Opened 15 years ago
Closed 15 years ago
Last modified 15 years ago
#6579 closed defect (invalid)
Streaming local files not working
Reported by: | Owned by: | Isaac Richards | |
---|---|---|---|
Priority: | minor | Milestone: | unknown |
Component: | MythTV - General | Version: | head |
Severity: | medium | Keywords: | |
Cc: | Ticket locked: | no |
Description
(a mail about this issue has also been sent to the mythtv-user-mailing list: http://mythtv.org/pipermail/mythtv-users/2009-May/256245.html)
i tried to check "always stream recordings from the backend" which i thought would have the backend make accessing the files and streaming it to the frontend - nevertheless i get the output (mythfrontend)
2009-05-25 22:51:11.597 ProgramInfo?, Error: GetPlaybackURL: '17405_20090521210500.mpg' should be local, but it can not be found.
so it looks like the setting has no effect for me, because the frontend still wants to access it. the file has permissions 600 due to another bug and is owned by the user "mythtv" who also runs the backend. frontend is run by another user, both on the same machine. debian x86_64. changing permission to 644 allows the frontend to play the file - but this does not look like it's being streaming.
svn-revision 20616
Change History (2)
comment:1 Changed 15 years ago by
Resolution: | → invalid |
---|---|
Status: | new → closed |
comment:2 Changed 15 years ago by
why should the frontend need to access recordings when they are streamed from the backend?
nevertheless, skip the part with the permissions and simply take the bug as "checking stream local files does not make local files to be streamed". activating this option changes nothing for me - this option seems to be broken. the frontend still accesses the file locally:
We have a playbackURL(/mnt/recordings/mythtv/livetv/17401_20090526180800.mpg)
which obviously should look more like
RemoteFile(myth://127.0.0.1:6543/17401_20090526180800.mpg)
or not?
Again appears to be a filesystem permissions issue. Myth should be running all components as the same user, with permissions mapped over all shares.