I looked to KH, it really made some major improvements.
I will use wildcards for this.
Thanks a lot for the response

Em 8 de outubro de 2011 03:40, Gilles PIETRI <[email protected]>escreveu:

> Le 07/10/2011 13:37, Fábio Costa a écrit :
>
>  I will test habor in the next week.
>> Gilles icecast do a global authentication for several user names in the
>> KH branch ,in the original, or neither?
>>
>>
> You can use a URL or a htpasswd file for auth purposes on Icecast 2.3.x :
> http://icecast.org/docs/**icecast-2.3.2/icecast2_**listenerauth.html<http://icecast.org/docs/icecast-2.3.2/icecast2_listenerauth.html>
>
> And now, with icecast-kh (http://www.xiphicecast.**
> webspace.virginmedia.com/<http://www.xiphicecast.webspace.virginmedia.com/>)
> you can use wildcards for mount names in the configuration, meaning you can
> do something like <mount-name>/radio-*</mount-**name> and have a generic
> auth setup there. I never stress tested it, but KH usually does things right
> ;)
>
> If you don't want to use the KH branch, you can also dynamically generate
> the XML for your new mounts, and SIGHUP, but that's certainly not as funny.
>
> Cheers,
>
> Gilou
>
>
>
>  Thanks to everybody for all the feedback.
>>
>> Em 7 de outubro de 2011 08:11, Romain Beauxis <[email protected]
>> <mailto:[email protected]>> escreveu:
>>
>>    2011/10/7 Fábio Costa <[email protected]
>>    <mailto:blackjackdevel@gmail.**com <[email protected]>>>:
>>
>>     > Will try both, you think that output habor can handle the workload?
>>
>>    Well, I wouldn't mind having some real testing about this.. It
>>    _should_ .. :-)
>>
>>    Romain
>>
>>     > Em 6 de outubro de 2011 20:18, Romain Beauxis
>>    <[email protected] <mailto:[email protected]>>
>>
>>     > escreveu:
>>     >>
>>     >> Despite the fact that I cooked up output.harbor, I would say
>>    that the
>>     >> KH branch is probably the safest option.
>>     >>
>>     >> However, if you dare to try output.harbor, I'll be very happy to
>>    have
>>     >> feedback and fix what needs to be fixed :-)
>>     >>
>>     >> Romain
>>     >>
>>     >> 2011/10/6 Fábio Costa <[email protected]
>>    <mailto:blackjackdevel@gmail.**com <[email protected]>>>:
>>
>>     >> > will take a look.
>>     >> > Thanks
>>     >> >
>>     >> > Em 6 de outubro de 2011 16:53, Brandon Casci
>>    <[email protected] <mailto:[email protected]**>>
>>
>>     >> > escreveu:
>>     >> >>
>>     >> >> I would give this a try with the KH branch, it may not work
>>    but K,arl,
>>     >> >> the
>>     >> >> maintainer of that branch, has a put a lot of work into boosting
>>     >> >> performance
>>     >> >> and increasing the amounts of things that can be changed on
>>    the fly and
>>     >> >> applied via a SIGHUP
>>     >> >>
>>     >> >> 2011/10/6 Fábio Costa <[email protected]
>>    <mailto:blackjackdevel@gmail.**com <[email protected]>>>
>>
>>     >> >>>
>>     >> >>> I need to authenticate any mount point by an external
>>    application i
>>     >> >>> saw
>>     >> >>> that i can do that with icecast but i have to change the
>>    config by
>>     >> >>> hand for
>>     >> >>> each mount point.Since i would dynamically create
>>    mountpiunts that is
>>     >> >>> not an
>>     >> >>> option.
>>     >> >>>
>>     >> >>>
>>     >> >>> Em 6 de outubro de 2011 16:42, Brandon Casci
>>    <[email protected] <mailto:[email protected]**>>
>>
>>     >> >>> escreveu:
>>     >> >>>>
>>     >> >>>> What do you mean by dynamic authentication? Being able to
>>     >> >>>> authenticate
>>     >> >>>> against a username/password against any source? If so, use
>>    you can do
>>     >> >>>> that
>>     >> >>>> with Icecast. You may need to use the KH branch of Icecast
>>    to catch
>>     >> >>>> bug
>>     >> >>>> fixes, but briefly, you can a mount authenticate
>>    connections against
>>     >> >>>> an
>>     >> >>>> external script.
>>     >> >>>>
>>     >> >>>> 2011/10/6 Fábio Costa <[email protected]
>>    <mailto:blackjackdevel@gmail.**com <[email protected]>>>
>>
>>     >> >>>>>
>>     >> >>>>> Hi all.
>>     >> >>>>> I found myself in the need of dynamic authentication and
>>    icecast
>>     >> >>>>> doesn't support it.
>>     >> >>>>> I'm considering making it in the network with samba but
>>    would rather
>>     >> >>>>> use an alternative to icecast, does anyone have a good
>>    alternative
>>     >> >>>>> to
>>     >> >>>>> icecast with dynamic authentication to dynamic mountpoints?
>>     >> >>>>>
>>     >> >>>>>
>>     >> >>>>>
>>     >> >>>>>
>>    ------------------------------**------------------------------**
>> ------------------
>>     >> >>>>> All the data continuously generated in your IT infrastructure
>>     >> >>>>> contains
>>     >> >>>>> a
>>     >> >>>>> definitive record of customers, application performance,
>>    security
>>     >> >>>>> threats, fraudulent activity and more. Splunk takes this
>>    data and
>>     >> >>>>> makes
>>     >> >>>>> sense of it. Business sense. IT sense. Common sense.
>>     >> >>>>> 
>> http://p.sf.net/sfu/splunk-**d2dcopy1<http://p.sf.net/sfu/splunk-d2dcopy1>
>>     >> >>>>> ______________________________**_________________
>>     >> >>>>> Savonet-users mailing list
>>     >> >>>>> 
>> Savonet-users@lists.**sourceforge.net<[email protected]>
>>    
>> <mailto:Savonet-users@lists.**sourceforge.net<[email protected]>
>> >
>>
>>     >> >>>>> 
>> https://lists.sourceforge.net/**lists/listinfo/savonet-users<https://lists.sourceforge.net/lists/listinfo/savonet-users>
>>     >> >>>>>
>>     >> >>>>
>>     >> >>>>
>>     >> >>>>
>>     >> >>>> --
>>     >> >>>> ==============================**===========
>>     >> >>>> Brandon Casci
>>     >> >>>> Loudcaster
>>     >> >>>> http://loudcaster.com
>>     >> >>>> ==============================**===========
>>     >> >>>
>>     >> >>
>>     >> >>
>>     >> >>
>>     >> >> --
>>     >> >> ==============================**===========
>>     >> >> Brandon Casci
>>     >> >> Loudcaster
>>     >> >> http://loudcaster.com
>>     >> >> ==============================**===========
>>     >> >
>>     >> >
>>     >> >
>>     >> >
>>    ------------------------------**------------------------------**
>> ------------------
>>     >> > All the data continuously generated in your IT infrastructure
>>    contains a
>>     >> > definitive record of customers, application performance, security
>>     >> > threats, fraudulent activity and more. Splunk takes this data
>>    and makes
>>     >> > sense of it. Business sense. IT sense. Common sense.
>>     >> > 
>> http://p.sf.net/sfu/splunk-**d2dcopy1<http://p.sf.net/sfu/splunk-d2dcopy1>
>>     >> > ______________________________**_________________
>>     >> > Savonet-users mailing list
>>     >> > 
>> Savonet-users@lists.**sourceforge.net<[email protected]>
>>    
>> <mailto:Savonet-users@lists.**sourceforge.net<[email protected]>
>> >
>>     >> > 
>> https://lists.sourceforge.net/**lists/listinfo/savonet-users<https://lists.sourceforge.net/lists/listinfo/savonet-users>
>>     >> >
>>     >> >
>>     >
>>     >
>>
>>
>>
>
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Savonet-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/savonet-users

Reply via email to