The secret sauce is:
<Location /.well-known>
ProxyPass !
</Location>
Today I went to noisebridge and scanned Wonders Through the Microscope and it is now available for download on the freestore! I will likely also generate a color version of the PDF but the book is in black and white so it really doesn't add much.
This is my first attempt at book scanning and post-processing using only open source tools so I thought I'd share this book scanning guide based on my experiences :)
I used the noisebridge book scanner hardware and their python script which remote-controls two DSLR cameras and downloads the photos over USB. It worked very well.
Note that in addition to gphoto2 you will also need jpegtran. This command will get you both:
If you want to use pulseaudio, see BaReinhard's repo.
If you want to use bluealsa and avoid pulseaudio, keep reading.
So far this solution has two problems I haven't solved:
bluealsa-aplay crashes and bluealsa also needs restartingIf you have pulseaudio installed, make sure /etc/pulse/default.pa has the following two lines commented out and restart pulseaudio:
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/env python3 | |
| # This script sends a DHCP discover on the specified interface | |
| # then waits for the specified number of seconds (default: 5) | |
| # for replies from DHCP servers and prints the results. | |
| # Install dependencies: | |
| # sudo apt install python3-scapy | |
| # scapy API: https://scapy.readthedocs.io/en/latest/api/scapy.layers.html |
| #!/bin/bash | |
| # Show total memory usage of all processes matching the supplied grep arguments | |
| if [ "$#" -lt "1" ]; then | |
| echo "Usage: $0 <grep arguments>" >&2 | |
| exit 1 | |
| fi | |
| function humanize() { |
Check which version of chocolate-doom your distro has:
apt-cache show chocolate-doom|grep "Version:"
If it's version 3.0.0 or above then install it:
sudo apt install chocolate-doom
This is a brief guide on how to configure an SSH reverse tunnel that automatically establishes on boot and will continuously attempt to re-connect when it fails.
It is very useful if you are deploying a device somewhere without a public IP, e.g. behind a NAT, and need to be able to SSH into it from the wider internet.
Let's refer to the NAT'ed device as the client. This guide assumes that the client is able to create outgoing SSH connections to at least destination port 443.
You will need root access to a server with a static IP on the internet which runs an openssh server.
On my-server.example.com add the following to /etc/ssh/sshd_config, changing tunnel-user to whichever username you want to use (this will be a new user, not an exising user) and changing the PermitOpen line:
| -----BEGIN PGP PUBLIC KEY BLOCK----- | |
| mQGNBF7LOWQBDACv1M8bZUiiEFKJ0ITmVyKH3U1ixKnJ2HV2KzPlSMnlV8doyfYx | |
| ydv0Udu7WSeAfIpk9nMrwlzIqRSJx0sOsO0ZpiVdo+loKehBjoQiCiBzwmt0UOHL | |
| /knFEwBC1Sh33D+GfjUG+8cVZgEwx0ySt/w8boGS86384AQtwZ8CS2AGgIMZO7ld | |
| XPIIUr2uHPvZzT8We4+VhqBRwHKmIwDnPkJBs1LtLuRbgmPu3yJBSe38J6J6X4au | |
| 53bNKdE7kQmqzraawFJjVb14/fU6UoqBMkwOiTQ/1N/0JVUr+DOUTSI74RwnGPr8 | |
| 6qbQYbEY5SRDCsOAy9FhoEjf75nCTNQ+GQNa5Vih9tpVrEqikPRN+eouTD5YfnJv | |
| QcxJI8RORHsTCSGNGC8OmX+GM5NPS0jRwixeoGWEJBLIKjEP9HpIOLWYR3RNWTGe | |
| IwtJdWxXPYo8uDR4GAnTaTRbu5NTyQe65hORl7gZsrtALjojXmCZTyWlmuYRGHn/ |