flags and VideoInput=0 for action mappings - Correct action ID assignment (4198 for GSC, 9294 for G-Core PanLeft) ## Technical Stack - **Frontend**: Flutter Web, Dart, Dio HTTP client - **Backend**: Python FastAPI, PostgreSQL, Redis - **SDK Bridge**: C# .NET 8.0, gRPC, GeViSoft SDK - **Authentication**: JWT tokens - **Configuration**: GeViSoft .set files (binary format) ## Credentials - GeViSoft/GeViScope: username=sysadmin, password=masterkey - Default admin: username=admin, password=admin123 ## Deployment All services run on localhost: - Flutter Web: http://localhost:8081 - FastAPI: http://localhost:8000 - SDK Bridge gRPC: localhost:50051 - GeViServer: localhost (default port) Generated with Claude Code (https://claude.com/claude-code) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
120 lines
3.7 KiB
PowerShell
120 lines
3.7 KiB
PowerShell
# Analyze GeViSet configuration file format
|
|
|
|
$filePath = "C:\Users\Administrator\Desktop\GeViSoft.set"
|
|
|
|
Write-Host "=" * 80
|
|
Write-Host "GEVISET FILE STRUCTURE ANALYSIS"
|
|
Write-Host "=" * 80
|
|
Write-Host ""
|
|
|
|
$file = Get-Item $filePath
|
|
Write-Host "File: $($file.FullName)"
|
|
Write-Host "Size: $($file.Length) bytes"
|
|
Write-Host ""
|
|
|
|
# Read all bytes
|
|
$data = [System.IO.File]::ReadAllBytes($filePath)
|
|
|
|
# Hex dump of first 512 bytes
|
|
Write-Host "First 512 bytes (hex dump):"
|
|
Write-Host ("-" * 80)
|
|
|
|
for ($i = 0; $i -lt [Math]::Min(512, $data.Length); $i += 16) {
|
|
$offset = "{0:x8}" -f $i
|
|
$hexBytes = @()
|
|
$asciiBytes = ""
|
|
|
|
for ($j = 0; $j -lt 16 -and ($i + $j) -lt $data.Length; $j++) {
|
|
$byte = $data[$i + $j]
|
|
$hexBytes += "{0:x2}" -f $byte
|
|
|
|
if ($byte -ge 32 -and $byte -lt 127) {
|
|
$asciiBytes += [char]$byte
|
|
} else {
|
|
$asciiBytes += "."
|
|
}
|
|
}
|
|
|
|
$hexStr = $hexBytes -join ' '
|
|
Write-Host ("{0} {1,-48} {2}" -f $offset, $hexStr, $asciiBytes)
|
|
}
|
|
|
|
Write-Host ""
|
|
Write-Host "Searching for text patterns..."
|
|
Write-Host ("-" * 80)
|
|
|
|
# Convert to text (Latin-1 encoding to preserve all bytes)
|
|
$text = [System.Text.Encoding]::GetEncoding("ISO-8859-1").GetString($data)
|
|
|
|
# Find checksums (32 hex chars)
|
|
Write-Host ""
|
|
Write-Host "MD5-like checksums found:"
|
|
$checksumPattern = [regex]'[0-9a-f]{32}'
|
|
$matches = $checksumPattern.Matches($text)
|
|
|
|
foreach ($match in $matches) {
|
|
$offset = $match.Index
|
|
$checksum = $match.Value
|
|
$beforeStart = [Math]::Max(0, $offset - 30)
|
|
$beforeText = $text.Substring($beforeStart, $offset - $beforeStart)
|
|
$afterText = $text.Substring($offset + 32, [Math]::Min(30, $text.Length - $offset - 32))
|
|
|
|
Write-Host (" Offset 0x{0:x8}: {1}" -f $offset, $checksum)
|
|
Write-Host (" Before: {0}" -f ($beforeText.Substring([Math]::Max(0, $beforeText.Length - 30)) -replace '[^\x20-\x7E]', '.'))
|
|
Write-Host (" After: {0}" -f ($afterText -replace '[^\x20-\x7E]', '.'))
|
|
Write-Host ""
|
|
}
|
|
|
|
# Look for structure patterns
|
|
Write-Host ""
|
|
Write-Host "Section markers (length-prefixed strings):"
|
|
Write-Host ("-" * 80)
|
|
|
|
$pos = 0
|
|
$sections = @()
|
|
|
|
while ($pos -lt ($data.Length - 4)) {
|
|
# Try reading as little-endian 16-bit length
|
|
if ($pos + 2 -le $data.Length) {
|
|
$length = [BitConverter]::ToUInt16($data, $pos)
|
|
|
|
# Reasonable string length
|
|
if ($length -ge 2 -and $length -le 100 -and ($pos + 2 + $length) -le $data.Length) {
|
|
try {
|
|
$textBytes = $data[($pos + 2)..($pos + 2 + $length - 1)]
|
|
$decodedText = [System.Text.Encoding]::UTF8.GetString($textBytes)
|
|
|
|
# Check if printable and looks like a section name
|
|
if ($decodedText -match '^[\x20-\x7E]+$' -and ($decodedText -match ' ' -or $decodedText -match '^[A-Z]')) {
|
|
$nextBytes = ""
|
|
for ($k = 0; $k -lt [Math]::Min(10, $data.Length - ($pos + 2 + $length)); $k++) {
|
|
$nextBytes += "{0:x2}" -f $data[$pos + 2 + $length + $k]
|
|
}
|
|
|
|
$sections += [PSCustomObject]@{
|
|
Offset = $pos
|
|
Length = $length
|
|
Name = $decodedText
|
|
NextBytes = $nextBytes
|
|
}
|
|
|
|
$pos += 2 + $length
|
|
continue
|
|
}
|
|
} catch {
|
|
# Not valid UTF-8, continue
|
|
}
|
|
}
|
|
}
|
|
|
|
$pos++
|
|
}
|
|
|
|
Write-Host "Found $($sections.Count) potential sections (showing first 50):"
|
|
$sections | Select-Object -First 50 | ForEach-Object {
|
|
Write-Host (" 0x{0:x8}: len={1,3} name='{2}' next={3}" -f $_.Offset, $_.Length, $_.Name, $_.NextBytes)
|
|
}
|
|
|
|
Write-Host ""
|
|
Write-Host "Analysis complete."
|