This MVP release provides a complete full-stack solution for managing action mappings in Geutebruck's GeViScope and GeViSoft video surveillance systems. ## Features ### Flutter Web Application (Port 8081) - Modern, responsive UI for managing action mappings - Action picker dialog with full parameter configuration - Support for both GSC (GeViScope) and G-Core server actions - Consistent UI for input and output actions with edit/delete capabilities - Real-time action mapping creation, editing, and deletion - Server categorization (GSC: prefix for GeViScope, G-Core: prefix for G-Core servers) ### FastAPI REST Backend (Port 8000) - RESTful API for action mapping CRUD operations - Action template service with comprehensive action catalog (247 actions) - Server management (G-Core and GeViScope servers) - Configuration tree reading and writing - JWT authentication with role-based access control - PostgreSQL database integration ### C# SDK Bridge (gRPC, Port 50051) - Native integration with GeViSoft SDK (GeViProcAPINET_4_0.dll) - Action mapping creation with correct binary format - Support for GSC and G-Core action types - Proper Camera parameter inclusion in action strings (fixes CrossSwitch bug) - Action ID lookup table with server-specific action IDs - Configuration reading/writing via SetupClient ## Bug Fixes - **CrossSwitch Bug**: GSC and G-Core actions now correctly display camera/PTZ head parameters in GeViSet - Action strings now include Camera parameter: `@ PanLeft (Comment: "", Camera: 101028)` - Proper filter flags and VideoInput=0 for action mappings - Correct action ID assignment (4198 for GSC, 9294 for G-Core PanLeft) ## Technical Stack - **Frontend**: Flutter Web, Dart, Dio HTTP client - **Backend**: Python FastAPI, PostgreSQL, Redis - **SDK Bridge**: C# .NET 8.0, gRPC, GeViSoft SDK - **Authentication**: JWT tokens - **Configuration**: GeViSoft .set files (binary format) ## Credentials - GeViSoft/GeViScope: username=sysadmin, password=masterkey - Default admin: username=admin, password=admin123 ## Deployment All services run on localhost: - Flutter Web: http://localhost:8081 - FastAPI: http://localhost:8000 - SDK Bridge gRPC: localhost:50051 - GeViServer: localhost (default port) Generated with Claude Code (https://claude.com/claude-code) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
57 lines
1.9 KiB
Python
57 lines
1.9 KiB
Python
#!/usr/bin/env python3
|
|
"""Examine binary structure of action mappings to understand input/output actions and parameters"""
|
|
import sys
|
|
sys.path.insert(0, r'C:\DEV\COPILOT\geutebruck-api\src\api')
|
|
|
|
import grpc
|
|
from protos import configuration_pb2
|
|
from protos import configuration_pb2_grpc
|
|
|
|
|
|
def examine_binary_structure():
|
|
"""Request full binary dump of action mappings to analyze structure"""
|
|
print("Connecting to SDK Bridge...")
|
|
|
|
with grpc.insecure_channel('localhost:50051') as channel:
|
|
stub = configuration_pb2_grpc.ConfigurationServiceStub(channel)
|
|
|
|
# Read complete configuration to get raw binary data
|
|
request = configuration_pb2.ReadConfigurationRequest()
|
|
|
|
try:
|
|
response = stub.ReadConfiguration(request)
|
|
|
|
# Save the complete binary config for analysis
|
|
with open("gevisoft_config.dat", "wb") as f:
|
|
f.write(response.configData)
|
|
|
|
print(f"Saved {len(response.configData)} bytes to gevisoft_config.dat")
|
|
|
|
# Let's examine bytes around offset 253894 (first action mapping)
|
|
offset = 253894
|
|
window = 500
|
|
|
|
print(f"\nBytes around offset {offset} (first action mapping):")
|
|
print("=" * 80)
|
|
|
|
start = max(0, offset - 50)
|
|
end = min(len(response.configData), offset + window)
|
|
|
|
data = response.configData[start:end]
|
|
|
|
# Print hex dump
|
|
for i in range(0, len(data), 16):
|
|
hex_bytes = ' '.join(f'{b:02X}' for b in data[i:i+16])
|
|
ascii_chars = ''.join(chr(b) if 32 <= b < 127 else '.' for b in data[i:i+16])
|
|
print(f"{start + i:08X}: {hex_bytes:<48} | {ascii_chars}")
|
|
|
|
return True
|
|
|
|
except grpc.RpcError as e:
|
|
print(f"\nError: {e.code()}")
|
|
print(f"Details: {e.details()}")
|
|
return False
|
|
|
|
if __name__ == '__main__':
|
|
examine_binary_structure()
|