2018-06-01 11:28:31 +02:00
|
|
|
/* PipeWire
|
|
|
|
|
* Copyright (C) 2018 Wim Taymans <wim.taymans@gmail.com>
|
|
|
|
|
*
|
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
|
* modify it under the terms of the GNU Library General Public
|
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
|
* version 2 of the License, or (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
* Library General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Library General Public
|
|
|
|
|
* License along with this library; if not, write to the
|
|
|
|
|
* Free Software Foundation, Inc., 51 Franklin St, Fifth Floor,
|
|
|
|
|
* Boston, MA 02110-1301, USA.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
|
|
|
|
|
#include <pipewire/log.h>
|
2018-07-03 22:03:25 +02:00
|
|
|
#include <pipewire/stream.h>
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
#include <pulse/introspect.h>
|
|
|
|
|
|
|
|
|
|
#include "internal.h"
|
|
|
|
|
|
|
|
|
|
static void node_event_info(void *object, struct pw_node_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
2018-06-05 20:10:31 +02:00
|
|
|
pw_log_debug("update %d", g->id);
|
2018-06-01 11:28:31 +02:00
|
|
|
g->info = pw_node_info_update(g->info, info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_node_proxy_events node_events = {
|
|
|
|
|
PW_VERSION_NODE_PROXY_EVENTS,
|
|
|
|
|
.info = node_event_info,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void module_event_info(void *object, struct pw_module_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
2018-06-05 20:10:31 +02:00
|
|
|
pw_log_debug("update %d", g->id);
|
2018-06-01 11:28:31 +02:00
|
|
|
g->info = pw_module_info_update(g->info, info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_module_proxy_events module_events = {
|
|
|
|
|
PW_VERSION_MODULE_PROXY_EVENTS,
|
|
|
|
|
.info = module_event_info,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void client_event_info(void *object, struct pw_client_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
2018-06-05 20:10:31 +02:00
|
|
|
pw_log_debug("update %d", g->id);
|
2018-06-01 11:28:31 +02:00
|
|
|
g->info = pw_client_info_update(g->info, info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_client_proxy_events client_events = {
|
|
|
|
|
PW_VERSION_CLIENT_PROXY_EVENTS,
|
|
|
|
|
.info = client_event_info,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static int ensure_global(pa_context *c, struct global *g)
|
|
|
|
|
{
|
|
|
|
|
uint32_t client_version;
|
|
|
|
|
const void *events;
|
|
|
|
|
pw_destroy_t destroy;
|
|
|
|
|
|
|
|
|
|
if (g->proxy != NULL)
|
|
|
|
|
return 0;
|
|
|
|
|
|
2018-08-24 11:00:33 +02:00
|
|
|
if (g->type == PW_ID_INTERFACE_Node) {
|
2018-06-01 11:28:31 +02:00
|
|
|
events = &node_events;
|
|
|
|
|
client_version = PW_VERSION_NODE;
|
|
|
|
|
destroy = (pw_destroy_t) pw_node_info_free;
|
|
|
|
|
}
|
2018-08-24 11:00:33 +02:00
|
|
|
else if (g->type == PW_ID_INTERFACE_Module) {
|
2018-06-01 11:28:31 +02:00
|
|
|
events = &module_events;
|
|
|
|
|
client_version = PW_VERSION_MODULE;
|
|
|
|
|
destroy = (pw_destroy_t) pw_module_info_free;
|
|
|
|
|
}
|
2018-08-24 11:00:33 +02:00
|
|
|
else if (g->type == PW_ID_INTERFACE_Client) {
|
2018-06-01 11:28:31 +02:00
|
|
|
events = &client_events;
|
|
|
|
|
client_version = PW_VERSION_CLIENT;
|
|
|
|
|
destroy = (pw_destroy_t) pw_client_info_free;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
2018-06-05 20:10:31 +02:00
|
|
|
pw_log_debug("bind %d", g->id);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
g->proxy = pw_registry_proxy_bind(c->registry_proxy, g->id, g->type,
|
|
|
|
|
client_version, 0);
|
|
|
|
|
if (g->proxy == NULL)
|
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
|
|
pw_proxy_add_proxy_listener(g->proxy, &g->proxy_proxy_listener, events, g);
|
|
|
|
|
g->destroy = destroy;
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
static void ensure_types(pa_context *c, uint32_t mask)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
|
|
|
|
struct global *g;
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
2018-07-03 22:03:25 +02:00
|
|
|
if (g->mask & mask)
|
|
|
|
|
ensure_global(c, g);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
struct sink_data {
|
|
|
|
|
pa_context *context;
|
|
|
|
|
pa_sink_info_cb_t cb;
|
|
|
|
|
void *userdata;
|
|
|
|
|
struct global *global;
|
|
|
|
|
};
|
|
|
|
|
|
2018-07-04 18:43:45 +02:00
|
|
|
static pa_sink_state_t node_state_to_sink(enum pw_node_state s)
|
|
|
|
|
{
|
|
|
|
|
switch(s) {
|
|
|
|
|
case PW_NODE_STATE_ERROR:
|
|
|
|
|
return PA_SINK_UNLINKED;
|
|
|
|
|
case PW_NODE_STATE_CREATING:
|
|
|
|
|
return PA_SINK_INIT;
|
|
|
|
|
case PW_NODE_STATE_SUSPENDED:
|
|
|
|
|
return PA_SINK_SUSPENDED;
|
|
|
|
|
case PW_NODE_STATE_IDLE:
|
|
|
|
|
return PA_SINK_IDLE;
|
|
|
|
|
case PW_NODE_STATE_RUNNING:
|
|
|
|
|
return PA_SINK_RUNNING;
|
|
|
|
|
default:
|
|
|
|
|
return PA_SINK_INVALID_STATE;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
static void sink_callback(struct sink_data *d)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = d->global;
|
|
|
|
|
struct pw_node_info *info = g->info;
|
|
|
|
|
pa_sink_info i;
|
2018-06-05 20:10:31 +02:00
|
|
|
pa_format_info ii[1];
|
|
|
|
|
pa_format_info *ip[1];
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
spa_zero(i);
|
|
|
|
|
i.index = g->id;
|
|
|
|
|
i.name = info->name;
|
2018-07-04 15:33:20 +02:00
|
|
|
i.description = info->name;
|
2018-06-01 11:28:31 +02:00
|
|
|
i.proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
i.owner_module = g->parent_id;
|
|
|
|
|
i.base_volume = PA_VOLUME_NORM;
|
2018-07-04 18:43:45 +02:00
|
|
|
i.state = node_state_to_sink(info->state);
|
2018-06-01 11:28:31 +02:00
|
|
|
i.n_volume_steps = PA_VOLUME_NORM+1;
|
2018-06-05 20:10:31 +02:00
|
|
|
i.n_formats = 1;
|
|
|
|
|
ii[0].encoding = PA_ENCODING_PCM;
|
|
|
|
|
ii[0].plist = pa_proplist_new();
|
|
|
|
|
ip[0] = ii;
|
|
|
|
|
i.formats = ip;
|
2018-06-01 11:28:31 +02:00
|
|
|
d->cb(d->context, &i, 0, d->userdata);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void sink_info(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct sink_data *d = userdata;
|
|
|
|
|
sink_callback(d);
|
|
|
|
|
d->cb(d->context, NULL, 1, d->userdata);
|
2018-06-05 20:10:31 +02:00
|
|
|
pa_operation_done(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
static struct global *find_type_by_name(pa_context *c, uint32_t mask, const char *name)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2018-07-03 22:03:25 +02:00
|
|
|
struct global *g;
|
2018-06-01 11:28:31 +02:00
|
|
|
const char *str;
|
|
|
|
|
|
2018-06-05 20:10:31 +02:00
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & mask))
|
|
|
|
|
continue;
|
|
|
|
|
if (g->props == NULL)
|
|
|
|
|
continue;
|
|
|
|
|
if ((str = pw_properties_get(g->props, "node.name")) == NULL)
|
|
|
|
|
continue;
|
|
|
|
|
if (strcmp(str, name) == 0)
|
2018-06-05 20:10:31 +02:00
|
|
|
return g;
|
|
|
|
|
}
|
2018-06-01 11:28:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-05 20:10:31 +02:00
|
|
|
pa_operation* pa_context_get_sink_info_by_name(pa_context *c, const char *name, pa_sink_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct global *g;
|
|
|
|
|
struct sink_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, !name || *name, PA_ERR_INVALID);
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
if ((g = find_type_by_name(c, PA_SUBSCRIPTION_MASK_SINK, name)) == NULL)
|
2018-06-05 20:10:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
ensure_global(c, g);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, sink_info, sizeof(struct sink_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
d->global = g;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-05 20:10:31 +02:00
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_get_sink_info_by_index(pa_context *c, uint32_t idx, pa_sink_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct global *g;
|
|
|
|
|
struct sink_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
2018-06-05 20:10:31 +02:00
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
2018-06-01 11:28:31 +02:00
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, idx != PA_INVALID_INDEX, PA_ERR_INVALID);
|
|
|
|
|
|
|
|
|
|
if ((g = pa_context_find_global(c, idx)) == NULL)
|
|
|
|
|
return NULL;
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & PA_SUBSCRIPTION_MASK_SINK))
|
2018-06-01 11:28:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
ensure_global(c, g);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, sink_info, sizeof(struct sink_data));
|
|
|
|
|
d = o->userdata;
|
2018-06-05 20:10:31 +02:00
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-06-01 11:28:31 +02:00
|
|
|
d->global = g;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void sink_info_list(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct sink_data *d = userdata;
|
|
|
|
|
pa_context *c = d->context;
|
|
|
|
|
struct global *g;
|
|
|
|
|
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & PA_SUBSCRIPTION_MASK_SINK))
|
2018-06-01 11:28:31 +02:00
|
|
|
continue;
|
|
|
|
|
d->global = g;
|
|
|
|
|
sink_callback(d);
|
|
|
|
|
}
|
|
|
|
|
d->cb(c, NULL, 1, d->userdata);
|
2018-06-05 20:10:31 +02:00
|
|
|
pa_operation_done(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_sink_info_list(pa_context *c, pa_sink_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct sink_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
ensure_types(c, PA_SUBSCRIPTION_MASK_SINK);
|
2018-06-01 11:28:31 +02:00
|
|
|
o = pa_operation_new(c, NULL, sink_info_list, sizeof(struct sink_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_sink_volume_by_index(pa_context *c, uint32_t idx, const pa_cvolume *volume, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-07-03 22:03:25 +02:00
|
|
|
pw_log_warn("Not Implemented %d", idx);
|
2018-06-01 11:28:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_sink_volume_by_name(pa_context *c, const char *name, const pa_cvolume *volume, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-07-03 22:03:25 +02:00
|
|
|
pw_log_warn("Not Implemented %s", name);
|
2018-06-01 11:28:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_sink_mute_by_index(pa_context *c, uint32_t idx, int mute, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-07-03 22:03:25 +02:00
|
|
|
pw_log_warn("Not Implemented %d", mute);
|
2018-06-01 11:28:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_sink_mute_by_name(pa_context *c, const char *name, int mute, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-07-03 22:03:25 +02:00
|
|
|
pw_log_warn("Not Implemented %s", name);
|
2018-06-01 11:28:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_suspend_sink_by_name(pa_context *c, const char *sink_name, int suspend, pa_context_success_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_suspend_sink_by_index(pa_context *c, uint32_t idx, int suspend, pa_context_success_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_sink_port_by_index(pa_context *c, uint32_t idx, const char*port, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_sink_port_by_name(pa_context *c, const char*name, const char*port, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
struct source_data {
|
|
|
|
|
pa_context *context;
|
|
|
|
|
pa_source_info_cb_t cb;
|
|
|
|
|
void *userdata;
|
|
|
|
|
struct global *global;
|
|
|
|
|
};
|
|
|
|
|
|
2018-07-04 18:43:45 +02:00
|
|
|
static pa_source_state_t node_state_to_source(enum pw_node_state s)
|
|
|
|
|
{
|
|
|
|
|
switch(s) {
|
|
|
|
|
case PW_NODE_STATE_ERROR:
|
|
|
|
|
return PA_SOURCE_UNLINKED;
|
|
|
|
|
case PW_NODE_STATE_CREATING:
|
|
|
|
|
return PA_SOURCE_INIT;
|
|
|
|
|
case PW_NODE_STATE_SUSPENDED:
|
|
|
|
|
return PA_SOURCE_SUSPENDED;
|
|
|
|
|
case PW_NODE_STATE_IDLE:
|
|
|
|
|
return PA_SOURCE_IDLE;
|
|
|
|
|
case PW_NODE_STATE_RUNNING:
|
|
|
|
|
return PA_SOURCE_RUNNING;
|
|
|
|
|
default:
|
|
|
|
|
return PA_SOURCE_INVALID_STATE;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-06-01 11:28:31 +02:00
|
|
|
static void source_callback(struct source_data *d)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = d->global;
|
|
|
|
|
struct pw_node_info *info = g->info;
|
|
|
|
|
pa_source_info i;
|
2018-07-04 18:43:45 +02:00
|
|
|
pa_format_info ii[1];
|
|
|
|
|
pa_format_info *ip[1];
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
spa_zero(i);
|
|
|
|
|
i.index = g->id;
|
|
|
|
|
i.name = info->name;
|
2018-07-04 18:43:45 +02:00
|
|
|
i.description = info->name;
|
2018-06-01 11:28:31 +02:00
|
|
|
i.proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
i.owner_module = g->parent_id;
|
|
|
|
|
i.base_volume = PA_VOLUME_NORM;
|
2018-07-04 18:43:45 +02:00
|
|
|
i.state = node_state_to_source(info->state);
|
2018-06-01 11:28:31 +02:00
|
|
|
i.n_volume_steps = PA_VOLUME_NORM+1;
|
2018-07-04 18:43:45 +02:00
|
|
|
i.n_formats = 1;
|
|
|
|
|
ii[0].encoding = PA_ENCODING_PCM;
|
|
|
|
|
ii[0].plist = pa_proplist_new();
|
|
|
|
|
ip[0] = ii;
|
|
|
|
|
i.formats = ip;
|
2018-06-01 11:28:31 +02:00
|
|
|
d->cb(d->context, &i, 0, d->userdata);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void source_info(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct source_data *d = userdata;
|
|
|
|
|
source_callback(d);
|
|
|
|
|
d->cb(d->context, NULL, 1, d->userdata);
|
2018-07-04 15:33:20 +02:00
|
|
|
pa_operation_done(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_source_info_by_name(pa_context *c, const char *name, pa_source_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_source_info_by_index(pa_context *c, uint32_t idx, pa_source_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct global *g;
|
|
|
|
|
struct source_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, idx != PA_INVALID_INDEX, PA_ERR_INVALID);
|
|
|
|
|
|
|
|
|
|
if ((g = pa_context_find_global(c, idx)) == NULL)
|
|
|
|
|
return NULL;
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & PA_SUBSCRIPTION_MASK_SOURCE))
|
2018-06-01 11:28:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
ensure_global(c, g);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, source_info, sizeof(struct source_data));
|
|
|
|
|
d = o->userdata;
|
2018-07-03 22:03:25 +02:00
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-06-01 11:28:31 +02:00
|
|
|
d->global = g;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void source_info_list(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct source_data *d = userdata;
|
|
|
|
|
pa_context *c = d->context;
|
|
|
|
|
struct global *g;
|
|
|
|
|
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & PA_SUBSCRIPTION_MASK_SOURCE))
|
2018-06-01 11:28:31 +02:00
|
|
|
continue;
|
|
|
|
|
d->global = g;
|
|
|
|
|
source_callback(d);
|
|
|
|
|
}
|
|
|
|
|
d->cb(c, NULL, 1, d->userdata);
|
2018-07-04 15:33:20 +02:00
|
|
|
pa_operation_done(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_source_info_list(pa_context *c, pa_source_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct source_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
ensure_types(c, PA_SUBSCRIPTION_MASK_SOURCE);
|
2018-06-01 11:28:31 +02:00
|
|
|
o = pa_operation_new(c, NULL, source_info_list, sizeof(struct source_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_source_volume_by_index(pa_context *c, uint32_t idx, const pa_cvolume *volume, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_source_volume_by_name(pa_context *c, const char *name, const pa_cvolume *volume, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_source_mute_by_index(pa_context *c, uint32_t idx, int mute, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_source_mute_by_name(pa_context *c, const char *name, int mute, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_suspend_source_by_name(pa_context *c, const char *source_name, int suspend, pa_context_success_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_suspend_source_by_index(pa_context *c, uint32_t idx, int suspend, pa_context_success_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_source_port_by_index(pa_context *c, uint32_t idx, const char*port, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_source_port_by_name(pa_context *c, const char*name, const char*port, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_server_info(pa_context *c, pa_server_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
struct module_data {
|
|
|
|
|
pa_context *context;
|
|
|
|
|
pa_module_info_cb_t cb;
|
|
|
|
|
void *userdata;
|
|
|
|
|
struct global *global;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void module_callback(struct module_data *d)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = d->global;
|
|
|
|
|
struct pw_module_info *info = g->info;
|
|
|
|
|
pa_module_info i;
|
|
|
|
|
|
|
|
|
|
spa_zero(i);
|
|
|
|
|
i.proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
i.index = g->id;
|
|
|
|
|
i.name = info->name;
|
|
|
|
|
i.argument = info->args;
|
|
|
|
|
i.n_used = -1;
|
|
|
|
|
i.auto_unload = false;
|
|
|
|
|
d->cb(d->context, &i, 0, d->userdata);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void module_info(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct module_data *d = userdata;
|
|
|
|
|
module_callback(d);
|
|
|
|
|
d->cb(d->context, NULL, 1, d->userdata);
|
2018-07-04 15:33:20 +02:00
|
|
|
pa_operation_done(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_module_info(pa_context *c, uint32_t idx, pa_module_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct global *g;
|
|
|
|
|
struct module_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, idx != PA_INVALID_INDEX, PA_ERR_INVALID);
|
|
|
|
|
|
|
|
|
|
if ((g = pa_context_find_global(c, idx)) == NULL)
|
|
|
|
|
return NULL;
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & PA_SUBSCRIPTION_MASK_MODULE))
|
2018-06-01 11:28:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
ensure_global(c, g);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, module_info, sizeof(struct module_data));
|
|
|
|
|
d = o->userdata;
|
2018-07-03 22:03:25 +02:00
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-06-01 11:28:31 +02:00
|
|
|
d->global = g;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void module_info_list(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct module_data *d = userdata;
|
|
|
|
|
pa_context *c = d->context;
|
|
|
|
|
struct global *g;
|
|
|
|
|
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & PA_SUBSCRIPTION_MASK_MODULE))
|
2018-06-01 11:28:31 +02:00
|
|
|
continue;
|
|
|
|
|
d->global = g;
|
|
|
|
|
module_callback(d);
|
|
|
|
|
}
|
|
|
|
|
d->cb(c, NULL, 1, d->userdata);
|
2018-07-04 15:33:20 +02:00
|
|
|
pa_operation_done(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_module_info_list(pa_context *c, pa_module_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct module_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
ensure_types(c, PA_SUBSCRIPTION_MASK_MODULE);
|
2018-06-01 11:28:31 +02:00
|
|
|
o = pa_operation_new(c, NULL, module_info_list, sizeof(struct module_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_load_module(pa_context *c, const char*name, const char *argument, pa_context_index_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_unload_module(pa_context *c, uint32_t idx, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
struct client_data {
|
|
|
|
|
pa_context *context;
|
|
|
|
|
pa_client_info_cb_t cb;
|
|
|
|
|
void *userdata;
|
|
|
|
|
struct global *global;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void client_callback(struct client_data *d)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = d->global;
|
|
|
|
|
struct pw_client_info *info = g->info;
|
|
|
|
|
pa_client_info i;
|
|
|
|
|
|
|
|
|
|
spa_zero(i);
|
|
|
|
|
i.proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
i.index = g->id;
|
|
|
|
|
i.name = info->props ?
|
|
|
|
|
spa_dict_lookup(info->props, "application.prgname") : NULL;
|
|
|
|
|
i.owner_module = g->parent_id;
|
|
|
|
|
i.driver = info->props ?
|
|
|
|
|
spa_dict_lookup(info->props, PW_CLIENT_PROP_PROTOCOL) : NULL;
|
|
|
|
|
d->cb(d->context, &i, 0, d->userdata);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void client_info(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct client_data *d = userdata;
|
|
|
|
|
client_callback(d);
|
|
|
|
|
d->cb(d->context, NULL, 1, d->userdata);
|
2018-07-04 15:33:20 +02:00
|
|
|
pa_operation_done(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_client_info(pa_context *c, uint32_t idx, pa_client_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct global *g;
|
|
|
|
|
struct client_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, idx != PA_INVALID_INDEX, PA_ERR_INVALID);
|
|
|
|
|
|
|
|
|
|
if ((g = pa_context_find_global(c, idx)) == NULL)
|
|
|
|
|
return NULL;
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & PA_SUBSCRIPTION_MASK_CLIENT))
|
2018-06-01 11:28:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
ensure_global(c, g);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, client_info, sizeof(struct client_data));
|
|
|
|
|
d = o->userdata;
|
2018-07-03 22:03:25 +02:00
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-06-01 11:28:31 +02:00
|
|
|
d->global = g;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void client_info_list(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct client_data *d = userdata;
|
|
|
|
|
pa_context *c = d->context;
|
|
|
|
|
struct global *g;
|
|
|
|
|
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & PA_SUBSCRIPTION_MASK_CLIENT))
|
2018-06-01 11:28:31 +02:00
|
|
|
continue;
|
|
|
|
|
d->global = g;
|
|
|
|
|
client_callback(d);
|
|
|
|
|
}
|
|
|
|
|
d->cb(c, NULL, 1, d->userdata);
|
2018-07-04 15:33:20 +02:00
|
|
|
pa_operation_done(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_client_info_list(pa_context *c, pa_client_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct client_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
ensure_types(c, PA_SUBSCRIPTION_MASK_CLIENT);
|
2018-06-01 11:28:31 +02:00
|
|
|
o = pa_operation_new(c, NULL, client_info_list, sizeof(struct client_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_kill_client(pa_context *c, uint32_t idx, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_card_info_by_index(pa_context *c, uint32_t idx, pa_card_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_card_info_by_name(pa_context *c, const char *name, pa_card_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_card_info_list(pa_context *c, pa_card_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_card_profile_by_index(pa_context *c, uint32_t idx, const char*profile, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_card_profile_by_name(pa_context *c, const char*name, const char*profile, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_port_latency_offset(pa_context *c, const char *card_name, const char *port_name, int64_t offset, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-05 20:10:31 +02:00
|
|
|
struct sink_input_data {
|
|
|
|
|
pa_context *context;
|
|
|
|
|
pa_sink_input_info_cb_t cb;
|
|
|
|
|
void *userdata;
|
|
|
|
|
struct global *global;
|
|
|
|
|
};
|
|
|
|
|
|
2018-07-04 15:33:20 +02:00
|
|
|
static pa_stream *find_stream(pa_context *c, uint32_t idx)
|
|
|
|
|
{
|
|
|
|
|
pa_stream *s;
|
|
|
|
|
spa_list_for_each(s, &c->streams, link) {
|
|
|
|
|
if (pw_stream_get_node_id(s->stream) == idx)
|
|
|
|
|
return s;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-05 20:10:31 +02:00
|
|
|
static void sink_input_callback(struct sink_input_data *d)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = d->global;
|
|
|
|
|
struct pw_node_info *info = g->info;
|
|
|
|
|
pa_sink_input_info i;
|
|
|
|
|
pa_format_info ii[1];
|
2018-07-04 15:33:20 +02:00
|
|
|
pa_stream *s;
|
2018-06-05 20:10:31 +02:00
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
pw_log_debug("index %d", g->id);
|
2018-07-04 15:33:20 +02:00
|
|
|
s = find_stream(d->context, g->id);
|
|
|
|
|
|
2018-06-05 20:10:31 +02:00
|
|
|
spa_zero(i);
|
|
|
|
|
i.index = g->id;
|
|
|
|
|
i.name = info->name;
|
|
|
|
|
i.owner_module = g->parent_id;
|
2018-07-04 18:43:45 +02:00
|
|
|
i.client = PA_INVALID_INDEX;
|
|
|
|
|
i.sink = PA_INVALID_INDEX;
|
|
|
|
|
pa_cvolume_init(&i.volume);
|
|
|
|
|
if (s) {
|
|
|
|
|
i.sample_spec = s->sample_spec;
|
|
|
|
|
i.channel_map = s->channel_map;
|
|
|
|
|
pa_cvolume_set(&i.volume, 1, s->volume * PA_VOLUME_NORM);
|
|
|
|
|
i.format = s->format;
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
pa_channel_map_init(&i.channel_map);
|
|
|
|
|
pa_sample_spec_init(&i.sample_spec);
|
|
|
|
|
ii[0].encoding = PA_ENCODING_PCM;
|
|
|
|
|
ii[0].plist = pa_proplist_new();
|
|
|
|
|
i.format = ii;
|
|
|
|
|
}
|
|
|
|
|
i.buffer_usec = 0;
|
|
|
|
|
i.sink_usec = 0;
|
2018-07-03 22:03:25 +02:00
|
|
|
i.resample_method = "PipeWire resampler";
|
|
|
|
|
i.driver = "PipeWire";
|
|
|
|
|
i.mute = false;
|
2018-07-04 18:43:45 +02:00
|
|
|
i.proplist = pa_proplist_new_dict(info->props);
|
2018-07-03 22:03:25 +02:00
|
|
|
i.corked = false;
|
|
|
|
|
i.has_volume = true;
|
|
|
|
|
i.volume_writable = true;
|
2018-06-05 20:10:31 +02:00
|
|
|
d->cb(d->context, &i, 0, d->userdata);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void sink_input_info(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct sink_input_data *d = userdata;
|
|
|
|
|
sink_input_callback(d);
|
|
|
|
|
d->cb(d->context, NULL, 1, d->userdata);
|
2018-07-04 15:33:20 +02:00
|
|
|
pa_operation_done(o);
|
2018-06-05 20:10:31 +02:00
|
|
|
}
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_get_sink_input_info(pa_context *c, uint32_t idx, pa_sink_input_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-05 20:10:31 +02:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct global *g;
|
|
|
|
|
struct sink_input_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, idx != PA_INVALID_INDEX, PA_ERR_INVALID);
|
|
|
|
|
|
|
|
|
|
if ((g = pa_context_find_global(c, idx)) == NULL)
|
|
|
|
|
return NULL;
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & PA_SUBSCRIPTION_MASK_SINK_INPUT))
|
2018-06-05 20:10:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
ensure_global(c, g);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, sink_input_info, sizeof(struct sink_input_data));
|
|
|
|
|
d = o->userdata;
|
2018-07-03 22:03:25 +02:00
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-06-05 20:10:31 +02:00
|
|
|
d->global = g;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-05 20:10:31 +02:00
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void sink_input_info_list(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct sink_input_data *d = userdata;
|
|
|
|
|
pa_context *c = d->context;
|
|
|
|
|
struct global *g;
|
|
|
|
|
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
2018-07-03 22:03:25 +02:00
|
|
|
if (!(g->mask & PA_SUBSCRIPTION_MASK_SINK_INPUT))
|
2018-06-05 20:10:31 +02:00
|
|
|
continue;
|
|
|
|
|
d->global = g;
|
|
|
|
|
sink_input_callback(d);
|
|
|
|
|
}
|
|
|
|
|
d->cb(c, NULL, 1, d->userdata);
|
2018-07-04 15:33:20 +02:00
|
|
|
pa_operation_done(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_sink_input_info_list(pa_context *c, pa_sink_input_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-05 20:10:31 +02:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct sink_input_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(cb);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
ensure_types(c, PA_SUBSCRIPTION_MASK_SINK_INPUT);
|
2018-06-05 20:10:31 +02:00
|
|
|
o = pa_operation_new(c, NULL, sink_input_info_list, sizeof(struct sink_input_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->context = c;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-05 20:10:31 +02:00
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_move_sink_input_by_name(pa_context *c, uint32_t idx, const char *sink_name, pa_context_success_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_move_sink_input_by_index(pa_context *c, uint32_t idx, uint32_t sink_idx, pa_context_success_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
struct success_ack {
|
|
|
|
|
pa_context_success_cb_t cb;
|
|
|
|
|
void *userdata;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void on_success(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct success_ack *d = userdata;
|
|
|
|
|
pa_context *c = o->context;
|
|
|
|
|
if (d->cb)
|
|
|
|
|
d->cb(c, PA_OK, d->userdata);
|
2018-07-04 15:33:20 +02:00
|
|
|
pa_operation_done(o);
|
2018-07-03 22:03:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_sink_input_volume(pa_context *c, uint32_t idx, const pa_cvolume *volume, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_stream *s;
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_ack *d;
|
|
|
|
|
|
|
|
|
|
if ((s = find_stream(c, idx)) == NULL)
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
s->volume = pa_cvolume_avg(volume) / (float) PA_VOLUME_NORM;
|
|
|
|
|
pw_stream_set_control(s->stream, PW_STREAM_CONTROL_VOLUME, s->volume);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_ack));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-07-03 22:03:25 +02:00
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_set_sink_input_mute(pa_context *c, uint32_t idx, int mute, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-07-03 22:03:25 +02:00
|
|
|
pa_stream *s;
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_ack *d;
|
|
|
|
|
|
|
|
|
|
if ((s = find_stream(c, idx)) == NULL)
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
if (mute)
|
|
|
|
|
pw_stream_set_control(s->stream, PW_STREAM_CONTROL_VOLUME, 0.0);
|
|
|
|
|
else
|
|
|
|
|
pw_stream_set_control(s->stream, PW_STREAM_CONTROL_VOLUME, s->volume);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_ack));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-07-03 22:03:25 +02:00
|
|
|
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_kill_sink_input(pa_context *c, uint32_t idx, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_source_output_info(pa_context *c, uint32_t idx, pa_source_output_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_source_output_info_list(pa_context *c, pa_source_output_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_move_source_output_by_name(pa_context *c, uint32_t idx, const char *source_name, pa_context_success_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_move_source_output_by_index(pa_context *c, uint32_t idx, uint32_t source_idx, pa_context_success_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_source_output_volume(pa_context *c, uint32_t idx, const pa_cvolume *volume, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_set_source_output_mute(pa_context *c, uint32_t idx, int mute, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_kill_source_output(pa_context *c, uint32_t idx, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_stat(pa_context *c, pa_stat_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_sample_info_by_name(pa_context *c, const char *name, pa_sample_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_sample_info_by_index(pa_context *c, uint32_t idx, pa_sample_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_sample_info_list(pa_context *c, pa_sample_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_autoload_info_by_name(pa_context *c, const char *name, pa_autoload_type_t type, pa_autoload_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Deprecated: Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_autoload_info_by_index(pa_context *c, uint32_t idx, pa_autoload_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Deprecated: Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_get_autoload_info_list(pa_context *c, pa_autoload_info_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Deprecated: Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_add_autoload(pa_context *c, const char *name, pa_autoload_type_t type, const char *module, const char*argument, pa_context_index_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Deprecated: Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_remove_autoload_by_name(pa_context *c, const char *name, pa_autoload_type_t type, pa_context_success_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Deprecated: Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_operation* pa_context_remove_autoload_by_index(pa_context *c, uint32_t idx, pa_context_success_cb_t cb, void* userdata)
|
|
|
|
|
{
|
|
|
|
|
pw_log_warn("Deprecated: Not Implemented");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|