Overview

The Mixer Service in the Voice Recording Solution (VRS) application is designed to combine the separate audio streams of an agent and customer into a single WAV file. To enhance security, the mixed WAV file is encrypted before storage. This ensures that files downloaded directly from the server remain secure and unplayable without proper decryption.

A separate Decryption Service API is available to decrypt the files on request. This API provides the decrypted file and its associated metadata, enabling playback only through authorized access via the VRS front end.


Workflow

1. Recording Mixing

2. File Encryption

3. Decryption and Playback


Environment Configuration

Key Hard-coding


Testing Process

Prerequisites

Test Steps

Step 1: Make a Call

  1. Use Cisco Finesse to initiate and receive a test call.

  2. Ensure the call is recorded via the SIP trunk.

Step 2: Download the File Directly

  1. Access the server where recordings are stored.

  2. Locate and download the encrypted WAV file associated with the test call in the directory. /usr/share/freeswitch/cucmRecording/sessions

  3. Attempt to play the downloaded file:

Step 3: Playback via VRS Front End

  1. Log in to the VRS front end.

  2. Locate the test call recording in the application interface.

  3. Attempt to play the recording:

Step 4: Verify Metadata

  1. Check the metadata returned by the API.


Known Limitations

  1. Hardcoded Key:

  2. Direct File Access:

/wiki/spaces/CT/pages/381452292