Files
geutebruck/examine_action_structure.py
Administrator 14893e62a5 feat: Geutebruck GeViScope/GeViSoft Action Mapping System - MVP
This MVP release provides a complete full-stack solution for managing action mappings
in Geutebruck's GeViScope and GeViSoft video surveillance systems.

## Features

### Flutter Web Application (Port 8081)
- Modern, responsive UI for managing action mappings
- Action picker dialog with full parameter configuration
- Support for both GSC (GeViScope) and G-Core server actions
- Consistent UI for input and output actions with edit/delete capabilities
- Real-time action mapping creation, editing, and deletion
- Server categorization (GSC: prefix for GeViScope, G-Core: prefix for G-Core servers)

### FastAPI REST Backend (Port 8000)
- RESTful API for action mapping CRUD operations
- Action template service with comprehensive action catalog (247 actions)
- Server management (G-Core and GeViScope servers)
- Configuration tree reading and writing
- JWT authentication with role-based access control
- PostgreSQL database integration

### C# SDK Bridge (gRPC, Port 50051)
- Native integration with GeViSoft SDK (GeViProcAPINET_4_0.dll)
- Action mapping creation with correct binary format
- Support for GSC and G-Core action types
- Proper Camera parameter inclusion in action strings (fixes CrossSwitch bug)
- Action ID lookup table with server-specific action IDs
- Configuration reading/writing via SetupClient

## Bug Fixes
- **CrossSwitch Bug**: GSC and G-Core actions now correctly display camera/PTZ head parameters in GeViSet
- Action strings now include Camera parameter: `@ PanLeft (Comment: "", Camera: 101028)`
- Proper filter flags and VideoInput=0 for action mappings
- Correct action ID assignment (4198 for GSC, 9294 for G-Core PanLeft)

## Technical Stack
- **Frontend**: Flutter Web, Dart, Dio HTTP client
- **Backend**: Python FastAPI, PostgreSQL, Redis
- **SDK Bridge**: C# .NET 8.0, gRPC, GeViSoft SDK
- **Authentication**: JWT tokens
- **Configuration**: GeViSoft .set files (binary format)

## Credentials
- GeViSoft/GeViScope: username=sysadmin, password=masterkey
- Default admin: username=admin, password=admin123

## Deployment
All services run on localhost:
- Flutter Web: http://localhost:8081
- FastAPI: http://localhost:8000
- SDK Bridge gRPC: localhost:50051
- GeViServer: localhost (default port)

Generated with Claude Code (https://claude.com/claude-code)

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2025-12-31 18:10:54 +01:00

57 lines
1.9 KiB
Python

#!/usr/bin/env python3
"""Examine binary structure of action mappings to understand input/output actions and parameters"""
import sys
sys.path.insert(0, r'C:\DEV\COPILOT\geutebruck-api\src\api')
import grpc
from protos import configuration_pb2
from protos import configuration_pb2_grpc
def examine_binary_structure():
"""Request full binary dump of action mappings to analyze structure"""
print("Connecting to SDK Bridge...")
with grpc.insecure_channel('localhost:50051') as channel:
stub = configuration_pb2_grpc.ConfigurationServiceStub(channel)
# Read complete configuration to get raw binary data
request = configuration_pb2.ReadConfigurationRequest()
try:
response = stub.ReadConfiguration(request)
# Save the complete binary config for analysis
with open("gevisoft_config.dat", "wb") as f:
f.write(response.configData)
print(f"Saved {len(response.configData)} bytes to gevisoft_config.dat")
# Let's examine bytes around offset 253894 (first action mapping)
offset = 253894
window = 500
print(f"\nBytes around offset {offset} (first action mapping):")
print("=" * 80)
start = max(0, offset - 50)
end = min(len(response.configData), offset + window)
data = response.configData[start:end]
# Print hex dump
for i in range(0, len(data), 16):
hex_bytes = ' '.join(f'{b:02X}' for b in data[i:i+16])
ascii_chars = ''.join(chr(b) if 32 <= b < 127 else '.' for b in data[i:i+16])
print(f"{start + i:08X}: {hex_bytes:<48} | {ascii_chars}")
return True
except grpc.RpcError as e:
print(f"\nError: {e.code()}")
print(f"Details: {e.details()}")
return False
if __name__ == '__main__':
examine_binary_structure()