See https://chromium.googlesource.com/chromium/src/+/master/docs/mac_build_instructions.md
git clone depot_tools
add to path (not using ~ but $HOME) in .bash_profile
sudo sysctl kern.maxvnodes=$((512*1024))
See https://chromium.googlesource.com/chromium/src/+/master/docs/mac_build_instructions.md
git clone depot_tools
add to path (not using ~ but $HOME) in .bash_profile
sudo sysctl kern.maxvnodes=$((512*1024))
⚠️ Note 2023-01-21
Some things have changed since I originally wrote this in 2016. I have updated a few minor details, and the advice is still broadly the same, but there are some new Cloudflare features you can (and should) take advantage of. In particular, pay attention to Trevor Stevens' comment here from 22 January 2022, and Matt Stenson's useful caching advice. In addition, Backblaze, with whom Cloudflare are a Bandwidth Alliance partner, have published their own guide detailing how to use Cloudflare's Web Workers to cache content from B2 private buckets. That is worth reading,
| // rtsp receivers: | |
| gst-launch-1.0 rtspsrc location="rtsp://192.168.0.102:8554/test" protocols=GST_RTSP_LOWER_TRANS_TCP latency=0 ! rtph264depay ! decodebin ! videoconvert ! autovideosink sync=false | |
| gst-launch-1.0 rtspsrc location=rtsp://192.168.1.156:8554/test ! rtph264depay ! h264parse ! avdec_h264 ! videoconvert ! autovideosink | |
| // Stream video to window and record it to file | |
| gst-launch-1.0 -e -v udpsrc port=5600 ! tee name=VIDEOWINDOW ! queue ! application/x-rtp, encoding-name=H264, payload=96 ! rtph264depay ! h264parse ! mp4mux ! filesink location=myvideo.mp4 VIDEOWINDOW. ! queue ! application/x-rtp, payload=96 ! rtph264depay ! avdec_h264 ! autovideosink | |
terraform initterraform apply -var="do_token=$(cat $HOME/digitalocean-access-token)"gateway_url = http://178.128.39.201:8080/
login_cmd = faas-cli login -g http://178.128.39.201:8080/ -p rvIU49CEcFcHmqxj
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code.