current position：Home>Troubleshooting and optimization of files that cannot be globally searched by ordinary users in easydss video platform customization project
Troubleshooting and optimization of files that cannot be globally searched by ordinary users in easydss video platform customization project
2022-06-24 12:43:15【Tsingsee green rhino video】
TSINGSEE Qingxi video cloud edge Architecture EasyDSS Before the video platform, the user management and role management functions have been updated , Super administrators are free to create or delete users and roles , You can also search and manage all channel files , Ordinary users can only search the channel files assigned by themselves .
When testing the global search for files by ordinary users , We found that non super administrator users cannot search global files , And the error returned when calling the interface is shown in the following figure ：
According to the error returned , We can see , It is an error report caused by the program's failure to correctly judge the user role .
We just need to add a simple judgment here , Through the judgment of user role , When the non super administrator role makes a global query , Query the files in all directories under this role .
Database query statement modification ：
Page display after solution ：
EasyDSS The video platform accesses the device or platform through rtmp Agreement to achieve , This protocol uses the streaming mechanism , Just support rtmp The protocol device can push the stream to EasyDSS above , Like mobile phone. 、 The computer 、 Unmanned aerial vehicle (uav) 、 Cameras and so on , Online classroom 、 The remote UAV can land in terms of streaming live broadcast and security .
Besides ,EasyDSS It also has rich secondary development interfaces , It can facilitate secondary development , Welcome to test .
author[Tsingsee green rhino video],Please bring the original link to reprint, thank you.
The sidebar is recommended
- Tencent Youtu, together with Tencent security Tianyu and wechat, jointly launched an infringement protection scheme
- Fbnet/fbnetv2/fbnetv3: Facebook's lightweight network exploration in NAS | lightweight network
- A flaw in R markdown: folders cannot have Chinese
- Getting started with scrapy
- Detailed explanation of the execution order of the expression and loop body in the for loop
- Remote terminal RTU slope monitoring and early warning
- Jupyter notebook service installation and startup
- About Adobe Photoshop adjusting selection
- Kubernetes practical skills: use cert manager to issue free certificates for DNSPod domain names
- In depth analysis, from ordinary clock system to various time service modes
guess what you like
What are the software prototyping tools?
[tke] GPU node NVIDIA Tesla driver reinstallation
A good habit that makes your programming ability soar
Google hacking search engine attack and Prevention
Data stack technology sharing: open source · data stack - extend flinksql to realize the join of flow and dimension tables
Pinduoduo press the user accelerator key
Installing sqlserver extension PDO of PHP under Linux_ sqlsrv
Go basic series | 1 Leading
Node cache vs browser cache
Istio practical skills: implement header based authorization
- [Tencent cloud 618 countdown!] Promotion strategy of the promotion activities
- Simple and flexible permission design?
- Making daily menu applet with micro build low code
- 99% of the students can't write good code because of this problem!
- Istio practical skills: using prism to construct multi version test services
- Kubernetes practical technique: setting kernel parameters for pod
- A scheme for crawlers to collect public opinion data
- Essential key steps in the construction of e-commerce live broadcast source code
- How do websites and we media tap user needs? Deeply expose the secrets behind the keywords!
- From theory to practice, decipher Alibaba's internal MySQL optimization scheme in simple terms
- Continuous testing | key to efficient testing in Devops Era
- It's settled! Bank retail credit risk control just does it!
- Encapsulate the method of converting a picture file object to Base64
- The pod is evicted due to insufficient disk space of tke node
- Post processing - deep camera deformation effects
- Tencent released credit risk control results safely: it has helped banks lend more than 100 billion yuan
- Interesting erasure code
- Five minutes to develop your own code generator
- How to make secruecrt more productive
- About me, a 19 line programmer
- Kubernetes practical skill: entering container netns
- [programming navigation] the practical code summarized by foreign great God, learned in 30 seconds!
- Design and implementation of high performance go log library zap
- Ghost, a synonym for blog system
- Engage in audio and video development? Several things I have to say about SRT live broadcast protocol
- IOMMU (VII) -vfio and mdev
- [highlights] summary of award-winning activities of Tencent cloud documents
- The programmer's graduation project is still bald after a year
- How to solve the problem that MBR does not support partitions over 2T, and lossless transfer to GPT
- Another prize! Tencent Youtu won the leading scientific and technological achievement award of the 2021 digital Expo
- Use txvideoeditor to add watermark and export video card at 99%? No successful failed callback?
- Reset the password, and the automatic login of the website saved by chrome Google browser is lost. What is the underlying reason?
- [log service CLS] Tencent cloud log service CLS accesses CDN
- [live broadcast of celebrities] elastic observability workshop
- Smart Policing: how to use video intelligent analysis technology to help urban policing visual comprehensive supervision and command system
- SMS SMS
- WPF from zero to 1 tutorial details, suitable for novices on the road
- Dingding, Feishu, and enterprise wechat: different business approaches
- [2022 national tournament simulation] BigBen -- determinant, Du Jiao sieve
- How to do research on plant endophytes? Special topic on Microbiology