This MVP release provides a complete full-stack solution for managing action mappings in Geutebruck's GeViScope and GeViSoft video surveillance systems. ## Features ### Flutter Web Application (Port 8081) - Modern, responsive UI for managing action mappings - Action picker dialog with full parameter configuration - Support for both GSC (GeViScope) and G-Core server actions - Consistent UI for input and output actions with edit/delete capabilities - Real-time action mapping creation, editing, and deletion - Server categorization (GSC: prefix for GeViScope, G-Core: prefix for G-Core servers) ### FastAPI REST Backend (Port 8000) - RESTful API for action mapping CRUD operations - Action template service with comprehensive action catalog (247 actions) - Server management (G-Core and GeViScope servers) - Configuration tree reading and writing - JWT authentication with role-based access control - PostgreSQL database integration ### C# SDK Bridge (gRPC, Port 50051) - Native integration with GeViSoft SDK (GeViProcAPINET_4_0.dll) - Action mapping creation with correct binary format - Support for GSC and G-Core action types - Proper Camera parameter inclusion in action strings (fixes CrossSwitch bug) - Action ID lookup table with server-specific action IDs - Configuration reading/writing via SetupClient ## Bug Fixes - **CrossSwitch Bug**: GSC and G-Core actions now correctly display camera/PTZ head parameters in GeViSet - Action strings now include Camera parameter: `@ PanLeft (Comment: "", Camera: 101028)` - Proper filter flags and VideoInput=0 for action mappings - Correct action ID assignment (4198 for GSC, 9294 for G-Core PanLeft) ## Technical Stack - **Frontend**: Flutter Web, Dart, Dio HTTP client - **Backend**: Python FastAPI, PostgreSQL, Redis - **SDK Bridge**: C# .NET 8.0, gRPC, GeViSoft SDK - **Authentication**: JWT tokens - **Configuration**: GeViSoft .set files (binary format) ## Credentials - GeViSoft/GeViScope: username=sysadmin, password=masterkey - Default admin: username=admin, password=admin123 ## Deployment All services run on localhost: - Flutter Web: http://localhost:8081 - FastAPI: http://localhost:8000 - SDK Bridge gRPC: localhost:50051 - GeViServer: localhost (default port) Generated with Claude Code (https://claude.com/claude-code) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
90 lines
3.7 KiB
Python
90 lines
3.7 KiB
Python
#!/usr/bin/env python3
|
|
"""Dump raw bytes around first action mapping to understand binary structure"""
|
|
import sys
|
|
sys.path.insert(0, r'C:\DEV\COPILOT\geutebruck-api\src\api')
|
|
|
|
import grpc
|
|
from protos import configuration_pb2
|
|
from protos import configuration_pb2_grpc
|
|
|
|
def dump_binary_structure():
|
|
"""Get first action mapping and dump its bytes"""
|
|
print("Connecting to SDK Bridge...")
|
|
|
|
with grpc.insecure_channel('localhost:50051') as channel:
|
|
stub = configuration_pb2_grpc.ConfigurationServiceStub(channel)
|
|
|
|
# Get action mappings first to find offsets
|
|
request = configuration_pb2.ReadActionMappingsRequest()
|
|
response = stub.ReadActionMappings(request)
|
|
|
|
if not response.success or not response.mappings:
|
|
print("Failed to get mappings")
|
|
return False
|
|
|
|
# Get first 3 mappings
|
|
for i, mapping in enumerate(response.mappings[:3]):
|
|
print(f"\n{'='*80}")
|
|
print(f"Mapping {i+1}: offset {mapping.start_offset} to {mapping.end_offset} ({mapping.end_offset - mapping.start_offset} bytes)")
|
|
|
|
# Show old format actions
|
|
print(f"Old format actions ({len(mapping.actions)}):")
|
|
for j, action in enumerate(mapping.actions):
|
|
try:
|
|
print(f" [{j}] {action}")
|
|
except:
|
|
print(f" [{j}] (decode error)")
|
|
|
|
# Now get the full configuration to access raw binary
|
|
print("\n" + "="*80)
|
|
print("Getting full configuration to examine binary structure...")
|
|
full_request = configuration_pb2.ReadConfigurationRequest()
|
|
full_response = stub.ReadConfiguration(full_request)
|
|
|
|
if not full_response.success:
|
|
print("Failed to get full configuration")
|
|
return False
|
|
|
|
print(f"Got {len(full_response.nodes)} nodes")
|
|
|
|
# Find the "ules" markers
|
|
ules_markers = [i for i, n in enumerate(full_response.nodes) if n.node_type == "marker" and "ules" in (n.name or "")]
|
|
print(f"Found {len(ules_markers)} ules markers")
|
|
|
|
# Examine first 3
|
|
for i, marker_idx in enumerate(ules_markers[:3]):
|
|
marker = full_response.nodes[marker_idx]
|
|
print(f"\n{'-'*80}")
|
|
print(f"Marker {i+1} at index {marker_idx}, offset {marker.start_offset}:")
|
|
|
|
# Show marker name (first 200 chars)
|
|
try:
|
|
name_hex = ' '.join(f'{ord(c):02X}' for c in marker.name[:50])
|
|
name_ascii = ''.join(c if 32 <= ord(c) < 127 else '.' for c in marker.name[:100])
|
|
print(f" Name (hex): {name_hex}")
|
|
print(f" Name (ascii): {name_ascii}")
|
|
except:
|
|
print(f" Name: (decode error)")
|
|
|
|
# Look at surrounding nodes
|
|
print(f"\n Surrounding nodes (5 before, 20 after):")
|
|
start_idx = max(0, marker_idx - 5)
|
|
end_idx = min(len(full_response.nodes), marker_idx + 20)
|
|
|
|
for j in range(start_idx, end_idx):
|
|
node = full_response.nodes[j]
|
|
prefix = ">>>" if j == marker_idx else " "
|
|
|
|
# Show node details
|
|
try:
|
|
name_display = (node.name[:30] + "...") if len(node.name or "") > 30 else (node.name or "")
|
|
value_display = str(node.value)[:40] if node.value else ""
|
|
print(f"{prefix} [{j:4d}] offset={node.start_offset:6d}, type={node.node_type:8s}, name={name_display!r:35s}, value={value_display!r}")
|
|
except:
|
|
print(f"{prefix} [{j:4d}] offset={node.start_offset:6d}, type={node.node_type:8s} (decode error)")
|
|
|
|
return True
|
|
|
|
if __name__ == '__main__':
|
|
dump_binary_structure()
|