/* * Asterisk -- A telephony toolkit for Linux. * * The Asterisk Management Interface - AMI * * Channel Management and more * * Copyright (C) 1999-2004, Digium, Inc. * * Mark Spencer * * This program is free software, distributed under the terms of * the GNU General Public License */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include struct fast_originate_helper { char tech[256]; char data[256]; int timeout; char app[256]; char appdata[256]; char callerid[256]; char variable[256]; char account[256]; char context[256]; char exten[256]; char idtext[256]; int priority; }; static int enabled = 0; static int portno = DEFAULT_MANAGER_PORT; static int asock = -1; static pthread_t t; AST_MUTEX_DEFINE_STATIC(sessionlock); static int block_sockets = 0; static struct permalias { int num; char *label; } perms[] = { { EVENT_FLAG_SYSTEM, "system" }, { EVENT_FLAG_CALL, "call" }, { EVENT_FLAG_LOG, "log" }, { EVENT_FLAG_VERBOSE, "verbose" }, { EVENT_FLAG_COMMAND, "command" }, { EVENT_FLAG_AGENT, "agent" }, { EVENT_FLAG_USER, "user" }, { -1, "all" }, }; static struct mansession *sessions = NULL; static struct manager_action *first_action = NULL; AST_MUTEX_DEFINE_STATIC(actionlock); int ast_carefulwrite(int fd, char *s, int len, int timeoutms) { /* Try to write string, but wait no more than ms milliseconds before timing out */ int res=0; struct pollfd fds[1]; while(len) { res = write(fd, s, len); if ((res < 0) && (errno != EAGAIN)) { return -1; } if (res < 0) res = 0; len -= res; s += res; fds[0].fd = fd; fds[0].events = POLLOUT; /* Wait until writable again */ res = poll(fds, 1, timeoutms); if (res < 1) return -1; } return res; } static char *authority_to_str(int authority, char *res, int reslen) { int running_total = 0, i; memset(res, 0, reslen); for (i=0; i running_total) ? reslen - running_total : 0); running_total++; } strncat(res, perms[i].label, (reslen > running_total) ? reslen - running_total : 0); running_total += strlen(perms[i].label); } } if (ast_strlen_zero(res)) { strncpy(res, "", reslen); } return res; } static char *complete_show_mancmd(char *line, char *word, int pos, int state) { struct manager_action *cur = first_action; int which = 0; ast_mutex_lock(&actionlock); while (cur) { /* Walk the list of actions */ if (!strncasecmp(word, cur->action, strlen(word))) { if (++which > state) { char *ret = strdup(cur->action); ast_mutex_unlock(&actionlock); return ret; } } cur = cur->next; } ast_mutex_unlock(&actionlock); return NULL; } static int handle_showmancmd(int fd, int argc, char *argv[]) { struct manager_action *cur = first_action; char authority[80]; int num; if (argc != 4) return RESULT_SHOWUSAGE; ast_mutex_lock(&actionlock); while (cur) { /* Walk the list of actions */ for (num = 3; num < argc; num++) { if (!strcasecmp(cur->action, argv[num])) { ast_cli(fd, "Action: %s\nSynopsis: %s\nPrivilege: %s\n%s\n", cur->action, cur->synopsis, authority_to_str(cur->authority, authority, sizeof(authority) -1), cur->description ? cur->description : ""); } } cur = cur->next; } ast_mutex_unlock(&actionlock); return RESULT_SUCCESS; } static int handle_showmancmds(int fd, int argc, char *argv[]) { struct manager_action *cur = first_action; char authority[80]; char *format = " %-15.15s %-10.10s %-45.45s\n"; ast_mutex_lock(&actionlock); ast_cli(fd, format, "Action", "Privilege", "Synopsis"); while (cur) { /* Walk the list of actions */ ast_cli(fd, format, cur->action, authority_to_str(cur->authority, authority, sizeof(authority) -1), cur->synopsis); cur = cur->next; } ast_mutex_unlock(&actionlock); return RESULT_SUCCESS; } static int handle_showmanconn(int fd, int argc, char *argv[]) { struct mansession *s; char iabuf[INET_ADDRSTRLEN]; char *format = " %-15.15s %-15.15s\n"; ast_mutex_lock(&sessionlock); s = sessions; ast_cli(fd, format, "Username", "IP Address"); while (s) { ast_cli(fd, format,s->username, ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr)); s = s->next; } ast_mutex_unlock(&sessionlock); return RESULT_SUCCESS; } static char showmancmd_help[] = "Usage: show manager command \n" " Shows the detailed description for a specific manager command.\n"; static char showmancmds_help[] = "Usage: show manager commands\n" " Prints a listing of all the available manager commands.\n"; static char showmanconn_help[] = "Usage: show manager connected\n" " Prints a listing of the users that are connected to the\n" "manager interface.\n"; static struct ast_cli_entry show_mancmd_cli = { { "show", "manager", "command", NULL }, handle_showmancmd, "Show manager command", showmancmd_help, complete_show_mancmd }; static struct ast_cli_entry show_mancmds_cli = { { "show", "manager", "commands", NULL }, handle_showmancmds, "Show manager commands", showmancmds_help }; static struct ast_cli_entry show_manconn_cli = { { "show", "manager", "connected", NULL }, handle_showmanconn, "Show connected manager users", showmanconn_help }; static void destroy_session(struct mansession *s) { struct mansession *cur, *prev = NULL; ast_mutex_lock(&sessionlock); cur = sessions; while(cur) { if (cur == s) break; prev = cur; cur = cur->next; } if (cur) { if (prev) prev->next = cur->next; else sessions = cur->next; if (s->fd > -1) close(s->fd); ast_mutex_destroy(&s->lock); free(s); } else ast_log(LOG_WARNING, "Trying to delete nonexistent session %p?\n", s); ast_mutex_unlock(&sessionlock); } char *astman_get_header(struct message *m, char *var) { char cmp[80]; int x; snprintf(cmp, sizeof(cmp), "%s: ", var); for (x=0;xhdrcount;x++) if (!strncasecmp(cmp, m->headers[x], strlen(cmp))) return m->headers[x] + strlen(cmp); return ""; } void astman_send_error(struct mansession *s, struct message *m, char *error) { char *id = astman_get_header(m,"ActionID"); ast_mutex_lock(&s->lock); ast_cli(s->fd, "Response: Error\r\n"); if (id && !ast_strlen_zero(id)) ast_cli(s->fd, "ActionID: %s\r\n",id); ast_cli(s->fd, "Message: %s\r\n\r\n", error); ast_mutex_unlock(&s->lock); } void astman_send_response(struct mansession *s, struct message *m, char *resp, char *msg) { char *id = astman_get_header(m,"ActionID"); ast_mutex_lock(&s->lock); ast_cli(s->fd, "Response: %s\r\n", resp); if (id && !ast_strlen_zero(id)) ast_cli(s->fd, "ActionID: %s\r\n",id); if (msg) ast_cli(s->fd, "Message: %s\r\n\r\n", msg); else ast_cli(s->fd, "\r\n"); ast_mutex_unlock(&s->lock); } void astman_send_ack(struct mansession *s, struct message *m, char *msg) { astman_send_response(s, m, "Success", msg); } /* Tells you if smallstr exists inside bigstr which is delim by delim and uses no buf or stringsep ast_instring("this|that|more","this",',') == 1; feel free to move this to app.c -anthm */ static int ast_instring(char *bigstr, char *smallstr, char delim) { char *val = bigstr, *next; do { if ((next = strchr(val, delim))) { if (!strncmp(val, smallstr, (next - val))) return 1; else continue; } else return !strcmp(smallstr, val); } while (*(val = (next + 1))); return 0; } static int get_perm(char *instr) { int x = 0, ret = 0; if (!instr) return 0; for (x=0; x= 48 && string[x] <= 57)) { ret = 0; break; } } return ret ? atoi(string) : 0; } static int ast_strings_to_mask(char *string) { int x = 0, ret = -1; x = ast_is_number(string); if (x) ret = x; else if (!string || ast_strlen_zero(string)) ret = -1; else if (!strcasecmp(string, "off") || ast_false(string)) ret = 0; else if (!strcasecmp(string, "on") || ast_true(string)) ret = -1; else { ret = 0; for (x=0; xlock); s->send_events = maskint; ast_mutex_unlock(&s->lock); return s->send_events; } static int authenticate(struct mansession *s, struct message *m) { struct ast_config *cfg; char iabuf[INET_ADDRSTRLEN]; char *cat; char *user = astman_get_header(m, "Username"); char *pass = astman_get_header(m, "Secret"); char *authtype = astman_get_header(m, "AuthType"); char *key = astman_get_header(m, "Key"); char *events = astman_get_header(m, "Events"); cfg = ast_load("manager.conf"); if (!cfg) return -1; cat = ast_category_browse(cfg, NULL); while(cat) { if (strcasecmp(cat, "general")) { /* This is a user */ if (!strcasecmp(cat, user)) { struct ast_variable *v; struct ast_ha *ha = NULL; char *password = NULL; v = ast_variable_browse(cfg, cat); while (v) { if (!strcasecmp(v->name, "secret")) { password = v->value; } else if (!strcasecmp(v->name, "permit") || !strcasecmp(v->name, "deny")) { ha = ast_append_ha(v->name, v->value, ha); } v = v->next; } if (ha && !ast_apply_ha(ha, &(s->sin))) { ast_log(LOG_NOTICE, "%s failed to pass IP ACL as '%s'\n", ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr), user); ast_free_ha(ha); ast_destroy(cfg); return -1; } else if (ha) ast_free_ha(ha); if (!strcasecmp(authtype, "MD5")) { if (key && !ast_strlen_zero(key) && s->challenge) { int x; int len=0; char md5key[256] = ""; struct MD5Context md5; unsigned char digest[16]; MD5Init(&md5); MD5Update(&md5, s->challenge, strlen(s->challenge)); MD5Update(&md5, password, strlen(password)); MD5Final(digest, &md5); for (x=0;x<16;x++) len += sprintf(md5key + len, "%2.2x", digest[x]); if (!strcmp(md5key, key)) break; else { ast_destroy(cfg); return -1; } } } else if (password && !strcasecmp(password, pass)) { break; } else { ast_log(LOG_NOTICE, "%s failed to authenticate as '%s'\n", ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr), user); ast_destroy(cfg); return -1; } } } cat = ast_category_browse(cfg, cat); } if (cat) { strncpy(s->username, cat, sizeof(s->username) - 1); s->readperm = get_perm(ast_variable_retrieve(cfg, cat, "read")); s->writeperm = get_perm(ast_variable_retrieve(cfg, cat, "write")); ast_destroy(cfg); if (events) set_eventmask(s, events); return 0; } ast_log(LOG_NOTICE, "%s tried to authenticate with nonexistent user '%s'\n", ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr), user); ast_destroy(cfg); return -1; } static char mandescr_ping[] = "Description: A 'Ping' action will ellicit a 'Pong' response. Used to keep the " " manager connection open.\n" "Variables: NONE\n"; static int action_ping(struct mansession *s, struct message *m) { astman_send_response(s, m, "Pong", NULL); return 0; } static char mandescr_listcommands[] = "Description: Returns the action name and synopsis for every\n" " action that is available to the user\n" "Variables: NONE\n"; static int action_listcommands(struct mansession *s, struct message *m) { struct manager_action *cur = first_action; char idText[256] = ""; char *id = astman_get_header(m,"ActionID"); if (id && !ast_strlen_zero(id)) snprintf(idText,256,"ActionID: %s\r\n",id); ast_cli(s->fd, "Response: Success\r\n%s", idText); ast_mutex_lock(&s->lock); ast_mutex_lock(&actionlock); while (cur) { /* Walk the list of actions */ if ((s->writeperm & cur->authority) == cur->authority) ast_cli(s->fd, "%s: %s\r\n", cur->action, cur->synopsis); cur = cur->next; } ast_mutex_unlock(&actionlock); ast_cli(s->fd, "\r\n"); ast_mutex_unlock(&s->lock); return 0; } static char mandescr_events[] = "Description: Enable/Disable sending of events to this manager\n" " client.\n" "Variables:\n" " EventMask: 'on' if all events should be sent,\n" " 'off' if no events should be sent,\n" " 'system,call,log' to select which flags events should have to be sent.\n"; static int action_events(struct mansession *s, struct message *m) { char *mask = astman_get_header(m, "EventMask"); int res; res = set_eventmask(s, mask); if (res > 0) astman_send_response(s, m, "Events On", NULL); else if (res == 0) astman_send_response(s, m, "Events Off", NULL); return 0; } static char mandescr_logoff[] = "Description: Logoff this manager session\n" "Variables: NONE\n"; static int action_logoff(struct mansession *s, struct message *m) { astman_send_response(s, m, "Goodbye", "Thanks for all the fish."); return -1; } static char mandescr_hangup[] = "Description: Hangup a channel\n" "Variables: \n" " Channel: The channel name to be hungup\n"; static int action_hangup(struct mansession *s, struct message *m) { struct ast_channel *c = NULL; char *name = astman_get_header(m, "Channel"); if (ast_strlen_zero(name)) { astman_send_error(s, m, "No channel specified"); return 0; } c = ast_channel_walk_locked(NULL); while(c) { if (!strcasecmp(c->name, name)) { break; } ast_mutex_unlock(&c->lock); c = ast_channel_walk_locked(c); } if (!c) { astman_send_error(s, m, "No such channel"); return 0; } ast_softhangup(c, AST_SOFTHANGUP_EXPLICIT); ast_mutex_unlock(&c->lock); astman_send_ack(s, m, "Channel Hungup"); return 0; } static char mandescr_setvar[] = "Description: Set a local channel variable.\n" "Variables: (Names marked with * are required)\n" " *Channel: Channel to set variable for\n" " *Variable: Variable name\n" " *Value: Value\n"; static int action_setvar(struct mansession *s, struct message *m) { struct ast_channel *c = NULL; char *name = astman_get_header(m, "Channel"); char *varname = astman_get_header(m, "Variable"); char *varval = astman_get_header(m, "Value"); if (!strlen(name)) { astman_send_error(s, m, "No channel specified"); return 0; } if (!strlen(varname)) { astman_send_error(s, m, "No variable specified"); return 0; } c = ast_channel_walk_locked(NULL); while(c) { if (!strcasecmp(c->name, name)) { break; } ast_mutex_unlock(&c->lock); c = ast_channel_walk_locked(c); } if (!c) { astman_send_error(s, m, "No such channel"); return 0; } pbx_builtin_setvar_helper(c,varname,varval); ast_mutex_unlock(&c->lock); astman_send_ack(s, m, "Variable Set"); return 0; } static char mandescr_getvar[] = "Description: Get the value of a local channel variable.\n" "Variables: (Names marked with * are required)\n" " *Channel: Channel to read variable from\n" " *Variable: Variable name\n" " ActionID: Optional Action id for message matching.\n"; static int action_getvar(struct mansession *s, struct message *m) { struct ast_channel *c = NULL; char *name = astman_get_header(m, "Channel"); char *varname = astman_get_header(m, "Variable"); char *id = astman_get_header(m,"ActionID"); char *varval; if (!strlen(name)) { astman_send_error(s, m, "No channel specified"); return 0; } if (!strlen(varname)) { astman_send_error(s, m, "No variable specified"); return 0; } c = ast_channel_walk_locked(NULL); while(c) { if (!strcasecmp(c->name, name)) { break; } ast_mutex_unlock(&c->lock); c = ast_channel_walk_locked(c); } if (!c) { astman_send_error(s, m, "No such channel"); return 0; } varval=pbx_builtin_getvar_helper(c,varname); ast_mutex_unlock(&c->lock); ast_mutex_lock(&s->lock); ast_cli(s->fd, "Response: Success\r\n" "%s: %s\r\n" ,varname,varval); if (id && !ast_strlen_zero(id)) ast_cli(s->fd, "ActionID: %s\r\n",id); ast_cli(s->fd, "\r\n"); ast_mutex_unlock(&s->lock); return 0; } static int action_status(struct mansession *s, struct message *m) { char *id = astman_get_header(m,"ActionID"); char *name = astman_get_header(m,"Channel"); char idText[256] = ""; struct ast_channel *c; char bridge[256]; struct timeval now; long elapsed_seconds=0; gettimeofday(&now, NULL); astman_send_ack(s, m, "Channel status will follow"); c = ast_channel_walk_locked(NULL); if (id && !ast_strlen_zero(id)) snprintf(idText,256,"ActionID: %s\r\n",id); if (name && !ast_strlen_zero(name)) { while (c) { if (!strcasecmp(c->name, name)) { break; } ast_mutex_unlock(&c->lock); c = ast_channel_walk_locked(c); } if (!c) { astman_send_error(s, m, "No such channel"); return 0; } } while(c) { if (c->bridge) snprintf(bridge, sizeof(bridge), "Link: %s\r\n", c->bridge->name); else bridge[0] = '\0'; ast_mutex_lock(&s->lock); if (c->pbx) { if (c->cdr) { elapsed_seconds = now.tv_sec - c->cdr->start.tv_sec; } ast_cli(s->fd, "Event: Status\r\n" "Channel: %s\r\n" "CallerID: %s\r\n" "Account: %s\r\n" "State: %s\r\n" "Context: %s\r\n" "Extension: %s\r\n" "Priority: %d\r\n" "Seconds: %ld\r\n" "%s" "Uniqueid: %s\r\n" "%s" "\r\n", c->name, c->callerid ? c->callerid : "", c->accountcode, ast_state2str(c->_state), c->context, c->exten, c->priority, (long)elapsed_seconds, bridge, c->uniqueid, idText); } else { ast_cli(s->fd, "Event: Status\r\n" "Channel: %s\r\n" "CallerID: %s\r\n" "Account: %s\r\n" "State: %s\r\n" "%s" "Uniqueid: %s\r\n" "%s" "\r\n", c->name, c->callerid ? c->callerid : "", c->accountcode, ast_state2str(c->_state), bridge, c->uniqueid, idText); } ast_mutex_unlock(&s->lock); ast_mutex_unlock(&c->lock); if (name && !ast_strlen_zero(name)) { break; } c = ast_channel_walk_locked(c); } ast_mutex_lock(&s->lock); ast_cli(s->fd, "Event: StatusComplete\r\n" "%s" "\r\n",idText); ast_mutex_unlock(&s->lock); return 0; } static int action_redirect(struct mansession *s, struct message *m) { char *name = astman_get_header(m, "Channel"); char *name2 = astman_get_header(m, "ExtraChannel"); char *exten = astman_get_header(m, "Exten"); char *context = astman_get_header(m, "Context"); char *priority = astman_get_header(m, "Priority"); struct ast_channel *chan, *chan2 = NULL; int pi = 0; int res; if (!name || ast_strlen_zero(name)) { astman_send_error(s, m, "Channel not specified"); return 0; } if (!ast_strlen_zero(priority) && (sscanf(priority, "%d", &pi) != 1)) { astman_send_error(s, m, "Invalid priority\n"); return 0; } chan = ast_get_channel_by_name_locked(name); if (!chan) { astman_send_error(s, m, "Channel not existent"); return 0; } if (!ast_strlen_zero(name2)) chan2 = ast_get_channel_by_name_locked(name2); res = ast_async_goto(chan, context, exten, pi); if (!res) { if (!ast_strlen_zero(name2)) { if (chan2) res = ast_async_goto(chan2, context, exten, pi); else res = -1; if (!res) astman_send_ack(s, m, "Dual Redirect successful"); else astman_send_error(s, m, "Secondary redirect failed"); } else astman_send_ack(s, m, "Redirect successful"); } else astman_send_error(s, m, "Redirect failed"); if (chan) ast_mutex_unlock(&chan->lock); if (chan2) ast_mutex_unlock(&chan2->lock); return 0; } static char mandescr_command[] = "Description: Run a CLI command.\n" "Variables: (Names marked with * are required)\n" " *Command: Asterisk CLI command to run\n" " ActionID: Optional Action id for message matching.\n"; static int action_command(struct mansession *s, struct message *m) { char *cmd = astman_get_header(m, "Command"); char *id = astman_get_header(m, "ActionID"); ast_mutex_lock(&s->lock); s->blocking = 1; ast_mutex_unlock(&s->lock); ast_cli(s->fd, "Response: Follows\r\n"); if (id && !ast_strlen_zero(id)) ast_cli(s->fd, "ActionID: %s\r\n", id); /* FIXME: Wedge a ActionID response in here, waiting for later changes */ ast_cli_command(s->fd, cmd); ast_cli(s->fd, "--END COMMAND--\r\n\r\n"); ast_mutex_lock(&s->lock); s->blocking = 0; ast_mutex_unlock(&s->lock); return 0; } static void *fast_originate(void *data) { struct fast_originate_helper *in = data; int res; int reason = 0; if (!ast_strlen_zero(in->app)) { res = ast_pbx_outgoing_app(in->tech, AST_FORMAT_SLINEAR, in->data, in->timeout, in->app, in->appdata, &reason, 1, !ast_strlen_zero(in->callerid) ? in->callerid : NULL, in->variable, in->account); } else { res = ast_pbx_outgoing_exten(in->tech, AST_FORMAT_SLINEAR, in->data, in->timeout, in->context, in->exten, in->priority, &reason, 1, !ast_strlen_zero(in->callerid) ? in->callerid : NULL, in->variable, in->account); } if (!res) manager_event(EVENT_FLAG_CALL, "OriginateSuccess", "%s" "Channel: %s/%s\r\n" "Context: %s\r\n" "Exten: %s\r\n", in->idtext, in->tech, in->data, in->context, in->exten); else manager_event(EVENT_FLAG_CALL, "OriginateFailure", "%s" "Channel: %s/%s\r\n" "Context: %s\r\n" "Exten: %s\r\n", in->idtext, in->tech, in->data, in->context, in->exten); free(in); return NULL; } static char mandescr_originate[] = "Description: Generates an outgoing call to a Extension/Context/Priority or\n" " Application/Data\n" "Variables: (Names marked with * are required)\n" " *Channel: Channel name to call\n" " Exten: Extension to use (requires 'Context' and 'Priority')\n" " Context: Context to use (requires 'Exten' and 'Priority')\n" " Priority: Priority to use (requires 'Exten' and 'Context')\n" " Application: Application to use\n" " Data: Data to use (requires 'Application')\n" " Timeout: How long to wait for call to be answered (in ms)\n" " CallerID: Caller ID to be set on the outgoing channel\n" " Variable: Channel variable to set (VAR1=value1|VAR2=value2)\n" " Account: Account code\n" " Async: Set to 'true' for fast origination\n"; static int action_originate(struct mansession *s, struct message *m) { char *name = astman_get_header(m, "Channel"); char *exten = astman_get_header(m, "Exten"); char *context = astman_get_header(m, "Context"); char *priority = astman_get_header(m, "Priority"); char *timeout = astman_get_header(m, "Timeout"); char *callerid = astman_get_header(m, "CallerID"); char *variable = astman_get_header(m, "Variable"); char *account = astman_get_header(m, "Account"); char *app = astman_get_header(m, "Application"); char *appdata = astman_get_header(m, "Data"); char *async = astman_get_header(m, "Async"); char *id = astman_get_header(m, "ActionID"); char *tech, *data; int pi = 0; int res; int to = 30000; int reason = 0; char tmp[256]; pthread_t th; pthread_attr_t attr; if (!name) { astman_send_error(s, m, "Channel not specified"); return 0; } if (!ast_strlen_zero(priority) && (sscanf(priority, "%d", &pi) != 1)) { astman_send_error(s, m, "Invalid priority\n"); return 0; } if (!ast_strlen_zero(timeout) && (sscanf(timeout, "%d", &to) != 1)) { astman_send_error(s, m, "Invalid timeout\n"); return 0; } strncpy(tmp, name, sizeof(tmp) - 1); tech = tmp; data = strchr(tmp, '/'); if (!data) { astman_send_error(s, m, "Invalid channel\n"); return 0; } *data = '\0'; data++; if (ast_true(async)) { struct fast_originate_helper *fast = malloc(sizeof(struct fast_originate_helper)); if (!fast) { res = -1; } else { memset(fast, 0, sizeof(struct fast_originate_helper)); if (id && !ast_strlen_zero(id)) snprintf(fast->idtext, sizeof(fast->idtext), "ActionID: %s\r\n", id); strncpy(fast->tech, tech, sizeof(fast->tech) - 1); strncpy(fast->data, data, sizeof(fast->data) - 1); strncpy(fast->app, app, sizeof(fast->app) - 1); strncpy(fast->appdata, appdata, sizeof(fast->appdata) - 1); strncpy(fast->callerid, callerid, sizeof(fast->callerid) - 1); strncpy(fast->variable, variable, sizeof(fast->variable) - 1); strncpy(fast->account, account, sizeof(fast->account) - 1); strncpy(fast->context, context, sizeof(fast->context) - 1); strncpy(fast->exten, exten, sizeof(fast->exten) - 1); fast->timeout = to; fast->priority = pi; pthread_attr_init(&attr); pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); if (ast_pthread_create(&th, &attr, fast_originate, fast)) { res = -1; } else { res = 0; } } } else if (!ast_strlen_zero(app)) { res = ast_pbx_outgoing_app(tech, AST_FORMAT_SLINEAR, data, to, app, appdata, &reason, 1, !ast_strlen_zero(callerid) ? callerid : NULL, variable, account); } else { if (exten && context && pi) res = ast_pbx_outgoing_exten(tech, AST_FORMAT_SLINEAR, data, to, context, exten, pi, &reason, 1, !ast_strlen_zero(callerid) ? callerid : NULL, variable, account); else { astman_send_error(s, m, "Originate with 'Exten' requires 'Context' and 'Priority'"); return 0; } } if (!res) astman_send_ack(s, m, "Originate successfully queued"); else astman_send_error(s, m, "Originate failed"); return 0; } static char mandescr_mailboxstatus[] = "Description: Checks a voicemail account for status.\n" "Variables: (Names marked with * are required)\n" " *Mailbox: Full mailbox ID @\n" " ActionID: Optional ActionID for message matching.\n" "Returns number of messages.\n" " Message: Mailbox Status\n" " Mailbox: \n" " Waiting: \n" "\n"; static int action_mailboxstatus(struct mansession *s, struct message *m) { char *mailbox = astman_get_header(m, "Mailbox"); char *id = astman_get_header(m,"ActionID"); char idText[256] = ""; int ret; if (!mailbox || ast_strlen_zero(mailbox)) { astman_send_error(s, m, "Mailbox not specified"); return 0; } if (id && !ast_strlen_zero(id)) snprintf(idText,256,"ActionID: %s\r\n",id); ret = ast_app_has_voicemail(mailbox); ast_mutex_lock(&s->lock); ast_cli(s->fd, "Response: Success\r\n" "%s" "Message: Mailbox Status\r\n" "Mailbox: %s\r\n" "Waiting: %d\r\n\r\n", idText, mailbox, ret); ast_mutex_unlock(&s->lock); return 0; } static char mandescr_mailboxcount[] = "Description: Checks a voicemail account for new messages.\n" "Variables: (Names marked with * are required)\n" " *Mailbox: Full mailbox ID @\n" " ActionID: Optional ActionID for message matching.\n" "Returns number of new and old messages.\n" " Message: Mailbox Message Count\n" " Mailbox: \n" " NewMessages: \n" " OldMessages: \n" "\n"; static int action_mailboxcount(struct mansession *s, struct message *m) { char *mailbox = astman_get_header(m, "Mailbox"); char *id = astman_get_header(m,"ActionID"); char idText[256] = ""; int newmsgs = 0, oldmsgs = 0; if (!mailbox || ast_strlen_zero(mailbox)) { astman_send_error(s, m, "Mailbox not specified"); return 0; } ast_app_messagecount(mailbox, &newmsgs, &oldmsgs); if (id && !ast_strlen_zero(id)) { snprintf(idText,256,"ActionID: %s\r\n",id); } ast_mutex_lock(&s->lock); ast_cli(s->fd, "Response: Success\r\n" "%s" "Message: Mailbox Message Count\r\n" "Mailbox: %s\r\n" "NewMessages: %d\r\n" "OldMessages: %d\r\n" "\r\n", idText,mailbox, newmsgs, oldmsgs); ast_mutex_unlock(&s->lock); return 0; } static char mandescr_extensionstate[] = "Description: Report the extension state for given extension.\n" " If the extension has a hint, will use devicestate to check\n" " the status of the device connected to the extension.\n" "Variables: (Names marked with * are required)\n" " *Exten: Extension to check state on\n" " *Context: Context for extension\n" " ActionId: Optional ID for this transaction\n" "Will return an \"Extension Status\" message.\n" "The response will include the hint for the extension and the status.\n"; static int action_extensionstate(struct mansession *s, struct message *m) { char *exten = astman_get_header(m, "Exten"); char *context = astman_get_header(m, "Context"); char *id = astman_get_header(m,"ActionID"); char idText[256] = ""; char hint[256] = ""; int status; if (!exten || ast_strlen_zero(exten)) { astman_send_error(s, m, "Extension not specified"); return 0; } if (!context || ast_strlen_zero(context)) context = "default"; status = ast_extension_state(NULL, context, exten); ast_get_hint(hint, sizeof(hint) - 1, NULL, context, exten); if (id && !ast_strlen_zero(id)) { snprintf(idText,256,"ActionID: %s\r\n",id); } ast_mutex_lock(&s->lock); ast_cli(s->fd, "Response: Success\r\n" "%s" "Message: Extension Status\r\n" "Exten: %s\r\n" "Context: %s\r\n" "Hint: %s\r\n" "Status: %d\r\n\r\n", idText,exten, context, hint, status); ast_mutex_unlock(&s->lock); return 0; } static char mandescr_timeout[] = "Description: Hangup a channel after a certain time.\n" "Variables: (Names marked with * are required)\n" " *Channel: Channel name to hangup\n" " *Timeout: Maximum duration of the call (sec)\n" "Acknowledges set time with 'Timeout Set' message\n"; static int action_timeout(struct mansession *s, struct message *m) { struct ast_channel *c = NULL; char *name = astman_get_header(m, "Channel"); int timeout = atoi(astman_get_header(m, "Timeout")); if (ast_strlen_zero(name)) { astman_send_error(s, m, "No channel specified"); return 0; } if (!timeout) { astman_send_error(s, m, "No timeout specified"); return 0; } c = ast_channel_walk_locked(NULL); while(c) { if (!strcasecmp(c->name, name)) { break; } ast_mutex_unlock(&c->lock); c = ast_channel_walk_locked(c); } if (!c) { astman_send_error(s, m, "No such channel"); return 0; } ast_channel_setwhentohangup(c, timeout); ast_mutex_unlock(&c->lock); astman_send_ack(s, m, "Timeout Set"); return 0; } static int process_message(struct mansession *s, struct message *m) { char action[80] = ""; struct manager_action *tmp = first_action; char *id = astman_get_header(m,"ActionID"); char idText[256] = ""; char iabuf[INET_ADDRSTRLEN]; strncpy(action, astman_get_header(m, "Action"), sizeof(action) - 1); ast_log( LOG_DEBUG, "Manager received command '%s'\n", action ); if (ast_strlen_zero(action)) { astman_send_error(s, m, "Missing action in request"); return 0; } if (id && !ast_strlen_zero(id)) { snprintf(idText,256,"ActionID: %s\r\n",id); } if (!s->authenticated) { if (!strcasecmp(action, "Challenge")) { char *authtype; authtype = astman_get_header(m, "AuthType"); if (!strcasecmp(authtype, "MD5")) { if (!s->challenge || ast_strlen_zero(s->challenge)) { ast_mutex_lock(&s->lock); snprintf(s->challenge, sizeof(s->challenge), "%d", rand()); ast_mutex_unlock(&s->lock); } ast_mutex_lock(&s->lock); ast_cli(s->fd, "Response: Success\r\n" "%s" "Challenge: %s\r\n\r\n", idText,s->challenge); ast_mutex_unlock(&s->lock); return 0; } else { astman_send_error(s, m, "Must specify AuthType"); return 0; } } else if (!strcasecmp(action, "Login")) { if (authenticate(s, m)) { sleep(1); astman_send_error(s, m, "Authentication failed"); return -1; } else { s->authenticated = 1; if (option_verbose > 1) ast_verbose(VERBOSE_PREFIX_2 "Manager '%s' logged on from %s\n", s->username, ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr)); ast_log(LOG_EVENT, "Manager '%s' logged on from %s\n", s->username, ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr)); astman_send_ack(s, m, "Authentication accepted"); } } else if (!strcasecmp(action, "Logoff")) { astman_send_ack(s, m, "See ya"); return -1; } else astman_send_error(s, m, "Authentication Required"); } else { while( tmp ) { if (!strcasecmp(action, tmp->action)) { if ((s->writeperm & tmp->authority) == tmp->authority) { if (tmp->func(s, m)) return -1; } else { astman_send_error(s, m, "Permission denied"); } return 0; } tmp = tmp->next; } astman_send_error(s, m, "Invalid/unknown command"); } return 0; } static int get_input(struct mansession *s, char *output) { /* output must have at least sizeof(s->inbuf) space */ int res; int x; struct pollfd fds[1]; char iabuf[INET_ADDRSTRLEN]; for (x=1;xinlen;x++) { if ((s->inbuf[x] == '\n') && (s->inbuf[x-1] == '\r')) { /* Copy output data up to and including \r\n */ memcpy(output, s->inbuf, x + 1); /* Add trailing \0 */ output[x+1] = '\0'; /* Move remaining data back to the front */ memmove(s->inbuf, s->inbuf + x + 1, s->inlen - x); s->inlen -= (x + 1); return 1; } } if (s->inlen >= sizeof(s->inbuf) - 1) { ast_log(LOG_WARNING, "Dumping long line with no return from %s: %s\n", ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr), s->inbuf); s->inlen = 0; } fds[0].fd = s->fd; fds[0].events = POLLIN; res = poll(fds, 1, -1); if (res < 0) { ast_log(LOG_WARNING, "Select returned error: %s\n", strerror(errno)); return -1; } else if (res > 0) { ast_mutex_lock(&s->lock); res = read(s->fd, s->inbuf + s->inlen, sizeof(s->inbuf) - 1 - s->inlen); ast_mutex_unlock(&s->lock); if (res < 1) return -1; } s->inlen += res; s->inbuf[s->inlen] = '\0'; return 0; } static void *session_do(void *data) { struct mansession *s = data; struct message m; char iabuf[INET_ADDRSTRLEN]; int res; ast_mutex_lock(&s->lock); ast_cli(s->fd, "Asterisk Call Manager/1.0\r\n"); ast_mutex_unlock(&s->lock); memset(&m, 0, sizeof(&m)); for (;;) { res = get_input(s, m.headers[m.hdrcount]); if (res > 0) { /* Strip trailing \r\n */ if (strlen(m.headers[m.hdrcount]) < 2) continue; m.headers[m.hdrcount][strlen(m.headers[m.hdrcount]) - 2] = '\0'; if (ast_strlen_zero(m.headers[m.hdrcount])) { if (process_message(s, &m)) break; memset(&m, 0, sizeof(&m)); } else if (m.hdrcount < MAX_HEADERS - 1) m.hdrcount++; } else if (res < 0) break; } if (s->authenticated) { if (option_verbose > 1) ast_verbose(VERBOSE_PREFIX_2 "Manager '%s' logged off from %s\n", s->username, ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr)); ast_log(LOG_EVENT, "Manager '%s' logged off from %s\n", s->username, ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr)); } else { if (option_verbose > 1) ast_verbose(VERBOSE_PREFIX_2 "Connect attempt from '%s' unable to authenticate\n", ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr)); ast_log(LOG_EVENT, "Failed attempt from %s\n", ast_inet_ntoa(iabuf, sizeof(iabuf), s->sin.sin_addr)); } destroy_session(s); return NULL; } static void *accept_thread(void *ignore) { int as; struct sockaddr_in sin; int sinlen; struct mansession *s; struct protoent *p; int arg = 1; int flags; pthread_attr_t attr; pthread_attr_init(&attr); pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); for (;;) { sinlen = sizeof(sin); as = accept(asock, (struct sockaddr *)&sin, &sinlen); if (as < 0) { ast_log(LOG_NOTICE, "Accept returned -1: %s\n", strerror(errno)); continue; } p = getprotobyname("tcp"); if( p ) { if( setsockopt(as, p->p_proto, TCP_NODELAY, (char *)&arg, sizeof(arg) ) < 0 ) { ast_log(LOG_WARNING, "Failed to set manager tcp connection to TCP_NODELAY mode: %s\n", strerror(errno)); } } s = malloc(sizeof(struct mansession)); if (!s) { ast_log(LOG_WARNING, "Failed to allocate management session: %s\n", strerror(errno)); continue; } memset(s, 0, sizeof(struct mansession)); memcpy(&s->sin, &sin, sizeof(sin)); if(! block_sockets) { /* For safety, make sure socket is non-blocking */ flags = fcntl(as, F_GETFL); fcntl(as, F_SETFL, flags | O_NONBLOCK); } ast_mutex_init(&s->lock); s->fd = as; s->send_events = -1; ast_mutex_lock(&sessionlock); s->next = sessions; sessions = s; ast_mutex_unlock(&sessionlock); if (ast_pthread_create(&t, &attr, session_do, s)) destroy_session(s); } pthread_attr_destroy(&attr); return NULL; } int manager_event(int category, char *event, char *fmt, ...) { struct mansession *s; char tmp[4096]; va_list ap; ast_mutex_lock(&sessionlock); s = sessions; while(s) { if (((s->readperm & category) == category) && ((s->send_events & category) == category) ) { ast_mutex_lock(&s->lock); if (!s->blocking) { ast_cli(s->fd, "Event: %s\r\n", event); va_start(ap, fmt); vsnprintf(tmp, sizeof(tmp), fmt, ap); va_end(ap); ast_carefulwrite(s->fd,tmp,strlen(tmp),100); ast_cli(s->fd, "\r\n"); } ast_mutex_unlock(&s->lock); } s = s->next; } ast_mutex_unlock(&sessionlock); return 0; } int ast_manager_unregister( char *action ) { struct manager_action *cur = first_action, *prev = first_action; ast_mutex_lock(&actionlock); while( cur ) { if (!strcasecmp(action, cur->action)) { prev->next = cur->next; free(cur); if (option_verbose > 1) ast_verbose(VERBOSE_PREFIX_2 "Manager unregistered action %s\n", action); ast_mutex_unlock(&actionlock); return 0; } prev = cur; cur = cur->next; } ast_mutex_unlock(&actionlock); return 0; } static int manager_state_cb(char *context, char *exten, int state, void *data) { /* Notify managers of change */ manager_event(EVENT_FLAG_CALL, "ExtensionStatus", "Exten: %s\r\nContext: %s\r\nStatus: %d\r\n", exten, context, state); return 0; } static int ast_manager_register_struct(struct manager_action *act) { struct manager_action *cur = first_action, *prev = NULL; int ret; ast_mutex_lock(&actionlock); while(cur) { /* Walk the list of actions */ ret = strcasecmp(cur->action, act->action); if (ret == 0) { ast_log(LOG_WARNING, "Manager: Action '%s' already registered\n", act->action); ast_mutex_unlock(&actionlock); return -1; } else if (ret > 0) { /* Insert these alphabetically */ if (prev) { act->next = prev->next; prev->next = act; } else { act->next = first_action; first_action = act; } break; } prev = cur; cur = cur->next; } if (!cur) { if (prev) prev->next = act; else first_action = act; act->next = NULL; } if (option_verbose > 1) ast_verbose(VERBOSE_PREFIX_2 "Manager registered action %s\n", act->action); ast_mutex_unlock(&actionlock); return 0; } int ast_manager_register2(char *action, int auth, int (*func)(struct mansession *s, struct message *m), char *synopsis, char *description) { struct manager_action *cur; cur = malloc(sizeof(struct manager_action)); if (!cur) { ast_log(LOG_WARNING, "Manager: out of memory trying to register action\n"); ast_mutex_unlock(&actionlock); return -1; } cur->action = action; cur->authority = auth; cur->func = func; cur->synopsis = synopsis; cur->description = description; cur->next = NULL; ast_manager_register_struct(cur); return 0; } static int registered = 0; int init_manager(void) { struct ast_config *cfg; char *val; int oldportno = portno; static struct sockaddr_in ba; int x = 1; if (!registered) { /* Register default actions */ ast_manager_register2("Ping", 0, action_ping, "Ping", mandescr_ping); ast_manager_register2("Events", 0, action_events, "Contol Event Flow", mandescr_events); ast_manager_register2("Logoff", 0, action_logoff, "Logoff Manager", mandescr_logoff); ast_manager_register2("Hangup", EVENT_FLAG_CALL, action_hangup, "Hangup Channel", mandescr_hangup); ast_manager_register( "Status", EVENT_FLAG_CALL, action_status, "Status" ); ast_manager_register2( "Setvar", EVENT_FLAG_CALL, action_setvar, "Set Channel Variable", mandescr_setvar ); ast_manager_register2( "Getvar", EVENT_FLAG_CALL, action_getvar, "Gets a Channel Variable", mandescr_getvar ); ast_manager_register( "Redirect", EVENT_FLAG_CALL, action_redirect, "Redirect" ); ast_manager_register2("Originate", EVENT_FLAG_CALL, action_originate, "Originate Call", mandescr_originate); ast_manager_register2( "Command", EVENT_FLAG_COMMAND, action_command, "Execute Command", mandescr_command ); ast_manager_register2( "ExtensionState", EVENT_FLAG_CALL, action_extensionstate, "Check Extension Status", mandescr_extensionstate ); ast_manager_register2( "AbsoluteTimeout", EVENT_FLAG_CALL, action_timeout, "Set Absolute Timeout", mandescr_timeout ); ast_manager_register2( "MailboxStatus", EVENT_FLAG_CALL, action_mailboxstatus, "Check Mailbox", mandescr_mailboxstatus ); ast_manager_register2( "MailboxCount", EVENT_FLAG_CALL, action_mailboxcount, "Check Mailbox Message Count", mandescr_mailboxcount ); ast_manager_register2("ListCommands", 0, action_listcommands, "List available manager commands", mandescr_listcommands); ast_cli_register(&show_mancmd_cli); ast_cli_register(&show_mancmds_cli); ast_cli_register(&show_manconn_cli); ast_extension_state_add(NULL, NULL, manager_state_cb, NULL); registered = 1; } portno = DEFAULT_MANAGER_PORT; cfg = ast_load("manager.conf"); if (!cfg) { ast_log(LOG_NOTICE, "Unable to open management configuration manager.conf. Call management disabled.\n"); return 0; } memset(&ba, 0, sizeof(ba)); val = ast_variable_retrieve(cfg, "general", "enabled"); if (val) enabled = ast_true(val); val = ast_variable_retrieve(cfg, "general", "block-sockets"); if(val) block_sockets = ast_true(val); if ((val = ast_variable_retrieve(cfg, "general", "port"))) { if (sscanf(val, "%d", &portno) != 1) { ast_log(LOG_WARNING, "Invalid port number '%s'\n", val); portno = DEFAULT_MANAGER_PORT; } } else if ((val = ast_variable_retrieve(cfg, "general", "portno"))) { if (sscanf(val, "%d", &portno) != 1) { ast_log(LOG_WARNING, "Invalid port number '%s'\n", val); portno = DEFAULT_MANAGER_PORT; } ast_log(LOG_NOTICE, "Use of portno in manager.conf deprecated. Please use 'port=%s' instead.\n", val); } ba.sin_family = AF_INET; ba.sin_port = htons(portno); memset(&ba.sin_addr, 0, sizeof(ba.sin_addr)); if ((val = ast_variable_retrieve(cfg, "general", "bindaddr"))) { if (!inet_aton(val, &ba.sin_addr)) { ast_log(LOG_WARNING, "Invalid address '%s' specified, using 0.0.0.0\n", val); memset(&ba.sin_addr, 0, sizeof(ba.sin_addr)); } } if ((asock > -1) && ((portno != oldportno) || !enabled)) { #if 0 /* Can't be done yet */ close(asock); asock = -1; #else ast_log(LOG_WARNING, "Unable to change management port / enabled\n"); #endif } ast_destroy(cfg); /* If not enabled, do nothing */ if (!enabled) { return 0; } if (asock < 0) { asock = socket(AF_INET, SOCK_STREAM, 0); if (asock < 0) { ast_log(LOG_WARNING, "Unable to create socket: %s\n", strerror(errno)); return -1; } setsockopt(asock, SOL_SOCKET, SO_REUSEADDR, &x, sizeof(x)); if (bind(asock, (struct sockaddr *)&ba, sizeof(ba))) { ast_log(LOG_WARNING, "Unable to bind socket: %s\n", strerror(errno)); close(asock); asock = -1; return -1; } if (listen(asock, 2)) { ast_log(LOG_WARNING, "Unable to listen on socket: %s\n", strerror(errno)); close(asock); asock = -1; return -1; } if (option_verbose) ast_verbose("Asterisk Management interface listening on port %d\n", portno); ast_pthread_create(&t, NULL, accept_thread, NULL); } return 0; } int reload_manager(void) { manager_event(EVENT_FLAG_SYSTEM, "Reload", "Message: Reload Requested\r\n"); return init_manager(); }