Le 07/10/2011 13:37, Fábio Costa a écrit :
> I will test habor in the next week.
> Gilles icecast do a global authentication for several user names in the
> KH branch ,in the original, or neither?
>

You can use a URL or a htpasswd file for auth purposes on Icecast 2.3.x 
: http://icecast.org/docs/icecast-2.3.2/icecast2_listenerauth.html

And now, with icecast-kh 
(http://www.xiphicecast.webspace.virginmedia.com/) you can use wildcards 
for mount names in the configuration, meaning you can do something like 
<mount-name>/radio-*</mount-name> and have a generic auth setup there. I 
never stress tested it, but KH usually does things right ;)

If you don't want to use the KH branch, you can also dynamically 
generate the XML for your new mounts, and SIGHUP, but that's certainly 
not as funny.

Cheers,

Gilou



> Thanks to everybody for all the feedback.
>
> Em 7 de outubro de 2011 08:11, Romain Beauxis <[email protected]
> <mailto:[email protected]>> escreveu:
>
>     2011/10/7 Fábio Costa <[email protected]
>     <mailto:[email protected]>>:
>      > Will try both, you think that output habor can handle the workload?
>
>     Well, I wouldn't mind having some real testing about this.. It
>     _should_ .. :-)
>
>     Romain
>
>      > Em 6 de outubro de 2011 20:18, Romain Beauxis
>     <[email protected] <mailto:[email protected]>>
>      > escreveu:
>      >>
>      >> Despite the fact that I cooked up output.harbor, I would say
>     that the
>      >> KH branch is probably the safest option.
>      >>
>      >> However, if you dare to try output.harbor, I'll be very happy to
>     have
>      >> feedback and fix what needs to be fixed :-)
>      >>
>      >> Romain
>      >>
>      >> 2011/10/6 Fábio Costa <[email protected]
>     <mailto:[email protected]>>:
>      >> > will take a look.
>      >> > Thanks
>      >> >
>      >> > Em 6 de outubro de 2011 16:53, Brandon Casci
>     <[email protected] <mailto:[email protected]>>
>      >> > escreveu:
>      >> >>
>      >> >> I would give this a try with the KH branch, it may not work
>     but K,arl,
>      >> >> the
>      >> >> maintainer of that branch, has a put a lot of work into boosting
>      >> >> performance
>      >> >> and increasing the amounts of things that can be changed on
>     the fly and
>      >> >> applied via a SIGHUP
>      >> >>
>      >> >> 2011/10/6 Fábio Costa <[email protected]
>     <mailto:[email protected]>>
>      >> >>>
>      >> >>> I need to authenticate any mount point by an external
>     application i
>      >> >>> saw
>      >> >>> that i can do that with icecast but i have to change the
>     config by
>      >> >>> hand for
>      >> >>> each mount point.Since i would dynamically create
>     mountpiunts that is
>      >> >>> not an
>      >> >>> option.
>      >> >>>
>      >> >>>
>      >> >>> Em 6 de outubro de 2011 16:42, Brandon Casci
>     <[email protected] <mailto:[email protected]>>
>      >> >>> escreveu:
>      >> >>>>
>      >> >>>> What do you mean by dynamic authentication? Being able to
>      >> >>>> authenticate
>      >> >>>> against a username/password against any source? If so, use
>     you can do
>      >> >>>> that
>      >> >>>> with Icecast. You may need to use the KH branch of Icecast
>     to catch
>      >> >>>> bug
>      >> >>>> fixes, but briefly, you can a mount authenticate
>     connections against
>      >> >>>> an
>      >> >>>> external script.
>      >> >>>>
>      >> >>>> 2011/10/6 Fábio Costa <[email protected]
>     <mailto:[email protected]>>
>      >> >>>>>
>      >> >>>>> Hi all.
>      >> >>>>> I found myself in the need of dynamic authentication and
>     icecast
>      >> >>>>> doesn't support it.
>      >> >>>>> I'm considering making it in the network with samba but
>     would rather
>      >> >>>>> use an alternative to icecast, does anyone have a good
>     alternative
>      >> >>>>> to
>      >> >>>>> icecast with dynamic authentication to dynamic mountpoints?
>      >> >>>>>
>      >> >>>>>
>      >> >>>>>
>      >> >>>>>
>     
> ------------------------------------------------------------------------------
>      >> >>>>> All the data continuously generated in your IT infrastructure
>      >> >>>>> contains
>      >> >>>>> a
>      >> >>>>> definitive record of customers, application performance,
>     security
>      >> >>>>> threats, fraudulent activity and more. Splunk takes this
>     data and
>      >> >>>>> makes
>      >> >>>>> sense of it. Business sense. IT sense. Common sense.
>      >> >>>>> http://p.sf.net/sfu/splunk-d2dcopy1
>      >> >>>>> _______________________________________________
>      >> >>>>> Savonet-users mailing list
>      >> >>>>> [email protected]
>     <mailto:[email protected]>
>      >> >>>>> https://lists.sourceforge.net/lists/listinfo/savonet-users
>      >> >>>>>
>      >> >>>>
>      >> >>>>
>      >> >>>>
>      >> >>>> --
>      >> >>>> =========================================
>      >> >>>> Brandon Casci
>      >> >>>> Loudcaster
>      >> >>>> http://loudcaster.com
>      >> >>>> =========================================
>      >> >>>
>      >> >>
>      >> >>
>      >> >>
>      >> >> --
>      >> >> =========================================
>      >> >> Brandon Casci
>      >> >> Loudcaster
>      >> >> http://loudcaster.com
>      >> >> =========================================
>      >> >
>      >> >
>      >> >
>      >> >
>     
> ------------------------------------------------------------------------------
>      >> > All the data continuously generated in your IT infrastructure
>     contains a
>      >> > definitive record of customers, application performance, security
>      >> > threats, fraudulent activity and more. Splunk takes this data
>     and makes
>      >> > sense of it. Business sense. IT sense. Common sense.
>      >> > http://p.sf.net/sfu/splunk-d2dcopy1
>      >> > _______________________________________________
>      >> > Savonet-users mailing list
>      >> > [email protected]
>     <mailto:[email protected]>
>      >> > https://lists.sourceforge.net/lists/listinfo/savonet-users
>      >> >
>      >> >
>      >
>      >
>
>


------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Savonet-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/savonet-users

Reply via email to