zzyycc / bulk-loader

Automatically exported from code.google.com/p/bulk-loader
0 stars 0 forks source link

Cannot Retrieve content in Release Flash Player 10 - Debug #54

Closed GoogleCodeExporter closed 8 years ago

GoogleCodeExporter commented 8 years ago
What steps will reproduce the problem?
1. add url to loader
2. start loader
3. on complete attempt to getBitmap using url

What is the expected output? What do you see instead?
expect to get a bitmap object to use. 
trace output:
[BulkLoader] Failed to get content with url:
'http://brightcove.vo.llnwd.net/d4/unsecured/media/1078685629/1078685629_1281282
762_87065f08ad8a6efb21d1811d14d376383cd25153.jpg?pubId=1078685629'as
type: [class Bitmap]

What version of the product are you using? On what operating system?
latest svn version : 222, mac os X 10.5.5, flash player 10 debug release

Please provide any additional information below.
my swf displays the images when playing back in flash player 9.

Original issue reported on code.google.com by ross.scl...@gmail.com on 22 Oct 2008 at 12:18

GoogleCodeExporter commented 8 years ago
Hi Ross.

I do have projects compiling for FP10 and being ran on that player loading 
fine. Are you sure you don't gave a 
security issue? FP10 has different rules for crossdomains, and this might be 
it. If you cannot load a local 
image, than 'll look into it.

If you set the log level to  LOG_DEBUG, I can get more information on what is 
going on. 

Cheers
Arthur Debert

Original comment by debert on 15 Nov 2008 at 9:41

GoogleCodeExporter commented 8 years ago
agreed. i did not have crossdomain would love to see this hinted at by flash in 
the
tracer.
crossdomain image loading is a confusing issue that does not come with clear 
error text.
 [BulkLoader] Failed to get content with url:
'http://brightcove.vo.llnwd.net/d4/unsecured/media/1078685629/1078685629_1281282
762_87065f08ad8a6efb21d1811d14d376383cd25153.jpg?pubId=1078685629'as
type: [class Bitmap] (possible crossdomain security violation?)

dont know if that's realistic. but this one lost me two hours I'll never lose 
again,
nor ever get back.

Original comment by ross.scl...@gmail.com on 16 Nov 2008 at 4:56

GoogleCodeExporter commented 8 years ago
Hi Ross.

You can attach a SecurityError handler for any item(or the entire BulkLoader), 
which should really help with 
debugging.

Cheers
Arthur

Original comment by debert on 16 Nov 2008 at 3:03

GoogleCodeExporter commented 8 years ago
I just ran into this same issue. I have listeners on SecurityError and IOError, 
but the 
message coming back is not clear that it's a crossdomain issue. It seems to be 
a 
datatyping problem at first. It would be very helpful to clean up the messages 
coming 
back on those errors to make things a little easier to debug.

Original comment by james.to...@gmail.com on 24 Aug 2009 at 4:56

GoogleCodeExporter commented 8 years ago
hi , i had this problem too ( but my imige was generated into cache directry , 
f.e: 
/thumbps.php?dir=file.jpf&format=png, but i solved it after 4 hours of looking 
deep 
into bulkloader :D ant later notices , that if u try to save with firefox that 
generated page - firefox instead of png format sugests to save like .php. So i 
changed 
public static var IMAGE_EXTENSIONS array content (in BulkLoader.as) - added php 
as 
array element and removed it from TEXT_EXTENSIONS. I think u had the same 
problem.

Original comment by Cels...@gmail.com on 12 Jan 2010 at 12:21

GoogleCodeExporter commented 8 years ago
Hi Celsyum.

Bulkloader (nor firefox) has a reliable way to know what the php script should 
return. 
The way to handle it is not to add php as a image extension (what if some other 
url 
your are fetching returns php as a xml?), but to use the type prop:
bulkLoader.add('some.php', {'type':'image'});

This is also explained here:
http://code.google.com/p/bulk-loader/wiki/UsingTypes

Regards

Original comment by debert on 12 Jan 2010 at 2:21

GoogleCodeExporter commented 8 years ago
Thanks , works perfect! Bulkloader da best :D

Original comment by Cels...@gmail.com on 15 Jan 2010 at 12:23