2018-06-01 11:28:31 +02:00
|
|
|
/* PipeWire
|
|
|
|
|
* Copyright (C) 2018 Wim Taymans <wim.taymans@gmail.com>
|
|
|
|
|
*
|
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
|
* modify it under the terms of the GNU Library General Public
|
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
|
* version 2 of the License, or (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
* Library General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Library General Public
|
|
|
|
|
* License along with this library; if not, write to the
|
|
|
|
|
* Free Software Foundation, Inc., 51 Franklin St, Fifth Floor,
|
|
|
|
|
* Boston, MA 02110-1301, USA.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
|
2019-12-06 11:48:40 +01:00
|
|
|
#include <spa/utils/result.h>
|
2019-03-15 20:31:20 +01:00
|
|
|
#include <spa/param/props.h>
|
|
|
|
|
|
2019-01-14 13:01:47 +01:00
|
|
|
#include <pipewire/pipewire.h>
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
#include <pulse/context.h>
|
2018-06-07 11:16:09 +02:00
|
|
|
#include <pulse/timeval.h>
|
2018-12-03 15:12:27 +01:00
|
|
|
#include <pulse/error.h>
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
#include "internal.h"
|
|
|
|
|
|
2019-12-05 10:35:07 +01:00
|
|
|
int pa_context_set_error(PA_CONST pa_context *c, int error) {
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(error >= 0);
|
|
|
|
|
pa_assert(error < PA_ERR_MAX);
|
2018-12-14 16:39:19 +01:00
|
|
|
if (c && c->error != error) {
|
|
|
|
|
pw_log_debug("context %p: error %d %s", c, error, pa_strerror(error));
|
2019-12-05 10:35:07 +01:00
|
|
|
((pa_context*)c)->error = error;
|
|
|
|
|
|
2018-12-14 16:39:19 +01:00
|
|
|
}
|
2018-06-01 11:28:31 +02:00
|
|
|
return error;
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-12 12:15:28 +01:00
|
|
|
static void global_free(pa_context *c, struct global *g)
|
2019-01-30 15:24:07 +01:00
|
|
|
{
|
|
|
|
|
spa_list_remove(&g->link);
|
2019-03-12 12:15:28 +01:00
|
|
|
|
2019-03-15 20:31:20 +01:00
|
|
|
if (g->destroy)
|
|
|
|
|
g->destroy(g);
|
|
|
|
|
if (g->proxy) {
|
2019-05-29 10:38:49 +02:00
|
|
|
spa_hook_remove(&g->object_listener);
|
2019-03-15 20:31:20 +01:00
|
|
|
spa_hook_remove(&g->proxy_listener);
|
|
|
|
|
pw_proxy_destroy(g->proxy);
|
|
|
|
|
}
|
2019-01-30 15:24:07 +01:00
|
|
|
if (g->props)
|
|
|
|
|
pw_properties_free(g->props);
|
2019-12-19 13:15:10 +01:00
|
|
|
free(g->type);
|
2019-01-30 15:24:07 +01:00
|
|
|
free(g);
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
static void context_unlink(pa_context *c)
|
|
|
|
|
{
|
|
|
|
|
pa_stream *s, *t;
|
2019-01-30 15:24:07 +01:00
|
|
|
struct global *g;
|
2018-12-14 16:41:19 +01:00
|
|
|
pa_operation *o;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("context %p: unlink %d", c, c->state);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2019-03-14 13:23:20 +01:00
|
|
|
c->disconnect = true;
|
|
|
|
|
c->state_callback = NULL;
|
|
|
|
|
c->state_userdata = NULL;
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
spa_list_for_each_safe(s, t, &c->streams, link) {
|
|
|
|
|
pa_stream_set_state(s, c->state == PA_CONTEXT_FAILED ?
|
|
|
|
|
PA_STREAM_FAILED : PA_STREAM_TERMINATED);
|
|
|
|
|
}
|
2019-01-30 15:24:07 +01:00
|
|
|
spa_list_consume(g, &c->globals, link)
|
2019-03-12 12:15:28 +01:00
|
|
|
global_free(c, g);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2018-12-14 16:41:19 +01:00
|
|
|
spa_list_consume(o, &c->operations, link)
|
|
|
|
|
pa_operation_cancel(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void pa_context_set_state(pa_context *c, pa_context_state_t st) {
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
if (c->state == st)
|
|
|
|
|
return;
|
|
|
|
|
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("context %p: state %d", c, st);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context_ref(c);
|
|
|
|
|
|
|
|
|
|
c->state = st;
|
|
|
|
|
|
|
|
|
|
if (c->state_callback)
|
|
|
|
|
c->state_callback(c, c->state_userdata);
|
|
|
|
|
|
|
|
|
|
if (st == PA_CONTEXT_FAILED || st == PA_CONTEXT_TERMINATED)
|
|
|
|
|
context_unlink(c);
|
|
|
|
|
|
|
|
|
|
pa_context_unref(c);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void context_fail(pa_context *c, int error) {
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("context %p: error %d", c, error);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context_set_error(c, error);
|
|
|
|
|
pa_context_set_state(c, PA_CONTEXT_FAILED);
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context *pa_context_new(pa_mainloop_api *mainloop, const char *name)
|
|
|
|
|
{
|
|
|
|
|
return pa_context_new_with_proplist(mainloop, name, NULL);
|
|
|
|
|
}
|
|
|
|
|
|
2018-07-04 15:33:20 +02:00
|
|
|
struct global *pa_context_find_global(pa_context *c, uint32_t id)
|
|
|
|
|
{
|
|
|
|
|
struct global *g;
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
|
|
|
|
if (g->id == id)
|
|
|
|
|
return g;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-12-04 11:48:15 +01:00
|
|
|
struct global *pa_context_find_global_by_name(pa_context *c, uint32_t mask, const char *name)
|
|
|
|
|
{
|
|
|
|
|
struct global *g;
|
|
|
|
|
const char *str;
|
|
|
|
|
uint32_t id = atoi(name);
|
|
|
|
|
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
2018-12-11 16:37:30 +01:00
|
|
|
if ((g->mask & mask) == 0)
|
2018-12-04 11:48:15 +01:00
|
|
|
continue;
|
|
|
|
|
if (g->props != NULL &&
|
2019-05-24 15:47:05 +02:00
|
|
|
(str = pw_properties_get(g->props, PW_KEY_NODE_NAME)) != NULL &&
|
2018-12-04 11:48:15 +01:00
|
|
|
strcmp(str, name) == 0)
|
|
|
|
|
return g;
|
2019-11-18 13:12:28 +01:00
|
|
|
if (g->id == id)
|
2018-12-04 11:48:15 +01:00
|
|
|
return g;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-11-28 11:13:21 +01:00
|
|
|
struct global *pa_context_find_linked(pa_context *c, uint32_t idx)
|
|
|
|
|
{
|
|
|
|
|
struct global *g, *f;
|
|
|
|
|
|
|
|
|
|
spa_list_for_each(g, &c->globals, link) {
|
2019-12-19 13:15:10 +01:00
|
|
|
if (strcmp(g->type, PW_TYPE_INTERFACE_EndpointLink) != 0)
|
2018-11-28 11:13:21 +01:00
|
|
|
continue;
|
|
|
|
|
|
2019-11-15 18:21:04 +01:00
|
|
|
pw_log_debug("context %p: %p %d %d:%d %d:%d", c, g, idx,
|
|
|
|
|
g->link_info.output->id, g->link_info.output->endpoint_info.node_id,
|
|
|
|
|
g->link_info.input->id, g->link_info.input->endpoint_info.node_id);
|
2018-11-28 11:13:21 +01:00
|
|
|
|
2019-11-15 18:21:04 +01:00
|
|
|
if (g->link_info.input->id == idx ||
|
|
|
|
|
g->link_info.input->endpoint_info.node_id == idx)
|
|
|
|
|
f = g->link_info.output;
|
|
|
|
|
else if (g->link_info.output->id == idx ||
|
|
|
|
|
g->link_info.output->endpoint_info.node_id == idx)
|
|
|
|
|
f = g->link_info.input;
|
2018-11-28 11:13:21 +01:00
|
|
|
else
|
|
|
|
|
continue;
|
2019-08-16 22:10:08 +02:00
|
|
|
|
2019-11-15 18:48:33 +01:00
|
|
|
if (f == NULL || ((f->mask & (PA_SUBSCRIPTION_MASK_SOURCE | PA_SUBSCRIPTION_MASK_SINK)) == 0))
|
2018-11-28 11:13:21 +01:00
|
|
|
continue;
|
2019-11-15 18:48:33 +01:00
|
|
|
|
2018-11-28 11:13:21 +01:00
|
|
|
return f;
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2018-12-14 16:41:19 +01:00
|
|
|
static void emit_event(pa_context *c, struct global *g, pa_subscription_event_type_t event)
|
|
|
|
|
{
|
2019-07-02 17:38:16 +02:00
|
|
|
if (c->subscribe_callback && (c->subscribe_mask & g->mask)) {
|
|
|
|
|
pw_log_debug("context %p: obj %d: emit %d:%d", c, g->id, event, g->event);
|
|
|
|
|
c->subscribe_callback(c,
|
|
|
|
|
event | g->event,
|
|
|
|
|
g->id,
|
|
|
|
|
c->subscribe_userdata);
|
2018-12-14 16:41:19 +01:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
static void update_device_props(struct global *g)
|
2019-08-12 12:31:55 +02:00
|
|
|
{
|
|
|
|
|
pa_card_info *i = &g->card_info.info;
|
|
|
|
|
const char *s;
|
|
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
if ((s = pa_proplist_gets(i->proplist, PW_KEY_DEVICE_ICON_NAME)))
|
2019-08-12 12:31:55 +02:00
|
|
|
pa_proplist_sets(i->proplist, PA_PROP_DEVICE_ICON_NAME, s);
|
|
|
|
|
}
|
|
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
static void device_event_info(void *object, const struct pw_device_info *update)
|
2019-03-15 20:31:20 +01:00
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
|
|
|
|
pa_card_info *i = &g->card_info.info;
|
2019-08-16 22:10:08 +02:00
|
|
|
const char *str;
|
2019-03-15 20:31:20 +01:00
|
|
|
uint32_t n;
|
2019-11-13 09:38:40 +01:00
|
|
|
struct pw_device_info *info;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("global %p: id:%d change-mask:%08lx", g, g->id, update->change_mask);
|
|
|
|
|
info = g->info = pw_device_info_update(g->info, update);
|
2019-03-15 20:31:20 +01:00
|
|
|
|
|
|
|
|
i->index = g->id;
|
2019-11-13 09:38:40 +01:00
|
|
|
i->name = info->props ?
|
|
|
|
|
spa_dict_lookup(info->props, PW_KEY_DEVICE_NAME) : "unknown";
|
|
|
|
|
str = info->props ? spa_dict_lookup(info->props, PW_KEY_MODULE_ID) : NULL;
|
|
|
|
|
i->owner_module = str ? (unsigned)atoi(str) : SPA_ID_INVALID;
|
|
|
|
|
if (info->change_mask & PW_DEVICE_CHANGE_MASK_PROPS) {
|
|
|
|
|
i->driver = info->props ?
|
|
|
|
|
spa_dict_lookup(info->props, PW_KEY_DEVICE_API) : NULL;
|
2019-08-12 12:31:55 +02:00
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
if (i->proplist)
|
|
|
|
|
pa_proplist_update_dict(i->proplist, info->props);
|
|
|
|
|
else {
|
|
|
|
|
i->proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
}
|
|
|
|
|
update_device_props(g);
|
2019-03-15 20:31:20 +01:00
|
|
|
}
|
2019-11-07 16:04:42 +01:00
|
|
|
info->change_mask = update->change_mask;
|
2019-11-13 09:38:40 +01:00
|
|
|
if (update->change_mask & PW_DEVICE_CHANGE_MASK_PARAMS) {
|
2019-03-15 20:31:20 +01:00
|
|
|
for (n = 0; n < info->n_params; n++) {
|
|
|
|
|
if (!(info->params[n].flags & SPA_PARAM_INFO_READ))
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
switch (info->params[n].id) {
|
|
|
|
|
case SPA_PARAM_EnumProfile:
|
2019-12-11 15:00:41 +01:00
|
|
|
pw_device_enum_params((struct pw_device*)g->proxy,
|
2019-03-15 20:31:20 +01:00
|
|
|
0, SPA_PARAM_EnumProfile, 0, -1, NULL);
|
|
|
|
|
break;
|
|
|
|
|
case SPA_PARAM_Profile:
|
2019-12-11 15:00:41 +01:00
|
|
|
pw_device_enum_params((struct pw_device*)g->proxy,
|
2019-03-15 20:31:20 +01:00
|
|
|
0, SPA_PARAM_Profile, 0, -1, NULL);
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
g->pending_seq = pw_proxy_sync(g->proxy, 0);
|
|
|
|
|
}
|
|
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
static void device_event_param(void *object, int seq,
|
2019-03-15 20:31:20 +01:00
|
|
|
uint32_t id, uint32_t index, uint32_t next,
|
|
|
|
|
const struct spa_pod *param)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
|
|
|
|
|
|
|
|
|
switch (id) {
|
|
|
|
|
case SPA_PARAM_EnumProfile:
|
|
|
|
|
{
|
|
|
|
|
uint32_t id;
|
|
|
|
|
const char *name;
|
|
|
|
|
struct param *p;
|
|
|
|
|
|
|
|
|
|
if (spa_pod_parse_object(param,
|
|
|
|
|
SPA_TYPE_OBJECT_ParamProfile, NULL,
|
|
|
|
|
SPA_PARAM_PROFILE_index, SPA_POD_Int(&id),
|
|
|
|
|
SPA_PARAM_PROFILE_name, SPA_POD_String(&name)) < 0) {
|
|
|
|
|
pw_log_warn("device %d: can't parse profile", g->id);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
p = malloc(sizeof(struct param) + SPA_POD_SIZE(param));
|
|
|
|
|
if (p) {
|
|
|
|
|
p->id = id;
|
|
|
|
|
p->seq = seq;
|
|
|
|
|
p->param = SPA_MEMBER(p, sizeof(struct param), struct spa_pod);
|
|
|
|
|
memcpy(p->param, param, SPA_POD_SIZE(param));
|
|
|
|
|
spa_list_append(&g->card_info.profiles, &p->link);
|
|
|
|
|
g->card_info.n_profiles++;
|
|
|
|
|
}
|
|
|
|
|
pw_log_debug("device %d: enum profile %d: \"%s\"", g->id, id, name);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
case SPA_PARAM_Profile:
|
|
|
|
|
{
|
|
|
|
|
uint32_t id;
|
|
|
|
|
if (spa_pod_parse_object(param,
|
|
|
|
|
SPA_TYPE_OBJECT_ParamProfile, NULL,
|
|
|
|
|
SPA_PARAM_PROFILE_index, SPA_POD_Int(&id)) < 0) {
|
|
|
|
|
pw_log_warn("device %d: can't parse profile", g->id);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
g->card_info.active_profile = id;
|
|
|
|
|
pw_log_debug("device %d: current profile %d", g->id, id);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-11 15:00:41 +01:00
|
|
|
static const struct pw_device_events device_events = {
|
|
|
|
|
PW_VERSION_DEVICE_EVENTS,
|
2019-11-13 09:38:40 +01:00
|
|
|
.info = device_event_info,
|
|
|
|
|
.param = device_event_param,
|
2019-03-15 20:31:20 +01:00
|
|
|
};
|
|
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
static void device_destroy(void *data)
|
2019-03-15 20:31:20 +01:00
|
|
|
{
|
|
|
|
|
struct global *global = data;
|
|
|
|
|
struct param *p;
|
|
|
|
|
|
|
|
|
|
if (global->card_info.info.proplist)
|
|
|
|
|
pa_proplist_free(global->card_info.info.proplist);
|
|
|
|
|
spa_list_consume(p, &global->card_info.profiles, link) {
|
|
|
|
|
spa_list_remove(&p->link);
|
|
|
|
|
free(p);
|
|
|
|
|
}
|
2019-11-13 09:38:40 +01:00
|
|
|
if (global->info)
|
|
|
|
|
pw_device_info_free(global->info);
|
2019-03-15 20:31:20 +01:00
|
|
|
}
|
|
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
static void endpoint_event_info(void *object, const struct pw_endpoint_info *update)
|
2019-03-15 20:31:20 +01:00
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
2019-11-13 09:38:40 +01:00
|
|
|
struct pw_endpoint_info *info = g->info;
|
2019-03-15 20:31:20 +01:00
|
|
|
uint32_t i;
|
|
|
|
|
|
2019-11-07 16:04:42 +01:00
|
|
|
pw_log_debug("update %d %08x", g->id, update->change_mask);
|
|
|
|
|
if (info == NULL) {
|
|
|
|
|
info = g->info = calloc(1, sizeof(*info));
|
|
|
|
|
info->id = update->id;
|
|
|
|
|
info->name = update->name ? strdup(update->name) : NULL;
|
2019-11-13 09:38:40 +01:00
|
|
|
info->media_class = update->media_class ? strdup(update->media_class) : NULL;
|
|
|
|
|
info->direction = update->direction;
|
|
|
|
|
info->flags = update->flags;
|
2019-11-07 16:04:42 +01:00
|
|
|
}
|
|
|
|
|
info->change_mask = update->change_mask;
|
2019-03-15 20:31:20 +01:00
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
if (update->change_mask & PW_ENDPOINT_CHANGE_MASK_STREAMS)
|
|
|
|
|
info->n_streams = update->n_streams;
|
|
|
|
|
if (update->change_mask & PW_ENDPOINT_CHANGE_MASK_SESSION)
|
|
|
|
|
info->session_id = update->session_id;
|
|
|
|
|
if (update->change_mask & PW_ENDPOINT_CHANGE_MASK_PARAMS && !g->subscribed) {
|
2019-03-18 16:11:23 +01:00
|
|
|
uint32_t subscribed[32], n_subscribed = 0;
|
2019-03-15 20:31:20 +01:00
|
|
|
|
2019-11-07 16:04:42 +01:00
|
|
|
info->n_params = update->n_params;
|
|
|
|
|
free(info->params);
|
|
|
|
|
info->params = malloc(info->n_params * sizeof(struct spa_param_info));
|
|
|
|
|
memcpy(info->params, update->params,
|
|
|
|
|
info->n_params * sizeof(struct spa_param_info));
|
|
|
|
|
|
2019-03-18 16:11:23 +01:00
|
|
|
for (i = 0; i < info->n_params; i++) {
|
2019-03-15 20:31:20 +01:00
|
|
|
switch (info->params[i].id) {
|
2019-11-13 09:38:40 +01:00
|
|
|
case SPA_PARAM_EnumRoute:
|
2019-03-15 20:31:20 +01:00
|
|
|
case SPA_PARAM_Props:
|
2019-03-18 16:11:23 +01:00
|
|
|
subscribed[n_subscribed++] = info->params[i].id;
|
2019-03-15 20:31:20 +01:00
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
2019-03-18 16:11:23 +01:00
|
|
|
if (n_subscribed > 0) {
|
2019-12-11 16:43:53 +01:00
|
|
|
pw_endpoint_subscribe_params((struct pw_endpoint*)g->proxy,
|
2019-03-18 16:11:23 +01:00
|
|
|
subscribed, n_subscribed);
|
|
|
|
|
g->subscribed = true;
|
|
|
|
|
}
|
2019-03-15 20:31:20 +01:00
|
|
|
}
|
2019-11-13 09:38:40 +01:00
|
|
|
if (update->change_mask & PW_ENDPOINT_CHANGE_MASK_PROPS) {
|
2019-11-07 16:04:42 +01:00
|
|
|
if (info->props)
|
|
|
|
|
pw_properties_free ((struct pw_properties *)info->props);
|
|
|
|
|
info->props =
|
|
|
|
|
(struct spa_dict *) pw_properties_new_dict (update->props);
|
2019-11-13 09:38:40 +01:00
|
|
|
|
|
|
|
|
#if 0
|
|
|
|
|
i->name = info->props ?
|
|
|
|
|
spa_dict_lookup(info->props, PW_KEY_ENDPOINT_NAME) : "unknown";
|
|
|
|
|
str = info->props ? spa_dict_lookup(info->props, PW_KEY_MODULE_ID) : NULL;
|
|
|
|
|
i->owner_module = str ? (unsigned)atoi(str) : SPA_ID_INVALID;
|
|
|
|
|
i->driver = info->props ?
|
|
|
|
|
spa_dict_lookup(info->props, PW_KEY_DEVICE_API) : "unknown";
|
|
|
|
|
|
|
|
|
|
if (i->proplist)
|
|
|
|
|
pa_proplist_update_dict(i->proplist, info->props);
|
|
|
|
|
else {
|
|
|
|
|
i->proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
}
|
|
|
|
|
#endif
|
2019-11-07 16:04:42 +01:00
|
|
|
}
|
2019-03-15 20:31:20 +01:00
|
|
|
g->pending_seq = pw_proxy_sync(g->proxy, 0);
|
|
|
|
|
}
|
|
|
|
|
|
2019-08-12 12:31:55 +02:00
|
|
|
static void parse_props(struct global *g, const struct spa_pod *param)
|
|
|
|
|
{
|
|
|
|
|
struct spa_pod_prop *prop;
|
|
|
|
|
struct spa_pod_object *obj = (struct spa_pod_object *) param;
|
|
|
|
|
|
|
|
|
|
SPA_POD_OBJECT_FOREACH(obj, prop) {
|
|
|
|
|
switch (prop->key) {
|
|
|
|
|
case SPA_PROP_volume:
|
2019-11-13 09:38:40 +01:00
|
|
|
spa_pod_get_float(&prop->value, &g->endpoint_info.volume);
|
2019-08-12 12:31:55 +02:00
|
|
|
break;
|
|
|
|
|
case SPA_PROP_mute:
|
2019-11-13 09:38:40 +01:00
|
|
|
spa_pod_get_bool(&prop->value, &g->endpoint_info.mute);
|
2019-08-12 12:31:55 +02:00
|
|
|
break;
|
|
|
|
|
case SPA_PROP_channelVolumes:
|
|
|
|
|
{
|
|
|
|
|
uint32_t n_vals;
|
|
|
|
|
|
|
|
|
|
n_vals = spa_pod_copy_array(&prop->value, SPA_TYPE_Float,
|
2019-11-13 09:38:40 +01:00
|
|
|
g->endpoint_info.channel_volumes, SPA_AUDIO_MAX_CHANNELS);
|
2019-08-12 12:31:55 +02:00
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
if (n_vals != g->endpoint_info.n_channel_volumes) {
|
2019-08-12 12:31:55 +02:00
|
|
|
emit_event(g->context, g, PA_SUBSCRIPTION_EVENT_REMOVE);
|
|
|
|
|
emit_event(g->context, g, PA_SUBSCRIPTION_EVENT_NEW);
|
2019-11-13 09:38:40 +01:00
|
|
|
g->endpoint_info.n_channel_volumes = n_vals;
|
2019-08-12 12:31:55 +02:00
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
/* routing information on the endpoint is mapped to sink/source ports. */
|
|
|
|
|
static void parse_route(struct global *g, const struct spa_pod *param)
|
|
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void endpoint_event_param(void *object, int seq,
|
2019-03-15 20:31:20 +01:00
|
|
|
uint32_t id, uint32_t index, uint32_t next,
|
|
|
|
|
const struct spa_pod *param)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
|
|
|
|
pw_log_debug("update param %d %d", g->id, id);
|
|
|
|
|
|
|
|
|
|
switch (id) {
|
|
|
|
|
case SPA_PARAM_Props:
|
2019-08-12 12:31:55 +02:00
|
|
|
parse_props(g, param);
|
2019-03-15 20:31:20 +01:00
|
|
|
break;
|
2019-11-13 09:38:40 +01:00
|
|
|
case SPA_PARAM_EnumRoute:
|
|
|
|
|
parse_route(g, param);
|
|
|
|
|
break;
|
2019-03-15 20:31:20 +01:00
|
|
|
default:
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-11 16:43:53 +01:00
|
|
|
static const struct pw_endpoint_events endpoint_events = {
|
|
|
|
|
PW_VERSION_ENDPOINT_EVENTS,
|
2019-11-13 09:38:40 +01:00
|
|
|
.info = endpoint_event_info,
|
|
|
|
|
.param = endpoint_event_param,
|
2019-03-15 20:31:20 +01:00
|
|
|
};
|
|
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
static void endpoint_destroy(void *data)
|
2019-03-15 20:31:20 +01:00
|
|
|
{
|
|
|
|
|
struct global *global = data;
|
2019-11-07 16:04:42 +01:00
|
|
|
if (global->info) {
|
2019-11-13 09:38:40 +01:00
|
|
|
struct pw_endpoint_info *info = global->info;
|
2019-11-07 16:04:42 +01:00
|
|
|
free(info->name);
|
|
|
|
|
free(info->params);
|
|
|
|
|
if (info->props)
|
|
|
|
|
pw_properties_free ((struct pw_properties *)info->props);
|
|
|
|
|
free(info);
|
|
|
|
|
}
|
2019-03-15 20:31:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void module_event_info(void *object, const struct pw_module_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
|
|
|
|
pa_module_info *i = &g->module_info.info;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("update %d", g->id);
|
|
|
|
|
|
|
|
|
|
info = g->info = pw_module_info_update(g->info, info);
|
|
|
|
|
|
|
|
|
|
i->index = g->id;
|
|
|
|
|
if (info->change_mask & PW_MODULE_CHANGE_MASK_PROPS) {
|
|
|
|
|
if (i->proplist)
|
|
|
|
|
pa_proplist_update_dict(i->proplist, info->props);
|
|
|
|
|
else
|
|
|
|
|
i->proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
}
|
|
|
|
|
|
2019-08-12 12:31:55 +02:00
|
|
|
i->name = info->name;
|
|
|
|
|
i->argument = info->args;
|
2019-03-15 20:31:20 +01:00
|
|
|
i->n_used = -1;
|
|
|
|
|
i->auto_unload = false;
|
|
|
|
|
g->pending_seq = pw_proxy_sync(g->proxy, 0);
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-11 15:16:30 +01:00
|
|
|
static const struct pw_module_events module_events = {
|
|
|
|
|
PW_VERSION_MODULE_EVENTS,
|
2019-03-15 20:31:20 +01:00
|
|
|
.info = module_event_info,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void module_destroy(void *data)
|
|
|
|
|
{
|
|
|
|
|
struct global *global = data;
|
|
|
|
|
if (global->module_info.info.proplist)
|
|
|
|
|
pa_proplist_free(global->module_info.info.proplist);
|
|
|
|
|
if (global->info)
|
|
|
|
|
pw_module_info_free(global->info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void client_event_info(void *object, const struct pw_client_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = object;
|
2019-08-16 22:10:08 +02:00
|
|
|
const char *str;
|
2019-03-15 20:31:20 +01:00
|
|
|
pa_client_info *i = &g->client_info.info;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("update %d", g->id);
|
|
|
|
|
info = g->info = pw_client_info_update(g->info, info);
|
|
|
|
|
|
|
|
|
|
i->index = g->id;
|
2019-08-16 22:10:08 +02:00
|
|
|
str = info->props ? spa_dict_lookup(info->props, PW_KEY_MODULE_ID) : NULL;
|
|
|
|
|
i->owner_module = str ? (unsigned)atoi(str) : SPA_ID_INVALID;
|
2019-03-15 20:31:20 +01:00
|
|
|
|
|
|
|
|
if (info->change_mask & PW_CLIENT_CHANGE_MASK_PROPS) {
|
|
|
|
|
if (i->proplist)
|
|
|
|
|
pa_proplist_update_dict(i->proplist, info->props);
|
|
|
|
|
else
|
|
|
|
|
i->proplist = pa_proplist_new_dict(info->props);
|
|
|
|
|
i->name = info->props ?
|
2019-05-24 15:47:05 +02:00
|
|
|
spa_dict_lookup(info->props, PW_KEY_APP_NAME) : NULL;
|
2019-03-15 20:31:20 +01:00
|
|
|
i->driver = info->props ?
|
2019-05-24 15:47:05 +02:00
|
|
|
spa_dict_lookup(info->props, PW_KEY_PROTOCOL) : NULL;
|
2019-03-15 20:31:20 +01:00
|
|
|
}
|
|
|
|
|
g->pending_seq = pw_proxy_sync(g->proxy, 0);
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-11 14:53:39 +01:00
|
|
|
static const struct pw_client_events client_events = {
|
|
|
|
|
PW_VERSION_CLIENT_EVENTS,
|
2019-03-15 20:31:20 +01:00
|
|
|
.info = client_event_info,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void client_destroy(void *data)
|
|
|
|
|
{
|
|
|
|
|
struct global *global = data;
|
|
|
|
|
if (global->client_info.info.proplist)
|
|
|
|
|
pa_proplist_free(global->client_info.info.proplist);
|
|
|
|
|
if (global->info)
|
|
|
|
|
pw_client_info_free(global->info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void proxy_destroy(void *data)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = data;
|
|
|
|
|
spa_hook_remove(&g->proxy_listener);
|
|
|
|
|
g->proxy = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void proxy_done(void *data, int seq)
|
|
|
|
|
{
|
|
|
|
|
struct global *g = data;
|
|
|
|
|
pa_subscription_event_type_t event;
|
|
|
|
|
|
|
|
|
|
if (g->pending_seq == seq) {
|
|
|
|
|
if (g->init) {
|
|
|
|
|
g->init = false;
|
|
|
|
|
event = PA_SUBSCRIPTION_EVENT_NEW;
|
|
|
|
|
} else {
|
|
|
|
|
event = PA_SUBSCRIPTION_EVENT_CHANGE;
|
|
|
|
|
}
|
|
|
|
|
emit_event(g->context, g, event);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct pw_proxy_events proxy_events = {
|
|
|
|
|
PW_VERSION_PROXY_EVENTS,
|
|
|
|
|
.destroy = proxy_destroy,
|
|
|
|
|
.done = proxy_done,
|
|
|
|
|
};
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
static int set_mask(pa_context *c, struct global *g)
|
|
|
|
|
{
|
|
|
|
|
const char *str;
|
2019-11-15 18:21:04 +01:00
|
|
|
const void *events = NULL;
|
|
|
|
|
pw_destroy_t destroy;
|
2019-03-15 20:31:20 +01:00
|
|
|
uint32_t client_version;
|
2018-07-03 22:03:25 +02:00
|
|
|
|
2019-12-19 13:15:10 +01:00
|
|
|
if (strcmp(g->type, PW_TYPE_INTERFACE_Device) == 0) {
|
2018-11-28 11:13:21 +01:00
|
|
|
if (g->props == NULL)
|
|
|
|
|
return 0;
|
2019-05-24 15:47:05 +02:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_MEDIA_CLASS)) == NULL)
|
2018-11-28 11:13:21 +01:00
|
|
|
return 0;
|
|
|
|
|
if (strcmp(str, "Audio/Device") != 0)
|
|
|
|
|
return 0;
|
|
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
/* devices are turned into card objects */
|
2018-11-28 11:13:21 +01:00
|
|
|
pw_log_debug("found card %d", g->id);
|
|
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_CARD;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_CARD;
|
2019-03-15 20:31:20 +01:00
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
events = &device_events;
|
2019-12-11 15:00:41 +01:00
|
|
|
client_version = PW_VERSION_DEVICE;
|
2019-11-13 09:38:40 +01:00
|
|
|
destroy = device_destroy;
|
2019-03-15 20:31:20 +01:00
|
|
|
spa_list_init(&g->card_info.profiles);
|
2019-12-19 13:15:10 +01:00
|
|
|
} else if (strcmp(g->type, PW_TYPE_INTERFACE_Endpoint) == 0) {
|
2018-07-03 22:03:25 +02:00
|
|
|
if (g->props == NULL)
|
|
|
|
|
return 0;
|
2019-10-31 17:55:25 +01:00
|
|
|
|
2019-11-07 16:04:42 +01:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_PRIORITY_SESSION)) != NULL)
|
|
|
|
|
g->priority_session = pw_properties_parse_int(str);
|
2019-10-31 17:55:25 +01:00
|
|
|
|
2019-07-11 11:29:05 +02:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_MEDIA_CLASS)) == NULL) {
|
2019-11-13 09:38:40 +01:00
|
|
|
pw_log_warn("endpoint %d without "PW_KEY_MEDIA_CLASS, g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
return 0;
|
2019-07-11 11:29:05 +02:00
|
|
|
}
|
2019-11-18 13:12:28 +01:00
|
|
|
g->endpoint_info.monitor = SPA_ID_INVALID;
|
2018-07-03 22:03:25 +02:00
|
|
|
|
2019-11-13 09:38:40 +01:00
|
|
|
/* endpoints get transformed into sink/source or sink_input/source_output */
|
2018-07-03 22:03:25 +02:00
|
|
|
if (strcmp(str, "Audio/Sink") == 0) {
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found sink %d", g->id);
|
2019-11-18 13:12:28 +01:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_SINK;
|
2019-07-02 17:38:16 +02:00
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_SINK;
|
2018-07-04 15:33:20 +02:00
|
|
|
}
|
2018-07-03 22:03:25 +02:00
|
|
|
else if (strcmp(str, "Audio/Source") == 0) {
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found source %d", g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_SOURCE;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_SOURCE;
|
2019-11-18 13:12:28 +01:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_ENDPOINT_MONITOR)) != NULL) {
|
|
|
|
|
struct global *f;
|
|
|
|
|
f = pa_context_find_global(c, pw_properties_parse_int(str));
|
|
|
|
|
if (f != NULL) {
|
|
|
|
|
g->endpoint_info.monitor = f->id;
|
|
|
|
|
f->endpoint_info.monitor = g->id;
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-07-03 22:03:25 +02:00
|
|
|
}
|
|
|
|
|
else if (strcmp(str, "Stream/Output/Audio") == 0) {
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found sink input %d", g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_SINK_INPUT;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_SINK_INPUT;
|
|
|
|
|
}
|
|
|
|
|
else if (strcmp(str, "Stream/Input/Audio") == 0) {
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found source output %d", g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_SOURCE_OUTPUT;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_SOURCE_OUTPUT;
|
|
|
|
|
}
|
2019-08-16 22:10:08 +02:00
|
|
|
|
2019-11-15 18:49:10 +01:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_ENDPOINT_CLIENT_ID)) != NULL)
|
|
|
|
|
g->endpoint_info.client_id = atoi(str);
|
|
|
|
|
else if ((str = pw_properties_get(g->props, PW_KEY_CLIENT_ID)) != NULL)
|
2019-11-13 09:38:40 +01:00
|
|
|
g->endpoint_info.client_id = atoi(str);
|
|
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_DEVICE_ID)) != NULL)
|
|
|
|
|
g->endpoint_info.device_id = atoi(str);
|
2019-11-26 17:51:54 +01:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_NODE_ID)) != NULL) {
|
|
|
|
|
pa_stream *s;
|
2019-11-15 18:21:04 +01:00
|
|
|
g->endpoint_info.node_id = atoi(str);
|
2019-11-26 17:51:54 +01:00
|
|
|
spa_list_for_each(s, &c->streams, link) {
|
|
|
|
|
if (pw_stream_get_node_id(s->stream) == g->endpoint_info.node_id)
|
|
|
|
|
s->endpoint_id = g->id;
|
|
|
|
|
}
|
|
|
|
|
}
|
2019-11-13 09:38:40 +01:00
|
|
|
|
|
|
|
|
events = &endpoint_events;
|
2019-12-11 16:43:53 +01:00
|
|
|
client_version = PW_VERSION_ENDPOINT;
|
2019-11-13 09:38:40 +01:00
|
|
|
destroy = endpoint_destroy;
|
|
|
|
|
g->endpoint_info.volume = 1.0;
|
|
|
|
|
g->endpoint_info.mute = false;
|
2019-12-19 13:15:10 +01:00
|
|
|
} else if (strcmp(g->type, PW_TYPE_INTERFACE_EndpointStream) == 0) {
|
2019-11-13 09:38:40 +01:00
|
|
|
if (g->props == NULL)
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_ENDPOINT_ID)) == NULL) {
|
|
|
|
|
pw_log_warn("endpoint stream %d without "PW_KEY_ENDPOINT_ID, g->id);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
/* streams get transformed into profiles on the device */
|
|
|
|
|
pw_log_debug("found endpoint stream %d", g->id);
|
2019-12-19 13:15:10 +01:00
|
|
|
} else if (strcmp(g->type, PW_TYPE_INTERFACE_Module) == 0) {
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found module %d", g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_MODULE;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_MODULE;
|
2019-03-15 20:31:20 +01:00
|
|
|
events = &module_events;
|
2019-12-11 15:16:30 +01:00
|
|
|
client_version = PW_VERSION_MODULE;
|
2019-03-15 20:31:20 +01:00
|
|
|
destroy = module_destroy;
|
2019-12-19 13:15:10 +01:00
|
|
|
} else if (strcmp(g->type, PW_TYPE_INTERFACE_Client) == 0) {
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("found client %d", g->id);
|
2018-07-03 22:03:25 +02:00
|
|
|
g->mask = PA_SUBSCRIPTION_MASK_CLIENT;
|
|
|
|
|
g->event = PA_SUBSCRIPTION_EVENT_CLIENT;
|
2019-03-15 20:31:20 +01:00
|
|
|
events = &client_events;
|
2019-12-11 14:53:39 +01:00
|
|
|
client_version = PW_VERSION_CLIENT;
|
2019-03-15 20:31:20 +01:00
|
|
|
destroy = client_destroy;
|
2019-12-19 13:15:10 +01:00
|
|
|
} else if (strcmp(g->type, PW_TYPE_INTERFACE_EndpointLink) == 0) {
|
2019-11-15 18:21:04 +01:00
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_ENDPOINT_LINK_OUTPUT_ENDPOINT)) == NULL)
|
2018-07-04 15:33:20 +02:00
|
|
|
return 0;
|
2019-11-15 18:21:04 +01:00
|
|
|
g->link_info.output = pa_context_find_global(c, pw_properties_parse_int(str));
|
|
|
|
|
if ((str = pw_properties_get(g->props, PW_KEY_ENDPOINT_LINK_INPUT_ENDPOINT)) == NULL)
|
2018-07-04 15:33:20 +02:00
|
|
|
return 0;
|
2019-11-15 18:21:04 +01:00
|
|
|
g->link_info.input = pa_context_find_global(c, pw_properties_parse_int(str));
|
2018-07-04 15:33:20 +02:00
|
|
|
|
2019-11-15 18:21:04 +01:00
|
|
|
if (g->link_info.output == NULL || g->link_info.input == NULL)
|
2018-07-04 15:33:20 +02:00
|
|
|
return 0;
|
|
|
|
|
|
2019-11-15 18:21:04 +01:00
|
|
|
pw_log_debug("link %d->%d", g->link_info.output->id, g->link_info.input->id);
|
2018-12-14 16:42:01 +01:00
|
|
|
|
2019-11-15 18:21:04 +01:00
|
|
|
if (!g->link_info.output->init)
|
|
|
|
|
emit_event(c, g->link_info.output, PA_SUBSCRIPTION_EVENT_CHANGE);
|
|
|
|
|
if (!g->link_info.input->init)
|
|
|
|
|
emit_event(c, g->link_info.input, PA_SUBSCRIPTION_EVENT_CHANGE);
|
2018-12-14 16:42:01 +01:00
|
|
|
|
2019-12-19 13:15:10 +01:00
|
|
|
} else {
|
2018-10-19 13:30:20 +02:00
|
|
|
return 0;
|
|
|
|
|
}
|
2019-03-15 20:31:20 +01:00
|
|
|
|
|
|
|
|
pw_log_debug("global %p: id:%u mask %d/%d", g, g->id, g->mask, g->event);
|
|
|
|
|
|
|
|
|
|
if (events) {
|
|
|
|
|
pw_log_debug("bind %d", g->id);
|
|
|
|
|
|
2019-12-11 09:44:48 +01:00
|
|
|
g->proxy = pw_registry_bind(c->registry, g->id, g->type,
|
2019-03-15 20:31:20 +01:00
|
|
|
client_version, 0);
|
|
|
|
|
if (g->proxy == NULL)
|
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
2019-05-29 10:38:49 +02:00
|
|
|
pw_proxy_add_object_listener(g->proxy, &g->object_listener, events, g);
|
2019-03-15 20:31:20 +01:00
|
|
|
pw_proxy_add_listener(g->proxy, &g->proxy_listener, &proxy_events, g);
|
|
|
|
|
g->destroy = destroy;
|
|
|
|
|
} else {
|
|
|
|
|
emit_event(c, g, PA_SUBSCRIPTION_EVENT_NEW);
|
|
|
|
|
}
|
|
|
|
|
|
2018-07-03 22:03:25 +02:00
|
|
|
return 1;
|
|
|
|
|
}
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2019-10-31 17:55:25 +01:00
|
|
|
static inline void insert_global(pa_context *c, struct global *global)
|
|
|
|
|
{
|
|
|
|
|
struct global *g, *t;
|
|
|
|
|
|
|
|
|
|
spa_list_for_each_safe(g, t, &c->globals, link) {
|
2019-11-15 18:21:04 +01:00
|
|
|
if (g->priority_session <= global->priority_session) {
|
2019-10-31 17:55:25 +01:00
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
2019-11-15 18:21:04 +01:00
|
|
|
spa_list_append(&g->link, &global->link);
|
2019-10-31 17:55:25 +01:00
|
|
|
}
|
|
|
|
|
|
2019-08-16 22:10:08 +02:00
|
|
|
static void registry_event_global(void *data, uint32_t id,
|
2019-12-19 13:15:10 +01:00
|
|
|
uint32_t permissions, const char *type, uint32_t version,
|
2018-06-01 11:28:31 +02:00
|
|
|
const struct spa_dict *props)
|
|
|
|
|
{
|
|
|
|
|
pa_context *c = data;
|
|
|
|
|
struct global *g;
|
2019-10-31 17:55:25 +01:00
|
|
|
int res;
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
g = calloc(1, sizeof(struct global));
|
2019-12-19 13:15:10 +01:00
|
|
|
pw_log_debug("context %p: global %d %s %p", c, id, type, g);
|
2019-03-15 20:31:20 +01:00
|
|
|
g->context = c;
|
2018-06-01 11:28:31 +02:00
|
|
|
g->id = id;
|
2019-12-19 13:15:10 +01:00
|
|
|
g->type = strdup(type);
|
2019-03-15 20:31:20 +01:00
|
|
|
g->init = true;
|
2018-06-01 11:28:31 +02:00
|
|
|
g->props = props ? pw_properties_new_dict(props) : NULL;
|
|
|
|
|
|
2019-10-31 17:55:25 +01:00
|
|
|
res = set_mask(c, g);
|
|
|
|
|
insert_global(c, g);
|
|
|
|
|
|
|
|
|
|
if (res != 1)
|
2019-03-12 12:15:28 +01:00
|
|
|
global_free(c, g);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-03-01 14:03:28 +01:00
|
|
|
static void registry_event_global_remove(void *object, uint32_t id)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
|
|
|
|
pa_context *c = object;
|
|
|
|
|
struct global *g;
|
|
|
|
|
|
2018-11-29 17:30:24 +01:00
|
|
|
pw_log_debug("context %p: remove %d", c, id);
|
2018-06-01 11:28:31 +02:00
|
|
|
if ((g = pa_context_find_global(c, id)) == NULL)
|
2019-03-01 14:03:28 +01:00
|
|
|
return;
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2018-12-14 16:41:19 +01:00
|
|
|
emit_event(c, g, PA_SUBSCRIPTION_EVENT_REMOVE);
|
2018-07-03 22:03:25 +02:00
|
|
|
|
2018-11-29 17:30:24 +01:00
|
|
|
pw_log_debug("context %p: free %d %p", c, id, g);
|
2019-03-12 12:15:28 +01:00
|
|
|
global_free(c, g);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-12-11 09:44:48 +01:00
|
|
|
static const struct pw_registry_events registry_events =
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2019-12-11 09:44:48 +01:00
|
|
|
PW_VERSION_REGISTRY_EVENTS,
|
2018-06-01 11:28:31 +02:00
|
|
|
.global = registry_event_global,
|
|
|
|
|
.global_remove = registry_event_global_remove,
|
|
|
|
|
};
|
|
|
|
|
|
2019-02-25 17:16:14 +01:00
|
|
|
static void complete_operations(pa_context *c, int seq)
|
2019-01-10 09:31:37 +01:00
|
|
|
{
|
|
|
|
|
pa_operation *o, *t;
|
|
|
|
|
spa_list_for_each_safe(o, t, &c->operations, link) {
|
|
|
|
|
if (o->seq != seq)
|
|
|
|
|
continue;
|
|
|
|
|
pa_operation_ref(o);
|
|
|
|
|
if (o->callback)
|
|
|
|
|
o->callback(o, o->userdata);
|
|
|
|
|
pa_operation_unref(o);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-01 14:03:28 +01:00
|
|
|
static void core_info(void *data, const struct pw_core_info *info)
|
2019-01-10 09:31:37 +01:00
|
|
|
{
|
|
|
|
|
pa_context *c = data;
|
2019-12-06 11:48:40 +01:00
|
|
|
bool first = c->core_info == NULL;
|
|
|
|
|
|
|
|
|
|
pw_log_debug("context %p: info", c);
|
|
|
|
|
|
|
|
|
|
if (first) {
|
|
|
|
|
pa_context_set_state(c, PA_CONTEXT_AUTHORIZING);
|
|
|
|
|
pa_context_set_state(c, PA_CONTEXT_SETTING_NAME);
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-10 09:31:37 +01:00
|
|
|
c->core_info = pw_core_info_update(c->core_info, info);
|
|
|
|
|
|
2019-12-06 11:48:40 +01:00
|
|
|
if (first)
|
|
|
|
|
pa_context_set_state(c, PA_CONTEXT_READY);
|
2019-01-10 09:31:37 +01:00
|
|
|
}
|
|
|
|
|
|
2019-12-06 11:48:40 +01:00
|
|
|
static void core_error(void *data, uint32_t id, int seq, int res, const char *message)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
|
|
|
|
pa_context *c = data;
|
|
|
|
|
|
2019-12-06 11:48:40 +01:00
|
|
|
pw_log_error("context %p: error id:%u seq:%d res:%d (%s): %s", c,
|
|
|
|
|
id, seq, res, spa_strerror(res), message);
|
|
|
|
|
|
|
|
|
|
if (id == 0) {
|
2019-03-14 13:23:20 +01:00
|
|
|
if (!c->disconnect)
|
|
|
|
|
context_fail(c, PA_ERR_CONNECTIONTERMINATED);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-06 11:48:40 +01:00
|
|
|
static void core_done(void *data, uint32_t id, int seq)
|
|
|
|
|
{
|
|
|
|
|
pa_context *c = data;
|
|
|
|
|
pw_log_debug("done %d", seq);
|
|
|
|
|
complete_operations(c, seq);
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-11 07:46:59 +01:00
|
|
|
static const struct pw_core_events core_events = {
|
|
|
|
|
PW_VERSION_CORE_EVENTS,
|
2019-12-06 11:48:40 +01:00
|
|
|
.info = core_info,
|
|
|
|
|
.done = core_done,
|
|
|
|
|
.error = core_error
|
2018-06-01 11:28:31 +02:00
|
|
|
};
|
|
|
|
|
|
2019-03-15 20:31:20 +01:00
|
|
|
struct success_data {
|
|
|
|
|
pa_context_success_cb_t cb;
|
|
|
|
|
void *userdata;
|
|
|
|
|
int ret;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void on_success(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct success_data *d = userdata;
|
|
|
|
|
pa_context *c = o->context;
|
|
|
|
|
pa_operation_done(o);
|
|
|
|
|
if (d->cb)
|
|
|
|
|
d->cb(c, d->ret, d->userdata);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
SPA_EXPORT
|
|
|
|
|
pa_operation* pa_context_subscribe(pa_context *c, pa_subscription_mask_t m, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
|
|
|
|
c->subscribe_mask = m;
|
|
|
|
|
|
2019-12-11 09:44:48 +01:00
|
|
|
if (c->registry == NULL) {
|
|
|
|
|
c->registry = pw_core_get_registry(c->core,
|
|
|
|
|
PW_VERSION_REGISTRY, 0);
|
|
|
|
|
pw_registry_add_listener(c->registry,
|
2019-03-15 20:31:20 +01:00
|
|
|
&c->registry_listener,
|
|
|
|
|
®istry_events, c);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->ret = 0;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
pa_operation_sync(o);
|
|
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
pa_context *pa_context_new_with_proplist(pa_mainloop_api *mainloop, const char *name, PA_CONST pa_proplist *p)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2019-12-10 18:19:56 +01:00
|
|
|
struct pw_context *context;
|
2018-06-01 11:28:31 +02:00
|
|
|
struct pw_loop *loop;
|
|
|
|
|
struct pw_properties *props;
|
|
|
|
|
pa_context *c;
|
|
|
|
|
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(mainloop);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
props = pw_properties_new(NULL, NULL);
|
|
|
|
|
if (name)
|
|
|
|
|
pw_properties_set(props, PA_PROP_APPLICATION_NAME, name);
|
2019-05-24 15:47:05 +02:00
|
|
|
pw_properties_set(props, PW_KEY_CLIENT_API, "pulseaudio");
|
2018-12-04 16:33:59 +01:00
|
|
|
if (p)
|
|
|
|
|
pw_properties_update(props, &p->props->dict);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
loop = mainloop->userdata;
|
2019-12-10 18:19:56 +01:00
|
|
|
context = pw_context_new(loop, NULL, sizeof(struct pa_context));
|
|
|
|
|
if (context == NULL)
|
2018-06-01 11:28:31 +02:00
|
|
|
return NULL;
|
|
|
|
|
|
2019-12-10 18:19:56 +01:00
|
|
|
c = pw_context_get_user_data(context);
|
2019-12-06 11:48:40 +01:00
|
|
|
c->props = props;
|
2018-06-01 11:28:31 +02:00
|
|
|
c->loop = loop;
|
2019-12-10 18:19:56 +01:00
|
|
|
c->context = context;
|
2018-06-01 11:28:31 +02:00
|
|
|
c->proplist = p ? pa_proplist_copy(p) : pa_proplist_new();
|
|
|
|
|
c->refcount = 1;
|
|
|
|
|
c->client_index = PA_INVALID_INDEX;
|
|
|
|
|
|
|
|
|
|
if (name)
|
|
|
|
|
pa_proplist_sets(c->proplist, PA_PROP_APPLICATION_NAME, name);
|
|
|
|
|
|
|
|
|
|
c->mainloop = mainloop;
|
|
|
|
|
c->error = 0;
|
|
|
|
|
c->state = PA_CONTEXT_UNCONNECTED;
|
|
|
|
|
|
|
|
|
|
spa_list_init(&c->globals);
|
|
|
|
|
|
|
|
|
|
spa_list_init(&c->streams);
|
|
|
|
|
spa_list_init(&c->operations);
|
|
|
|
|
|
|
|
|
|
return c;
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-10 18:19:56 +01:00
|
|
|
static void do_context_destroy(pa_mainloop_api*m, void *userdata)
|
2019-03-14 13:23:20 +01:00
|
|
|
{
|
|
|
|
|
pa_context *c = userdata;
|
2019-12-10 18:19:56 +01:00
|
|
|
pw_context_destroy(c->context);
|
2019-03-14 13:23:20 +01:00
|
|
|
}
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
static void context_free(pa_context *c)
|
|
|
|
|
{
|
2018-12-14 16:41:19 +01:00
|
|
|
pw_log_debug("context %p: free", c);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
context_unlink(c);
|
|
|
|
|
|
2019-12-06 11:48:40 +01:00
|
|
|
pw_properties_free(c->props);
|
2018-06-01 11:28:31 +02:00
|
|
|
if (c->proplist)
|
|
|
|
|
pa_proplist_free(c->proplist);
|
2019-01-10 09:31:37 +01:00
|
|
|
if (c->core_info)
|
|
|
|
|
pw_core_info_free(c->core_info);
|
2018-12-14 16:43:34 +01:00
|
|
|
|
2019-12-10 18:19:56 +01:00
|
|
|
pa_mainloop_api_once(c->mainloop, do_context_destroy, c);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
void pa_context_unref(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
if (--c->refcount == 0)
|
|
|
|
|
context_free(c);
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context* pa_context_ref(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
c->refcount++;
|
|
|
|
|
return c;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
void pa_context_set_state_callback(pa_context *c, pa_context_notify_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
if (c->state == PA_CONTEXT_TERMINATED || c->state == PA_CONTEXT_FAILED)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
c->state_callback = cb;
|
|
|
|
|
c->state_userdata = userdata;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
void pa_context_set_event_callback(pa_context *c, pa_context_event_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
if (c->state == PA_CONTEXT_TERMINATED || c->state == PA_CONTEXT_FAILED)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
c->event_callback = cb;
|
|
|
|
|
c->event_userdata = userdata;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
int pa_context_errno(PA_CONST pa_context *c)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
|
|
|
|
if (!c)
|
|
|
|
|
return PA_ERR_INVALID;
|
|
|
|
|
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
return c->error;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
int pa_context_is_pending(PA_CONST pa_context *c)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY(c, PA_CONTEXT_IS_GOOD(c->state), PA_ERR_BADSTATE);
|
|
|
|
|
|
|
|
|
|
return !spa_list_is_empty(&c->operations);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
pa_context_state_t pa_context_get_state(PA_CONST pa_context *c)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
return c->state;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
int pa_context_connect(pa_context *c, const char *server, pa_context_flags_t flags, const pa_spawn_api *api)
|
|
|
|
|
{
|
2019-12-06 11:48:40 +01:00
|
|
|
int res = 0;
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY(c, c->state == PA_CONTEXT_UNCONNECTED, PA_ERR_BADSTATE);
|
|
|
|
|
PA_CHECK_VALIDITY(c, !(flags & ~(PA_CONTEXT_NOAUTOSPAWN|PA_CONTEXT_NOFAIL)), PA_ERR_INVALID);
|
|
|
|
|
PA_CHECK_VALIDITY(c, !server || *server, PA_ERR_INVALID);
|
|
|
|
|
|
|
|
|
|
pa_context_ref(c);
|
|
|
|
|
|
|
|
|
|
c->no_fail = !!(flags & PA_CONTEXT_NOFAIL);
|
|
|
|
|
|
2019-12-06 11:48:40 +01:00
|
|
|
pa_context_set_state(c, PA_CONTEXT_CONNECTING);
|
|
|
|
|
|
2019-12-11 07:46:59 +01:00
|
|
|
c->core = pw_context_connect(c->context, pw_properties_copy(c->props), 0);
|
|
|
|
|
if (c->core == NULL) {
|
2019-12-06 11:48:40 +01:00
|
|
|
context_fail(c, PA_ERR_CONNECTIONREFUSED);
|
|
|
|
|
res = -1;
|
2019-12-06 22:27:27 +01:00
|
|
|
goto exit;
|
2019-12-06 11:48:40 +01:00
|
|
|
}
|
2019-12-11 07:46:59 +01:00
|
|
|
pw_core_add_listener(c->core, &c->core_listener, &core_events, c);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2019-12-06 22:27:27 +01:00
|
|
|
exit:
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_context_unref(c);
|
|
|
|
|
|
|
|
|
|
return res;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
void pa_context_disconnect(pa_context *c)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
2018-06-01 11:28:31 +02:00
|
|
|
|
2019-03-14 13:23:20 +01:00
|
|
|
c->disconnect = true;
|
2019-12-11 07:46:59 +01:00
|
|
|
if (c->core) {
|
|
|
|
|
pw_core_disconnect(c->core);
|
|
|
|
|
c->core = NULL;
|
2019-12-06 11:48:40 +01:00
|
|
|
}
|
2018-06-01 11:28:31 +02:00
|
|
|
if (PA_CONTEXT_IS_GOOD(c->state))
|
|
|
|
|
pa_context_set_state(c, PA_CONTEXT_TERMINATED);
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-07 11:16:09 +02:00
|
|
|
struct notify_data {
|
|
|
|
|
pa_context_notify_cb_t cb;
|
|
|
|
|
void *userdata;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void on_notify(pa_operation *o, void *userdata)
|
|
|
|
|
{
|
|
|
|
|
struct notify_data *d = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_context *c = o->context;
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_operation_done(o);
|
|
|
|
|
if (d->cb)
|
2018-08-02 10:31:29 +02:00
|
|
|
d->cb(c, d->userdata);
|
2018-06-07 11:16:09 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_drain(pa_context *c, pa_context_notify_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct notify_data *d;
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_notify, sizeof(struct notify_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-07 11:16:09 +02:00
|
|
|
|
|
|
|
|
return o;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_exit_daemon(pa_context *c, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->ret = PA_ERR_ACCESS;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2019-03-15 20:31:20 +01:00
|
|
|
pa_operation_sync(o);
|
2019-04-17 15:44:40 +02:00
|
|
|
pw_log_warn("Not Implemented");
|
2018-06-07 11:16:09 +02:00
|
|
|
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_set_default_sink(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2019-04-17 15:44:40 +02:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->ret = PA_ERR_ACCESS;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
pw_log_warn("Not Implemented");
|
2019-04-17 15:44:40 +02:00
|
|
|
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_set_default_source(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2019-04-17 15:44:40 +02:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->ret = PA_ERR_ACCESS;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
pa_operation_sync(o);
|
2018-06-01 11:28:31 +02:00
|
|
|
pw_log_warn("Not Implemented");
|
2019-04-17 15:44:40 +02:00
|
|
|
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
int pa_context_is_local(PA_CONST pa_context *c)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_ANY(c, PA_CONTEXT_IS_GOOD(c->state), PA_ERR_BADSTATE, -1);
|
|
|
|
|
|
|
|
|
|
return 1;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation* pa_context_set_name(pa_context *c, const char *name, pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
struct spa_dict dict;
|
|
|
|
|
struct spa_dict_item items[1];
|
|
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
2019-12-06 11:48:40 +01:00
|
|
|
int changed;
|
2018-06-07 11:16:09 +02:00
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(name);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
|
|
|
|
items[0] = SPA_DICT_ITEM_INIT(PA_PROP_APPLICATION_NAME, name);
|
|
|
|
|
dict = SPA_DICT_INIT(items, 1);
|
2019-12-06 11:48:40 +01:00
|
|
|
changed = pw_properties_update(c->props, &dict);
|
|
|
|
|
|
|
|
|
|
if (changed) {
|
2019-12-11 14:53:39 +01:00
|
|
|
struct pw_client *client;
|
2019-12-06 11:48:40 +01:00
|
|
|
|
2019-12-11 14:53:39 +01:00
|
|
|
client = pw_core_get_client(c->core);
|
|
|
|
|
pw_client_update_properties(client, &c->props->dict);
|
2019-12-06 11:48:40 +01:00
|
|
|
}
|
2018-06-07 11:16:09 +02:00
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
2018-08-02 10:31:29 +02:00
|
|
|
pa_operation_sync(o);
|
2018-06-07 11:16:09 +02:00
|
|
|
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
const char* pa_context_get_server(PA_CONST pa_context *c)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
const struct pw_core_info *info;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
2019-01-10 09:31:37 +01:00
|
|
|
info = c->core_info;
|
2018-06-07 11:16:09 +02:00
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, info && info->name, PA_ERR_NOENTITY);
|
|
|
|
|
|
|
|
|
|
return info->name;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
uint32_t pa_context_get_protocol_version(PA_CONST pa_context *c)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
|
|
|
|
return PA_PROTOCOL_VERSION;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
uint32_t pa_context_get_server_protocol_version(PA_CONST pa_context *c)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_ANY(c, PA_CONTEXT_IS_GOOD(c->state), PA_ERR_BADSTATE, PA_INVALID_INDEX);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
return PA_PROTOCOL_VERSION;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
pa_operation *pa_context_proplist_update(pa_context *c, pa_update_mode_t mode, PA_CONST pa_proplist *p, pa_context_success_cb_t cb, void *userdata)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2019-01-04 10:00:57 +01:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
spa_assert(c);
|
|
|
|
|
spa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, mode == PA_UPDATE_SET ||
|
|
|
|
|
mode == PA_UPDATE_MERGE || mode == PA_UPDATE_REPLACE, PA_ERR_INVALID);
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
|
|
|
|
pa_proplist_update(c->proplist, mode, p);
|
|
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
pa_operation_sync(o);
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
pa_operation *pa_context_proplist_remove(pa_context *c, const char *const keys[], pa_context_success_cb_t cb, void *userdata)
|
|
|
|
|
{
|
2019-01-04 10:00:57 +01:00
|
|
|
pa_operation *o;
|
|
|
|
|
struct success_data *d;
|
|
|
|
|
|
|
|
|
|
spa_assert(c);
|
|
|
|
|
spa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, keys && keys[0], PA_ERR_INVALID);
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_NULL(c, c->state == PA_CONTEXT_READY, PA_ERR_BADSTATE);
|
|
|
|
|
|
2018-06-01 11:28:31 +02:00
|
|
|
pw_log_warn("Not Implemented");
|
2019-01-04 10:00:57 +01:00
|
|
|
|
|
|
|
|
o = pa_operation_new(c, NULL, on_success, sizeof(struct success_data));
|
|
|
|
|
d = o->userdata;
|
|
|
|
|
d->cb = cb;
|
|
|
|
|
d->userdata = userdata;
|
|
|
|
|
pa_operation_sync(o);
|
|
|
|
|
return o;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
uint32_t pa_context_get_index(PA_CONST pa_context *c)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
|
|
|
|
return c->client_index;
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
pa_time_event* pa_context_rttime_new(PA_CONST pa_context *c, pa_usec_t usec, pa_time_event_cb_t cb, void *userdata)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(c->mainloop);
|
|
|
|
|
|
|
|
|
|
if (usec == PA_USEC_INVALID)
|
|
|
|
|
return c->mainloop->time_new(c->mainloop, NULL, cb, userdata);
|
|
|
|
|
|
|
|
|
|
pa_timeval_store(&tv, usec);
|
|
|
|
|
|
|
|
|
|
return c->mainloop->time_new(c->mainloop, &tv, cb, userdata);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
void pa_context_rttime_restart(PA_CONST pa_context *c, pa_time_event *e, pa_usec_t usec)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2018-06-07 11:16:09 +02:00
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
pa_assert(c->mainloop);
|
|
|
|
|
|
|
|
|
|
if (usec == PA_USEC_INVALID)
|
|
|
|
|
c->mainloop->time_restart(e, NULL);
|
|
|
|
|
else {
|
|
|
|
|
pa_timeval_store(&tv, usec);
|
|
|
|
|
c->mainloop->time_restart(e, &tv);
|
|
|
|
|
}
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2019-09-27 07:45:15 +05:30
|
|
|
size_t pa_context_get_tile_size(PA_CONST pa_context *c, const pa_sample_spec *ss)
|
2018-06-01 11:28:31 +02:00
|
|
|
{
|
2019-01-04 10:00:57 +01:00
|
|
|
size_t fs, mbs;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(c->refcount >= 1);
|
|
|
|
|
|
|
|
|
|
PA_CHECK_VALIDITY_RETURN_ANY(c, !ss || pa_sample_spec_valid(ss), PA_ERR_INVALID, (size_t) -1);
|
|
|
|
|
|
|
|
|
|
fs = ss ? pa_frame_size(ss) : 1;
|
|
|
|
|
mbs = PA_ROUND_DOWN(4096, fs);
|
|
|
|
|
return PA_MAX(mbs, fs);
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|
|
|
|
|
|
2019-02-06 13:23:43 +01:00
|
|
|
SPA_EXPORT
|
2018-06-01 11:28:31 +02:00
|
|
|
int pa_context_load_cookie_from_file(pa_context *c, const char *cookie_file_path)
|
|
|
|
|
{
|
2019-01-04 10:00:57 +01:00
|
|
|
return 0;
|
2018-06-01 11:28:31 +02:00
|
|
|
}
|