Page 319 - Asterisk™: The Future of Telephony
P. 319

Then verify the audio with your favorite audio application, such as the play application:
                   # play /tmp/voicemail-47395.wav

                   Input Filename : /tmp/voicemail-47395.wav
                   Sample Size    : 8-bits
                   Sample Encoding: wav
                   Channels       : 1
                   Sample Rate    : 8000

                   Time: 00:06.22 [00:00.00] of 00:00.00 (  0.0%) Output Buffer: 298.36K
                   Done.
               And now that we’ve confirmed everything was stored in the database correctly, we can
               try listening to it via the VoicemailMain() application by dialing extension 200:

                   *CLI>
                       -- Executing VoiceMailMain("SIP/odbc_test_user-10228cac", "1000@default") in new stack
                       -- Playing 'vm-password' (language 'en')
                       -- Playing 'vm-youhave' (language 'en')
                       -- Playing 'digits/1' (language 'en')
                       -- Playing 'vm-INBOX' (language 'en')
                       -- Playing 'vm-message' (language 'en')
                       -- Playing 'vm-onefor' (language 'en')
                       -- Playing 'vm-INBOX' (language 'en')
                       -- Playing 'vm-messages' (language 'en')
                       -- Playing 'vm-opts' (language 'en')
                       -- Playing 'vm-first' (language 'en')
                       -- Playing 'vm-message' (language 'en')
                     == Parsing '/var/spool/asterisk/voicemail/default/1000/INBOX/msg0000.txt': Found


               Conclusion

               In this chapter, we learned about several areas where Asterisk can integrate with a
               relational database. This is useful for systems where you need to start scaling by clus-
               tering multiple Asterisk boxes working with the same centralized information, or when
               you want to start building external applications to modify information without requir-
               ing a reload of the system (i.e., not requiring the modification of flatfiles).



















                                                                            Conclusion | 291
   314   315   316   317   318   319   320   321   322   323   324