Hi,
I have written a quick hack as per Tobias' suggestion below, extracting all 
input profile information from Darktable database. In case anyone finds it 
useful, it is available from my website: https://tomassobekphotography.co.
nz/articles/extract-Darktable-camera-input-profiles.php
(https://tomassobekphotography.co.nz/articles/extract-Darktable-camera-input-profiles.php)

Thank you to Tobias for the details, and all Darktable developers for such a
great product!
Cheers, Tomas

P.S. I noticed that right now https://darktable.org/(https://darktable.org/)
shows expired certificate exception.


"XMP and the database keep the same binary blob. If you are able to write a 
small program (C would be best) you can relatively easily decode that: check

that the module version is matching what your code knows and then cast the 
blob to dt_iop_colorin_params_t from src/iop/colorin.c:

typedef struct dt_iop_colorin_params_t
{
dt_colorspaces_color_profile_type_t type;
char filename[DT_IOP_COLOR_ICC_LEN];
dt_iop_color_intent_t intent;
int normalize;
int blue_mapping;
} dt_iop_colorin_params_t;

If you want a more robust and generic approach you can use module 
introspection, but for a quick tool like this it's probably overkill.
"





____________________________________________________________________________
darktable user mailing list
to unsubscribe send a mail to [email protected]

Reply via email to