Oscam is an Open Source Conditional Access Module software used for descrambling DVB transmissions using smart cards. It's both a server and a client.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

69 lines
3.1 KiB

4 years ago
4 years ago
4 years ago
  1. [linuxserverurl]: https://linuxserver.io
  2. [forumurl]: https://forum.linuxserver.io
  3. [ircurl]: https://www.linuxserver.io/index.php/irc/
  4. [podcasturl]: https://www.linuxserver.io/index.php/category/podcast/
  5. [![linuxserver.io](https://www.linuxserver.io/wp-content/uploads/2015/06/linuxserver_medium.png)][linuxserverurl]
  6. The [LinuxServer.io][linuxserverurl] team brings you another container release featuring easy user mapping and community support. Find us for support at:
  7. * [forum.linuxserver.io][forumurl]
  8. * [IRC][ircurl] on freenode at `#linuxserver.io`
  9. * [Podcast][podcasturl] covers everything to do with getting the most from your Linux Server plus a focus on all things Docker and containerisation!
  10. # linuxserver/oscam
  11. [![](https://images.microbadger.com/badges/image/linuxserver/oscam.svg)](https://microbadger.com/images/linuxserver/oscam "Get your own image badge on microbadger.com")[![Docker Pulls](https://img.shields.io/docker/pulls/linuxserver/oscam.svg)][hub][![Docker Stars](https://img.shields.io/docker/stars/linuxserver/oscam.svg)][hub][![Build Status](http://jenkins.linuxserver.io:8080/buildStatus/icon?job=Dockers/LinuxServer.io/linuxserver-oscam)](http://jenkins.linuxserver.io:8080/job/Dockers/job/LinuxServer.io/job/linuxserver-oscam/)
  12. [hub]: https://hub.docker.com/r/linuxserver/oscam/
  13. [Oscam][oscamurl] is an Open Source Conditional Access Module software used for descrambling DVB transmissions using smart cards. It's both a server and a client.
  14. [![oscam](http://download.oscam.cc/images/Logo.png)][oscamurl]
  15. [oscamurl]: http://www.streamboard.tv/oscam/
  16. ## Usage
  17. ```
  18. docker create \
  19. --name=oscam \
  20. -v <path to data>:/config \
  21. -e PGID=<gid> -e PUID=<uid> \
  22. -p 8888:8888 \
  23. linuxserver/oscam
  24. ```
  25. **Parameters**
  26. * `-p 8888` - the port(s)
  27. * `-v /config` - where oscam should store config files and logs
  28. * `-e PGID` for GroupID - see below for explanation
  29. * `-e PUID` for UserID - see below for explanation
  30. `If you pass through a card reader, add the --device=/path/to/cardreader tag.`
  31. It is based on alpine linux with s6 overlay, for shell access whilst the container is running do `docker exec -it oscam /bin/bash`.
  32. ### User / Group Identifiers
  33. Sometimes when using data volumes (`-v` flags) permissions issues can arise between the host OS and the container. We avoid this issue by allowing you to specify the user `PUID` and group `PGID`. Ensure the data volume directory on the host is owned by the same user you specify and it will "just work" ™.
  34. In this instance `PUID=1001` and `PGID=1001`. To find yours use `id user` as below:
  35. ```
  36. $ id <dockeruser>
  37. uid=1001(dockeruser) gid=1001(dockergroup) groups=1001(dockergroup)
  38. ```
  39. ## Setting up the application
  40. To set up oscam there are numerous guides on the internet. There are too many scenarios to make a quick guide.
  41. The web interface is at port 8888.
  42. To pass through a card reader, use the --device=/path/to/cardreader.
  43. ## Info
  44. * Shell access whilst the container is running: `docker exec -it oscam /bin/bash`
  45. * To monitor the logs of the container in realtime: `docker logs -f oscam`
  46. ## Versions
  47. + **25.09.2016:** Initial release.