2018-06-01 11:28:31 +02:00
|
|
|
/* PipeWire
|
|
|
|
|
* Copyright (C) 2018 Wim Taymans <wim.taymans@gmail.com>
|
|
|
|
|
*
|
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
|
* modify it under the terms of the GNU Library General Public
|
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
|
* version 2 of the License, or (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
* Library General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Library General Public
|
|
|
|
|
* License along with this library; if not, write to the
|
|
|
|
|
* Free Software Foundation, Inc., 51 Franklin St, Fifth Floor,
|
|
|
|
|
* Boston, MA 02110-1301, USA.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
|
2019-03-15 20:31:20 +01:00
|
|
|
#include <spa/param/props.h>
|
|
|
|
|
|
2019-01-14 13:01:47 +01:00
|
|
|
#include <pipewire/pipewire.h>
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
#include <pulse/context.h>
|
2018-06-07 11:16:09 +02:00
|
|
|
#include <pulse/timeval.h>
|
2018-12-03 15:12:27 +01:00
|
|
|
#include <pulse/error.h>
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
#include "internal.h"
|
|
|
|
|
|
|
|
|
|
int pa_context_set_error(pa_context *c, int error) {
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(error >= 0);
|
|
|
|
|
pa_assert(error < PA_ERR_MAX);
|
2018-12-14 16:39:19 +01:00
|
|
|
if (c && c->error != error) {
|
|
|
|
|
pw_log_debug("context %p: error %d %s", c, error, pa_strerror(error));
|
2018-06-01 11:28:31 +02:00
|
|
|
c->error = error;
|
2018-12-14 16:39:19 +01:00
|
|
|
}
|
2018-06-01 11:28:31 +02:00
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-12 12:15:28 +01:00
|
|
|
static void global_free(pa_context *c, struct global *g)
|
2019-01-30 15:24:07 +01:00
|
|
|
{
|
|
|
|
|
spa_list_remove(&g->link);
|
2019-03-12 12:15:28 +01:00
|
|
|
|
2019-03-15 20:31:20 +01:00
|
|
|
if (g->destroy)
|
|
|
|
|
g->destroy(g);
|
|
|
|
|
if (g->proxy) {
|
2019-05-29 10:38:49 +02:00
|
|
|
spa_hook_remove(&g->object_listener);
|
2019-03-15 20:31:20 +01:00
|
|
|
spa_hook_remove(&g->proxy_listener);
|
|
|
|
|
pw_proxy_destroy(g->proxy);
|
|
|
|
|
}
|
2019-01-30 15:24:07 +01:00
|
|
|
if (g->props)
|
|
|
|
|
pw_properties_free(g->props);
|
|
|
|
|
free(g);
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
static void context_unlink(pa_context *c)
|
|
|
|
|
{
|
|
|
|
|
pa_stream *s, *t;
|
2019-01-30 15:24:07 +01:00
|
|
|
struct global *g;
|
2018-12-14 16:41:19 +01:00
|
|
|
pa_operation *o;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("context %p: unlink %d", c, c->state);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2019-03-14 13:23:20 +01:00
|
|
|
c->disconnect = true;
|
|
|
|
|
c->state_callback = NULL;
|
|
|
|
|
c->state_userdata = NULL;
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
spa_list_for_each_safe(s, t, &c->streams, link) {
|
|
|
|
|
pa_stream_set_state(s, c->state == PA_CONTEXT_FAILED ?
|
|
|
|
|
PA_STREAM_FAILED : PA_STREAM_TERMINATED);
|
|
|
|
|
}
|
2019-01-30 15:24:07 +01:00
|
|
|
spa_list_consume(g, &c->globals, link)
|
2019-03-12 12:15:28 +01:00
|
|
|
global_free(c, g);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2018-12-14 16:41:19 +01:00
|
|
|
spa_list_consume(o, &c->operations, link)
|
|
|
|
|
pa_operation_cancel(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void pa_context_set_state(pa_context *c, pa_context_state_t st) {
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
if (c->state == st)
|
|
|
|
|
return;
|
|
|
|
|
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("context %p: state %d", c, st);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context_ref(c);
|
|
|
|
|
|
|
|
|
|
c->state = st;
|
|
|
|
|
|
|
|
|
|
if (c->state_callback)
|
|
|
|
|
c->state_callback(c, c->state_userdata);
|
|
|
|
|
|
|
|
|
|
if (st == PA_CONTEXT_FAILED || st == PA_CONTEXT_TERMINATED)
|
|
|
|
|
context_unlink(c);
|
|
|
|
|
|
|
|
|
|
pa_context_unref(c);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void context_fail(pa_context *c, int error) {
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("context %p: error %d", c, error);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context_set_error(c, error);
|
|
|
|
|
pa_context_set_state(c, PA_CONTEXT_FAILED);
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context *pa_context_new(pa_mainloop_api *mainloop, const char *name)
|
|
|
|
|
{
|
|
|
|
|
return pa_context_new_with_proplist(mainloop, name, NULL);
|
|
|
|
|
}
|
|
|
|
|
|
2018-07-04 15:33:20 +02:00
|
|
|
struct global *pa_context_find_global(pa_context *c, uint32_t id)
|
|
|
|
|
{
|
|
|
|
|
struct global *g;
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
|
|
|
|
if (g->id == id)
|
|
|
|
|
return g;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-12-04 11:48:15 +01:00
|
|
|
struct global *pa_context_find_global_by_name(pa_context *c, uint32_t mask, const char *name)
|
|
|
|
|
{
|
|
|
|
|
struct global *g;
|
|
|
|
|
const char *str;
|
|
|
|
|
uint32_t id = atoi(name);
|
|
|
|
|
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
2018-12-11 16:37:30 +01:00
|
|
|
if ((g->mask & mask) == 0)
|
2018-12-04 11:48:15 +01:00
|
|
|
continue;
|
|
|
|
|
if (g->props != NULL &&
|
2019-05-24 15:47:05 +02:00
|
|
|
(str = pw_properties_get(g->props, PW_KEY_NODE_NAME)) != NULL &&
|
2018-12-04 11:48:15 +01:00
|
|
|
strcmp(str, name) == 0)
|
|
|
|
|
return g;
|
2019-07-02 17:38:16 +02:00
|
|
|
if (g->id == id || (g->id == (id & PA_IDX_MASK_DSP)))
|
2018-12-04 11:48:15 +01:00
|
|
|
return g;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-28 11:13:21 +01:00
|
|
|
struct global *pa_context_find_linked(pa_context *c, uint32_t idx)
|
|
|
|
|
{
|
|
|
|
|
struct global *g, *f;
|
|
|
|
|
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
|
|
|
|
if (g->type != PW_TYPE_INTERFACE_Link)
|
|
|
|
|
continue;
|
|
|
|
|
|
2018-11-29 17:30:24 +01:00
|
|
|
pw_log_debug("context %p: %p %d %d %d", c, g, idx,
|
2018-11-28 11:13:21 +01:00
|
|
|
g->link_info.src->parent_id,
|
|
|
|
|
g->link_info.dst->parent_id);
|
|
|
|
|
|
|
|
|
|
if (g->link_info.src->parent_id == idx)
|
|
|
|
|
f = pa_context_find_global(c, g->link_info.dst->parent_id);
|
|
|
|
|
else if (g->link_info.dst->parent_id == idx)
|
|
|
|
|
f = pa_context_find_global(c, g->link_info.src->parent_id);
|
|
|
|
|
else
|
|
|
|
|
continue;
|
|
|
|
|
if (f == NULL)
|
|
|
|
|
continue;
|
|
|
|
|
return f;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-12-14 16:41:19 +01:00
|
|
|
static void emit_event(pa_context *c, struct global *g, pa_subscription_event_type_t event)
|
|
|
|
|
{
|
2019-07-02 17:38:16 +02:00
|
|
|
if (c->subscribe_callback && (c->subscribe_mask & g->mask)) {
|
|
|
|
|
pw_log_debug("context %p: obj %d: emit %d:%d", c, g->id, event, g->event);
|
|
|
|
|
c->subscribe_callback(c,
|
|
|
|
|
event | g->event,
|
|
|
|
|
g->id,
|
|
|
|
|
c->subscribe_userdata);
|
|
|
|
|
|
|
|
|
|
if (g->mask == (PA_SUBSCRIPTION_MASK_SINK | PA_SUBSCRIPTION_MASK_SOURCE)) {
|
|
|
|
|
pw_log_debug("context %p: obj %d: emit %d:%d", c, g->node_info.monitor,
|
|
|
|
|
event, PA_SUBSCRIPTION_EVENT_SOURCE);
|
2018-12-14 16:41:19 +01:00
|
|
|
c->subscribe_callback(c,
|
2019-07-02 17:38:16 +02:00
|
|
|
event | PA_SUBSCRIPTION_EVENT_SOURCE,
|
|
|
|
|
g->node_info.monitor,
|
2018-12-14 16:41:19 +01:00
|
|
|
c->subscribe_userdata);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-15 20:31:20 +01:00
|
|
|
static void device_event_info(void *object, const struct pw_device_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
|
|
|
|
pa_card_info *i = &g->card_info.info;
|
|
|
|
|
uint32_t n;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("global %p: id:%d change-mask:%"PRIu64, g, g->id, info->change_mask);
|
|
|
|
|
info = g->info = pw_device_info_update(g->info, info);
|
|
|
|
|
|
|
|
|
|
i->index = g->id;
|
|
|
|
|
i->name = info->name;
|
|
|
|
|
i->owner_module = g->parent_id;
|
|
|
|
|
if (info->change_mask & PW_DEVICE_CHANGE_MASK_PROPS) {
|
|
|
|
|
i->driver = info->props ?
|
2019-05-24 15:47:05 +02:00
|
|
|
spa_dict_lookup(info->props, PW_KEY_DEVICE_API) : NULL;
|
2019-03-15 20:31:20 +01:00
|
|
|
if (i->proplist)
|
|
|
|
|
pa_proplist_update_dict(i->proplist, info->props);
|
|
|
|
|
else
|
|
|
|
|
i->proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
}
|
|
|
|
|
if (info->change_mask & PW_DEVICE_CHANGE_MASK_PARAMS) {
|
|
|
|
|
for (n = 0; n < info->n_params; n++) {
|
|
|
|
|
if (!(info->params[n].flags & SPA_PARAM_INFO_READ))
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
switch (info->params[n].id) {
|
|
|
|
|
case SPA_PARAM_EnumProfile:
|
|
|
|
|
pw_device_proxy_enum_params((struct pw_device_proxy*)g->proxy,
|
|
|
|
|
0, SPA_PARAM_EnumProfile, 0, -1, NULL);
|
|
|
|
|
break;
|
|
|
|
|
case SPA_PARAM_Profile:
|
|
|
|
|
pw_device_proxy_enum_params((struct pw_device_proxy*)g->proxy,
|
|
|
|
|
0, SPA_PARAM_Profile, 0, -1, NULL);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
g->pending_seq = pw_proxy_sync(g->proxy, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void device_event_param(void *object, int seq,
|
|
|
|
|
uint32_t id, uint32_t index, uint32_t next,
|
|
|
|
|
const struct spa_pod *param)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
|
|
|
|
|
|
|
|
|
switch (id) {
|
|
|
|
|
case SPA_PARAM_EnumProfile:
|
|
|
|
|
{
|
|
|
|
|
uint32_t id;
|
|
|
|
|
const char *name;
|
|
|
|
|
struct param *p;
|
|
|
|
|
|
|
|
|
|
if (spa_pod_parse_object(param,
|
|
|
|
|
SPA_TYPE_OBJECT_ParamProfile, NULL,
|
|
|
|
|
SPA_PARAM_PROFILE_index, SPA_POD_Int(&id),
|
|
|
|
|
SPA_PARAM_PROFILE_name, SPA_POD_String(&name)) < 0) {
|
|
|
|
|
pw_log_warn("device %d: can't parse profile", g->id);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
p = malloc(sizeof(struct param) + SPA_POD_SIZE(param));
|
|
|
|
|
if (p) {
|
|
|
|
|
p->id = id;
|
|
|
|
|
p->seq = seq;
|
|
|
|
|
p->param = SPA_MEMBER(p, sizeof(struct param), struct spa_pod);
|
|
|
|
|
memcpy(p->param, param, SPA_POD_SIZE(param));
|
|
|
|
|
spa_list_append(&g->card_info.profiles, &p->link);
|
|
|
|
|
g->card_info.n_profiles++;
|
|
|
|
|
}
|
|
|
|
|
pw_log_debug("device %d: enum profile %d: \"%s\"", g->id, id, name);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
case SPA_PARAM_Profile:
|
|
|
|
|
{
|
|
|
|
|
uint32_t id;
|
|
|
|
|
if (spa_pod_parse_object(param,
|
|
|
|
|
SPA_TYPE_OBJECT_ParamProfile, NULL,
|
|
|
|
|
SPA_PARAM_PROFILE_index, SPA_POD_Int(&id)) < 0) {
|
|
|
|
|
pw_log_warn("device %d: can't parse profile", g->id);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
g->card_info.active_profile = id;
|
|
|
|
|
pw_log_debug("device %d: current profile %d", g->id, id);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_device_proxy_events device_events = {
|
|
|
|
|
PW_VERSION_DEVICE_PROXY_EVENTS,
|
|
|
|
|
.info = device_event_info,
|
|
|
|
|
.param = device_event_param,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void device_destroy(void *data)
|
|
|
|
|
{
|
|
|
|
|
struct global *global = data;
|
|
|
|
|
struct param *p;
|
|
|
|
|
|
|
|
|
|
if (global->card_info.info.proplist)
|
|
|
|
|
pa_proplist_free(global->card_info.info.proplist);
|
|
|
|
|
spa_list_consume(p, &global->card_info.profiles, link) {
|
|
|
|
|
spa_list_remove(&p->link);
|
|
|
|
|
free(p);
|
|
|
|
|
}
|
|
|
|
|
if (global->info)
|
|
|
|
|
pw_device_info_free(global->info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void node_event_info(void *object, const struct pw_node_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
|
|
|
|
uint32_t i;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("update %d %"PRIu64, g->id, info->change_mask);
|
|
|
|
|
g->info = pw_node_info_update(g->info, info);
|
|
|
|
|
|
2019-03-18 16:11:23 +01:00
|
|
|
if (info->change_mask & PW_NODE_CHANGE_MASK_PARAMS && !g->subscribed) {
|
|
|
|
|
uint32_t subscribed[32], n_subscribed = 0;
|
2019-03-15 20:31:20 +01:00
|
|
|
|
2019-03-18 16:11:23 +01:00
|
|
|
for (i = 0; i < info->n_params; i++) {
|
2019-03-15 20:31:20 +01:00
|
|
|
switch (info->params[i].id) {
|
|
|
|
|
case SPA_PARAM_EnumFormat:
|
|
|
|
|
case SPA_PARAM_Props:
|
2019-03-18 16:11:23 +01:00
|
|
|
subscribed[n_subscribed++] = info->params[i].id;
|
2019-03-15 20:31:20 +01:00
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
2019-03-18 16:11:23 +01:00
|
|
|
if (n_subscribed > 0) {
|
|
|
|
|
pw_node_proxy_subscribe_params((struct pw_node_proxy*)g->proxy,
|
|
|
|
|
subscribed, n_subscribed);
|
|
|
|
|
g->subscribed = true;
|
|
|
|
|
}
|
2019-03-15 20:31:20 +01:00
|
|
|
}
|
|
|
|
|
g->pending_seq = pw_proxy_sync(g->proxy, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void node_event_param(void *object, int seq,
|
|
|
|
|
uint32_t id, uint32_t index, uint32_t next,
|
|
|
|
|
const struct spa_pod *param)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
|
|
|
|
pw_log_debug("update param %d %d", g->id, id);
|
|
|
|
|
|
|
|
|
|
switch (id) {
|
|
|
|
|
case SPA_PARAM_Props:
|
|
|
|
|
{
|
|
|
|
|
struct spa_pod_prop *prop;
|
|
|
|
|
struct spa_pod_object *obj = (struct spa_pod_object *) param;
|
|
|
|
|
|
|
|
|
|
SPA_POD_OBJECT_FOREACH(obj, prop) {
|
|
|
|
|
switch (prop->key) {
|
|
|
|
|
case SPA_PROP_volume:
|
|
|
|
|
spa_pod_get_float(&prop->value, &g->node_info.volume);
|
|
|
|
|
break;
|
|
|
|
|
case SPA_PROP_mute:
|
|
|
|
|
spa_pod_get_bool(&prop->value, &g->node_info.mute);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_node_proxy_events node_events = {
|
|
|
|
|
PW_VERSION_NODE_PROXY_EVENTS,
|
|
|
|
|
.info = node_event_info,
|
|
|
|
|
.param = node_event_param,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void node_destroy(void *data)
|
|
|
|
|
{
|
|
|
|
|
struct global *global = data;
|
|
|
|
|
if (global->info)
|
|
|
|
|
pw_node_info_free(global->info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void module_event_info(void *object, const struct pw_module_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
|
|
|
|
pa_module_info *i = &g->module_info.info;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("update %d", g->id);
|
|
|
|
|
|
|
|
|
|
info = g->info = pw_module_info_update(g->info, info);
|
|
|
|
|
|
|
|
|
|
i->index = g->id;
|
|
|
|
|
if (info->change_mask & PW_MODULE_CHANGE_MASK_PROPS) {
|
|
|
|
|
if (i->proplist)
|
|
|
|
|
pa_proplist_update_dict(i->proplist, info->props);
|
|
|
|
|
else
|
|
|
|
|
i->proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (info->change_mask & PW_MODULE_CHANGE_MASK_NAME)
|
|
|
|
|
i->name = info->name;
|
|
|
|
|
if (info->change_mask & PW_MODULE_CHANGE_MASK_ARGS)
|
|
|
|
|
i->argument = info->args;
|
|
|
|
|
i->n_used = -1;
|
|
|
|
|
i->auto_unload = false;
|
|
|
|
|
g->pending_seq = pw_proxy_sync(g->proxy, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_module_proxy_events module_events = {
|
|
|
|
|
PW_VERSION_MODULE_PROXY_EVENTS,
|
|
|
|
|
.info = module_event_info,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void module_destroy(void *data)
|
|
|
|
|
{
|
|
|
|
|
struct global *global = data;
|
|
|
|
|
if (global->module_info.info.proplist)
|
|
|
|
|
pa_proplist_free(global->module_info.info.proplist);
|
|
|
|
|
if (global->info)
|
|
|
|
|
pw_module_info_free(global->info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void client_event_info(void *object, const struct pw_client_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
|
|
|
|
pa_client_info *i = &g->client_info.info;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("update %d", g->id);
|
|
|
|
|
info = g->info = pw_client_info_update(g->info, info);
|
|
|
|
|
|
|
|
|
|
i->index = g->id;
|
|
|
|
|
i->owner_module = g->parent_id;
|
|
|
|
|
|
|
|
|
|
if (info->change_mask & PW_CLIENT_CHANGE_MASK_PROPS) {
|
|
|
|
|
if (i->proplist)
|
|
|
|
|
pa_proplist_update_dict(i->proplist, info->props);
|
|
|
|
|
else
|
|
|
|
|
i->proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
i->name = info->props ?
|
2019-05-24 15:47:05 +02:00
|
|
|
spa_dict_lookup(info->props, PW_KEY_APP_NAME) : NULL;
|
2019-03-15 20:31:20 +01:00
|
|
|
i->driver = info->props ?
|
2019-05-24 15:47:05 +02:00
|
|
|
spa_dict_lookup(info->props, PW_KEY_PROTOCOL) : NULL;
|
2019-03-15 20:31:20 +01:00
|
|
|
}
|
|
|
|
|
g->pending_seq = pw_proxy_sync(g->proxy, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_client_proxy_events client_events = {
|
|
|
|
|
PW_VERSION_CLIENT_PROXY_EVENTS,
|
|
|
|
|
.info = client_event_info,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void client_destroy(void *data)
|
|
|
|
|
{
|
|
|
|
|
struct global *global = data;
|
|
|
|
|
if (global->client_info.info.proplist)
|
|
|
|
|
pa_proplist_free(global->client_info.info.proplist);
|
|
|
|
|
if (global->info)
|
|
|
|
|
pw_client_info_free(global->info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void proxy_destroy(void *data)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = data;
|
|
|
|
|
spa_hook_remove(&g->proxy_listener);
|
|
|
|
|
g->proxy = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void proxy_done(void *data, int seq)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = data;
|
|
|
|
|
pa_subscription_event_type_t event;
|
|
|
|
|
|
|
|
|
|
if (g->pending_seq == seq) {
|
|
|
|
|
if (g->init) {
|
|
|
|
|
g->init = false;
|
|
|
|
|
event = PA_SUBSCRIPTION_EVENT_NEW;
|
|
|
|
|
} else {
|
|
|
|
|
event = PA_SUBSCRIPTION_EVENT_CHANGE;
|
|
|
|
|
}
|
|
|
|
|
emit_event(g->context, g, event);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_proxy_events proxy_events = {
|
|
|
|
|
PW_VERSION_PROXY_EVENTS,
|
|
|
|
|
.destroy = proxy_destroy,
|
|
|
|
|
.done = proxy_done,
|
|
|
|
|
};
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
static int set_mask(pa_context *c, struct global *g)
|
|
|
|
|
{
|
|
|
|
|
const char *str;
|
2018-12-11 16:37:30 +01:00
|
|
|
struct global *f;
|
2019-03-15 20:31:20 +01:00
|
|
|
const void *events = NULL;
|
|
|
|
|
pw_destroy_t destroy;
|
|
|
|
|
uint32_t client_version;
|
2018-07-03 22:03:25 +02:00
|
|
|
|
2018-10-19 13:30:20 +02:00
|
|
|
switch (g->type) {
|
2018-11-28 11:13:21 +01:00
|
|
|
case PW_TYPE_INTERFACE_Device:
|
|
|
|
|
if (g->props == NULL)
|
|
|
|
|
return 0;
|
2019-05-24 15:47:05 +02:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_MEDIA_CLASS)) == NULL)
|
2018-11-28 11:13:21 +01:00
|
|
|
return 0;
|
|
|
|
|
if (strcmp(str, "Audio/Device") != 0)
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("found card %d", g->id);
|
|
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_CARD;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_CARD;
|
2019-03-15 20:31:20 +01:00
|
|
|
|
|
|
|
|
events = &device_events;
|
2019-05-23 12:28:59 +02:00
|
|
|
client_version = PW_VERSION_DEVICE_PROXY;
|
2019-03-15 20:31:20 +01:00
|
|
|
destroy = device_destroy;
|
|
|
|
|
spa_list_init(&g->card_info.profiles);
|
2018-11-28 11:13:21 +01:00
|
|
|
break;
|
|
|
|
|
|
2018-10-19 13:30:20 +02:00
|
|
|
case PW_TYPE_INTERFACE_Node:
|
2018-07-03 22:03:25 +02:00
|
|
|
if (g->props == NULL)
|
|
|
|
|
return 0;
|
2019-07-11 11:29:05 +02:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_MEDIA_CLASS)) == NULL) {
|
|
|
|
|
pw_log_debug("node %d without "PW_KEY_MEDIA_CLASS, g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
return 0;
|
2019-07-11 11:29:05 +02:00
|
|
|
}
|
|
|
|
|
pw_log_debug("node %d "PW_KEY_MEDIA_CLASS" '%s'", g->id, str);
|
2018-07-03 22:03:25 +02:00
|
|
|
|
|
|
|
|
if (strcmp(str, "Audio/Sink") == 0) {
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found sink %d", g->id);
|
2019-07-02 17:38:16 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_SINK | PA_SUBSCRIPTION_MASK_SOURCE;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_SINK;
|
|
|
|
|
g->node_info.monitor = g->id | PA_IDX_FLAG_DSP;
|
2018-07-04 15:33:20 +02:00
|
|
|
}
|
2018-07-03 22:03:25 +02:00
|
|
|
else if (strcmp(str, "Audio/Source") == 0) {
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found source %d", g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_SOURCE;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_SOURCE;
|
|
|
|
|
}
|
|
|
|
|
else if (strcmp(str, "Stream/Output/Audio") == 0) {
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found sink input %d", g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_SINK_INPUT;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_SINK_INPUT;
|
|
|
|
|
}
|
|
|
|
|
else if (strcmp(str, "Stream/Input/Audio") == 0) {
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found source output %d", g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_SOURCE_OUTPUT;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_SOURCE_OUTPUT;
|
|
|
|
|
}
|
2019-03-15 20:31:20 +01:00
|
|
|
events = &node_events;
|
2019-05-23 12:28:59 +02:00
|
|
|
client_version = PW_VERSION_NODE_PROXY;
|
2019-03-15 20:31:20 +01:00
|
|
|
destroy = node_destroy;
|
|
|
|
|
g->node_info.volume = 1.0;
|
|
|
|
|
g->node_info.mute = false;
|
2018-10-19 13:30:20 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case PW_TYPE_INTERFACE_Module:
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found module %d", g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_MODULE;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_MODULE;
|
2019-03-15 20:31:20 +01:00
|
|
|
events = &module_events;
|
2019-05-23 12:28:59 +02:00
|
|
|
client_version = PW_VERSION_MODULE_PROXY;
|
2019-03-15 20:31:20 +01:00
|
|
|
destroy = module_destroy;
|
2018-10-19 13:30:20 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case PW_TYPE_INTERFACE_Client:
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found client %d", g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_CLIENT;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_CLIENT;
|
2019-03-15 20:31:20 +01:00
|
|
|
events = &client_events;
|
2019-05-23 12:28:59 +02:00
|
|
|
client_version = PW_VERSION_CLIENT_PROXY;
|
2019-03-15 20:31:20 +01:00
|
|
|
destroy = client_destroy;
|
2018-10-19 13:30:20 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case PW_TYPE_INTERFACE_Port:
|
2018-07-04 15:33:20 +02:00
|
|
|
pw_log_debug("found port %d", g->id);
|
2018-10-19 13:30:20 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case PW_TYPE_INTERFACE_Link:
|
2019-05-24 15:47:05 +02:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_LINK_OUTPUT_PORT)) == NULL)
|
2018-07-04 15:33:20 +02:00
|
|
|
return 0;
|
|
|
|
|
g->link_info.src = pa_context_find_global(c, pw_properties_parse_int(str));
|
2019-05-24 16:13:39 +02:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_LINK_INPUT_PORT)) == NULL)
|
2018-07-04 15:33:20 +02:00
|
|
|
return 0;
|
|
|
|
|
g->link_info.dst = pa_context_find_global(c, pw_properties_parse_int(str));
|
|
|
|
|
|
|
|
|
|
if (g->link_info.src == NULL || g->link_info.dst == NULL)
|
|
|
|
|
return 0;
|
|
|
|
|
|
2018-12-14 16:42:01 +01:00
|
|
|
pw_log_debug("link %d:%d->%d:%d",
|
|
|
|
|
g->link_info.src->parent_id,
|
|
|
|
|
g->link_info.src->id,
|
|
|
|
|
g->link_info.dst->parent_id,
|
|
|
|
|
g->link_info.dst->id);
|
|
|
|
|
|
2019-07-16 18:53:34 +02:00
|
|
|
if ((f = pa_context_find_global(c, g->link_info.src->parent_id)) != NULL &&
|
|
|
|
|
!f->init)
|
2018-12-14 16:42:01 +01:00
|
|
|
emit_event(c, f, PA_SUBSCRIPTION_EVENT_CHANGE);
|
2019-07-16 18:53:34 +02:00
|
|
|
if ((f = pa_context_find_global(c, g->link_info.dst->parent_id)) != NULL &&
|
|
|
|
|
!f->init)
|
2018-12-14 16:42:01 +01:00
|
|
|
emit_event(c, f, PA_SUBSCRIPTION_EVENT_CHANGE);
|
|
|
|
|
|
2018-10-19 13:30:20 +02:00
|
|
|
break;
|
2018-07-03 22:03:25 +02:00
|
|
|
|
2018-10-19 13:30:20 +02:00
|
|
|
default:
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
2019-03-15 20:31:20 +01:00
|
|
|
|
|
|
|
|
pw_log_debug("global %p: id:%u mask %d/%d", g, g->id, g->mask, g->event);
|
|
|
|
|
|
|
|
|
|
if (events) {
|
|
|
|
|
pw_log_debug("bind %d", g->id);
|
|
|
|
|
|
|
|
|
|
g->proxy = pw_registry_proxy_bind(c->registry_proxy, g->id, g->type,
|
|
|
|
|
client_version, 0);
|
|
|
|
|
if (g->proxy == NULL)
|
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
2019-05-29 10:38:49 +02:00
|
|
|
pw_proxy_add_object_listener(g->proxy, &g->object_listener, events, g);
|
2019-03-15 20:31:20 +01:00
|
|
|
pw_proxy_add_listener(g->proxy, &g->proxy_listener, &proxy_events, g);
|
|
|
|
|
g->destroy = destroy;
|
|
|
|
|
} else {
|
|
|
|
|
emit_event(c, g, PA_SUBSCRIPTION_EVENT_NEW);
|
|
|
|
|
}
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
return 1;
|
|
|
|
|
}
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2019-03-01 14:03:28 +01:00
|
|
|
static void registry_event_global(void *data, uint32_t id, uint32_t parent_id,
|
2018-06-01 11:28:31 +02:00
|
|
|
uint32_t permissions, uint32_t type, uint32_t version,
|
|
|
|
|
const struct spa_dict *props)
|
|
|
|
|
{
|
|
|
|
|
pa_context *c = data;
|
|
|
|
|
struct global *g;
|
|
|
|
|
|
|
|
|
|
g = calloc(1, sizeof(struct global));
|
2019-05-29 10:38:49 +02:00
|
|
|
pw_log_debug("context %p: global %d %u %p", c, id, type, g);
|
2019-03-15 20:31:20 +01:00
|
|
|
g->context = c;
|
2018-06-01 11:28:31 +02:00
|
|
|
g->id = id;
|
|
|
|
|
g->parent_id = parent_id;
|
|
|
|
|
g->type = type;
|
2019-03-15 20:31:20 +01:00
|
|
|
g->init = true;
|
2018-06-01 11:28:31 +02:00
|
|
|
g->props = props ? pw_properties_new_dict(props) : NULL;
|
2019-01-30 15:24:07 +01:00
|
|
|
spa_list_append(&c->globals, &g->link);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2019-03-15 20:31:20 +01:00
|
|
|
if (set_mask(c, g) != 1) {
|
2019-03-12 12:15:28 +01:00
|
|
|
global_free(c, g);
|
2019-03-01 14:03:28 +01:00
|
|
|
return;
|
2019-01-30 15:24:07 +01:00
|
|
|
}
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-03-01 14:03:28 +01:00
|
|
|
static void registry_event_global_remove(void *object, uint32_t id)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
|
|
|
|
pa_context *c = object;
|
|
|
|
|
struct global *g;
|
|
|
|
|
|
2018-11-29 17:30:24 +01:00
|
|
|
pw_log_debug("context %p: remove %d", c, id);
|
2018-06-01 11:28:31 +02:00
|
|
|
if ((g = pa_context_find_global(c, id)) == NULL)
|
2019-03-01 14:03:28 +01:00
|
|
|
return;
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2018-12-14 16:41:19 +01:00
|
|
|
emit_event(c, g, PA_SUBSCRIPTION_EVENT_REMOVE);
|
2018-07-03 22:03:25 +02:00
|
|
|
|
2018-11-29 17:30:24 +01:00
|
|
|
pw_log_debug("context %p: free %d %p", c, id, g);
|
2019-03-12 12:15:28 +01:00
|
|
|
global_free(c, g);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_registry_proxy_events registry_events =
|
|
|
|
|
{
|
|
|
|
|
PW_VERSION_REGISTRY_PROXY_EVENTS,
|
|
|
|
|
.global = registry_event_global,
|
|
|
|
|
.global_remove = registry_event_global_remove,
|
|
|
|
|
};
|
|
|
|
|
|
2019-02-25 17:16:14 +01:00
|
|
|
static void complete_operations(pa_context *c, int seq)
|
2019-01-10 09:31:37 +01:00
|
|
|
{
|
|
|
|
|
pa_operation *o, *t;
|
|
|
|
|
spa_list_for_each_safe(o, t, &c->operations, link) {
|
|
|
|
|
if (o->seq != seq)
|
|
|
|
|
continue;
|
|
|
|
|
pa_operation_ref(o);
|
|
|
|
|
if (o->callback)
|
|
|
|
|
o->callback(o, o->userdata);
|
|
|
|
|
pa_operation_unref(o);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-01 14:03:28 +01:00
|
|
|
static void core_info(void *data, const struct pw_core_info *info)
|
2019-01-10 09:31:37 +01:00
|
|
|
{
|
|
|
|
|
pa_context *c = data;
|
|
|
|
|
c->core_info = pw_core_info_update(c->core_info, info);
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-01 14:03:28 +01:00
|
|
|
static void core_done(void *data, uint32_t id, int seq)
|
2019-01-10 09:31:37 +01:00
|
|
|
{
|
|
|
|
|
pa_context *c = data;
|
|
|
|
|
pw_log_debug("done %d", seq);
|
|
|
|
|
complete_operations(c, seq);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_core_proxy_events core_events = {
|
|
|
|
|
PW_VERSION_CORE_EVENTS,
|
|
|
|
|
.info = core_info,
|
|
|
|
|
.done = core_done
|
|
|
|
|
};
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
static void remote_state_changed(void *data, enum pw_remote_state old,
|
|
|
|
|
enum pw_remote_state state, const char *error)
|
|
|
|
|
{
|
|
|
|
|
pa_context *c = data;
|
|
|
|
|
|
|
|
|
|
switch(state) {
|
|
|
|
|
case PW_REMOTE_STATE_ERROR:
|
|
|
|
|
context_fail(c, PA_ERR_CONNECTIONTERMINATED);
|
|
|
|
|
break;
|
|
|
|
|
case PW_REMOTE_STATE_UNCONNECTED:
|
2019-03-14 13:23:20 +01:00
|
|
|
if (!c->disconnect)
|
|
|
|
|
context_fail(c, PA_ERR_CONNECTIONTERMINATED);
|
2018-06-01 11:28:31 +02:00
|
|
|
break;
|
|
|
|
|
case PW_REMOTE_STATE_CONNECTING:
|
|
|
|
|
pa_context_set_state(c, PA_CONTEXT_CONNECTING);
|
|
|
|
|
break;
|
|
|
|
|
case PW_REMOTE_STATE_CONNECTED:
|
|
|
|
|
pa_context_set_state(c, PA_CONTEXT_AUTHORIZING);
|
|
|
|
|
pa_context_set_state(c, PA_CONTEXT_SETTING_NAME);
|
|
|
|
|
|
|
|
|
|
c->core_proxy = pw_remote_get_core_proxy(c->remote);
|
2019-01-10 09:31:37 +01:00
|
|
|
pw_core_proxy_add_listener(c->core_proxy, &c->core_listener, &core_events, c);
|
|
|
|
|
|
2019-03-15 20:31:20 +01:00
|
|
|
pa_context_set_state(c, PA_CONTEXT_READY);
|
2018-06-01 11:28:31 +02:00
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_remote_events remote_events = {
|
|
|
|
|
PW_VERSION_REMOTE_EVENTS,
|
|
|
|
|
.state_changed = remote_state_changed,
|
|
|
|
|
};
|
|
|
|
|
|
2019-03-15 20:31:20 +01:00
|
|
|
struct success_data {
|
|
|
|
|
pa_context_success_cb_t cb;
|
|
|
|
|
void *userdata;
|
|
|
|
|
int ret;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void on_success(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct success_data *d = userdata;
|
|
|
|
|
pa_context *c = o->context;
|
|
|
|
|
pa_operation_done(o);
|
|
|
|
|
if (d->cb)
|
|
|
|
|
d->cb(c, d->ret, d->userdata);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
SPA_EXPORT
|
|
|
|
|
pa_operation* pa_context_subscribe(pa_context *c, pa_subscription_mask_t m, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
|
|
|
|
c->subscribe_mask = m;
|
|
|
|
|
|
|
|
|
|
if (c->registry_proxy == NULL) {
|
|
|
|
|
c->registry_proxy = pw_core_proxy_get_registry(c->core_proxy,
|
2019-05-23 12:28:59 +02:00
|
|
|
PW_VERSION_REGISTRY_PROXY, 0);
|
2019-03-15 20:31:20 +01:00
|
|
|
pw_registry_proxy_add_listener(c->registry_proxy,
|
|
|
|
|
&c->registry_listener,
|
|
|
|
|
®istry_events, c);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->ret = 0;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
pa_operation_sync(o);
|
|
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context *pa_context_new_with_proplist(pa_mainloop_api *mainloop, const char *name, pa_proplist *p)
|
|
|
|
|
{
|
|
|
|
|
struct pw_core *core;
|
|
|
|
|
struct pw_loop *loop;
|
|
|
|
|
struct pw_remote *r;
|
|
|
|
|
struct pw_properties *props;
|
|
|
|
|
pa_context *c;
|
|
|
|
|
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(mainloop);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
props = pw_properties_new(NULL, NULL);
|
|
|
|
|
if (name)
|
|
|
|
|
pw_properties_set(props, PA_PROP_APPLICATION_NAME, name);
|
2019-05-24 15:47:05 +02:00
|
|
|
pw_properties_set(props, PW_KEY_CLIENT_API, "pulseaudio");
|
2018-12-04 16:33:59 +01:00
|
|
|
if (p)
|
|
|
|
|
pw_properties_update(props, &p->props->dict);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
loop = mainloop->userdata;
|
2019-01-08 17:30:57 +01:00
|
|
|
core = pw_core_new(loop, NULL, 0);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
r = pw_remote_new(core, props, sizeof(struct pa_context));
|
|
|
|
|
if (r == NULL)
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
c = pw_remote_get_user_data(r);
|
|
|
|
|
c->loop = loop;
|
|
|
|
|
c->core = core;
|
|
|
|
|
c->remote = r;
|
|
|
|
|
|
|
|
|
|
pw_remote_add_listener(r, &c->remote_listener, &remote_events, c);
|
|
|
|
|
|
|
|
|
|
c->proplist = p ? pa_proplist_copy(p) : pa_proplist_new();
|
|
|
|
|
c->refcount = 1;
|
|
|
|
|
c->client_index = PA_INVALID_INDEX;
|
|
|
|
|
|
|
|
|
|
if (name)
|
|
|
|
|
pa_proplist_sets(c->proplist, PA_PROP_APPLICATION_NAME, name);
|
|
|
|
|
|
|
|
|
|
c->mainloop = mainloop;
|
|
|
|
|
c->error = 0;
|
|
|
|
|
c->state = PA_CONTEXT_UNCONNECTED;
|
|
|
|
|
|
|
|
|
|
spa_list_init(&c->globals);
|
|
|
|
|
|
|
|
|
|
spa_list_init(&c->streams);
|
|
|
|
|
spa_list_init(&c->operations);
|
|
|
|
|
|
|
|
|
|
return c;
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-14 13:23:20 +01:00
|
|
|
static void do_core_destroy(pa_mainloop_api*m, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_context *c = userdata;
|
|
|
|
|
pw_core_destroy(c->core);
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
static void context_free(pa_context *c)
|
|
|
|
|
{
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("context %p: free", c);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
context_unlink(c);
|
|
|
|
|
|
|
|
|
|
if (c->proplist)
|
|
|
|
|
pa_proplist_free(c->proplist);
|
2019-01-10 09:31:37 +01:00
|
|
|
if (c->core_info)
|
|
|
|
|
pw_core_info_free(c->core_info);
|
2018-12-14 16:43:34 +01:00
|
|
|
|
2019-03-14 13:23:20 +01:00
|
|
|
pa_mainloop_api_once(c->mainloop, do_core_destroy, c);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
void pa_context_unref(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
if (--c->refcount == 0)
|
|
|
|
|
context_free(c);
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context* pa_context_ref(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
c->refcount++;
|
|
|
|
|
return c;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
void pa_context_set_state_callback(pa_context *c, pa_context_notify_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
if (c->state == PA_CONTEXT_TERMINATED || c->state == PA_CONTEXT_FAILED)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
c->state_callback = cb;
|
|
|
|
|
c->state_userdata = userdata;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
void pa_context_set_event_callback(pa_context *c, pa_context_event_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
if (c->state == PA_CONTEXT_TERMINATED || c->state == PA_CONTEXT_FAILED)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
c->event_callback = cb;
|
|
|
|
|
c->event_userdata = userdata;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
int pa_context_errno(pa_context *c)
|
|
|
|
|
{
|
|
|
|
|
if (!c)
|
|
|
|
|
return PA_ERR_INVALID;
|
|
|
|
|
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
return c->error;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
int pa_context_is_pending(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY(c, PA_CONTEXT_IS_GOOD(c->state), PA_ERR_BADSTATE);
|
|
|
|
|
|
|
|
|
|
return !spa_list_is_empty(&c->operations);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context_state_t pa_context_get_state(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
return c->state;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
int pa_context_connect(pa_context *c, const char *server, pa_context_flags_t flags, const pa_spawn_api *api)
|
|
|
|
|
{
|
|
|
|
|
int res;
|
|
|
|
|
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY(c, c->state == PA_CONTEXT_UNCONNECTED, PA_ERR_BADSTATE);
|
|
|
|
|
PA_CHECK_VALIDITY(c, !(flags & ~(PA_CONTEXT_NOAUTOSPAWN|PA_CONTEXT_NOFAIL)), PA_ERR_INVALID);
|
|
|
|
|
PA_CHECK_VALIDITY(c, !server || *server, PA_ERR_INVALID);
|
|
|
|
|
|
|
|
|
|
pa_context_ref(c);
|
|
|
|
|
|
|
|
|
|
c->no_fail = !!(flags & PA_CONTEXT_NOFAIL);
|
|
|
|
|
|
|
|
|
|
res = pw_remote_connect(c->remote);
|
|
|
|
|
|
|
|
|
|
pa_context_unref(c);
|
|
|
|
|
|
|
|
|
|
return res;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
void pa_context_disconnect(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2019-03-14 13:23:20 +01:00
|
|
|
c->disconnect = true;
|
2018-06-01 11:28:31 +02:00
|
|
|
pw_remote_disconnect(c->remote);
|
|
|
|
|
|
|
|
|
|
if (PA_CONTEXT_IS_GOOD(c->state))
|
|
|
|
|
pa_context_set_state(c, PA_CONTEXT_TERMINATED);
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-07 11:16:09 +02:00
|
|
|
struct notify_data {
|
|
|
|
|
pa_context_notify_cb_t cb;
|
|
|
|
|
void *userdata;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void on_notify(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct notify_data *d = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_context *c = o->context;
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_operation_done(o);
|
|
|
|
|
if (d->cb)
|
2018-08-02 10:31:29 +02:00
|
|
|
d->cb(c, d->userdata);
|
2018-06-07 11:16:09 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_drain(pa_context *c, pa_context_notify_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct notify_data *d;
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_notify, sizeof(struct notify_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-07 11:16:09 +02:00
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_exit_daemon(pa_context *c, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->ret = PA_ERR_ACCESS;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2019-03-15 20:31:20 +01:00
|
|
|
pa_operation_sync(o);
|
2019-04-17 15:44:40 +02:00
|
|
|
pw_log_warn("Not Implemented");
|
2018-06-07 11:16:09 +02:00
|
|
|
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_set_default_sink(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2019-04-17 15:44:40 +02:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->ret = PA_ERR_ACCESS;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
pw_log_warn("Not Implemented");
|
2019-04-17 15:44:40 +02:00
|
|
|
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_set_default_source(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2019-04-17 15:44:40 +02:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->ret = PA_ERR_ACCESS;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
pw_log_warn("Not Implemented");
|
2019-04-17 15:44:40 +02:00
|
|
|
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
int pa_context_is_local(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_ANY(c, PA_CONTEXT_IS_GOOD(c->state), PA_ERR_BADSTATE, -1);
|
|
|
|
|
|
|
|
|
|
return 1;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_set_name(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
struct spa_dict dict;
|
|
|
|
|
struct spa_dict_item items[1];
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(name);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
|
|
|
|
items[0] = SPA_DICT_ITEM_INIT(PA_PROP_APPLICATION_NAME, name);
|
|
|
|
|
dict = SPA_DICT_INIT(items, 1);
|
|
|
|
|
pw_remote_update_properties(c->remote, &dict);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-07 11:16:09 +02:00
|
|
|
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
const char* pa_context_get_server(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
const struct pw_core_info *info;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
2019-01-10 09:31:37 +01:00
|
|
|
info = c->core_info;
|
2018-06-07 11:16:09 +02:00
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, info && info->name, PA_ERR_NOENTITY);
|
|
|
|
|
|
|
|
|
|
return info->name;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
uint32_t pa_context_get_protocol_version(pa_context *c)
|
|
|
|
|
{
|
|
|
|
|
return PA_PROTOCOL_VERSION;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
uint32_t pa_context_get_server_protocol_version(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_ANY(c, PA_CONTEXT_IS_GOOD(c->state), PA_ERR_BADSTATE, PA_INVALID_INDEX);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
return PA_PROTOCOL_VERSION;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation *pa_context_proplist_update(pa_context *c, pa_update_mode_t mode, pa_proplist *p, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2019-01-04 10:00:57 +01:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
spa_assert(c);
|
|
|
|
|
spa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, mode == PA_UPDATE_SET ||
|
|
|
|
|
mode == PA_UPDATE_MERGE || mode == PA_UPDATE_REPLACE, PA_ERR_INVALID);
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
|
|
|
|
pa_proplist_update(c->proplist, mode, p);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
pa_operation_sync(o);
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation *pa_context_proplist_remove(pa_context *c, const char *const keys[], pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2019-01-04 10:00:57 +01:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
spa_assert(c);
|
|
|
|
|
spa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, keys && keys[0], PA_ERR_INVALID);
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
pw_log_warn("Not Implemented");
|
2019-01-04 10:00:57 +01:00
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
pa_operation_sync(o);
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
uint32_t pa_context_get_index(pa_context *c)
|
|
|
|
|
{
|
|
|
|
|
return c->client_index;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_time_event* pa_context_rttime_new(pa_context *c, pa_usec_t usec, pa_time_event_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(c->mainloop);
|
|
|
|
|
|
|
|
|
|
if (usec == PA_USEC_INVALID)
|
|
|
|
|
return c->mainloop->time_new(c->mainloop, NULL, cb, userdata);
|
|
|
|
|
|
|
|
|
|
pa_timeval_store(&tv, usec);
|
|
|
|
|
|
|
|
|
|
return c->mainloop->time_new(c->mainloop, &tv, cb, userdata);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
void pa_context_rttime_restart(pa_context *c, pa_time_event *e, pa_usec_t usec)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(c->mainloop);
|
|
|
|
|
|
|
|
|
|
if (usec == PA_USEC_INVALID)
|
|
|
|
|
c->mainloop->time_restart(e, NULL);
|
|
|
|
|
else {
|
|
|
|
|
pa_timeval_store(&tv, usec);
|
|
|
|
|
c->mainloop->time_restart(e, &tv);
|
|
|
|
|
}
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
size_t pa_context_get_tile_size(pa_context *c, const pa_sample_spec *ss)
|
|
|
|
|
{
|
2019-01-04 10:00:57 +01:00
|
|
|
size_t fs, mbs;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_ANY(c, !ss || pa_sample_spec_valid(ss), PA_ERR_INVALID, (size_t) -1);
|
|
|
|
|
|
|
|
|
|
fs = ss ? pa_frame_size(ss) : 1;
|
|
|
|
|
mbs = PA_ROUND_DOWN(4096, fs);
|
|
|
|
|
return PA_MAX(mbs, fs);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
int pa_context_load_cookie_from_file(pa_context *c, const char *cookie_file_path)
|
|
|
|
|
{
|
2019-01-04 10:00:57 +01:00
|
|
|
return 0;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|