I hereby claim:
- I am agranig on github.
- I am agranig (https://keybase.io/agranig) on keybase.
- I have a public key whose fingerprint is C0ED 4FBF 6E1B 276A 2811 756F F06B 75A0 C504 5E98
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
# the key you get from http://www.hitbox.tv/settings/youruser/livestreams | |
HITBOX_KEY="youruser?key=xxxxx" | |
# top-left corner of capture window | |
CAPTURE_POS="250,200" | |
# width/height of capture window | |
CAPTURE_SIZE="1050x600" | |
# make sure to have a really recent ffmpeg version (0.10.12 works fine) | |
ffmpeg -f x11grab -show_region 1 \ | |
-s ${CAPTURE_SIZE} -r 25 -i :0.0+${CAPTURE_POS} \ |
#!/bin/sh -ex | |
DIR1=/var/lib/glusterfs/export | |
DIR2=/tmp/export-tmp | |
VOL=ngcp | |
rm -rf $DIR1 $DIR2 | |
mkdir -p $DIR1 $DIR2 | |
umount /mnt/glusterfs 1>/dev/null 2>/dev/null || true |
#!/bin/sh -ex | |
DIR1=/var/lib/glusterfs/export | |
DIR2=/tmp/export-tmp | |
VOL=ngcp | |
rm -rf $DIR1 $DIR2 | |
mkdir -p $DIR1 $DIR2 | |
umount /mnt/glusterfs 1>/dev/null 2>/dev/null || true |
// load extern script crypto-md5.js from https://code.google.com/p/crypto-js/ project here | |
// socket.io callback for SIP digest authentication request | |
// it passes the full SIP header www-authenticate or proxy-authenticate as json object, | |
// one might want to construct the ctx differently though, depending on the data format | |
socket.on('authentication-request', function (data) { | |
console.log('received authentication request', data); | |
var ctx; | |
if(data.response.status == 401) | |
ctx = data.response.headers['www-authenticate'][0]; |