Files
geutebruck/extract_chm.py
Administrator 14893e62a5 feat: Geutebruck GeViScope/GeViSoft Action Mapping System - MVP
This MVP release provides a complete full-stack solution for managing action mappings
in Geutebruck's GeViScope and GeViSoft video surveillance systems.

## Features

### Flutter Web Application (Port 8081)
- Modern, responsive UI for managing action mappings
- Action picker dialog with full parameter configuration
- Support for both GSC (GeViScope) and G-Core server actions
- Consistent UI for input and output actions with edit/delete capabilities
- Real-time action mapping creation, editing, and deletion
- Server categorization (GSC: prefix for GeViScope, G-Core: prefix for G-Core servers)

### FastAPI REST Backend (Port 8000)
- RESTful API for action mapping CRUD operations
- Action template service with comprehensive action catalog (247 actions)
- Server management (G-Core and GeViScope servers)
- Configuration tree reading and writing
- JWT authentication with role-based access control
- PostgreSQL database integration

### C# SDK Bridge (gRPC, Port 50051)
- Native integration with GeViSoft SDK (GeViProcAPINET_4_0.dll)
- Action mapping creation with correct binary format
- Support for GSC and G-Core action types
- Proper Camera parameter inclusion in action strings (fixes CrossSwitch bug)
- Action ID lookup table with server-specific action IDs
- Configuration reading/writing via SetupClient

## Bug Fixes
- **CrossSwitch Bug**: GSC and G-Core actions now correctly display camera/PTZ head parameters in GeViSet
- Action strings now include Camera parameter: `@ PanLeft (Comment: "", Camera: 101028)`
- Proper filter flags and VideoInput=0 for action mappings
- Correct action ID assignment (4198 for GSC, 9294 for G-Core PanLeft)

## Technical Stack
- **Frontend**: Flutter Web, Dart, Dio HTTP client
- **Backend**: Python FastAPI, PostgreSQL, Redis
- **SDK Bridge**: C# .NET 8.0, gRPC, GeViSoft SDK
- **Authentication**: JWT tokens
- **Configuration**: GeViSoft .set files (binary format)

## Credentials
- GeViSoft/GeViScope: username=sysadmin, password=masterkey
- Default admin: username=admin, password=admin123

## Deployment
All services run on localhost:
- Flutter Web: http://localhost:8081
- FastAPI: http://localhost:8000
- SDK Bridge gRPC: localhost:50051
- GeViServer: localhost (default port)

Generated with Claude Code (https://claude.com/claude-code)

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2025-12-31 18:10:54 +01:00

77 lines
2.3 KiB
Python

#!/usr/bin/env python3
"""Extract CHM files to text/HTML format"""
import os
import sys
from pathlib import Path
try:
from chm import chm
has_pychm = True
except ImportError:
has_pychm = False
def extract_with_hh(chm_file, output_dir):
"""Extract using Windows hh.exe decompiler"""
import subprocess
output_dir = Path(output_dir)
output_dir.mkdir(parents=True, exist_ok=True)
# Use Windows HTML Help decompiler
cmd = f'hh.exe -decompile "{output_dir}" "{chm_file}"'
print(f"Running: {cmd}")
result = subprocess.run(cmd, shell=True, capture_output=True, text=True)
if result.returncode == 0 or output_dir.exists():
print(f"Successfully extracted to {output_dir}")
return True
else:
print(f"Failed to extract: {result.stderr}")
return False
def extract_with_pychm(chm_file, output_dir):
"""Extract using pychm library"""
output_dir = Path(output_dir)
output_dir.mkdir(parents=True, exist_ok=True)
chmfile = chm.CHMFile()
chmfile.LoadCHM(chm_file)
def extract_callback(ui, param, output):
if ui.path.endswith('.html') or ui.path.endswith('.htm'):
file_path = output_dir / ui.path.lstrip('/')
file_path.parent.mkdir(parents=True, exist_ok=True)
data = chmfile.RetrieveObject(ui)[1]
if data:
with open(file_path, 'wb') as f:
f.write(data)
print(f"Extracted: {ui.path}")
return chm.CHM_ENUMERATE_CONTINUE
chmfile.EnumerateFiles(extract_callback, output_dir)
print(f"Successfully extracted to {output_dir}")
return True
if __name__ == "__main__":
chm_file = r"C:\GEVISOFT\Documentation\GeViSoft .NET SDK API Documentation.chm"
output_dir = r"C:\DEV\COPILOT\SOURCES\GeViSoft_API_Documentation_extracted"
print(f"Extracting: {chm_file}")
print(f"Output: {output_dir}")
# Try Windows hh.exe first (most reliable on Windows)
success = extract_with_hh(chm_file, output_dir)
if not success and has_pychm:
print("\nTrying pychm...")
success = extract_with_pychm(chm_file, output_dir)
if success:
print("\n✓ Extraction complete!")
print(f"Files extracted to: {output_dir}")
else:
print("\n✗ Extraction failed")
sys.exit(1)