maintained by ServerContainers
This Dockerfile (available as ghcr.io/servercontainers/zoneminder) gives you a ready to use zoneminder installation with optional tls.
Note: This container only supports mysql
/ mariadb
database servers.
There is no internal mysql-server available - so you need to setup a seconds container for that (take a look at docker-compose.yml
)
View in Docker Registry ghcr.io/servercontainers/zoneminder
View in GitHub ServerContainers/docker-zoneminder
This Dockerfile is based on the ghcr.io/servercontainers/apache2-ssl-secure debian:bullseye
based image.
You can specify DOCKER_REGISTRY
environment variable (for example my.registry.tld
)
and use the build script to build the main container and it's variants for x86_64, arm64 and arm
You'll find all images tagged like d11.2-a1.18.0-6.1-zm1.36.0
which means d<debian version>-a<apache version (with some esacped chars)>-zm<zoneminder version (with some esacped chars)>
.
This way you can pin your installation/configuration to a certian version. or easily roll back if you experience any problems
(don't forget to open a issue in that case ;D).
To build a latest
tag run ./build.sh release
- 2023-03-20
- github action to build container
- implemented ghcr.io as new registry
- moved from
MarvAmBass
toServerContainers
- 2021-09-06
- increased
shm_size
for more cameras
- increased
- 2021-08-27
- small fixes
- added this repo to container
- 2021-08-09
- initial commit
- healthchecks
- multiarch build
This container needs a database, so take a look at the docker-compose.yml
-
ZM_DB_HOST
-
host of mysql db
-
default:
db
-
ZM_DB_NAME
-
name of the mysql zoneminder database
-
default:
zm
-
ZM_DB_USER
-
username of the mysql database for zoneminder
-
default:
zmuser
-
ZM_DB_PASS
-
username of the mysql database for zoneminder
-
default:
zmpass
-
ZM_DB_SSL_CA_CERT
-
default: not set
-
ZM_DB_SSL_CLIENT_KEY
-
default: not set
-
ZM_DB_SSL_CLIENT_CERT
-
default: not set
-
DISABLE_TLS
-
default: not set - if set yo any value
https
and theHSTS_HEADERS_*
will be disabled -
HSTS_HEADERS_ENABLE
-
default: not set - if set to any value the HTTP Strict Transport Security will be activated on SSL Channel
-
HSTS_HEADERS_ENABLE_NO_SUBDOMAINS
-
default: not set - if set together with HSTS_HEADERS_ENABLE and set to any value the HTTP Strict Transport Security will be deactivated on subdomains