lscr.io/linuxserver/oscam:latest
should retrieve the correct image for your arch, but you can also pull specific arch images via tags.--device=
tag. The method used depends on how the reader is recognized. The first is /dev/ttyUSBX. To find the correct device, connect the reader and run dmesg | tail
on the host. In the output you will find /dev/ttyUSBX, where X is the number of the device. If this is the first reader you connect to your host, it will be /dev/ttyUSB0. If you add one more it will be /dev/ttyUSB1.dmesg | tail
, you have to use the USB bus path. It will look similar to the below./dev/bus/usb/001/001
lsusb
on the host, then find your USB device in the list and note the Bus and Device numbers.Bus 002 Device 005: ID 076b:6622 OmniKey AG CardMan 6121
--device=
tag.--device=/dev/bus/usb/002/005
--device=
tag for each reader.<external>:<internal>
respectively. For example, -p 8080:80
would expose port 80
from inside the container to be accessible from the host's IP on port 8080
outside the container.-p
)8888
-e
)PUID=1000
PGID=1000
TZ=Europe/London
-v
)/config
--device
)/dev/ttyUSB0
FILE__
.PASSWORD
based on the contents of the /run/secrets/mysecretpassword
file.-e UMASK=022
setting. Keep in mind umask is not chmod it subtracts from permissions based on it's value it does not add. Please read up here before asking for support.-v
flags), permissions issues can arise between the host OS and the container, we avoid this issue by allowing you to specify the user PUID
and group PGID
.PUID=1000
and PGID=1000
, to find yours use id user
as below:docker exec -it oscam /bin/bash
docker logs -f oscam
docker inspect -f '{{ index .Config.Labels "build_version" }}' oscam
docker inspect -f '{{ index .Config.Labels "build_version" }}' lscr.io/linuxserver/oscam:latest