Hi, I have written a quick hack as per Tobias' suggestion below, extracting all input profile information from Darktable database. In case anyone finds it useful, it is available from my website: https://tomassobekphotography.co. nz/articles/extract-Darktable-camera-input-profiles.php (https://tomassobekphotography.co.nz/articles/extract-Darktable-camera-input-profiles.php)
Thank you to Tobias for the details, and all Darktable developers for such a great product! Cheers, Tomas P.S. I noticed that right now https://darktable.org/(https://darktable.org/) shows expired certificate exception. "XMP and the database keep the same binary blob. If you are able to write a small program (C would be best) you can relatively easily decode that: check that the module version is matching what your code knows and then cast the blob to dt_iop_colorin_params_t from src/iop/colorin.c: typedef struct dt_iop_colorin_params_t { dt_colorspaces_color_profile_type_t type; char filename[DT_IOP_COLOR_ICC_LEN]; dt_iop_color_intent_t intent; int normalize; int blue_mapping; } dt_iop_colorin_params_t; If you want a more robust and generic approach you can use module introspection, but for a quick tool like this it's probably overkill. " ____________________________________________________________________________ darktable user mailing list to unsubscribe send a mail to [email protected]
