I looked to KH, it really made some major improvements.
I will use wildcards for this.
Thanks a lot for the response
Em 8 de outubro de 2011 03:40, Gilles PIETRI <[email protected]>escreveu:
> Le 07/10/2011 13:37, Fábio Costa a écrit :
>
> I will test habor in the next week.
>> Gilles icecast do a global authentication for several user names in the
>> KH branch ,in the original, or neither?
>>
>>
> You can use a URL or a htpasswd file for auth purposes on Icecast 2.3.x :
> http://icecast.org/docs/**icecast-2.3.2/icecast2_**listenerauth.html<http://icecast.org/docs/icecast-2.3.2/icecast2_listenerauth.html>
>
> And now, with icecast-kh (http://www.xiphicecast.**
> webspace.virginmedia.com/<http://www.xiphicecast.webspace.virginmedia.com/>)
> you can use wildcards for mount names in the configuration, meaning you can
> do something like <mount-name>/radio-*</mount-**name> and have a generic
> auth setup there. I never stress tested it, but KH usually does things right
> ;)
>
> If you don't want to use the KH branch, you can also dynamically generate
> the XML for your new mounts, and SIGHUP, but that's certainly not as funny.
>
> Cheers,
>
> Gilou
>
>
>
> Thanks to everybody for all the feedback.
>>
>> Em 7 de outubro de 2011 08:11, Romain Beauxis <[email protected]
>> <mailto:[email protected]>> escreveu:
>>
>> 2011/10/7 Fábio Costa <[email protected]
>> <mailto:blackjackdevel@gmail.**com <[email protected]>>>:
>>
>> > Will try both, you think that output habor can handle the workload?
>>
>> Well, I wouldn't mind having some real testing about this.. It
>> _should_ .. :-)
>>
>> Romain
>>
>> > Em 6 de outubro de 2011 20:18, Romain Beauxis
>> <[email protected] <mailto:[email protected]>>
>>
>> > escreveu:
>> >>
>> >> Despite the fact that I cooked up output.harbor, I would say
>> that the
>> >> KH branch is probably the safest option.
>> >>
>> >> However, if you dare to try output.harbor, I'll be very happy to
>> have
>> >> feedback and fix what needs to be fixed :-)
>> >>
>> >> Romain
>> >>
>> >> 2011/10/6 Fábio Costa <[email protected]
>> <mailto:blackjackdevel@gmail.**com <[email protected]>>>:
>>
>> >> > will take a look.
>> >> > Thanks
>> >> >
>> >> > Em 6 de outubro de 2011 16:53, Brandon Casci
>> <[email protected] <mailto:[email protected]**>>
>>
>> >> > escreveu:
>> >> >>
>> >> >> I would give this a try with the KH branch, it may not work
>> but K,arl,
>> >> >> the
>> >> >> maintainer of that branch, has a put a lot of work into boosting
>> >> >> performance
>> >> >> and increasing the amounts of things that can be changed on
>> the fly and
>> >> >> applied via a SIGHUP
>> >> >>
>> >> >> 2011/10/6 Fábio Costa <[email protected]
>> <mailto:blackjackdevel@gmail.**com <[email protected]>>>
>>
>> >> >>>
>> >> >>> I need to authenticate any mount point by an external
>> application i
>> >> >>> saw
>> >> >>> that i can do that with icecast but i have to change the
>> config by
>> >> >>> hand for
>> >> >>> each mount point.Since i would dynamically create
>> mountpiunts that is
>> >> >>> not an
>> >> >>> option.
>> >> >>>
>> >> >>>
>> >> >>> Em 6 de outubro de 2011 16:42, Brandon Casci
>> <[email protected] <mailto:[email protected]**>>
>>
>> >> >>> escreveu:
>> >> >>>>
>> >> >>>> What do you mean by dynamic authentication? Being able to
>> >> >>>> authenticate
>> >> >>>> against a username/password against any source? If so, use
>> you can do
>> >> >>>> that
>> >> >>>> with Icecast. You may need to use the KH branch of Icecast
>> to catch
>> >> >>>> bug
>> >> >>>> fixes, but briefly, you can a mount authenticate
>> connections against
>> >> >>>> an
>> >> >>>> external script.
>> >> >>>>
>> >> >>>> 2011/10/6 Fábio Costa <[email protected]
>> <mailto:blackjackdevel@gmail.**com <[email protected]>>>
>>
>> >> >>>>>
>> >> >>>>> Hi all.
>> >> >>>>> I found myself in the need of dynamic authentication and
>> icecast
>> >> >>>>> doesn't support it.
>> >> >>>>> I'm considering making it in the network with samba but
>> would rather
>> >> >>>>> use an alternative to icecast, does anyone have a good
>> alternative
>> >> >>>>> to
>> >> >>>>> icecast with dynamic authentication to dynamic mountpoints?
>> >> >>>>>
>> >> >>>>>
>> >> >>>>>
>> >> >>>>>
>> ------------------------------**------------------------------**
>> ------------------
>> >> >>>>> All the data continuously generated in your IT infrastructure
>> >> >>>>> contains
>> >> >>>>> a
>> >> >>>>> definitive record of customers, application performance,
>> security
>> >> >>>>> threats, fraudulent activity and more. Splunk takes this
>> data and
>> >> >>>>> makes
>> >> >>>>> sense of it. Business sense. IT sense. Common sense.
>> >> >>>>>
>> http://p.sf.net/sfu/splunk-**d2dcopy1<http://p.sf.net/sfu/splunk-d2dcopy1>
>> >> >>>>> ______________________________**_________________
>> >> >>>>> Savonet-users mailing list
>> >> >>>>>
>> Savonet-users@lists.**sourceforge.net<[email protected]>
>>
>> <mailto:Savonet-users@lists.**sourceforge.net<[email protected]>
>> >
>>
>> >> >>>>>
>> https://lists.sourceforge.net/**lists/listinfo/savonet-users<https://lists.sourceforge.net/lists/listinfo/savonet-users>
>> >> >>>>>
>> >> >>>>
>> >> >>>>
>> >> >>>>
>> >> >>>> --
>> >> >>>> ==============================**===========
>> >> >>>> Brandon Casci
>> >> >>>> Loudcaster
>> >> >>>> http://loudcaster.com
>> >> >>>> ==============================**===========
>> >> >>>
>> >> >>
>> >> >>
>> >> >>
>> >> >> --
>> >> >> ==============================**===========
>> >> >> Brandon Casci
>> >> >> Loudcaster
>> >> >> http://loudcaster.com
>> >> >> ==============================**===========
>> >> >
>> >> >
>> >> >
>> >> >
>> ------------------------------**------------------------------**
>> ------------------
>> >> > All the data continuously generated in your IT infrastructure
>> contains a
>> >> > definitive record of customers, application performance, security
>> >> > threats, fraudulent activity and more. Splunk takes this data
>> and makes
>> >> > sense of it. Business sense. IT sense. Common sense.
>> >> >
>> http://p.sf.net/sfu/splunk-**d2dcopy1<http://p.sf.net/sfu/splunk-d2dcopy1>
>> >> > ______________________________**_________________
>> >> > Savonet-users mailing list
>> >> >
>> Savonet-users@lists.**sourceforge.net<[email protected]>
>>
>> <mailto:Savonet-users@lists.**sourceforge.net<[email protected]>
>> >
>> >> >
>> https://lists.sourceforge.net/**lists/listinfo/savonet-users<https://lists.sourceforge.net/lists/listinfo/savonet-users>
>> >> >
>> >> >
>> >
>> >
>>
>>
>>
>
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Savonet-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/savonet-users