1
0
Files
docker-oscam/README.md
2016-09-25 22:45:37 +01:00

3.1 KiB

linuxserver.io

The LinuxServer.io team brings you another container release featuring easy user mapping and community support. Find us for support at:

  • forum.linuxserver.io
  • IRC on freenode at #linuxserver.io
  • Podcast covers everything to do with getting the most from your Linux Server plus a focus on all things Docker and containerisation!

linuxserver/oscam

[Docker Pulls][hub][Docker Stars][hub]Build Status [hub]: https://hub.docker.com/r/linuxserver/oscam/

[Oscam][oscamurl] is an Open Source Conditional Access Module software used for descrambling DVB transmissions using smart cards. It's both a server and a client.

[oscam][oscamurl] [oscamurl]: http://www.streamboard.tv/oscam/

Usage

docker create \
  --name=oscam \
  -v <path to data>:/config \
  -e PGID=<gid> -e PUID=<uid>  \
  -p 8888:8888 \
  linuxserver/oscam

Parameters

  • -p 8888 - the port(s)
  • -v /config - where oscam should store config files and logs
  • -e PGID for GroupID - see below for explanation
  • -e PUID for UserID - see below for explanation

If you pass through a card reader, add the --device=/path/to/cardreader tag.

It is based on alpine linux with s6 overlay, for shell access whilst the container is running do docker exec -it oscam /bin/bash.

User / Group Identifiers

Sometimes when using data volumes (-v flags) permissions issues can arise between the host OS and the container. We avoid this issue by allowing you to specify the user PUID and group PGID. Ensure the data volume directory on the host is owned by the same user you specify and it will "just work" ™.

In this instance PUID=1001 and PGID=1001. To find yours use id user as below:

  $ id <dockeruser>
    uid=1001(dockeruser) gid=1001(dockergroup) groups=1001(dockergroup)

Setting up the application

To set up oscam there are numerous guides on the internet. There are too many scenarios to make a quick guide. The web interface is at port 8888.

To pass through a card reader, use the --device=/path/to/cardreader.

Info

  • Shell access whilst the container is running: docker exec -it oscam /bin/bash
  • To monitor the logs of the container in realtime: docker logs -f oscam

Versions

  • 25.09.2016: Initial release.