/* * Asterisk -- An open source telephony toolkit. * * Copyright (C) 1999 - 2006, Digium, Inc. * * Mark Spencer * * See http://www.asterisk.org for more information about * the Asterisk project. Please do not directly contact * any of the maintainers of this project for assistance; * the project provides a web site, mailing lists and IRC * channels for your use. * * This program is free software, distributed under the terms of * the GNU General Public License Version 2. See the LICENSE file * at the top of the source tree. */ /*! \file * * \brief The Asterisk Management Interface - AMI * * \author Mark Spencer * * \extref OpenSSL http://www.openssl.org - for AMI/SSL * * At the moment this file contains a number of functions, namely: * * - data structures storing AMI state * - AMI-related API functions, used by internal asterisk components * - handlers for AMI-related CLI functions * - handlers for AMI functions (available through the AMI socket) * - the code for the main AMI listener thread and individual session threads * - the http handlers invoked for AMI-over-HTTP by the threads in main/http.c * * \ref amiconf */ /*! \addtogroup Group_AMI AMI functions */ /*! @{ Doxygen group */ #include "asterisk.h" ASTERISK_FILE_VERSION(__FILE__, "$Revision$") #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "asterisk/channel.h" #include "asterisk/file.h" #include "asterisk/manager.h" #include "asterisk/config.h" #include "asterisk/callerid.h" #include "asterisk/lock.h" #include "asterisk/logger.h" #include "asterisk/options.h" #include "asterisk/cli.h" #include "asterisk/app.h" #include "asterisk/pbx.h" #include "asterisk/md5.h" #include "asterisk/acl.h" #include "asterisk/utils.h" #include "asterisk/http.h" #include "asterisk/version.h" #include "asterisk/threadstorage.h" #include "asterisk/linkedlists.h" #include "asterisk/term.h" /*! * Linked list of events. * Global events are appended to the list by append_event(). * The usecount is the number of stored pointers to the element, * excluding the list pointers. So an element that is only in * the list has a usecount of 0, not 1. * * Clients have a pointer to the last event processed, and for each * of these clients we track the usecount of the elements. * If we have a pointer to an entry in the list, it is safe to navigate * it forward because elements will not be deleted, but only appended. * The worst that can happen is seeing the pointer still NULL. * * When the usecount of an element drops to 0, and the element is the * first in the list, we can remove it. Removal is done within the * main thread, which is woken up for the purpose. * * For simplicity of implementation, we make sure the list is never empty. */ struct eventqent { int usecount; /*!< # of clients who still need the event */ int category; unsigned int seq; /*!< sequence number */ AST_LIST_ENTRY(eventqent) eq_next; char eventdata[1]; /*!< really variable size, allocated by append_event() */ }; static AST_LIST_HEAD_STATIC(all_events, eventqent); static int displayconnects = 1; static int allowmultiplelogin; static int timestampevents; static int httptimeout = 60; static int manager_enabled = 0; static int webmanager_enabled = 0; static int block_sockets; static int num_sessions; static int manager_debug; /*!< enable some debugging code in the manager */ /*! \brief * Descriptor for a manager session, either on the AMI socket or over HTTP. * * \note * AMI session have managerid == 0; the entry is created upon a connect, * and destroyed with the socket. * HTTP sessions have managerid != 0, the value is used as a search key * to lookup sessions (using the mansession_id cookie). */ struct mansession { pthread_t ms_t; /*!< Execution thread, basically useless */ ast_mutex_t __lock; /*!< Thread lock -- don't use in action callbacks, it's already taken care of */ /* XXX need to document which fields it is protecting */ struct sockaddr_in sin; /*!< address we are connecting from */ FILE *f; /*!< fdopen() on the underlying fd */ int fd; /*!< descriptor used for output. Either the socket (AMI) or a temporary file (HTTP) */ int inuse; /*!< number of HTTP sessions using this entry */ int needdestroy; /*!< Whether an HTTP session should be destroyed */ pthread_t waiting_thread; /*!< Sleeping thread using this descriptor */ unsigned long managerid; /*!< Unique manager identifier, 0 for AMI sessions */ time_t sessiontimeout; /*!< Session timeout if HTTP */ char username[80]; /*!< Logged in username */ char challenge[10]; /*!< Authentication challenge */ int authenticated; /*!< Authentication status */ int readperm; /*!< Authorization for reading */ int writeperm; /*!< Authorization for writing */ char inbuf[1025]; /*!< Buffer */ /* we use the extra byte to add a '\0' and simplify parsing */ int inlen; /*!< number of buffered bytes */ int send_events; /*!< XXX what ? */ struct eventqent *last_ev; /*!< last event processed. */ int writetimeout; /*!< Timeout for ast_carefulwrite() */ AST_LIST_ENTRY(mansession) list; }; #define NEW_EVENT(m) (AST_LIST_NEXT(m->last_ev, eq_next)) static AST_LIST_HEAD_STATIC(sessions, mansession); /*! \brief user descriptor, as read from the config file. * * \note It is still missing some fields -- e.g. we can have multiple permit and deny * lines which are not supported here, and readperm/writeperm/writetimeout * are not stored. */ struct ast_manager_user { char username[80]; char *secret; char *deny; char *permit; char *read; char *write; int displayconnects; /*!< XXX unused */ int keep; /*!< mark entries created on a reload */ AST_LIST_ENTRY(ast_manager_user) list; }; /*! \brief list of users found in the config file */ static AST_LIST_HEAD_STATIC(users, ast_manager_user); /*! \brief list of actions registered */ static struct manager_action *first_action; AST_RWLOCK_DEFINE_STATIC(actionlock); static AST_RWLIST_HEAD_STATIC(manager_hooks, manager_custom_hook); /*! \brief Add a custom hook to be called when an event is fired */ void ast_manager_register_hook(struct manager_custom_hook *hook) { AST_RWLIST_WRLOCK(&manager_hooks); AST_RWLIST_INSERT_TAIL(&manager_hooks, hook, list); AST_RWLIST_UNLOCK(&manager_hooks); return; } /*! \brief Delete a custom hook to be called when an event is fired */ void ast_manager_unregister_hook(struct manager_custom_hook *hook) { AST_RWLIST_WRLOCK(&manager_hooks); AST_RWLIST_REMOVE(&manager_hooks, hook, list); AST_RWLIST_UNLOCK(&manager_hooks); return; } /*! \brief * Event list management functions. * We assume that the event list always has at least one element, * and the delete code will not remove the last entry even if the * */ #if 0 static time_t __deb(time_t start, const char *msg) { time_t now = time(NULL); ast_verbose("%4d th %p %s\n", (int)(now % 3600), pthread_self(), msg); if (start != 0 && now - start > 5) ast_verbose("+++ WOW, %s took %d seconds\n", msg, (int)(now - start)); return now; } static void LOCK_EVENTS(void) { time_t start = __deb(0, "about to lock events"); AST_LIST_LOCK(&all_events); __deb(start, "done lock events"); } static void UNLOCK_EVENTS(void) { __deb(0, "about to unlock events"); AST_LIST_UNLOCK(&all_events); } static void LOCK_SESS(void) { time_t start = __deb(0, "about to lock sessions"); AST_LIST_LOCK(&sessions); __deb(start, "done lock sessions"); } static void UNLOCK_SESS(void) { __deb(0, "about to unlock sessions"); AST_LIST_UNLOCK(&sessions); } #endif int check_manager_enabled() { return manager_enabled; } int check_webmanager_enabled() { return (webmanager_enabled && manager_enabled); } /*! * Grab a reference to the last event, update usecount as needed. * Can handle a NULL pointer. */ static struct eventqent *grab_last(void) { struct eventqent *ret; AST_LIST_LOCK(&all_events); ret = AST_LIST_LAST(&all_events); /* the list is never empty now, but may become so when * we optimize it in the future, so be prepared. */ if (ret) ast_atomic_fetchadd_int(&ret->usecount, 1); AST_LIST_UNLOCK(&all_events); return ret; } /*! * Purge unused events. Remove elements from the head * as long as their usecount is 0 and there is a next element. */ static void purge_events(void) { struct eventqent *ev; AST_LIST_LOCK(&all_events); while ( (ev = AST_LIST_FIRST(&all_events)) && ev->usecount == 0 && AST_LIST_NEXT(ev, eq_next)) { AST_LIST_REMOVE_HEAD(&all_events, eq_next); free(ev); } AST_LIST_UNLOCK(&all_events); } /*! * helper functions to convert back and forth between * string and numeric representation of set of flags */ static struct permalias { int num; char *label; } perms[] = { { EVENT_FLAG_SYSTEM, "system" }, { EVENT_FLAG_CALL, "call" }, { EVENT_FLAG_LOG, "log" }, { EVENT_FLAG_VERBOSE, "verbose" }, { EVENT_FLAG_COMMAND, "command" }, { EVENT_FLAG_AGENT, "agent" }, { EVENT_FLAG_USER, "user" }, { EVENT_FLAG_CONFIG, "config" }, { EVENT_FLAG_DTMF, "dtmf" }, { -1, "all" }, { 0, "none" }, }; /*! \brief Convert authority code to a list of options */ static char *authority_to_str(int authority, struct ast_str **res) { int i; char *sep = ""; (*res)->used = 0; for (i = 0; i < (sizeof(perms) / sizeof(perms[0])) - 1; i++) { if (authority & perms[i].num) { ast_str_append(res, 0, "%s%s", sep, perms[i].label); sep = ","; } } if ((*res)->used == 0) /* replace empty string with something sensible */ ast_str_append(res, 0, ""); return (*res)->str; } /*! Tells you if smallstr exists inside bigstr which is delim by delim and uses no buf or stringsep ast_instring("this|that|more","this",'|') == 1; feel free to move this to app.c -anthm */ static int ast_instring(const char *bigstr, const char *smallstr, const char delim) { const char *val = bigstr, *next; do { if ((next = strchr(val, delim))) { if (!strncmp(val, smallstr, (next - val))) return 1; else continue; } else return !strcmp(smallstr, val); } while (*(val = (next + 1))); return 0; } static int get_perm(const char *instr) { int x = 0, ret = 0; if (!instr) return 0; for (x = 0; x < (sizeof(perms) / sizeof(perms[0])); x++) { if (ast_instring(instr, perms[x].label, ',')) ret |= perms[x].num; } return ret; } /*! * A number returns itself, false returns 0, true returns all flags, * other strings return the flags that are set. */ static int strings_to_mask(const char *string) { const char *p; if (ast_strlen_zero(string)) return -1; for (p = string; *p; p++) if (*p < '0' || *p > '9') break; if (!p) /* all digits */ return atoi(string); if (ast_false(string)) return 0; if (ast_true(string)) { /* all permissions */ int x, ret = 0; for (x=0; xnext) { /* Walk the list of actions */ if (!strncasecmp(word, cur->action, l) && ++which > state) { ret = ast_strdup(cur->action); break; /* make sure we exit even if ast_strdup() returns NULL */ } } ast_rwlock_unlock(&actionlock); return ret; } static int check_manager_session_inuse(const char *name) { struct mansession *session = NULL; AST_LIST_LOCK(&sessions); AST_LIST_TRAVERSE(&sessions, session, list) { if (!strcasecmp(session->username, name)) break; } AST_LIST_UNLOCK(&sessions); return session ? 1 : 0; } /*! * lookup an entry in the list of registered users. * must be called with the list lock held. */ static struct ast_manager_user *get_manager_by_name_locked(const char *name) { struct ast_manager_user *user = NULL; AST_LIST_TRAVERSE(&users, user, list) if (!strcasecmp(user->username, name)) break; return user; } /*! \note The actionlock is read-locked by the caller of this function */ static int handle_showmancmd(int fd, int argc, char *argv[]) { struct manager_action *cur; struct ast_str *authority = ast_str_alloca(80); int num; if (argc != 4) return RESULT_SHOWUSAGE; for (cur = first_action; cur; cur = cur->next) { /* Walk the list of actions */ for (num = 3; num < argc; num++) { if (!strcasecmp(cur->action, argv[num])) { ast_cli(fd, "Action: %s\nSynopsis: %s\nPrivilege: %s\n%s\n", cur->action, cur->synopsis, authority_to_str(cur->authority, &authority), S_OR(cur->description, "") ); } } } return RESULT_SUCCESS; } static int handle_mandebug(int fd, int argc, char *argv[]) { if (argc == 2) ast_cli(fd, "manager debug is %s\n", manager_debug? "on" : "off"); else if (argc == 3) { if (!strcasecmp(argv[2], "on")) manager_debug = 1; else if (!strcasecmp(argv[2], "off")) manager_debug = 0; else return RESULT_SHOWUSAGE; } return RESULT_SUCCESS; } static int handle_showmanager(int fd, int argc, char *argv[]) { struct ast_manager_user *user = NULL; if (argc != 4) return RESULT_SHOWUSAGE; AST_LIST_LOCK(&users); if (!(user = get_manager_by_name_locked(argv[3]))) { ast_cli(fd, "There is no manager called %s\n", argv[3]); AST_LIST_UNLOCK(&users); return -1; } ast_cli(fd,"\n"); ast_cli(fd, " username: %s\n" " secret: %s\n" " deny: %s\n" " permit: %s\n" " read: %s\n" " write: %s\n" "displayconnects: %s\n", (user->username ? user->username : "(N/A)"), (user->secret ? "" : "(N/A)"), (user->deny ? user->deny : "(N/A)"), (user->permit ? user->permit : "(N/A)"), (user->read ? user->read : "(N/A)"), (user->write ? user->write : "(N/A)"), (user->displayconnects ? "yes" : "no")); AST_LIST_UNLOCK(&users); return RESULT_SUCCESS; } static int handle_showmanagers(int fd, int argc, char *argv[]) { struct ast_manager_user *user = NULL; int count_amu = 0; if (argc != 3) return RESULT_SHOWUSAGE; AST_LIST_LOCK(&users); /* If there are no users, print out something along those lines */ if (AST_LIST_EMPTY(&users)) { ast_cli(fd, "There are no manager users.\n"); AST_LIST_UNLOCK(&users); return RESULT_SUCCESS; } ast_cli(fd, "\nusername\n--------\n"); AST_LIST_TRAVERSE(&users, user, list) { ast_cli(fd, "%s\n", user->username); count_amu++; } AST_LIST_UNLOCK(&users); ast_cli(fd,"-------------------\n"); ast_cli(fd,"%d manager users configured.\n", count_amu); return RESULT_SUCCESS; } /*! \brief CLI command manager list commands */ static int handle_showmancmds(int fd, int argc, char *argv[]) { struct manager_action *cur; struct ast_str *authority = ast_str_alloca(80); char *format = " %-15.15s %-15.15s %-55.55s\n"; ast_cli(fd, format, "Action", "Privilege", "Synopsis"); ast_cli(fd, format, "------", "---------", "--------"); ast_rwlock_rdlock(&actionlock); for (cur = first_action; cur; cur = cur->next) /* Walk the list of actions */ ast_cli(fd, format, cur->action, authority_to_str(cur->authority, &authority), cur->synopsis); ast_rwlock_unlock(&actionlock); return RESULT_SUCCESS; } /*! \brief CLI command manager list connected */ static int handle_showmanconn(int fd, int argc, char *argv[]) { struct mansession *s; char *format = " %-15.15s %-15.15s\n"; ast_cli(fd, format, "Username", "IP Address"); AST_LIST_LOCK(&sessions); AST_LIST_TRAVERSE(&sessions, s, list) ast_cli(fd, format,s->username, ast_inet_ntoa(s->sin.sin_addr)); AST_LIST_UNLOCK(&sessions); return RESULT_SUCCESS; } /*! \brief CLI command manager list eventq */ /* Should change to "manager show connected" */ static int handle_showmaneventq(int fd, int argc, char *argv[]) { struct eventqent *s; AST_LIST_LOCK(&all_events); AST_LIST_TRAVERSE(&all_events, s, eq_next) { ast_cli(fd, "Usecount: %d\n",s->usecount); ast_cli(fd, "Category: %d\n", s->category); ast_cli(fd, "Event:\n%s", s->eventdata); } AST_LIST_UNLOCK(&all_events); return RESULT_SUCCESS; } static char showmancmd_help[] = "Usage: manager show command \n" " Shows the detailed description for a specific Asterisk manager interface command.\n"; static char showmancmds_help[] = "Usage: manager show commands\n" " Prints a listing of all the available Asterisk manager interface commands.\n"; static char showmanconn_help[] = "Usage: manager show connected\n" " Prints a listing of the users that are currently connected to the\n" "Asterisk manager interface.\n"; static char showmaneventq_help[] = "Usage: manager show eventq\n" " Prints a listing of all events pending in the Asterisk manger\n" "event queue.\n"; static char showmanagers_help[] = "Usage: manager show users\n" " Prints a listing of all managers that are currently configured on that\n" " system.\n"; static char showmanager_help[] = " Usage: manager show user \n" " Display all information related to the manager user specified.\n"; static struct ast_cli_entry cli_manager[] = { { { "manager", "show", "command", NULL }, handle_showmancmd, "Show a manager interface command", showmancmd_help, complete_show_mancmd }, { { "manager", "show", "commands", NULL }, handle_showmancmds, "List manager interface commands", showmancmds_help }, { { "manager", "show", "connected", NULL }, handle_showmanconn, "List connected manager interface users", showmanconn_help }, { { "manager", "show", "eventq", NULL }, handle_showmaneventq, "List manager interface queued events", showmaneventq_help }, { { "manager", "show", "users", NULL }, handle_showmanagers, "List configured manager users", showmanagers_help, NULL, NULL }, { { "manager", "show", "user", NULL }, handle_showmanager, "Display information on a specific manager user", showmanager_help, NULL, NULL }, { { "manager", "debug", NULL }, handle_mandebug, "Show, enable, disable debugging of the manager code", "Usage: manager debug [on|off]\n Show, enable, disable debugging of the manager code.\n", NULL, NULL }, }; /* * Decrement the usecount for the event; if it goes to zero, * (why check for e->next ?) wakeup the * main thread, which is in charge of freeing the record. * Returns the next record. */ static struct eventqent *unref_event(struct eventqent *e) { ast_atomic_fetchadd_int(&e->usecount, -1); return AST_LIST_NEXT(e, eq_next); } static void ref_event(struct eventqent *e) { ast_atomic_fetchadd_int(&e->usecount, 1); } /* * destroy a session, leaving the usecount */ static void free_session(struct mansession *s) { struct eventqent *eqe = s->last_ev; if (s->f != NULL) fclose(s->f); ast_mutex_destroy(&s->__lock); free(s); unref_event(eqe); } static void destroy_session(struct mansession *s) { AST_LIST_LOCK(&sessions); AST_LIST_REMOVE(&sessions, s, list); AST_LIST_UNLOCK(&sessions); ast_atomic_fetchadd_int(&num_sessions, -1); free_session(s); } const char *astman_get_header(const struct message *m, char *var) { int x, l = strlen(var); for (x = 0; x < m->hdrcount; x++) { const char *h = m->headers[x]; if (!strncasecmp(var, h, l) && h[l] == ':' && h[l+1] == ' ') return h + l + 2; } return ""; } struct ast_variable *astman_get_variables(const struct message *m) { int varlen, x, y; struct ast_variable *head = NULL, *cur; AST_DECLARE_APP_ARGS(args, AST_APP_ARG(vars)[32]; ); varlen = strlen("Variable: "); for (x = 0; x < m->hdrcount; x++) { char *parse, *var, *val; if (strncasecmp("Variable: ", m->headers[x], varlen)) continue; parse = ast_strdupa(m->headers[x] + varlen); AST_STANDARD_APP_ARGS(args, parse); if (!args.argc) continue; for (y = 0; y < args.argc; y++) { if (!args.vars[y]) continue; var = val = ast_strdupa(args.vars[y]); strsep(&val, "="); if (!val || ast_strlen_zero(var)) continue; cur = ast_variable_new(var, val); cur->next = head; head = cur; } } return head; } /*! * helper function to send a string to the socket. * Return -1 on error (e.g. buffer full). */ static int send_string(struct mansession *s, char *string) { int len = strlen(string); /* residual length */ char *src = string; struct timeval start = ast_tvnow(); int n = 0; for (;;) { int elapsed; struct pollfd fd; n = fwrite(src, 1, len, s->f); /* try to write the string, non blocking */ if (n == len /* ok */ || n < 0 /* error */) break; len -= n; /* skip already written data */ src += n; fd.fd = s->fd; fd.events = POLLOUT; n = -1; /* error marker */ elapsed = ast_tvdiff_ms(ast_tvnow(), start); if (elapsed > s->writetimeout) break; if (poll(&fd, 1, s->writetimeout - elapsed) < 1) break; } fflush(s->f); return n < 0 ? -1 : 0; } /* XXX see if it can be moved inside the function */ AST_THREADSTORAGE(astman_append_buf); #define ASTMAN_APPEND_BUF_INITSIZE 256 /*! * utility functions for creating AMI replies */ void astman_append(struct mansession *s, const char *fmt, ...) { va_list ap; struct ast_str *buf; if (!(buf = ast_str_thread_get(&astman_append_buf, ASTMAN_APPEND_BUF_INITSIZE))) return; va_start(ap, fmt); ast_str_set_va(&buf, 0, fmt, ap); va_end(ap); if (s->f != NULL) send_string(s, buf->str); else ast_verbose("fd == -1 in astman_append, should not happen\n"); } /*! \note NOTE: XXX this comment is unclear and possibly wrong. Callers of astman_send_error(), astman_send_response() or astman_send_ack() must EITHER hold the session lock _or_ be running in an action callback (in which case s->busy will be non-zero). In either of these cases, there is no need to lock-protect the session's fd, since no other output will be sent (events will be queued), and no input will be read until either the current action finishes or get_input() obtains the session lock. */ /*! \brief send a response with an optional message, * and terminate it with an empty line. * m is used only to grab the 'ActionID' field. * * Use the explicit constant MSG_MOREDATA to remove the empty line. * XXX MSG_MOREDATA should go to a header file. */ #define MSG_MOREDATA ((char *)astman_send_response) static void astman_send_response_full(struct mansession *s, const struct message *m, char *resp, char *msg, char *listflag) { const char *id = astman_get_header(m,"ActionID"); astman_append(s, "Response: %s\r\n", resp); if (!ast_strlen_zero(id)) astman_append(s, "ActionID: %s\r\n", id); if (listflag) astman_append(s, "Eventlist: %s\r\n", listflag); /* Start, complete, cancelled */ if (msg == MSG_MOREDATA) return; else if (msg) astman_append(s, "Message: %s\r\n\r\n", msg); else astman_append(s, "\r\n"); } void astman_send_response(struct mansession *s, const struct message *m, char *resp, char *msg) { astman_send_response_full(s, m, resp, msg, NULL); } void astman_send_error(struct mansession *s, const struct message *m, char *error) { astman_send_response_full(s, m, "Error", error, NULL); } void astman_send_ack(struct mansession *s, const struct message *m, char *msg) { astman_send_response_full(s, m, "Success", msg, NULL); } static void astman_start_ack(struct mansession *s, const struct message *m) { astman_send_response_full(s, m, "Success", MSG_MOREDATA, NULL); } void astman_send_listack(struct mansession *s, const struct message *m, char *msg, char *listflag) { astman_send_response_full(s, m, "Success", msg, listflag); } /*! \brief Rather than braindead on,off this now can also accept a specific int mask value or a ',' delim list of mask strings (the same as manager.conf) -anthm */ static int set_eventmask(struct mansession *s, const char *eventmask) { int maskint = strings_to_mask(eventmask); ast_mutex_lock(&s->__lock); if (maskint >= 0) s->send_events = maskint; ast_mutex_unlock(&s->__lock); return maskint; } /* * Here we start with action_ handlers for AMI actions, * and the internal functions used by them. * Generally, the handlers are called action_foo() */ /* helper function for action_login() */ static int authenticate(struct mansession *s, const struct message *m) { const char *user = astman_get_header(m, "Username"); int error = -1; struct ast_ha *ha = NULL; char *password = NULL; int readperm = 0, writeperm = 0; if (ast_strlen_zero(user)) /* missing username */ return -1; { /* * XXX there should be no need to scan the config file again here, * suffices to call get_manager_by_name_locked() to fetch * the user's entry. */ struct ast_config *cfg = ast_config_load("manager.conf"); char *cat = NULL; struct ast_variable *v; if (!cfg) return -1; while ( (cat = ast_category_browse(cfg, cat)) ) { /* "general" is not a valid user */ if (strcasecmp(cat, user) || !strcasecmp(cat, "general")) continue; /* collect parameters for the user's entry */ for (v = ast_variable_browse(cfg, cat); v; v = v->next) { if (!strcasecmp(v->name, "secret")) password = ast_strdupa(v->value); else if (!strcasecmp(v->name, "read")) readperm = get_perm(v->value); else if (!strcasecmp(v->name, "write")) writeperm = get_perm(v->value); else if (!strcasecmp(v->name, "permit") || !strcasecmp(v->name, "deny")) { ha = ast_append_ha(v->name, v->value, ha, NULL); } else if (!strcasecmp(v->name, "writetimeout")) { int val = atoi(v->value); if (val < 100) ast_log(LOG_WARNING, "Invalid writetimeout value '%s' at line %d\n", v->value, v->lineno); else s->writetimeout = val; } } break; } ast_config_destroy(cfg); if (!cat) { /* Didn't find the user in manager.conf, check users.conf */ int hasmanager = 0; cfg = ast_config_load("users.conf"); if (!cfg) return -1; while ( (cat = ast_category_browse(cfg, cat)) ) { if (!strcasecmp(cat, user) && strcasecmp(cat, "general")) break; } if (!cat) { ast_log(LOG_NOTICE, "%s tried to authenticate with nonexistent user '%s'\n", ast_inet_ntoa(s->sin.sin_addr), user); ast_config_destroy(cfg); return -1; } /* collect parameters for the user's entry from users.conf */ for (v = ast_variable_browse(cfg, cat); v; v = v->next) { if (!strcasecmp(v->name, "secret")) password = ast_strdupa(v->value); else if (!strcasecmp(v->name, "read")) readperm = get_perm(v->value); else if (!strcasecmp(v->name, "write")) writeperm = get_perm(v->value); else if (!strcasecmp(v->name, "permit") || !strcasecmp(v->name, "deny")) { ha = ast_append_ha(v->name, v->value, ha, NULL); } else if (!strcasecmp(v->name, "writetimeout")) { int val = atoi(v->value); if (val < 100) ast_log(LOG_WARNING, "Invalid writetimeout value '%s' at line %d\n", v->value, v->lineno); else s->writetimeout = val; } else if (!strcasecmp(v->name, "hasmanager")) { hasmanager = ast_true(v->value); } } ast_config_destroy(cfg); if (!hasmanager) { ast_log(LOG_NOTICE, "%s tried to authenticate with nonexistent user '%s'\n", ast_inet_ntoa(s->sin.sin_addr), user); return -1; } } } if (ha) { int good = ast_apply_ha(ha, &(s->sin)); ast_free_ha(ha); if (!good) { ast_log(LOG_NOTICE, "%s failed to pass IP ACL as '%s'\n", ast_inet_ntoa(s->sin.sin_addr), user); return -1; } } if (!strcasecmp(astman_get_header(m, "AuthType"), "MD5")) { const char *key = astman_get_header(m, "Key"); if (!ast_strlen_zero(key) && !ast_strlen_zero(s->challenge) && !ast_strlen_zero(password)) { int x; int len = 0; char md5key[256] = ""; struct MD5Context md5; unsigned char digest[16]; MD5Init(&md5); MD5Update(&md5, (unsigned char *) s->challenge, strlen(s->challenge)); MD5Update(&md5, (unsigned char *) password, strlen(password)); MD5Final(digest, &md5); for (x=0; x<16; x++) len += sprintf(md5key + len, "%2.2x", digest[x]); if (!strcmp(md5key, key)) error = 0; } else { ast_log(LOG_DEBUG, "MD5 authentication is not possible. challenge: '%s'\n", S_OR(s->challenge, "")); return -1; } } else if (password) { const char *pass = astman_get_header(m, "Secret"); if (!strcmp(password, pass)) error = 0; } if (error) { ast_log(LOG_NOTICE, "%s failed to authenticate as '%s'\n", ast_inet_ntoa(s->sin.sin_addr), user); return -1; } ast_copy_string(s->username, user, sizeof(s->username)); s->readperm = readperm; s->writeperm = writeperm; set_eventmask(s, astman_get_header(m, "Events")); return 0; } /*! \brief Manager PING */ static char mandescr_ping[] = "Description: A 'Ping' action will ellicit a 'Pong' response. Used to keep the\n" " manager connection open.\n" "Variables: NONE\n"; static int action_ping(struct mansession *s, const struct message *m) { astman_send_response(s, m, "Pong", NULL); return 0; } static char mandescr_getconfig[] = "Description: A 'GetConfig' action will dump the contents of a configuration\n" "file by category and contents.\n" "Variables:\n" " Filename: Configuration filename (e.g. foo.conf)\n"; static int action_getconfig(struct mansession *s, const struct message *m) { struct ast_config *cfg; const char *fn = astman_get_header(m, "Filename"); int catcount = 0; int lineno = 0; char *category=NULL; struct ast_variable *v; if (ast_strlen_zero(fn)) { astman_send_error(s, m, "Filename not specified"); return 0; } if (!(cfg = ast_config_load_with_comments(fn))) { astman_send_error(s, m, "Config file not found"); return 0; } astman_start_ack(s, m); while ((category = ast_category_browse(cfg, category))) { lineno = 0; astman_append(s, "Category-%06d: %s\r\n", catcount, category); for (v = ast_variable_browse(cfg, category); v; v = v->next) astman_append(s, "Line-%06d-%06d: %s=%s\r\n", catcount, lineno++, v->name, v->value); catcount++; } ast_config_destroy(cfg); astman_append(s, "\r\n"); return 0; } /*! The amount of space in out must be at least ( 2 * strlen(in) + 1 ) */ static void json_escape(char *out, const char *in) { for (; *in; in++) { if (*in == '\\' || *in == '\"') *out++ = '\\'; *out++ = *in; } *out = '\0'; } static char mandescr_getconfigjson[] = "Description: A 'GetConfigJSON' action will dump the contents of a configuration\n" "file by category and contents in JSON format. This only makes sense to be used\n" "using rawman over the HTTP interface.\n" "Variables:\n" " Filename: Configuration filename (e.g. foo.conf)\n"; static int action_getconfigjson(struct mansession *s, const struct message *m) { struct ast_config *cfg; const char *fn = astman_get_header(m, "Filename"); char *category = NULL; struct ast_variable *v; int comma1 = 0; char *buf = NULL; unsigned int buf_len = 0; if (ast_strlen_zero(fn)) { astman_send_error(s, m, "Filename not specified"); return 0; } if (!(cfg = ast_config_load_with_comments(fn))) { astman_send_error(s, m, "Config file not found"); return 0; } buf_len = 512; buf = alloca(buf_len); astman_start_ack(s, m); astman_append(s, "JSON: {"); while ((category = ast_category_browse(cfg, category))) { int comma2 = 0; if (buf_len < 2 * strlen(category) + 1) { buf_len *= 2; buf = alloca(buf_len); } json_escape(buf, category); astman_append(s, "%s\"%s\":[", comma1 ? "," : "", buf); if (!comma1) comma1 = 1; for (v = ast_variable_browse(cfg, category); v; v = v->next) { if (comma2) astman_append(s, ","); if (buf_len < 2 * strlen(v->name) + 1) { buf_len *= 2; buf = alloca(buf_len); } json_escape(buf, v->name); astman_append(s, "\"%s", buf); if (buf_len < 2 * strlen(v->value) + 1) { buf_len *= 2; buf = alloca(buf_len); } json_escape(buf, v->value); astman_append(s, "%s\"", buf); if (!comma2) comma2 = 1; } astman_append(s, "]"); } astman_append(s, "}\r\n\r\n"); ast_config_destroy(cfg); return 0; } /* helper function for action_updateconfig */ static void handle_updates(struct mansession *s, const struct message *m, struct ast_config *cfg) { int x; char hdr[40]; const char *action, *cat, *var, *value, *match; struct ast_category *category; struct ast_variable *v; for (x=0;x<100000;x++) { unsigned int object = 0; snprintf(hdr, sizeof(hdr), "Action-%06d", x); action = astman_get_header(m, hdr); if (ast_strlen_zero(action)) break; snprintf(hdr, sizeof(hdr), "Cat-%06d", x); cat = astman_get_header(m, hdr); snprintf(hdr, sizeof(hdr), "Var-%06d", x); var = astman_get_header(m, hdr); snprintf(hdr, sizeof(hdr), "Value-%06d", x); value = astman_get_header(m, hdr); if (!ast_strlen_zero(value) && *value == '>') { object = 1; value++; } snprintf(hdr, sizeof(hdr), "Match-%06d", x); match = astman_get_header(m, hdr); if (!strcasecmp(action, "newcat")) { if (!ast_strlen_zero(cat)) { category = ast_category_new(cat); if (category) { ast_category_append(cfg, category); } } } else if (!strcasecmp(action, "renamecat")) { if (!ast_strlen_zero(cat) && !ast_strlen_zero(value)) { category = ast_category_get(cfg, cat); if (category) ast_category_rename(category, value); } } else if (!strcasecmp(action, "delcat")) { if (!ast_strlen_zero(cat)) ast_category_delete(cfg, cat); } else if (!strcasecmp(action, "update")) { if (!ast_strlen_zero(cat) && !ast_strlen_zero(var) && (category = ast_category_get(cfg, cat))) ast_variable_update(category, var, value, match, object); } else if (!strcasecmp(action, "delete")) { if (!ast_strlen_zero(cat) && !ast_strlen_zero(var) && (category = ast_category_get(cfg, cat))) ast_variable_delete(category, var, match); } else if (!strcasecmp(action, "append")) { if (!ast_strlen_zero(cat) && !ast_strlen_zero(var) && (category = ast_category_get(cfg, cat)) && (v = ast_variable_new(var, value))){ if (object || (match && !strcasecmp(match, "object"))) v->object = 1; ast_variable_append(category, v); } } } } static char mandescr_updateconfig[] = "Description: A 'UpdateConfig' action will dump the contents of a configuration\n" "file by category and contents.\n" "Variables (X's represent 6 digit number beginning with 000000):\n" " SrcFilename: Configuration filename to read(e.g. foo.conf)\n" " DstFilename: Configuration filename to write(e.g. foo.conf)\n" " Reload: Whether or not a reload should take place (or name of specific module)\n" " Action-XXXXXX: Action to Take (NewCat,RenameCat,DelCat,Update,Delete,Append)\n" " Cat-XXXXXX: Category to operate on\n" " Var-XXXXXX: Variable to work on\n" " Value-XXXXXX: Value to work on\n" " Match-XXXXXX: Extra match required to match line\n"; static int action_updateconfig(struct mansession *s, const struct message *m) { struct ast_config *cfg; const char *sfn = astman_get_header(m, "SrcFilename"); const char *dfn = astman_get_header(m, "DstFilename"); int res; const char *rld = astman_get_header(m, "Reload"); if (ast_strlen_zero(sfn) || ast_strlen_zero(dfn)) { astman_send_error(s, m, "Filename not specified"); return 0; } if (!(cfg = ast_config_load_with_comments(sfn))) { astman_send_error(s, m, "Config file not found"); return 0; } handle_updates(s, m, cfg); res = config_text_file_save(dfn, cfg, "Manager"); ast_config_destroy(cfg); if (res) { astman_send_error(s, m, "Save of config failed"); return 0; } astman_send_ack(s, m, NULL); if (!ast_strlen_zero(rld)) { if (ast_true(rld)) rld = NULL; ast_module_reload(rld); } return 0; } /*! \brief Manager WAITEVENT */ static char mandescr_waitevent[] = "Description: A 'WaitEvent' action will ellicit a 'Success' response. Whenever\n" "a manager event is queued. Once WaitEvent has been called on an HTTP manager\n" "session, events will be generated and queued.\n" "Variables: \n" " Timeout: Maximum time (in seconds) to wait for events, -1 means forever.\n"; static int action_waitevent(struct mansession *s, const struct message *m) { const char *timeouts = astman_get_header(m, "Timeout"); int timeout = -1; int x; int needexit = 0; const char *id = astman_get_header(m,"ActionID"); char idText[256] = ""; if (!ast_strlen_zero(id)) snprintf(idText, sizeof(idText), "ActionID: %s\r\n", id); if (!ast_strlen_zero(timeouts)) { sscanf(timeouts, "%i", &timeout); if (timeout < -1) timeout = -1; /* XXX maybe put an upper bound, or prevent the use of 0 ? */ } ast_mutex_lock(&s->__lock); if (s->waiting_thread != AST_PTHREADT_NULL) pthread_kill(s->waiting_thread, SIGURG); if (s->managerid) { /* AMI-over-HTTP session */ /* * Make sure the timeout is within the expire time of the session, * as the client will likely abort the request if it does not see * data coming after some amount of time. */ time_t now = time(NULL); int max = s->sessiontimeout - now - 10; if (max < 0) /* We are already late. Strange but possible. */ max = 0; if (timeout < 0 || timeout > max) timeout = max; if (!s->send_events) /* make sure we record events */ s->send_events = -1; } ast_mutex_unlock(&s->__lock); /* XXX should this go inside the lock ? */ s->waiting_thread = pthread_self(); /* let new events wake up this thread */ if (option_debug) ast_log(LOG_DEBUG, "Starting waiting for an event!\n"); for (x=0; x < timeout || timeout < 0; x++) { ast_mutex_lock(&s->__lock); if (NEW_EVENT(s)) needexit = 1; /* We can have multiple HTTP session point to the same mansession entry. * The way we deal with it is not very nice: newcomers kick out the previous * HTTP session. XXX this needs to be improved. */ if (s->waiting_thread != pthread_self()) needexit = 1; if (s->needdestroy) needexit = 1; ast_mutex_unlock(&s->__lock); if (needexit) break; if (s->managerid == 0) { /* AMI session */ if (ast_wait_for_input(s->fd, 1000)) break; } else { /* HTTP session */ sleep(1); } } if (option_debug) ast_log(LOG_DEBUG, "Finished waiting for an event!\n"); ast_mutex_lock(&s->__lock); if (s->waiting_thread == pthread_self()) { struct eventqent *eqe; astman_send_response(s, m, "Success", "Waiting for Event completed."); while ( (eqe = NEW_EVENT(s)) ) { ref_event(eqe); if (((s->readperm & eqe->category) == eqe->category) && ((s->send_events & eqe->category) == eqe->category)) { astman_append(s, "%s", eqe->eventdata); } s->last_ev = unref_event(s->last_ev); } astman_append(s, "Event: WaitEventComplete\r\n" "%s" "\r\n", idText); s->waiting_thread = AST_PTHREADT_NULL; } else { if (option_debug) ast_log(LOG_DEBUG, "Abandoning event request!\n"); } ast_mutex_unlock(&s->__lock); return 0; } static char mandescr_listcommands[] = "Description: Returns the action name and synopsis for every\n" " action that is available to the user\n" "Variables: NONE\n"; /*! \note The actionlock is read-locked by the caller of this function */ static int action_listcommands(struct mansession *s, const struct message *m) { struct manager_action *cur; struct ast_str *temp = ast_str_alloca(BUFSIZ); /* XXX very large ? */ astman_start_ack(s, m); for (cur = first_action; cur; cur = cur->next) { /* Walk the list of actions */ if ((s->writeperm & cur->authority) == cur->authority) astman_append(s, "%s: %s (Priv: %s)\r\n", cur->action, cur->synopsis, authority_to_str(cur->authority, &temp)); } astman_append(s, "\r\n"); return 0; } static char mandescr_events[] = "Description: Enable/Disable sending of events to this manager\n" " client.\n" "Variables:\n" " EventMask: 'on' if all events should be sent,\n" " 'off' if no events should be sent,\n" " 'system,call,log' to select which flags events should have to be sent.\n"; static int action_events(struct mansession *s, const struct message *m) { const char *mask = astman_get_header(m, "EventMask"); int res; res = set_eventmask(s, mask); if (res > 0) astman_send_response(s, m, "Events On", NULL); else if (res == 0) astman_send_response(s, m, "Events Off", NULL); return 0; } static char mandescr_logoff[] = "Description: Logoff this manager session\n" "Variables: NONE\n"; static int action_logoff(struct mansession *s, const struct message *m) { astman_send_response(s, m, "Goodbye", "Thanks for all the fish."); return -1; } static int action_login(struct mansession *s, const struct message *m) { if (authenticate(s, m)) { sleep(1); astman_send_error(s, m, "Authentication failed"); return -1; } s->authenticated = 1; if (option_verbose > 1) { if (displayconnects) { ast_verbose(VERBOSE_PREFIX_2 "%sManager '%s' logged on from %s\n", (s->managerid ? "HTTP " : ""), s->username, ast_inet_ntoa(s->sin.sin_addr)); } } ast_log(LOG_EVENT, "%sManager '%s' logged on from %s\n", (s->managerid ? "HTTP " : ""), s->username, ast_inet_ntoa(s->sin.sin_addr)); astman_send_ack(s, m, "Authentication accepted"); return 0; } static int action_challenge(struct mansession *s, const struct message *m) { const char *authtype = astman_get_header(m, "AuthType"); if (!strcasecmp(authtype, "MD5")) { if (ast_strlen_zero(s->challenge)) snprintf(s->challenge, sizeof(s->challenge), "%ld", ast_random()); ast_mutex_lock(&s->__lock); astman_start_ack(s, m); astman_append(s, "Challenge: %s\r\n\r\n", s->challenge); ast_mutex_unlock(&s->__lock); } else { astman_send_error(s, m, "Must specify AuthType"); } return 0; } static char mandescr_hangup[] = "Description: Hangup a channel\n" "Variables: \n" " Channel: The channel name to be hungup\n"; static int action_hangup(struct mansession *s, const struct message *m) { struct ast_channel *c = NULL; const char *name = astman_get_header(m, "Channel"); if (ast_strlen_zero(name)) { astman_send_error(s, m, "No channel specified"); return 0; } c = ast_get_channel_by_name_locked(name); if (!c) { astman_send_error(s, m, "No such channel"); return 0; } ast_softhangup(c, AST_SOFTHANGUP_EXPLICIT); ast_channel_unlock(c); astman_send_ack(s, m, "Channel Hungup"); return 0; } static char mandescr_setvar[] = "Description: Set a global or local channel variable.\n" "Variables: (Names marked with * are required)\n" " Channel: Channel to set variable for\n" " *Variable: Variable name\n" " *Value: Value\n"; static int action_setvar(struct mansession *s, const struct message *m) { struct ast_channel *c = NULL; const char *name = astman_get_header(m, "Channel"); const char *varname = astman_get_header(m, "Variable"); const char *varval = astman_get_header(m, "Value"); if (ast_strlen_zero(varname)) { astman_send_error(s, m, "No variable specified"); return 0; } if (ast_strlen_zero(varval)) { astman_send_error(s, m, "No value specified"); return 0; } if (!ast_strlen_zero(name)) { c = ast_get_channel_by_name_locked(name); if (!c) { astman_send_error(s, m, "No such channel"); return 0; } } pbx_builtin_setvar_helper(c, varname, varval); if (c) ast_channel_unlock(c); astman_send_ack(s, m, "Variable Set"); return 0; } static char mandescr_getvar[] = "Description: Get the value of a global or local channel variable.\n" "Variables: (Names marked with * are required)\n" " Channel: Channel to read variable from\n" " *Variable: Variable name\n" " ActionID: Optional Action id for message matching.\n"; static int action_getvar(struct mansession *s, const struct message *m) { struct ast_channel *c = NULL; const char *name = astman_get_header(m, "Channel"); const char *varname = astman_get_header(m, "Variable"); char *varval; char workspace[1024] = ""; if (ast_strlen_zero(varname)) { astman_send_error(s, m, "No variable specified"); return 0; } if (!ast_strlen_zero(name)) { c = ast_get_channel_by_name_locked(name); if (!c) { astman_send_error(s, m, "No such channel"); return 0; } } if (varname[strlen(varname) - 1] == ')') { ast_func_read(c, (char *) varname, workspace, sizeof(workspace)); varval = workspace; } else { pbx_retrieve_variable(c, varname, &varval, workspace, sizeof(workspace), NULL); } if (c) ast_channel_unlock(c); astman_start_ack(s, m); astman_append(s, "Variable: %s\r\nValue: %s\r\n\r\n", varname, varval); return 0; } /*! \brief Manager "status" command to show channels */ /* Needs documentation... */ static int action_status(struct mansession *s, const struct message *m) { const char *name = astman_get_header(m,"Channel"); struct ast_channel *c; char bridge[256]; struct timeval now = ast_tvnow(); long elapsed_seconds = 0; int all = ast_strlen_zero(name); /* set if we want all channels */ const char *id = astman_get_header(m,"ActionID"); char idText[256] = ""; if (!ast_strlen_zero(id)) snprintf(idText, sizeof(idText), "ActionID: %s\r\n", id); if (all) c = ast_channel_walk_locked(NULL); else { c = ast_get_channel_by_name_locked(name); if (!c) { astman_send_error(s, m, "No such channel"); return 0; } } astman_send_ack(s, m, "Channel status will follow"); /* if we look by name, we break after the first iteration */ while (c) { if (c->_bridge) snprintf(bridge, sizeof(bridge), "Link: %s\r\n", c->_bridge->name); else bridge[0] = '\0'; if (c->pbx) { if (c->cdr) { elapsed_seconds = now.tv_sec - c->cdr->start.tv_sec; } astman_append(s, "Event: Status\r\n" "Privilege: Call\r\n" "Channel: %s\r\n" "CallerIDNum: %s\r\n" "CallerIDName: %s\r\n" "Account: %s\r\n" "State: %s\r\n" "Context: %s\r\n" "Extension: %s\r\n" "Priority: %d\r\n" "Seconds: %ld\r\n" "%s" "Uniqueid: %s\r\n" "%s" "\r\n", c->name, S_OR(c->cid.cid_num, ""), S_OR(c->cid.cid_name, ""), c->accountcode, ast_state2str(c->_state), c->context, c->exten, c->priority, (long)elapsed_seconds, bridge, c->uniqueid, idText); } else { astman_append(s, "Event: Status\r\n" "Privilege: Call\r\n" "Channel: %s\r\n" "CallerIDNum: %s\r\n" "CallerIDName: %s\r\n" "Account: %s\r\n" "State: %s\r\n" "%s" "Uniqueid: %s\r\n" "%s" "\r\n", c->name, S_OR(c->cid.cid_num, ""), S_OR(c->cid.cid_name, ""), c->accountcode, ast_state2str(c->_state), bridge, c->uniqueid, idText); } ast_channel_unlock(c); if (!all) break; c = ast_channel_walk_locked(c); } astman_append(s, "Event: StatusComplete\r\n" "%s" "\r\n",idText); return 0; } static char mandescr_sendtext[] = "Description: Sends A Text Message while in a call.\n" "Variables: (Names marked with * are required)\n" " *Channel: Channel to send message to\n" " *Message: Message to send\n" " ActionID: Optional Action id for message matching.\n"; static int action_sendtext(struct mansession *s, const struct message *m) { struct ast_channel *c = NULL; const char *name = astman_get_header(m, "Channel"); const char *textmsg = astman_get_header(m, "Message"); int res = 0; if (ast_strlen_zero(name)) { astman_send_error(s, m, "No channel specified"); return 0; } if (ast_strlen_zero(textmsg)) { astman_send_error(s, m, "No Message specified"); return 0; } c = ast_get_channel_by_name_locked(name); if (!c) { astman_send_error(s, m, "No such channel"); return 0; } res = ast_sendtext(c, textmsg); ast_mutex_unlock(&c->lock); if (res > 0) astman_send_ack(s, m, "Success"); else astman_send_error(s, m, "Failure"); return res; } static char mandescr_redirect[] = "Description: Redirect (transfer) a call.\n" "Variables: (Names marked with * are required)\n" " *Channel: Channel to redirect\n" " ExtraChannel: Second call leg to transfer (optional)\n" " *Exten: Extension to transfer to\n" " *Context: Context to transfer to\n" " *Priority: Priority to transfer to\n" " ActionID: Optional Action id for message matching.\n"; /*! \brief action_redirect: The redirect manager command */ static int action_redirect(struct mansession *s, const struct message *m) { const char *name = astman_get_header(m, "Channel"); const char *name2 = astman_get_header(m, "ExtraChannel"); const char *exten = astman_get_header(m, "Exten"); const char *context = astman_get_header(m, "Context"); const char *priority = astman_get_header(m, "Priority"); struct ast_channel *chan, *chan2 = NULL; int pi = 0; int res; if (ast_strlen_zero(name)) { astman_send_error(s, m, "Channel not specified"); return 0; } if (!ast_strlen_zero(priority) && (sscanf(priority, "%d", &pi) != 1)) { if ((pi = ast_findlabel_extension(NULL, context, exten, priority, NULL)) < 1) { astman_send_error(s, m, "Invalid priority\n"); return 0; } } /* XXX watch out, possible deadlock - we are trying to get two channels!!! */ chan = ast_get_channel_by_name_locked(name); if (!chan) { char buf[BUFSIZ]; snprintf(buf, sizeof(buf), "Channel does not exist: %s", name); astman_send_error(s, m, buf); return 0; } if (ast_check_hangup(chan)) { astman_send_error(s, m, "Redirect failed, channel not up.\n"); ast_channel_unlock(chan); return 0; } if (!ast_strlen_zero(name2)) chan2 = ast_get_channel_by_name_locked(name2); if (chan2 && ast_check_hangup(chan2)) { astman_send_error(s, m, "Redirect failed, extra channel not up.\n"); ast_channel_unlock(chan); ast_channel_unlock(chan2); return 0; } res = ast_async_goto(chan, context, exten, pi); if (!res) { if (!ast_strlen_zero(name2)) { if (chan2) res = ast_async_goto(chan2, context, exten, pi); else res = -1; if (!res) astman_send_ack(s, m, "Dual Redirect successful"); else astman_send_error(s, m, "Secondary redirect failed"); } else astman_send_ack(s, m, "Redirect successful"); } else astman_send_error(s, m, "Redirect failed"); if (chan) ast_channel_unlock(chan); if (chan2) ast_channel_unlock(chan2); return 0; } static char mandescr_command[] = "Description: Run a CLI command.\n" "Variables: (Names marked with * are required)\n" " *Command: Asterisk CLI command to run\n" " ActionID: Optional Action id for message matching.\n"; /*! \brief Manager command "command" - execute CLI command */ static int action_command(struct mansession *s, const struct message *m) { const char *cmd = astman_get_header(m, "Command"); const char *id = astman_get_header(m, "ActionID"); char *buf, *final_buf; char template[] = "/tmp/ast-ami-XXXXXX"; /* template for temporary file */ int fd = mkstemp(template); off_t l; astman_append(s, "Response: Follows\r\nPrivilege: Command\r\n"); if (!ast_strlen_zero(id)) astman_append(s, "ActionID: %s\r\n", id); /* FIXME: Wedge a ActionID response in here, waiting for later changes */ ast_cli_command(fd, cmd); /* XXX need to change this to use a FILE * */ l = lseek(fd, 0, SEEK_END); /* how many chars available */ buf = alloca(l + 1); final_buf = alloca(l + 1); lseek(fd, 0, SEEK_SET); read(fd, buf, l); buf[l] = '\0'; close(fd); unlink(template); term_strip(final_buf, buf, l); final_buf[l] = '\0'; astman_append(s, final_buf); astman_append(s, "--END COMMAND--\r\n\r\n"); return 0; } /* helper function for originate */ struct fast_originate_helper { char tech[AST_MAX_EXTENSION]; char data[AST_MAX_EXTENSION]; int timeout; char app[AST_MAX_APP]; char appdata[AST_MAX_EXTENSION]; char cid_name[AST_MAX_EXTENSION]; char cid_num[AST_MAX_EXTENSION]; char context[AST_MAX_CONTEXT]; char exten[AST_MAX_EXTENSION]; char idtext[AST_MAX_EXTENSION]; char account[AST_MAX_ACCOUNT_CODE]; int priority; struct ast_variable *vars; }; static void *fast_originate(void *data) { struct fast_originate_helper *in = data; int res; int reason = 0; struct ast_channel *chan = NULL; char requested_channel[AST_CHANNEL_NAME]; if (!ast_strlen_zero(in->app)) { res = ast_pbx_outgoing_app(in->tech, AST_FORMAT_SLINEAR, in->data, in->timeout, in->app, in->appdata, &reason, 1, S_OR(in->cid_num, NULL), S_OR(in->cid_name, NULL), in->vars, in->account, &chan); } else { res = ast_pbx_outgoing_exten(in->tech, AST_FORMAT_SLINEAR, in->data, in->timeout, in->context, in->exten, in->priority, &reason, 1, S_OR(in->cid_num, NULL), S_OR(in->cid_name, NULL), in->vars, in->account, &chan); } if (!chan) snprintf(requested_channel, AST_CHANNEL_NAME, "%s/%s", in->tech, in->data); /* Tell the manager what happened with the channel */ manager_event(EVENT_FLAG_CALL, "OriginateResponse", "%s" "Response: %s\r\n" "Channel: %s\r\n" "Context: %s\r\n" "Exten: %s\r\n" "Reason: %d\r\n" "Uniqueid: %s\r\n" "CallerIDNum: %s\r\n" "CallerIDName: %s\r\n", in->idtext, res ? "Failure" : "Success", chan ? chan->name : requested_channel, in->context, in->exten, reason, chan ? chan->uniqueid : "", S_OR(in->cid_num, ""), S_OR(in->cid_name, "") ); /* Locked by ast_pbx_outgoing_exten or ast_pbx_outgoing_app */ if (chan) ast_channel_unlock(chan); free(in); return NULL; } static char mandescr_originate[] = "Description: Generates an outgoing call to a Extension/Context/Priority or\n" " Application/Data\n" "Variables: (Names marked with * are required)\n" " *Channel: Channel name to call\n" " Exten: Extension to use (requires 'Context' and 'Priority')\n" " Context: Context to use (requires 'Exten' and 'Priority')\n" " Priority: Priority to use (requires 'Exten' and 'Context')\n" " Application: Application to use\n" " Data: Data to use (requires 'Application')\n" " Timeout: How long to wait for call to be answered (in ms)\n" " CallerID: Caller ID to be set on the outgoing channel\n" " Variable: Channel variable to set, multiple Variable: headers are allowed\n" " Account: Account code\n" " Async: Set to 'true' for fast origination\n"; static int action_originate(struct mansession *s, const struct message *m) { const char *name = astman_get_header(m, "Channel"); const char *exten = astman_get_header(m, "Exten"); const char *context = astman_get_header(m, "Context"); const char *priority = astman_get_header(m, "Priority"); const char *timeout = astman_get_header(m, "Timeout"); const char *callerid = astman_get_header(m, "CallerID"); const char *account = astman_get_header(m, "Account"); const char *app = astman_get_header(m, "Application"); const char *appdata = astman_get_header(m, "Data"); const char *async = astman_get_header(m, "Async"); const char *id = astman_get_header(m, "ActionID"); struct ast_variable *vars = astman_get_variables(m); char *tech, *data; char *l = NULL, *n = NULL; int pi = 0; int res; int to = 30000; int reason = 0; char tmp[256]; char tmp2[256]; pthread_t th; pthread_attr_t attr; if (!name) { astman_send_error(s, m, "Channel not specified"); return 0; } if (!ast_strlen_zero(priority) && (sscanf(priority, "%d", &pi) != 1)) { if ((pi = ast_findlabel_extension(NULL, context, exten, priority, NULL)) < 1) { astman_send_error(s, m, "Invalid priority\n"); return 0; } } if (!ast_strlen_zero(timeout) && (sscanf(timeout, "%d", &to) != 1)) { astman_send_error(s, m, "Invalid timeout\n"); return 0; } ast_copy_string(tmp, name, sizeof(tmp)); tech = tmp; data = strchr(tmp, '/'); if (!data) { astman_send_error(s, m, "Invalid channel\n"); return 0; } *data++ = '\0'; ast_copy_string(tmp2, callerid, sizeof(tmp2)); ast_callerid_parse(tmp2, &n, &l); if (n) { if (ast_strlen_zero(n)) n = NULL; } if (l) { ast_shrink_phone_number(l); if (ast_strlen_zero(l)) l = NULL; } if (ast_true(async)) { struct fast_originate_helper *fast = ast_calloc(1, sizeof(*fast)); if (!fast) { res = -1; } else { if (!ast_strlen_zero(id)) snprintf(fast->idtext, sizeof(fast->idtext), "ActionID: %s\r\n", id); ast_copy_string(fast->tech, tech, sizeof(fast->tech)); ast_copy_string(fast->data, data, sizeof(fast->data)); ast_copy_string(fast->app, app, sizeof(fast->app)); ast_copy_string(fast->appdata, appdata, sizeof(fast->appdata)); if (l) ast_copy_string(fast->cid_num, l, sizeof(fast->cid_num)); if (n) ast_copy_string(fast->cid_name, n, sizeof(fast->cid_name)); fast->vars = vars; ast_copy_string(fast->context, context, sizeof(fast->context)); ast_copy_string(fast->exten, exten, sizeof(fast->exten)); ast_copy_string(fast->account, account, sizeof(fast->account)); fast->timeout = to; fast->priority = pi; pthread_attr_init(&attr); pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); if (ast_pthread_create(&th, &attr, fast_originate, fast)) { res = -1; } else { res = 0; } pthread_attr_destroy(&attr); } } else if (!ast_strlen_zero(app)) { res = ast_pbx_outgoing_app(tech, AST_FORMAT_SLINEAR, data, to, app, appdata, &reason, 1, l, n, vars, account, NULL); } else { if (exten && context && pi) res = ast_pbx_outgoing_exten(tech, AST_FORMAT_SLINEAR, data, to, context, exten, pi, &reason, 1, l, n, vars, account, NULL); else { astman_send_error(s, m, "Originate with 'Exten' requires 'Context' and 'Priority'"); return 0; } } if (!res) astman_send_ack(s, m, "Originate successfully queued"); else astman_send_error(s, m, "Originate failed"); return 0; } /*! \brief Help text for manager command mailboxstatus */ static char mandescr_mailboxstatus[] = "Description: Checks a voicemail account for status.\n" "Variables: (Names marked with * are required)\n" " *Mailbox: Full mailbox ID @\n" " ActionID: Optional ActionID for message matching.\n" "Returns number of messages.\n" " Message: Mailbox Status\n" " Mailbox: \n" " Waiting: \n" "\n"; static int action_mailboxstatus(struct mansession *s, const struct message *m) { const char *mailbox = astman_get_header(m, "Mailbox"); int ret; if (ast_strlen_zero(mailbox)) { astman_send_error(s, m, "Mailbox not specified"); return 0; } ret = ast_app_has_voicemail(mailbox, NULL); astman_start_ack(s, m); astman_append(s, "Message: Mailbox Status\r\n" "Mailbox: %s\r\n" "Waiting: %d\r\n\r\n", mailbox, ret); return 0; } static char mandescr_mailboxcount[] = "Description: Checks a voicemail account for new messages.\n" "Variables: (Names marked with * are required)\n" " *Mailbox: Full mailbox ID @\n" " ActionID: Optional ActionID for message matching.\n" "Returns number of new and old messages.\n" " Message: Mailbox Message Count\n" " Mailbox: \n" " NewMessages: \n" " OldMessages: \n" "\n"; static int action_mailboxcount(struct mansession *s, const struct message *m) { const char *mailbox = astman_get_header(m, "Mailbox"); int newmsgs = 0, oldmsgs = 0; if (ast_strlen_zero(mailbox)) { astman_send_error(s, m, "Mailbox not specified"); return 0; } ast_app_inboxcount(mailbox, &newmsgs, &oldmsgs); astman_start_ack(s, m); astman_append(s, "Message: Mailbox Message Count\r\n" "Mailbox: %s\r\n" "NewMessages: %d\r\n" "OldMessages: %d\r\n" "\r\n", mailbox, newmsgs, oldmsgs); return 0; } static char mandescr_extensionstate[] = "Description: Report the extension state for given extension.\n" " If the extension has a hint, will use devicestate to check\n" " the status of the device connected to the extension.\n" "Variables: (Names marked with * are required)\n" " *Exten: Extension to check state on\n" " *Context: Context for extension\n" " ActionId: Optional ID for this transaction\n" "Will return an \"Extension Status\" message.\n" "The response will include the hint for the extension and the status.\n"; static int action_extensionstate(struct mansession *s, const struct message *m) { const char *exten = astman_get_header(m, "Exten"); const char *context = astman_get_header(m, "Context"); char hint[256] = ""; int status; if (ast_strlen_zero(exten)) { astman_send_error(s, m, "Extension not specified"); return 0; } if (ast_strlen_zero(context)) context = "default"; status = ast_extension_state(NULL, context, exten); ast_get_hint(hint, sizeof(hint) - 1, NULL, 0, NULL, context, exten); astman_start_ack(s, m); astman_append(s, "Message: Extension Status\r\n" "Exten: %s\r\n" "Context: %s\r\n" "Hint: %s\r\n" "Status: %d\r\n\r\n", exten, context, hint, status); return 0; } static char mandescr_timeout[] = "Description: Hangup a channel after a certain time.\n" "Variables: (Names marked with * are required)\n" " *Channel: Channel name to hangup\n" " *Timeout: Maximum duration of the call (sec)\n" "Acknowledges set time with 'Timeout Set' message\n"; static int action_timeout(struct mansession *s, const struct message *m) { struct ast_channel *c; const char *name = astman_get_header(m, "Channel"); int timeout = atoi(astman_get_header(m, "Timeout")); if (ast_strlen_zero(name)) { astman_send_error(s, m, "No channel specified"); return 0; } if (!timeout) { astman_send_error(s, m, "No timeout specified"); return 0; } c = ast_get_channel_by_name_locked(name); if (!c) { astman_send_error(s, m, "No such channel"); return 0; } ast_channel_setwhentohangup(c, timeout); ast_channel_unlock(c); astman_send_ack(s, m, "Timeout Set"); return 0; } /*! * Send any applicable events to the client listening on this socket. * Wait only for a finite time on each event, and drop all events whether * they are successfully sent or not. */ static int process_events(struct mansession *s) { int ret = 0; ast_mutex_lock(&s->__lock); if (s->f != NULL) { struct eventqent *eqe; while ( (eqe = NEW_EVENT(s)) ) { ref_event(eqe); if (!ret && s->authenticated && (s->readperm & eqe->category) == eqe->category && (s->send_events & eqe->category) == eqe->category) { if (send_string(s, eqe->eventdata) < 0) ret = -1; /* don't send more */ } s->last_ev = unref_event(s->last_ev); } } ast_mutex_unlock(&s->__lock); return ret; } static char mandescr_userevent[] = "Description: Send an event to manager sessions.\n" "Variables: (Names marked with * are required)\n" " *UserEvent: EventStringToSend\n" " Header1: Content1\n" " HeaderN: ContentN\n"; static int action_userevent(struct mansession *s, const struct message *m) { const char *event = astman_get_header(m, "UserEvent"); char body[2048] = ""; int x, bodylen = 0; for (x = 0; x < m->hdrcount; x++) { if (strncasecmp("UserEvent:", m->headers[x], strlen("UserEvent:"))) { ast_copy_string(body + bodylen, m->headers[x], sizeof(body) - bodylen - 3); bodylen += strlen(m->headers[x]); ast_copy_string(body + bodylen, "\r\n", 3); bodylen += 2; } } manager_event(EVENT_FLAG_USER, "UserEvent", "UserEvent: %s\r\n%s", event, body); return 0; } static char mandescr_coresettings[] = "Description: Query for Core PBX settings.\n" "Variables: (Names marked with * are optional)\n" " *ActionID: ActionID of this transaction\n"; /*! \brief Show PBX core settings information */ static int action_coresettings(struct mansession *s, const struct message *m) { const char *actionid = astman_get_header(m, "ActionID"); char idText[150]; if (!ast_strlen_zero(actionid)) snprintf(idText, sizeof(idText), "ActionID: %s\r\n", actionid); astman_append(s, "Response: Success\r\n" "%s" "AMIversion: %s\r\n" "AsteriskVersion: %s\r\n" "SystemName: %s\r\n" "CoreMaxCalls: %d\r\n" "CoreMaxLoadAvg: %f\r\n" "CoreRunUser: %s\r\n" "CoreRunGroup: %s\r\n" "CoreMaxFilehandles: %d\r\n" "CoreRealTimeEnabled: %s\r\n" "CoreCDRenabled: %s\r\n" "CoreHTTPenabled: %s\r\n" , AMI_VERSION, idText, ASTERISK_VERSION, ast_config_AST_SYSTEM_NAME, option_maxcalls, option_maxload, ast_config_AST_RUN_USER, ast_config_AST_RUN_GROUP, option_maxfiles, ast_realtime_enabled() ? "Yes" : "No", check_cdr_enabled() ? "Yes" : "No", check_webmanager_enabled() ? "Yes" : "No" ); return 0; } static char mandescr_corestatus[] = "Description: Query for Core PBX status.\n" "Variables: (Names marked with * are optional)\n" " *ActionID: ActionID of this transaction\n"; /*! \brief Show PBX core status information */ static int action_corestatus(struct mansession *s, const struct message *m) { const char *actionid = astman_get_header(m, "ActionID"); char idText[150]; char startuptime[150]; char reloadtime[150]; struct tm tm; if (!ast_strlen_zero(actionid)) snprintf(idText, sizeof(idText), "ActionID: %s\r\n", actionid); localtime_r(&ast_startuptime, &tm); strftime(startuptime, sizeof(startuptime), "%H:%M:%S", &tm); localtime_r(&ast_lastreloadtime, &tm); strftime(reloadtime, sizeof(reloadtime), "%H:%M:%S", &tm); astman_append(s, "Response: Success\r\n" "%s" "CoreStartupTime: %s\r\n" "CoreReloadTime: %s\r\n" "CoreCurrentCalls: %d\r\n" "", idText, startuptime, reloadtime, ast_active_channels() ); return 0; } /* * Done with the action handlers here, we start with the code in charge * of accepting connections and serving them. * accept_thread() forks a new thread for each connection, session_do(), * which in turn calls get_input() repeatedly until a full message has * been accumulated, and then invokes process_message() to pass it to * the appropriate handler. */ /* * Process an AMI message, performing desired action. * Return 0 on success, -1 on error that require the session to be destroyed. */ static int process_message(struct mansession *s, const struct message *m) { char action[80] = ""; int ret = 0; struct manager_action *tmp; const char *user = astman_get_header(m, "Username"); ast_copy_string(action, astman_get_header(m, "Action"), sizeof(action)); if (option_debug) ast_log(LOG_DEBUG, "Manager received command '%s'\n", action); if (ast_strlen_zero(action)) { astman_send_error(s, m, "Missing action in request"); return 0; } if (!s->authenticated && strcasecmp(action, "Login") && strcasecmp(action, "Logoff") && strcasecmp(action, "Challenge")) { ast_mutex_lock(&s->__lock); astman_send_error(s, m, "Permission denied"); ast_mutex_unlock(&s->__lock); return 0; } if (!allowmultiplelogin && !s->authenticated && user && (!strcasecmp(action, "Login") || !strcasecmp(action, "Challenge"))) { if (check_manager_session_inuse(user)) { sleep(1); astman_send_error(s, m, "Login Already In Use"); return -1; } } ast_rwlock_rdlock(&actionlock); for (tmp = first_action ; tmp; tmp = tmp->next) { if (strcasecmp(action, tmp->action)) continue; if ((s->writeperm & tmp->authority) == tmp->authority) ret = tmp->func(s, m); else astman_send_error(s, m, "Permission denied"); break; } ast_rwlock_unlock(&actionlock); if (!tmp) { ast_mutex_lock(&s->__lock); astman_send_error(s, m, "Invalid/unknown command. Use Action: ListCommands to show available commands."); ast_mutex_unlock(&s->__lock); } if (ret) return ret; /* Once done with our message, deliver any pending events */ return process_events(s); } /*! * Read one full line (including crlf) from the manager socket. * \note \verbatim * \r\n is the only valid terminator for the line. * (Note that, later, '\0' will be considered as the end-of-line marker, * so everything between the '\0' and the '\r\n' will not be used). * Also note that we assume output to have at least "maxlen" space. * \endverbatim */ static int get_input(struct mansession *s, char *output) { int res, x; int maxlen = sizeof(s->inbuf) - 1; char *src = s->inbuf; /* * Look for \r\n within the buffer. If found, copy to the output * buffer and return, trimming the \r\n (not used afterwards). */ for (x = 0; x < s->inlen; x++) { int cr; /* set if we have \r */ if (src[x] == '\r' && x+1 < s->inlen && src[x+1] == '\n') cr = 2; /* Found. Update length to include \r\n */ else if (src[x] == '\n') cr = 1; /* also accept \n only */ else continue; memmove(output, src, x); /*... but trim \r\n */ output[x] = '\0'; /* terminate the string */ x += cr; /* number of bytes used */ s->inlen -= x; /* remaining size */ memmove(src, src + x, s->inlen); /* remove used bytes */ return 1; } if (s->inlen >= maxlen) { /* no crlf found, and buffer full - sorry, too long for us */ ast_log(LOG_WARNING, "Dumping long line with no return from %s: %s\n", ast_inet_ntoa(s->sin.sin_addr), src); s->inlen = 0; } res = 0; while (res == 0) { /* XXX do we really need this locking ? */ ast_mutex_lock(&s->__lock); s->waiting_thread = pthread_self(); ast_mutex_unlock(&s->__lock); res = ast_wait_for_input(s->fd, -1); /* return 0 on timeout ? */ ast_mutex_lock(&s->__lock); s->waiting_thread = AST_PTHREADT_NULL; ast_mutex_unlock(&s->__lock); } if (res < 0) { /* If we get a signal from some other thread (typically because * there are new events queued), return 0 to notify the caller. */ if (errno == EINTR) return 0; ast_log(LOG_WARNING, "poll() returned error: %s\n", strerror(errno)); return -1; } ast_mutex_lock(&s->__lock); res = fread(src + s->inlen, 1, maxlen - s->inlen, s->f); if (res < 1) res = -1; /* error return */ else { s->inlen += res; src[s->inlen] = '\0'; res = 0; } ast_mutex_unlock(&s->__lock); return res; } static int do_message(struct mansession *s) { struct message m = { 0 }; char header_buf[sizeof(s->inbuf)] = { '\0' }; int res; for (;;) { /* Check if any events are pending and do them if needed */ if (process_events(s)) return -1; res = get_input(s, header_buf); if (res == 0) { continue; } else if (res > 0) { if (ast_strlen_zero(header_buf)) return process_message(s, &m) ? -1 : 0; else if (m.hdrcount < (AST_MAX_MANHEADERS - 1)) m.headers[m.hdrcount++] = ast_strdupa(header_buf); } else { return res; } } } /*! \brief The body of the individual manager session. * Call get_input() to read one line at a time * (or be woken up on new events), collect the lines in a * message until found an empty line, and execute the request. * In any case, deliver events asynchronously through process_events() * (called from here if no line is available, or at the end of * process_message(). ) */ static void *session_do(void *data) { struct server_instance *ser = data; struct mansession *s = ast_calloc(1, sizeof(*s)); int flags; int res; if (s == NULL) goto done; s->writetimeout = 100; s->waiting_thread = AST_PTHREADT_NULL; flags = fcntl(ser->fd, F_GETFL); if (!block_sockets) /* make sure socket is non-blocking */ flags |= O_NONBLOCK; else flags &= ~O_NONBLOCK; fcntl(ser->fd, F_SETFL, flags); ast_mutex_init(&s->__lock); s->send_events = -1; /* these fields duplicate those in the 'ser' structure */ s->fd = ser->fd; s->f = ser->f; s->sin = ser->requestor; ast_atomic_fetchadd_int(&num_sessions, 1); AST_LIST_LOCK(&sessions); AST_LIST_INSERT_HEAD(&sessions, s, list); AST_LIST_UNLOCK(&sessions); /* Hook to the tail of the event queue */ s->last_ev = grab_last(); s->f = ser->f; astman_append(s, "Asterisk Call Manager/%s\r\n", AMI_VERSION); /* welcome prompt */ for (;;) { if ((res = do_message(s)) < 0) break; } /* session is over, explain why and terminate */ if (s->authenticated) { if (option_verbose > 1) { if (displayconnects) ast_verbose(VERBOSE_PREFIX_2 "Manager '%s' logged off from %s\n", s->username, ast_inet_ntoa(s->sin.sin_addr)); } ast_log(LOG_EVENT, "Manager '%s' logged off from %s\n", s->username, ast_inet_ntoa(s->sin.sin_addr)); } else { if (option_verbose > 1) { if (displayconnects) ast_verbose(VERBOSE_PREFIX_2 "Connect attempt from '%s' unable to authenticate\n", ast_inet_ntoa(s->sin.sin_addr)); } ast_log(LOG_EVENT, "Failed attempt from %s\n", ast_inet_ntoa(s->sin.sin_addr)); } destroy_session(s); done: free(ser); return NULL; } /*! \brief remove at most n_max stale session from the list. */ static void purge_sessions(int n_max) { struct mansession *s; time_t now = time(NULL); AST_LIST_LOCK(&sessions); AST_LIST_TRAVERSE_SAFE_BEGIN(&sessions, s, list) { if (s->sessiontimeout && (now > s->sessiontimeout) && !s->inuse) { AST_LIST_REMOVE_CURRENT(&sessions, list); ast_atomic_fetchadd_int(&num_sessions, -1); if (s->authenticated && (option_verbose > 1) && displayconnects) { ast_verbose(VERBOSE_PREFIX_2 "HTTP Manager '%s' timed out from %s\n", s->username, ast_inet_ntoa(s->sin.sin_addr)); } free_session(s); /* XXX outside ? */ if (--n_max <= 0) break; } } AST_LIST_TRAVERSE_SAFE_END AST_LIST_UNLOCK(&sessions); } /* * events are appended to a queue from where they * can be dispatched to clients. */ static int append_event(const char *str, int category) { struct eventqent *tmp = ast_malloc(sizeof(*tmp) + strlen(str)); static int seq; /* sequence number */ if (!tmp) return -1; /* need to init all fields, because ast_malloc() does not */ tmp->usecount = 0; tmp->category = category; tmp->seq = ast_atomic_fetchadd_int(&seq, 1); AST_LIST_NEXT(tmp, eq_next) = NULL; strcpy(tmp->eventdata, str); AST_LIST_LOCK(&all_events); AST_LIST_INSERT_TAIL(&all_events, tmp, eq_next); AST_LIST_UNLOCK(&all_events); return 0; } /* XXX see if can be moved inside the function */ AST_THREADSTORAGE(manager_event_buf); #define MANAGER_EVENT_BUF_INITSIZE 256 /*! \brief manager_event: Send AMI event to client */ int __manager_event(int category, const char *event, const char *file, int line, const char *func, const char *fmt, ...) { struct mansession *s; struct manager_custom_hook *hook; struct ast_str *auth = ast_str_alloca(80); const char *cat_str; va_list ap; struct timeval now; struct ast_str *buf; /* Abort if there aren't any manager sessions */ if (!num_sessions) return 0; if (!(buf = ast_str_thread_get(&manager_event_buf, MANAGER_EVENT_BUF_INITSIZE))) return -1; cat_str = authority_to_str(category, &auth); ast_str_set(&buf, 0, "Event: %s\r\nPrivilege: %s\r\n", event, cat_str); if (timestampevents) { now = ast_tvnow(); ast_str_append(&buf, 0, "Timestamp: %ld.%06lu\r\n", now.tv_sec, (unsigned long) now.tv_usec); } if (manager_debug) { static int seq; ast_str_append(&buf, 0, "SequenceNumber: %d\r\n", ast_atomic_fetchadd_int(&seq, 1)); ast_str_append(&buf, 0, "File: %s\r\nLine: %d\r\nFunc: %s\r\n", file, line, func); } va_start(ap, fmt); ast_str_append_va(&buf, 0, fmt, ap); va_end(ap); ast_str_append(&buf, 0, "\r\n"); append_event(buf->str, category); /* Wake up any sleeping sessions */ AST_LIST_LOCK(&sessions); AST_LIST_TRAVERSE(&sessions, s, list) { ast_mutex_lock(&s->__lock); if (s->waiting_thread != AST_PTHREADT_NULL) pthread_kill(s->waiting_thread, SIGURG); ast_mutex_unlock(&s->__lock); } AST_LIST_UNLOCK(&sessions); AST_RWLIST_RDLOCK(&manager_hooks); if (!AST_RWLIST_EMPTY(&manager_hooks)) { AST_RWLIST_TRAVERSE(&manager_hooks, hook, list) { hook->helper(category, event, buf->str); } } AST_RWLIST_UNLOCK(&manager_hooks); return 0; } /* * support functions to register/unregister AMI action handlers, */ int ast_manager_unregister(char *action) { struct manager_action *cur, *prev; ast_rwlock_wrlock(&actionlock); for (cur = first_action, prev = NULL; cur; prev = cur, cur = cur->next) { if (!strcasecmp(action, cur->action)) { if (prev) prev->next = cur->next; else first_action = cur->next; free(cur); if (option_verbose > 1) ast_verbose(VERBOSE_PREFIX_2 "Manager unregistered action %s\n", action); break; } } ast_rwlock_unlock(&actionlock); return 0; } static int manager_state_cb(char *context, char *exten, int state, void *data) { /* Notify managers of change */ char hint[BUFSIZ]; ast_get_hint(hint, sizeof(hint), NULL, 0, NULL, context, exten); manager_event(EVENT_FLAG_CALL, "ExtensionStatus", "Exten: %s\r\nContext: %s\r\nHint: %s\r\nStatus: %d\r\n", exten, context, hint, state); return 0; } static int ast_manager_register_struct(struct manager_action *act) { struct manager_action *cur, *prev = NULL; int ret; ast_rwlock_wrlock(&actionlock); for (cur = first_action; cur; prev = cur, cur = cur->next) { ret = strcasecmp(cur->action, act->action); if (ret == 0) { ast_log(LOG_WARNING, "Manager: Action '%s' already registered\n", act->action); ast_rwlock_unlock(&actionlock); return -1; } if (ret > 0) /* Insert these alphabetically */ break; } if (prev) prev->next = act; else first_action = act; act->next = cur; if (option_verbose > 1) ast_verbose(VERBOSE_PREFIX_2 "Manager registered action %s\n", act->action); ast_rwlock_unlock(&actionlock); return 0; } /*! \brief register a new command with manager, including online help. This is the preferred way to register a manager command */ int ast_manager_register2(const char *action, int auth, int (*func)(struct mansession *s, const struct message *m), const char *synopsis, const char *description) { struct manager_action *cur; cur = ast_malloc(sizeof(*cur)); if (!cur) return -1; cur->action = action; cur->authority = auth; cur->func = func; cur->synopsis = synopsis; cur->description = description; cur->next = NULL; ast_manager_register_struct(cur); return 0; } /*! @} END Doxygen group */ /* * The following are support functions for AMI-over-http. * The common entry point is generic_http_callback(), * which extracts HTTP header and URI fields and reformats * them into AMI messages, locates a proper session * (using the mansession_id Cookie or GET variable), * and calls process_message() as for regular AMI clients. * When done, the output (which goes to a temporary file) * is read back into a buffer and reformatted as desired, * then fed back to the client over the original socket. */ enum output_format { FORMAT_RAW, FORMAT_HTML, FORMAT_XML, }; static char *contenttype[] = { [FORMAT_RAW] = "plain", [FORMAT_HTML] = "html", [FORMAT_XML] = "xml", }; /*! * locate an http session in the list. The search key (ident) is * the value of the mansession_id cookie (0 is not valid and means * a session on the AMI socket). */ static struct mansession *find_session(unsigned long ident) { struct mansession *s; if (ident == 0) return NULL; AST_LIST_LOCK(&sessions); AST_LIST_TRAVERSE(&sessions, s, list) { ast_mutex_lock(&s->__lock); if (s->managerid == ident && !s->needdestroy) { ast_atomic_fetchadd_int(&s->inuse, 1); break; } ast_mutex_unlock(&s->__lock); } AST_LIST_UNLOCK(&sessions); return s; } int astman_verify_session_readpermissions(unsigned long ident, int perm) { int result = 0; struct mansession *s; AST_LIST_LOCK(&sessions); AST_LIST_TRAVERSE(&sessions, s, list) { ast_mutex_lock(&s->__lock); if ((s->managerid == ident) && (s->readperm & perm)) { result = 1; ast_mutex_unlock(&s->__lock); break; } ast_mutex_unlock(&s->__lock); } AST_LIST_UNLOCK(&sessions); return result; } int astman_verify_session_writepermissions(unsigned long ident, int perm) { int result = 0; struct mansession *s; AST_LIST_LOCK(&sessions); AST_LIST_TRAVERSE(&sessions, s, list) { ast_mutex_lock(&s->__lock); if ((s->managerid == ident) && (s->writeperm & perm)) { result = 1; ast_mutex_unlock(&s->__lock); break; } ast_mutex_unlock(&s->__lock); } AST_LIST_UNLOCK(&sessions); return result; } /* * convert to xml with various conversion: * mode & 1 -> lowercase; * mode & 2 -> replace non-alphanumeric chars with underscore */ static void xml_copy_escape(struct ast_str **out, const char *src, int mode) { /* store in a local buffer to avoid calling ast_str_append too often */ char buf[256]; char *dst = buf; int space = sizeof(buf); /* repeat until done and nothing to flush */ for ( ; *src || dst != buf ; src++) { if (*src == '\0' || space < 10) { /* flush */ *dst++ = '\0'; ast_str_append(out, 0, "%s", buf); dst = buf; space = sizeof(buf); if (*src == '\0') break; } if ( (mode & 2) && !isalnum(*src)) { *dst++ = '_'; space--; continue; } switch (*src) { case '<': strcpy(dst, "<"); dst += 4; space -= 4; break; case '>': strcpy(dst, ">"); dst += 4; space -= 4; break; case '\"': strcpy(dst, """); dst += 6; space -= 6; break; case '\'': strcpy(dst, "'"); dst += 6; space -= 6; break; case '&': strcpy(dst, "&"); dst += 5; space -= 5; break; default: *dst++ = mode ? tolower(*src) : *src; space--; } } } /*! \brief Convert the input into XML or HTML. * The input is supposed to be a sequence of lines of the form * Name: value * optionally followed by a blob of unformatted text. * A blank line is a section separator. Basically, this is a * mixture of the format of Manager Interface and CLI commands. * The unformatted text is considered as a single value of a field * named 'Opaque-data'. * * At the moment the output format is the following (but it may * change depending on future requirements so don't count too * much on it when writing applications): * * General: the unformatted text is used as a value of * XML output: to be completed * Each section is within * where xxx is taken from ajaxdest variable or defaults to unknown * Each row is reported as an attribute Name="value" of an XML * entity named from the variable ajaxobjtype, default to "generic" * * HTML output: * each Name-value pair is output as a single row of a two-column table. * Sections (blank lines in the input) are separated by a
* */ static void xml_translate(struct ast_str **out, char *in, struct ast_variable *vars, enum output_format format) { struct ast_variable *v; char *dest = NULL; char *var, *val; char *objtype = NULL; int in_data = 0; /* parsing data */ int inobj = 0; int xml = (format == FORMAT_XML); for (v = vars; v; v = v->next) { if (!dest && !strcasecmp(v->name, "ajaxdest")) dest = v->value; else if (!objtype && !strcasecmp(v->name, "ajaxobjtype")) objtype = v->value; } if (!dest) dest = "unknown"; if (!objtype) objtype = "generic"; #if 0 /* determine how large is the response. * This is a heuristic - counting colons (for headers), * newlines (for extra arguments), and escaped chars. * XXX needs to be checked carefully for overflows. * Even better, use some code that allows extensible strings. */ for (x = 0; in[x]; x++) { if (in[x] == ':') colons++; else if (in[x] == '\n') breaks++; else if (strchr("&\"<>", in[x])) escaped++; } len = (size_t) (1 + strlen(in) + colons * 5 + breaks * (40 + strlen(dest) + strlen(objtype)) + escaped * 10); /* foo="bar", "\n", inobj, in_data, val); if (ast_strlen_zero(val)) { if (in_data) { /* close data */ ast_str_append(out, 0, xml ? "'" : "\n"); in_data = 0; } ast_str_append(out, 0, xml ? " />\n" : "
\r\n"); inobj = 0; continue; } /* we expect Name: value lines */ if (in_data) { var = NULL; } else { var = strsep(&val, ":"); if (val) { /* found the field name */ val = ast_skip_blanks(val); ast_trim_blanks(var); } else { /* field name not found, move to opaque mode */ val = var; var = "Opaque-data"; } } if (!inobj) { if (xml) ast_str_append(out, 0, "<%s", dest, objtype); else ast_str_append(out, 0, "\n"); inobj = 1; } if (!in_data) { /* build appropriate line start */ ast_str_append(out, 0, xml ? " " : ""); xml_copy_escape(out, var, xml ? 1 | 2 : 0); ast_str_append(out, 0, xml ? "='" : ""); if (!strcmp(var, "Opaque-data")) in_data = 1; } xml_copy_escape(out, val, 0); /* data field */ if (!in_data) ast_str_append(out, 0, xml ? "'" : "\n"); else ast_str_append(out, 0, xml ? "\n" : "
\n"); } if (inobj) ast_str_append(out, 0, xml ? " />
\n" : "
\r\n"); } static struct ast_str *generic_http_callback(enum output_format format, struct sockaddr_in *requestor, const char *uri, struct ast_variable *params, int *status, char **title, int *contentlength) { struct mansession *s = NULL; unsigned long ident = 0; /* invalid, so find_session will fail if not set through the cookie */ int blastaway = 0; struct ast_variable *v; char template[] = "/tmp/ast-http-XXXXXX"; /* template for temporary file */ struct ast_str *out = NULL; struct message m = { 0 }; unsigned int x; size_t hdrlen; for (v = params; v; v = v->next) { if (!strcasecmp(v->name, "mansession_id")) { sscanf(v->value, "%lx", &ident); break; } } if (!(s = find_session(ident))) { /* Create new session. * While it is not in the list we don't need any locking */ if (!(s = ast_calloc(1, sizeof(*s)))) { *status = 500; goto generic_callback_out; } s->sin = *requestor; s->fd = -1; s->waiting_thread = AST_PTHREADT_NULL; s->send_events = 0; ast_mutex_init(&s->__lock); ast_mutex_lock(&s->__lock); s->inuse = 1; s->managerid = rand() | 1; /* make sure it is non-zero */ s->last_ev = grab_last(); AST_LIST_LOCK(&sessions); AST_LIST_INSERT_HEAD(&sessions, s, list); AST_LIST_UNLOCK(&sessions); ast_atomic_fetchadd_int(&num_sessions, 1); } ast_mutex_unlock(&s->__lock); if (!(out = ast_str_create(1024))) { *status = 500; goto generic_callback_out; } s->fd = mkstemp(template); /* create a temporary file for command output */ unlink(template); s->f = fdopen(s->fd, "w+"); for (x = 0, v = params; v && (x < AST_MAX_MANHEADERS); x++, v = v->next) { hdrlen = strlen(v->name) + strlen(v->value) + 3; m.headers[m.hdrcount] = alloca(hdrlen); snprintf((char *) m.headers[m.hdrcount], hdrlen, "%s: %s", v->name, v->value); m.hdrcount = x + 1; } if (process_message(s, &m)) { if (s->authenticated) { if (option_verbose > 1) { if (displayconnects) ast_verbose(VERBOSE_PREFIX_2 "HTTP Manager '%s' logged off from %s\n", s->username, ast_inet_ntoa(s->sin.sin_addr)); } ast_log(LOG_EVENT, "HTTP Manager '%s' logged off from %s\n", s->username, ast_inet_ntoa(s->sin.sin_addr)); } else { if (option_verbose > 1) { if (displayconnects) ast_verbose(VERBOSE_PREFIX_2 "HTTP Connect attempt from '%s' unable to authenticate\n", ast_inet_ntoa(s->sin.sin_addr)); } ast_log(LOG_EVENT, "HTTP Failed attempt from %s\n", ast_inet_ntoa(s->sin.sin_addr)); } s->needdestroy = 1; } ast_str_append(&out, 0, "Content-type: text/%s\r\n" "Cache-Control: no-cache;\r\n" "Set-Cookie: mansession_id=\"%08lx\"; Version=\"1\"; Max-Age=%d\r\n" "\r\n", contenttype[format], s->managerid, httptimeout); if (format == FORMAT_XML) { ast_str_append(&out, 0, "\n"); } else if (format == FORMAT_HTML) { #define ROW_FMT "%s\r\n" #define TEST_STRING \ "
action: cmd
\ user pass
\
" ast_str_append(&out, 0, "Asterisk™ Manager Interface"); ast_str_append(&out, 0, "\r\n"); ast_str_append(&out, 0, ROW_FMT, "

Manager Tester

"); ast_str_append(&out, 0, ROW_FMT, TEST_STRING); } if (s->f != NULL) { /* have temporary output */ char *buf; size_t l = ftell(s->f); if (l) { if ((buf = mmap(NULL, l, PROT_READ | PROT_WRITE, MAP_SHARED, s->fd, 0))) { if (format == FORMAT_XML || format == FORMAT_HTML) xml_translate(&out, buf, params, format); else ast_str_append(&out, 0, buf); munmap(buf, l); } } else if (format == FORMAT_XML || format == FORMAT_HTML) { xml_translate(&out, "", params, format); } fclose(s->f); s->f = NULL; s->fd = -1; } if (format == FORMAT_XML) { ast_str_append(&out, 0, "\n"); } else if (format == FORMAT_HTML) ast_str_append(&out, 0, "
\r\n"); ast_mutex_lock(&s->__lock); /* Reset HTTP timeout. If we're not authenticated, keep it extremely short */ s->sessiontimeout = time(NULL) + ((s->authenticated || httptimeout < 5) ? httptimeout : 5); if (s->needdestroy) { if (s->inuse == 1) { if (option_debug) ast_log(LOG_DEBUG, "Need destroy, doing it now!\n"); blastaway = 1; } else { if (option_debug) ast_log(LOG_DEBUG, "Need destroy, but can't do it yet!\n"); if (s->waiting_thread != AST_PTHREADT_NULL) pthread_kill(s->waiting_thread, SIGURG); s->inuse--; } } else s->inuse--; ast_mutex_unlock(&s->__lock); if (blastaway) destroy_session(s); generic_callback_out: if (*status != 200) return ast_http_error(500, "Server Error", NULL, "Internal Server Error (out of memory)\n"); return out; } static struct ast_str *manager_http_callback(struct sockaddr_in *requestor, const char *uri, struct ast_variable *params, int *status, char **title, int *contentlength) { return generic_http_callback(FORMAT_HTML, requestor, uri, params, status, title, contentlength); } static struct ast_str *mxml_http_callback(struct sockaddr_in *requestor, const char *uri, struct ast_variable *params, int *status, char **title, int *contentlength) { return generic_http_callback(FORMAT_XML, requestor, uri, params, status, title, contentlength); } static struct ast_str *rawman_http_callback(struct sockaddr_in *requestor, const char *uri, struct ast_variable *params, int *status, char **title, int *contentlength) { return generic_http_callback(FORMAT_RAW, requestor, uri, params, status, title, contentlength); } struct ast_http_uri rawmanuri = { .description = "Raw HTTP Manager Event Interface", .uri = "rawman", .has_subtree = 0, .callback = rawman_http_callback, }; struct ast_http_uri manageruri = { .description = "HTML Manager Event Interface", .uri = "manager", .has_subtree = 0, .callback = manager_http_callback, }; struct ast_http_uri managerxmluri = { .description = "XML Manager Event Interface", .uri = "mxml", .has_subtree = 0, .callback = mxml_http_callback, }; static int registered = 0; static int webregged = 0; /*! \brief cleanup code called at each iteration of server_root, * guaranteed to happen every 5 seconds at most */ static void purge_old_stuff(void *data) { purge_sessions(1); purge_events(); } struct tls_config ami_tls_cfg; static struct server_args ami_desc = { .accept_fd = -1, .master = AST_PTHREADT_NULL, .tls_cfg = NULL, .poll_timeout = 5000, /* wake up every 5 seconds */ .periodic_fn = purge_old_stuff, .name = "AMI server", .accept_fn = server_root, /* thread doing the accept() */ .worker_fn = session_do, /* thread handling the session */ }; static struct server_args amis_desc = { .accept_fd = -1, .master = AST_PTHREADT_NULL, .tls_cfg = &ami_tls_cfg, .poll_timeout = -1, /* the other does the periodic cleanup */ .name = "AMI TLS server", .accept_fn = server_root, /* thread doing the accept() */ .worker_fn = session_do, /* thread handling the session */ }; int init_manager(void) { struct ast_config *cfg = NULL; const char *val; char *cat = NULL; int newhttptimeout = 60; int have_sslbindaddr = 0; struct hostent *hp; struct ast_hostent ahp; struct ast_manager_user *user = NULL; struct ast_variable *var; if (!registered) { /* Register default actions */ ast_manager_register2("Ping", 0, action_ping, "Keepalive command", mandescr_ping); ast_manager_register2("Events", 0, action_events, "Control Event Flow", mandescr_events); ast_manager_register2("Logoff", 0, action_logoff, "Logoff Manager", mandescr_logoff); ast_manager_register2("Login", 0, action_login, "Login Manager", NULL); ast_manager_register2("Challenge", 0, action_challenge, "Generate Challenge for MD5 Auth", NULL); ast_manager_register2("Hangup", EVENT_FLAG_CALL, action_hangup, "Hangup Channel", mandescr_hangup); ast_manager_register("Status", EVENT_FLAG_CALL, action_status, "Lists channel status" ); ast_manager_register2("Setvar", EVENT_FLAG_CALL, action_setvar, "Set Channel Variable", mandescr_setvar ); ast_manager_register2("Getvar", EVENT_FLAG_CALL, action_getvar, "Gets a Channel Variable", mandescr_getvar ); ast_manager_register2("GetConfig", EVENT_FLAG_CONFIG, action_getconfig, "Retrieve configuration", mandescr_getconfig); ast_manager_register2("GetConfigJSON", EVENT_FLAG_CONFIG, action_getconfigjson, "Retrieve configuration (JSON format)", mandescr_getconfigjson); ast_manager_register2("UpdateConfig", EVENT_FLAG_CONFIG, action_updateconfig, "Update basic configuration", mandescr_updateconfig); ast_manager_register2("Redirect", EVENT_FLAG_CALL, action_redirect, "Redirect (transfer) a call", mandescr_redirect ); ast_manager_register2("Originate", EVENT_FLAG_CALL, action_originate, "Originate Call", mandescr_originate); ast_manager_register2("Command", EVENT_FLAG_COMMAND, action_command, "Execute Asterisk CLI Command", mandescr_command ); ast_manager_register2("ExtensionState", EVENT_FLAG_CALL, action_extensionstate, "Check Extension Status", mandescr_extensionstate ); ast_manager_register2("AbsoluteTimeout", EVENT_FLAG_CALL, action_timeout, "Set Absolute Timeout", mandescr_timeout ); ast_manager_register2("MailboxStatus", EVENT_FLAG_CALL, action_mailboxstatus, "Check Mailbox", mandescr_mailboxstatus ); ast_manager_register2("MailboxCount", EVENT_FLAG_CALL, action_mailboxcount, "Check Mailbox Message Count", mandescr_mailboxcount ); ast_manager_register2("ListCommands", 0, action_listcommands, "List available manager commands", mandescr_listcommands); ast_manager_register2("SendText", EVENT_FLAG_CALL, action_sendtext, "Send text message to channel", mandescr_sendtext); ast_manager_register2("UserEvent", EVENT_FLAG_USER, action_userevent, "Send an arbitrary event", mandescr_userevent); ast_manager_register2("WaitEvent", 0, action_waitevent, "Wait for an event to occur", mandescr_waitevent); ast_manager_register2("CoreSettings", EVENT_FLAG_SYSTEM, action_coresettings, "Show PBX core settings (version etc)", mandescr_coresettings); ast_manager_register2("CoreStatus", EVENT_FLAG_SYSTEM, action_corestatus, "Show PBX core status variables", mandescr_corestatus); ast_cli_register_multiple(cli_manager, sizeof(cli_manager) / sizeof(struct ast_cli_entry)); ast_extension_state_add(NULL, NULL, manager_state_cb, NULL); registered = 1; /* Append placeholder event so master_eventq never runs dry */ append_event("Event: Placeholder\r\n\r\n", 0); } displayconnects = 1; cfg = ast_config_load("manager.conf"); if (!cfg) { ast_log(LOG_NOTICE, "Unable to open management configuration manager.conf. Call management disabled.\n"); return 0; } /* default values */ memset(&ami_desc.sin, 0, sizeof(struct sockaddr_in)); memset(&amis_desc.sin, 0, sizeof(amis_desc.sin)); amis_desc.sin.sin_port = htons(5039); ami_desc.sin.sin_port = htons(DEFAULT_MANAGER_PORT); ami_tls_cfg.enabled = 0; if (ami_tls_cfg.certfile) free(ami_tls_cfg.certfile); ami_tls_cfg.certfile = ast_strdup(AST_CERTFILE); if (ami_tls_cfg.cipher) free(ami_tls_cfg.cipher); ami_tls_cfg.cipher = ast_strdup(""); for (var = ast_variable_browse(cfg, "general"); var; var = var->next) { val = var->value; if (!strcasecmp(var->name, "ssenable")) ami_tls_cfg.enabled = ast_true(val); else if (!strcasecmp(var->name, "ssbindport")) amis_desc.sin.sin_port = htons(atoi(val)); else if (!strcasecmp(var->name, "ssbindaddr")) { if ((hp = ast_gethostbyname(val, &ahp))) { memcpy(&amis_desc.sin.sin_addr, hp->h_addr, sizeof(amis_desc.sin.sin_addr)); have_sslbindaddr = 1; } else { ast_log(LOG_WARNING, "Invalid bind address '%s'\n", val); } } else if (!strcasecmp(var->name, "sslcert")) { free(ami_tls_cfg.certfile); ami_tls_cfg.certfile = ast_strdup(val); } else if (!strcasecmp(var->name, "sslcipher")) { free(ami_tls_cfg.cipher); ami_tls_cfg.cipher = ast_strdup(val); } else if (!strcasecmp(var->name, "enabled")) { manager_enabled = ast_true(val); } else if (!strcasecmp(var->name, "block-sockets")) { block_sockets = ast_true(val); } else if (!strcasecmp(var->name, "webenabled")) { webmanager_enabled = ast_true(val); } else if (!strcasecmp(var->name, "port")) { ami_desc.sin.sin_port = htons(atoi(val)); } else if (!strcasecmp(var->name, "bindaddr")) { if (!inet_aton(val, &ami_desc.sin.sin_addr)) { ast_log(LOG_WARNING, "Invalid address '%s' specified, using 0.0.0.0\n", val); memset(&ami_desc.sin.sin_addr, 0, sizeof(ami_desc.sin.sin_addr)); } } else if (!strcasecmp(var->name, "allowmultiplelogin")) { allowmultiplelogin = ast_true(val); } else if (!strcasecmp(var->name, "displayconnects")) { displayconnects = ast_true(val); } else if (!strcasecmp(var->name, "timestampevents")) { timestampevents = ast_true(val); } else if (!strcasecmp(var->name, "debug")) { manager_debug = ast_true(val); } else if (!strcasecmp(var->name, "httptimeout")) { newhttptimeout = atoi(val); } else { ast_log(LOG_NOTICE, "Invalid keyword <%s> = <%s> in manager.conf [general]\n", var->name, val); } } if (manager_enabled) ami_desc.sin.sin_family = AF_INET; if (!have_sslbindaddr) amis_desc.sin.sin_addr = ami_desc.sin.sin_addr; if (ami_tls_cfg.enabled) amis_desc.sin.sin_family = AF_INET; AST_LIST_LOCK(&users); while ((cat = ast_category_browse(cfg, cat))) { if (!strcasecmp(cat, "general")) continue; /* Look for an existing entry, if none found - create one and add it to the list */ if (!(user = get_manager_by_name_locked(cat))) { if (!(user = ast_calloc(1, sizeof(*user)))) break; /* Copy name over */ ast_copy_string(user->username, cat, sizeof(user->username)); /* Insert into list */ AST_LIST_INSERT_TAIL(&users, user, list); } /* Make sure we keep this user and don't destroy it during cleanup */ user->keep = 1; var = ast_variable_browse(cfg, cat); while (var) { if (!strcasecmp(var->name, "secret")) { if (user->secret) free(user->secret); user->secret = ast_strdup(var->value); } else if (!strcasecmp(var->name, "deny") ) { if (user->deny) free(user->deny); user->deny = ast_strdup(var->value); } else if (!strcasecmp(var->name, "permit") ) { if (user->permit) free(user->permit); user->permit = ast_strdup(var->value); } else if (!strcasecmp(var->name, "read") ) { if (user->read) free(user->read); user->read = ast_strdup(var->value); } else if (!strcasecmp(var->name, "write") ) { if (user->write) free(user->write); user->write = ast_strdup(var->value); } else if (!strcasecmp(var->name, "displayconnects") ) user->displayconnects = ast_true(var->value); else { if (option_debug) ast_log(LOG_DEBUG, "%s is an unknown option.\n", var->name); } var = var->next; } } /* Perform cleanup - essentially prune out old users that no longer exist */ AST_LIST_TRAVERSE_SAFE_BEGIN(&users, user, list) { if (user->keep) { /* valid record. clear flag for the next round */ user->keep = 0; continue; } /* We do not need to keep this user so take them out of the list */ AST_LIST_REMOVE_CURRENT(&users, list); /* Free their memory now */ if (user->secret) free(user->secret); if (user->deny) free(user->deny); if (user->permit) free(user->permit); if (user->read) free(user->read); if (user->write) free(user->write); free(user); } AST_LIST_TRAVERSE_SAFE_END AST_LIST_UNLOCK(&users); ast_config_destroy(cfg); if (webmanager_enabled && manager_enabled) { if (!webregged) { ast_http_uri_link(&rawmanuri); ast_http_uri_link(&manageruri); ast_http_uri_link(&managerxmluri); webregged = 1; } } else { if (webregged) { ast_http_uri_unlink(&rawmanuri); ast_http_uri_unlink(&manageruri); ast_http_uri_unlink(&managerxmluri); webregged = 0; } } if (newhttptimeout > 0) httptimeout = newhttptimeout; server_start(&ami_desc); if (ssl_setup(amis_desc.tls_cfg)) server_start(&amis_desc); return 0; } int reload_manager(void) { manager_event(EVENT_FLAG_SYSTEM, "Reload", "Message: Reload Requested\r\n"); return init_manager(); }