Oscam is an Open Source Conditional Access Module software used for descrambling DVB transmissions using smart cards. It's both a server and a client.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

109 lines
5.4 KiB

4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
  1. [linuxserverurl]: https://linuxserver.io
  2. [forumurl]: https://forum.linuxserver.io
  3. [ircurl]: https://www.linuxserver.io/irc/
  4. [podcasturl]: https://www.linuxserver.io/podcast/
  5. [appurl]: http://www.streamboard.tv/oscam/
  6. [hub]: https://hub.docker.com/r/linuxserver/oscam/
  7. [![linuxserver.io](https://raw.githubusercontent.com/linuxserver/docker-templates/master/linuxserver.io/img/linuxserver_medium.png)][linuxserverurl]
  8. The [LinuxServer.io][linuxserverurl] team brings you another container release featuring easy user mapping and community support. Find us for support at:
  9. * [forum.linuxserver.io][forumurl]
  10. * [IRC][ircurl] on freenode at `#linuxserver.io`
  11. * [Podcast][podcasturl] covers everything to do with getting the most from your Linux Server plus a focus on all things Docker and containerisation!
  12. # linuxserver/oscam
  13. [![](https://images.microbadger.com/badges/version/linuxserver/oscam.svg)](https://microbadger.com/images/linuxserver/oscam "Get your own version badge on microbadger.com")[![](https://images.microbadger.com/badges/image/linuxserver/oscam.svg)](https://microbadger.com/images/linuxserver/oscam "Get your own image badge on microbadger.com")[![Docker Pulls](https://img.shields.io/docker/pulls/linuxserver/oscam.svg)][hub][![Docker Stars](https://img.shields.io/docker/stars/linuxserver/oscam.svg)][hub][![Build Status](https://ci.linuxserver.io/buildStatus/icon?job=Docker-Builders/x86-64/x86-64-oscam)](https://ci.linuxserver.io/job/Docker-Builders/job/x86-64/job/x86-64-oscam/)
  14. [Oscam][appurl] is an Open Source Conditional Access Module software used for descrambling DVB transmissions using smart cards. It's both a server and a client.
  15. [![oscam](http://download.oscam.cc/images/Logo.png)][appurl]
  16. ## Usage
  17. ```
  18. docker create \
  19. --name=oscam \
  20. -v <path to data>:/config \
  21. -e PGID=<gid> -e PUID=<uid> \
  22. -p 8888:8888 \
  23. --device=/dev/ttyUSB0 \
  24. linuxserver/oscam
  25. ```
  26. ## Parameters
  27. `The parameters are split into two halves, separated by a colon, the left hand side representing the host and the right the container side.
  28. For example with a port -p external:internal - what this shows is the port mapping from internal to external of the container.
  29. So -p 8080:80 would expose port 80 from inside the container to be accessible from the host's IP on port 8080
  30. http://192.168.x.x:8080 would show you what's running INSIDE the container on port 80.`
  31. * `-p 8888` - the port(s)
  32. * `-v /config` - where oscam should store config files and logs
  33. * `-e PGID` for GroupID - see below for explanation
  34. * `-e PUID` for UserID - see below for explanation
  35. * `--device=/dev/ttyUSB0` - for passing through smart card readers
  36. It is based on alpine linux with s6 overlay, for shell access whilst the container is running do `docker exec -it oscam /bin/bash`.
  37. ### Passing through Smart Card Readers
  38. If you want to pass through a smart card reader, you need to specify the reader with the `--device=` tag. The method used depends on how the reader is recognized.
  39. The first is /dev/ttyUSBX. To find the correct device, connect the reader and run `dmesg | tail` on the host. In the output you will find /dev/ttyUSBX, where X is the number of the device. If this is the first reader you connect to your host, it will be /dev/ttyUSB0. If you add one more it will be /dev/ttyUSB1.
  40. If there are no /dev/ttyUSBX device in `dmesg | tail`, you have to use the USB bus path. It will look similar to the below.
  41. `/dev/bus/usb/001/001`
  42. The important parts are the two numbers in the end. The first one is the Bus number, the second is the Device number. To find the Bus and Device number you have to run `lsusb` on the host, then find your USB device in the list and note the Bus and Device numbers.
  43. Here is an example of how to find the Bus and Device. The output of the lsusb command is below.
  44. `Bus 002 Device 005: ID 076b:6622 OmniKey AG CardMan 6121`
  45. The first number, the Bus, is 002. The second number, the Device, is 005. This will look like below in the `--device=` tag.
  46. `--device=/dev/bus/usb/002/005`
  47. If you have multiple smart card readers, you add one `--device=` tag for each reader.
  48. ### User / Group Identifiers
  49. Sometimes when using data volumes (`-v` flags) permissions issues can arise between the host OS and the container. We avoid this issue by allowing you to specify the user `PUID` and group `PGID`. Ensure the data volume directory on the host is owned by the same user you specify and it will "just work" ™.
  50. In this instance `PUID=1001` and `PGID=1001`. To find yours use `id user` as below:
  51. ```
  52. $ id <dockeruser>
  53. uid=1001(dockeruser) gid=1001(dockergroup) groups=1001(dockergroup)
  54. ```
  55. ## Setting up the application
  56. To set up oscam there are numerous guides on the internet. There are too many scenarios to make a quick guide.
  57. The web interface is at port 8888.
  58. ## Info
  59. * Shell access whilst the container is running: `docker exec -it oscam /bin/bash`
  60. * To monitor the logs of the container in realtime: `docker logs -f oscam`
  61. * container version number
  62. `docker inspect -f '{{ index .Config.Labels "build_version" }}' oscam`
  63. * image version number
  64. `docker inspect -f '{{ index .Config.Labels "build_version" }}' linuxserver/oscam`
  65. ## Versions
  66. + **19.10.2017:** Add ccid package for usb card readers.
  67. + **17.10.2017:** Switch to using bzr for source code, streamboard awol.
  68. + **28.05.2017:** Rebase to alpine 3.6.
  69. + **09.02.2017:** Rebase to alpine 3.5.
  70. + **14.10.2016:** Add version layer information.
  71. + **02.10.2016:** Add info on passing through devices to README.
  72. + **25.09.2016:** Initial release.