2004-07-16 19:56:36 +00:00
|
|
|
/* $Id$ */
|
|
|
|
|
|
|
|
|
|
/***
|
2006-06-19 21:53:48 +00:00
|
|
|
This file is part of PulseAudio.
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-02-13 15:35:19 +00:00
|
|
|
Copyright 2004-2006 Lennart Poettering
|
|
|
|
|
Copyright 2006 Pierre Ossman <ossman@cendio.se> for Cendio AB
|
|
|
|
|
|
2006-06-19 21:53:48 +00:00
|
|
|
PulseAudio is free software; you can redistribute it and/or modify
|
2004-11-14 14:58:54 +00:00
|
|
|
it under the terms of the GNU Lesser General Public License as published
|
2004-07-16 19:56:36 +00:00
|
|
|
by the Free Software Foundation; either version 2 of the License,
|
|
|
|
|
or (at your option) any later version.
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-06-19 21:53:48 +00:00
|
|
|
PulseAudio is distributed in the hope that it will be useful, but
|
2004-07-16 19:56:36 +00:00
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
General Public License for more details.
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-11-14 14:58:54 +00:00
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
2006-06-19 21:53:48 +00:00
|
|
|
along with PulseAudio; if not, write to the Free Software
|
2004-07-16 19:56:36 +00:00
|
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
|
|
|
|
USA.
|
|
|
|
|
***/
|
|
|
|
|
|
2004-07-16 19:16:42 +00:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
|
#include <config.h>
|
|
|
|
|
#endif
|
|
|
|
|
|
2004-07-06 00:08:44 +00:00
|
|
|
#include <string.h>
|
2004-06-20 01:12:13 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <stdlib.h>
|
2006-02-24 15:12:42 +00:00
|
|
|
#include <unistd.h>
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2006-06-19 21:53:48 +00:00
|
|
|
#include <pulse/timeval.h>
|
|
|
|
|
#include <pulse/version.h>
|
|
|
|
|
#include <pulse/utf8.h>
|
|
|
|
|
#include <pulse/util.h>
|
|
|
|
|
#include <pulse/xmalloc.h>
|
2006-03-02 21:56:15 +00:00
|
|
|
|
2006-06-19 21:53:48 +00:00
|
|
|
#include <pulsecore/native-common.h>
|
|
|
|
|
#include <pulsecore/packet.h>
|
|
|
|
|
#include <pulsecore/client.h>
|
|
|
|
|
#include <pulsecore/source-output.h>
|
|
|
|
|
#include <pulsecore/sink-input.h>
|
|
|
|
|
#include <pulsecore/pstream.h>
|
|
|
|
|
#include <pulsecore/tagstruct.h>
|
|
|
|
|
#include <pulsecore/pdispatch.h>
|
|
|
|
|
#include <pulsecore/pstream-util.h>
|
|
|
|
|
#include <pulsecore/authkey.h>
|
|
|
|
|
#include <pulsecore/namereg.h>
|
|
|
|
|
#include <pulsecore/core-scache.h>
|
|
|
|
|
#include <pulsecore/core-subscribe.h>
|
|
|
|
|
#include <pulsecore/log.h>
|
|
|
|
|
#include <pulsecore/autoload.h>
|
|
|
|
|
#include <pulsecore/authkey-prop.h>
|
|
|
|
|
#include <pulsecore/strlist.h>
|
|
|
|
|
#include <pulsecore/props.h>
|
|
|
|
|
#include <pulsecore/sample-util.h>
|
|
|
|
|
#include <pulsecore/llist.h>
|
2006-07-19 21:48:35 +00:00
|
|
|
#include <pulsecore/creds.h>
|
|
|
|
|
#include <pulsecore/core-util.h>
|
2006-07-20 18:43:20 +00:00
|
|
|
#include <pulsecore/ipacl.h>
|
2007-10-28 19:13:50 +00:00
|
|
|
#include <pulsecore/thread-mq.h>
|
2006-02-17 12:10:58 +00:00
|
|
|
|
2004-06-08 23:54:24 +00:00
|
|
|
#include "protocol-native.h"
|
|
|
|
|
|
2004-11-18 00:28:26 +00:00
|
|
|
/* Kick a client if it doesn't authenticate within this time */
|
2006-04-23 19:49:01 +00:00
|
|
|
#define AUTH_TIMEOUT 60
|
2004-11-18 00:28:26 +00:00
|
|
|
|
|
|
|
|
/* Don't accept more connection than this */
|
2006-06-21 16:36:58 +00:00
|
|
|
#define MAX_CONNECTIONS 64
|
2004-11-18 00:28:26 +00:00
|
|
|
|
2006-02-22 21:02:27 +00:00
|
|
|
#define MAX_MEMBLOCKQ_LENGTH (4*1024*1024) /* 4MB */
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
typedef struct connection connection;
|
2004-07-03 23:35:12 +00:00
|
|
|
struct pa_protocol_native;
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
typedef struct record_stream {
|
|
|
|
|
pa_msgobject parent;
|
|
|
|
|
|
|
|
|
|
connection *connection;
|
2004-06-20 01:12:13 +00:00
|
|
|
uint32_t index;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_source_output *source_output;
|
|
|
|
|
pa_memblockq *memblockq;
|
2004-07-10 16:50:22 +00:00
|
|
|
size_t fragment_size;
|
2007-10-28 19:13:50 +00:00
|
|
|
} record_stream;
|
|
|
|
|
|
|
|
|
|
typedef struct output_stream {
|
|
|
|
|
pa_msgobject parent;
|
|
|
|
|
} output_stream;
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
typedef struct playback_stream {
|
|
|
|
|
output_stream parent;
|
|
|
|
|
|
|
|
|
|
connection *connection;
|
2004-06-20 01:12:13 +00:00
|
|
|
uint32_t index;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sink_input *sink_input;
|
|
|
|
|
pa_memblockq *memblockq;
|
2004-07-07 22:02:15 +00:00
|
|
|
int drain_request;
|
|
|
|
|
uint32_t drain_tag;
|
2006-02-20 04:05:16 +00:00
|
|
|
uint32_t syncid;
|
|
|
|
|
int underrun;
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_atomic_t missing;
|
|
|
|
|
size_t minreq;
|
|
|
|
|
|
|
|
|
|
/* Only updated after SINK_INPUT_MESSAGE_UPDATE_LATENCY */
|
|
|
|
|
int64_t read_index, write_index;
|
|
|
|
|
size_t resampled_chunk_length;
|
|
|
|
|
} playback_stream;
|
2004-06-08 23:54:24 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
typedef struct upload_stream {
|
|
|
|
|
output_stream parent;
|
|
|
|
|
|
|
|
|
|
connection *connection;
|
2004-08-03 19:26:56 +00:00
|
|
|
uint32_t index;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_memchunk memchunk;
|
2004-08-03 19:26:56 +00:00
|
|
|
size_t length;
|
|
|
|
|
char *name;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sample_spec sample_spec;
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_channel_map channel_map;
|
2007-10-28 19:13:50 +00:00
|
|
|
} upload_stream;
|
2004-08-03 19:26:56 +00:00
|
|
|
|
2004-06-08 23:54:24 +00:00
|
|
|
struct connection {
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_msgobject parent;
|
|
|
|
|
|
2004-06-20 01:12:13 +00:00
|
|
|
int authorized;
|
2006-03-02 21:56:15 +00:00
|
|
|
uint32_t version;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_protocol_native *protocol;
|
|
|
|
|
pa_client *client;
|
|
|
|
|
pa_pstream *pstream;
|
|
|
|
|
pa_pdispatch *pdispatch;
|
|
|
|
|
pa_idxset *record_streams, *output_streams;
|
2004-07-10 16:50:22 +00:00
|
|
|
uint32_t rrobin_index;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_subscription *subscription;
|
|
|
|
|
pa_time_event *auth_timeout_event;
|
2004-06-20 01:12:13 +00:00
|
|
|
};
|
2004-06-08 23:54:24 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
PA_DECLARE_CLASS(record_stream);
|
|
|
|
|
#define RECORD_STREAM(o) (record_stream_cast(o))
|
|
|
|
|
static PA_DEFINE_CHECK_TYPE(record_stream, pa_msgobject);
|
|
|
|
|
|
|
|
|
|
PA_DECLARE_CLASS(output_stream);
|
|
|
|
|
#define OUTPUT_STREAM(o) (output_stream_cast(o))
|
|
|
|
|
static PA_DEFINE_CHECK_TYPE(output_stream, pa_msgobject);
|
|
|
|
|
|
|
|
|
|
PA_DECLARE_CLASS(playback_stream);
|
|
|
|
|
#define PLAYBACK_STREAM(o) (playback_stream_cast(o))
|
|
|
|
|
static PA_DEFINE_CHECK_TYPE(playback_stream, output_stream);
|
|
|
|
|
|
|
|
|
|
PA_DECLARE_CLASS(upload_stream);
|
|
|
|
|
#define UPLOAD_STREAM(o) (upload_stream_cast(o))
|
|
|
|
|
static PA_DEFINE_CHECK_TYPE(upload_stream, output_stream);
|
|
|
|
|
|
|
|
|
|
PA_DECLARE_CLASS(connection);
|
|
|
|
|
#define CONNECTION(o) (connection_cast(o))
|
|
|
|
|
static PA_DEFINE_CHECK_TYPE(connection, pa_msgobject);
|
|
|
|
|
|
2004-07-03 23:35:12 +00:00
|
|
|
struct pa_protocol_native {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_module *module;
|
|
|
|
|
pa_core *core;
|
2007-10-28 19:13:50 +00:00
|
|
|
int public;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_socket_server *server;
|
|
|
|
|
pa_idxset *connections;
|
2004-07-06 00:08:44 +00:00
|
|
|
uint8_t auth_cookie[PA_NATIVE_COOKIE_LENGTH];
|
2004-11-07 20:48:46 +00:00
|
|
|
int auth_cookie_in_property;
|
2006-07-19 21:48:35 +00:00
|
|
|
#ifdef HAVE_CREDS
|
2006-02-24 17:14:23 +00:00
|
|
|
char *auth_group;
|
|
|
|
|
#endif
|
2006-07-20 18:43:20 +00:00
|
|
|
pa_ip_acl *auth_ip_acl;
|
2004-06-20 01:12:13 +00:00
|
|
|
};
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
enum {
|
|
|
|
|
SINK_INPUT_MESSAGE_POST_DATA = PA_SINK_INPUT_MESSAGE_MAX, /* data from main loop to sink input */
|
|
|
|
|
SINK_INPUT_MESSAGE_DRAIN, /* disabled prebuf, get playback started. */
|
|
|
|
|
SINK_INPUT_MESSAGE_FLUSH,
|
|
|
|
|
SINK_INPUT_MESSAGE_TRIGGER,
|
|
|
|
|
SINK_INPUT_MESSAGE_SEEK,
|
|
|
|
|
SINK_INPUT_MESSAGE_PREBUF_FORCE,
|
|
|
|
|
SINK_INPUT_MESSAGE_UPDATE_LATENCY
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
enum {
|
|
|
|
|
PLAYBACK_STREAM_MESSAGE_REQUEST_DATA, /* data requested from sink input from the main loop */
|
|
|
|
|
PLAYBACK_STREAM_MESSAGE_UNDERFLOW,
|
|
|
|
|
PLAYBACK_STREAM_MESSAGE_OVERFLOW,
|
|
|
|
|
PLAYBACK_STREAM_MESSAGE_DRAIN_ACK
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
enum {
|
|
|
|
|
RECORD_STREAM_MESSAGE_POST_DATA /* data from source output to main loop */
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
enum {
|
|
|
|
|
CONNECTION_MESSAGE_RELEASE,
|
|
|
|
|
CONNECTION_MESSAGE_REVOKE
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static int sink_input_peek_cb(pa_sink_input *i, size_t length, pa_memchunk *chunk);
|
|
|
|
|
static void sink_input_drop_cb(pa_sink_input *i, size_t length);
|
2006-01-11 01:17:39 +00:00
|
|
|
static void sink_input_kill_cb(pa_sink_input *i);
|
2007-11-21 01:30:40 +00:00
|
|
|
static void sink_input_suspend_cb(pa_sink_input *i, pa_bool_t suspend);
|
|
|
|
|
static void sink_input_moved_cb(pa_sink_input *i);
|
2004-06-23 23:17:30 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void send_memblock(connection *c);
|
2004-06-23 23:17:30 +00:00
|
|
|
static void request_bytes(struct playback_stream*s);
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void source_output_kill_cb(pa_source_output *o);
|
|
|
|
|
static void source_output_push_cb(pa_source_output *o, const pa_memchunk *chunk);
|
2007-11-21 01:30:40 +00:00
|
|
|
static void source_output_suspend_cb(pa_source_output *o, pa_bool_t suspend);
|
|
|
|
|
static void source_output_moved_cb(pa_source_output *o);
|
2006-01-11 01:17:39 +00:00
|
|
|
static pa_usec_t source_output_get_latency_cb(pa_source_output *o);
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static int sink_input_process_msg(pa_msgobject *o, int code, void *userdata, int64_t offset, pa_memchunk *chunk);
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_exit(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_create_playback_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_drain_playback_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_create_record_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_delete_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_auth(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_set_client_name(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_lookup(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_stat(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_get_playback_latency(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_get_record_latency(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_create_upload_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_finish_upload_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_play_sample(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_remove_sample(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_get_info(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_get_info_list(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_get_server_info(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_subscribe(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_set_volume(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
2006-02-23 12:04:31 +00:00
|
|
|
static void command_set_mute(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_cork_playback_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
2007-10-28 19:13:50 +00:00
|
|
|
static void command_trigger_or_flush_or_prebuf_playback_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_set_default_sink_or_source(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_set_stream_name(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_kill(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_load_module(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_unload_module(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_add_autoload(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_remove_autoload(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_get_autoload_info(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_get_autoload_info_list(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_cork_record_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_flush_record_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
2006-07-31 21:54:46 +00:00
|
|
|
static void command_move_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
2007-10-28 19:13:50 +00:00
|
|
|
static void command_suspend(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
2007-11-21 01:30:40 +00:00
|
|
|
static void command_set_stream_buffer_attr(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
|
|
|
|
static void command_update_stream_sample_rate(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
|
2006-02-20 22:41:02 +00:00
|
|
|
static const pa_pdispatch_cb_t command_table[PA_COMMAND_MAX] = {
|
2006-01-11 01:17:39 +00:00
|
|
|
[PA_COMMAND_ERROR] = NULL,
|
|
|
|
|
[PA_COMMAND_TIMEOUT] = NULL,
|
|
|
|
|
[PA_COMMAND_REPLY] = NULL,
|
|
|
|
|
[PA_COMMAND_CREATE_PLAYBACK_STREAM] = command_create_playback_stream,
|
|
|
|
|
[PA_COMMAND_DELETE_PLAYBACK_STREAM] = command_delete_stream,
|
|
|
|
|
[PA_COMMAND_DRAIN_PLAYBACK_STREAM] = command_drain_playback_stream,
|
|
|
|
|
[PA_COMMAND_CREATE_RECORD_STREAM] = command_create_record_stream,
|
|
|
|
|
[PA_COMMAND_DELETE_RECORD_STREAM] = command_delete_stream,
|
|
|
|
|
[PA_COMMAND_AUTH] = command_auth,
|
|
|
|
|
[PA_COMMAND_REQUEST] = NULL,
|
|
|
|
|
[PA_COMMAND_EXIT] = command_exit,
|
|
|
|
|
[PA_COMMAND_SET_CLIENT_NAME] = command_set_client_name,
|
|
|
|
|
[PA_COMMAND_LOOKUP_SINK] = command_lookup,
|
|
|
|
|
[PA_COMMAND_LOOKUP_SOURCE] = command_lookup,
|
|
|
|
|
[PA_COMMAND_STAT] = command_stat,
|
|
|
|
|
[PA_COMMAND_GET_PLAYBACK_LATENCY] = command_get_playback_latency,
|
|
|
|
|
[PA_COMMAND_GET_RECORD_LATENCY] = command_get_record_latency,
|
|
|
|
|
[PA_COMMAND_CREATE_UPLOAD_STREAM] = command_create_upload_stream,
|
|
|
|
|
[PA_COMMAND_DELETE_UPLOAD_STREAM] = command_delete_stream,
|
|
|
|
|
[PA_COMMAND_FINISH_UPLOAD_STREAM] = command_finish_upload_stream,
|
|
|
|
|
[PA_COMMAND_PLAY_SAMPLE] = command_play_sample,
|
|
|
|
|
[PA_COMMAND_REMOVE_SAMPLE] = command_remove_sample,
|
|
|
|
|
[PA_COMMAND_GET_SINK_INFO] = command_get_info,
|
|
|
|
|
[PA_COMMAND_GET_SOURCE_INFO] = command_get_info,
|
|
|
|
|
[PA_COMMAND_GET_CLIENT_INFO] = command_get_info,
|
|
|
|
|
[PA_COMMAND_GET_MODULE_INFO] = command_get_info,
|
|
|
|
|
[PA_COMMAND_GET_SINK_INPUT_INFO] = command_get_info,
|
|
|
|
|
[PA_COMMAND_GET_SOURCE_OUTPUT_INFO] = command_get_info,
|
|
|
|
|
[PA_COMMAND_GET_SAMPLE_INFO] = command_get_info,
|
|
|
|
|
[PA_COMMAND_GET_SINK_INFO_LIST] = command_get_info_list,
|
|
|
|
|
[PA_COMMAND_GET_SOURCE_INFO_LIST] = command_get_info_list,
|
|
|
|
|
[PA_COMMAND_GET_MODULE_INFO_LIST] = command_get_info_list,
|
|
|
|
|
[PA_COMMAND_GET_CLIENT_INFO_LIST] = command_get_info_list,
|
|
|
|
|
[PA_COMMAND_GET_SINK_INPUT_INFO_LIST] = command_get_info_list,
|
|
|
|
|
[PA_COMMAND_GET_SOURCE_OUTPUT_INFO_LIST] = command_get_info_list,
|
|
|
|
|
[PA_COMMAND_GET_SAMPLE_INFO_LIST] = command_get_info_list,
|
|
|
|
|
[PA_COMMAND_GET_SERVER_INFO] = command_get_server_info,
|
|
|
|
|
[PA_COMMAND_SUBSCRIBE] = command_subscribe,
|
|
|
|
|
|
|
|
|
|
[PA_COMMAND_SET_SINK_VOLUME] = command_set_volume,
|
|
|
|
|
[PA_COMMAND_SET_SINK_INPUT_VOLUME] = command_set_volume,
|
2006-02-22 14:11:23 +00:00
|
|
|
[PA_COMMAND_SET_SOURCE_VOLUME] = command_set_volume,
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-23 12:04:31 +00:00
|
|
|
[PA_COMMAND_SET_SINK_MUTE] = command_set_mute,
|
2007-10-28 19:13:50 +00:00
|
|
|
[PA_COMMAND_SET_SINK_INPUT_MUTE] = command_set_mute,
|
2006-02-23 12:04:31 +00:00
|
|
|
[PA_COMMAND_SET_SOURCE_MUTE] = command_set_mute,
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
[PA_COMMAND_SUSPEND_SINK] = command_suspend,
|
|
|
|
|
[PA_COMMAND_SUSPEND_SOURCE] = command_suspend,
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
[PA_COMMAND_CORK_PLAYBACK_STREAM] = command_cork_playback_stream,
|
2007-10-28 19:13:50 +00:00
|
|
|
[PA_COMMAND_FLUSH_PLAYBACK_STREAM] = command_trigger_or_flush_or_prebuf_playback_stream,
|
|
|
|
|
[PA_COMMAND_TRIGGER_PLAYBACK_STREAM] = command_trigger_or_flush_or_prebuf_playback_stream,
|
|
|
|
|
[PA_COMMAND_PREBUF_PLAYBACK_STREAM] = command_trigger_or_flush_or_prebuf_playback_stream,
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
[PA_COMMAND_CORK_RECORD_STREAM] = command_cork_record_stream,
|
|
|
|
|
[PA_COMMAND_FLUSH_RECORD_STREAM] = command_flush_record_stream,
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
[PA_COMMAND_SET_DEFAULT_SINK] = command_set_default_sink_or_source,
|
|
|
|
|
[PA_COMMAND_SET_DEFAULT_SOURCE] = command_set_default_sink_or_source,
|
2007-01-04 13:43:45 +00:00
|
|
|
[PA_COMMAND_SET_PLAYBACK_STREAM_NAME] = command_set_stream_name,
|
2006-01-11 01:17:39 +00:00
|
|
|
[PA_COMMAND_SET_RECORD_STREAM_NAME] = command_set_stream_name,
|
|
|
|
|
[PA_COMMAND_KILL_CLIENT] = command_kill,
|
|
|
|
|
[PA_COMMAND_KILL_SINK_INPUT] = command_kill,
|
|
|
|
|
[PA_COMMAND_KILL_SOURCE_OUTPUT] = command_kill,
|
|
|
|
|
[PA_COMMAND_LOAD_MODULE] = command_load_module,
|
|
|
|
|
[PA_COMMAND_UNLOAD_MODULE] = command_unload_module,
|
|
|
|
|
[PA_COMMAND_GET_AUTOLOAD_INFO] = command_get_autoload_info,
|
|
|
|
|
[PA_COMMAND_GET_AUTOLOAD_INFO_LIST] = command_get_autoload_info_list,
|
|
|
|
|
[PA_COMMAND_ADD_AUTOLOAD] = command_add_autoload,
|
2006-07-31 21:54:46 +00:00
|
|
|
[PA_COMMAND_REMOVE_AUTOLOAD] = command_remove_autoload,
|
|
|
|
|
|
|
|
|
|
[PA_COMMAND_MOVE_SINK_INPUT] = command_move_stream,
|
2007-11-21 01:30:40 +00:00
|
|
|
[PA_COMMAND_MOVE_SOURCE_OUTPUT] = command_move_stream,
|
|
|
|
|
|
|
|
|
|
[PA_COMMAND_SET_PLAYBACK_STREAM_BUFFER_ATTR] = command_set_stream_buffer_attr,
|
|
|
|
|
[PA_COMMAND_SET_RECORD_STREAM_BUFFER_ATTR] = command_set_stream_buffer_attr,
|
|
|
|
|
|
|
|
|
|
[PA_COMMAND_UPDATE_PLAYBACK_STREAM_SAMPLE_RATE] = command_update_stream_sample_rate,
|
|
|
|
|
[PA_COMMAND_UPDATE_RECORD_STREAM_SAMPLE_RATE] = command_update_stream_sample_rate
|
2004-06-23 23:17:30 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
/* structure management */
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void upload_stream_unlink(upload_stream *s) {
|
|
|
|
|
pa_assert(s);
|
|
|
|
|
|
|
|
|
|
if (!s->connection)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
pa_assert_se(pa_idxset_remove_by_data(s->connection->output_streams, s, NULL) == s);
|
|
|
|
|
s->connection = NULL;
|
|
|
|
|
upload_stream_unref(s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void upload_stream_free(pa_object *o) {
|
|
|
|
|
upload_stream *s = UPLOAD_STREAM(o);
|
|
|
|
|
pa_assert(s);
|
|
|
|
|
|
|
|
|
|
upload_stream_unlink(s);
|
|
|
|
|
|
|
|
|
|
pa_xfree(s->name);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (s->memchunk.memblock)
|
|
|
|
|
pa_memblock_unref(s->memchunk.memblock);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_xfree(s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static upload_stream* upload_stream_new(
|
|
|
|
|
connection *c,
|
|
|
|
|
const pa_sample_spec *ss,
|
|
|
|
|
const pa_channel_map *map,
|
|
|
|
|
const char *name, size_t length) {
|
|
|
|
|
|
|
|
|
|
upload_stream *s;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(ss);
|
|
|
|
|
pa_assert(name);
|
|
|
|
|
pa_assert(length > 0);
|
|
|
|
|
|
|
|
|
|
s = pa_msgobject_new(upload_stream);
|
|
|
|
|
s->parent.parent.parent.free = upload_stream_free;
|
2004-08-03 19:26:56 +00:00
|
|
|
s->connection = c;
|
|
|
|
|
s->sample_spec = *ss;
|
2006-01-27 16:25:31 +00:00
|
|
|
s->channel_map = *map;
|
2004-08-04 16:39:30 +00:00
|
|
|
s->name = pa_xstrdup(name);
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_memchunk_reset(&s->memchunk);
|
2004-08-03 19:26:56 +00:00
|
|
|
s->length = length;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-08-03 19:26:56 +00:00
|
|
|
pa_idxset_put(c->output_streams, s, &s->index);
|
2007-10-28 19:13:50 +00:00
|
|
|
|
2004-08-03 19:26:56 +00:00
|
|
|
return s;
|
|
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void record_stream_unlink(record_stream *s) {
|
|
|
|
|
pa_assert(s);
|
|
|
|
|
|
|
|
|
|
if (!s->connection)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
if (s->source_output) {
|
|
|
|
|
pa_source_output_unlink(s->source_output);
|
|
|
|
|
pa_source_output_unref(s->source_output);
|
|
|
|
|
s->source_output = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_assert_se(pa_idxset_remove_by_data(s->connection->record_streams, s, NULL) == s);
|
|
|
|
|
s->connection = NULL;
|
|
|
|
|
record_stream_unref(s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void record_stream_free(pa_object *o) {
|
|
|
|
|
record_stream *s = RECORD_STREAM(o);
|
|
|
|
|
pa_assert(s);
|
|
|
|
|
|
|
|
|
|
record_stream_unlink(s);
|
|
|
|
|
|
|
|
|
|
pa_memblockq_free(s->memblockq);
|
|
|
|
|
pa_xfree(s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int record_stream_process_msg(pa_msgobject *o, int code, void*userdata, int64_t offset, pa_memchunk *chunk) {
|
|
|
|
|
record_stream *s = RECORD_STREAM(o);
|
|
|
|
|
record_stream_assert_ref(s);
|
2004-08-03 19:26:56 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (!s->connection)
|
|
|
|
|
return -1;
|
2004-08-03 19:26:56 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
switch (code) {
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
case RECORD_STREAM_MESSAGE_POST_DATA:
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (pa_memblockq_push_align(s->memblockq, chunk) < 0) {
|
|
|
|
|
/* pa_log_warn("Failed to push data into output queue."); */
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!pa_pstream_is_pending(s->connection->pstream))
|
|
|
|
|
send_memblock(s->connection);
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
2004-08-03 19:26:56 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static record_stream* record_stream_new(
|
|
|
|
|
connection *c,
|
|
|
|
|
pa_source *source,
|
2007-11-21 01:30:40 +00:00
|
|
|
pa_sample_spec *ss,
|
|
|
|
|
pa_channel_map *map,
|
2007-10-28 19:13:50 +00:00
|
|
|
const char *name,
|
|
|
|
|
uint32_t *maxlength,
|
|
|
|
|
uint32_t fragment_size,
|
2007-11-21 01:30:40 +00:00
|
|
|
pa_source_output_flags_t flags) {
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream *s;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_source_output *source_output;
|
2004-07-10 16:50:22 +00:00
|
|
|
size_t base;
|
2006-08-13 19:55:17 +00:00
|
|
|
pa_source_output_new_data data;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(ss);
|
|
|
|
|
pa_assert(name);
|
|
|
|
|
pa_assert(maxlength);
|
|
|
|
|
pa_assert(*maxlength > 0);
|
2004-07-10 16:50:22 +00:00
|
|
|
|
2006-08-13 19:55:17 +00:00
|
|
|
pa_source_output_new_data_init(&data);
|
2007-10-28 19:13:50 +00:00
|
|
|
data.module = c->protocol->module;
|
|
|
|
|
data.client = c->client;
|
2006-08-13 19:55:17 +00:00
|
|
|
data.source = source;
|
|
|
|
|
data.driver = __FILE__;
|
|
|
|
|
data.name = name;
|
|
|
|
|
pa_source_output_new_data_set_sample_spec(&data, ss);
|
|
|
|
|
pa_source_output_new_data_set_channel_map(&data, map);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
if (!(source_output = pa_source_output_new(c->protocol->core, &data, flags)))
|
2004-07-10 16:50:22 +00:00
|
|
|
return NULL;
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
s = pa_msgobject_new(record_stream);
|
|
|
|
|
s->parent.parent.free = record_stream_free;
|
|
|
|
|
s->parent.process_msg = record_stream_process_msg;
|
2004-07-10 16:50:22 +00:00
|
|
|
s->connection = c;
|
|
|
|
|
s->source_output = source_output;
|
|
|
|
|
s->source_output->push = source_output_push_cb;
|
|
|
|
|
s->source_output->kill = source_output_kill_cb;
|
2004-09-16 00:05:56 +00:00
|
|
|
s->source_output->get_latency = source_output_get_latency_cb;
|
2007-11-21 01:30:40 +00:00
|
|
|
s->source_output->moved = source_output_moved_cb;
|
|
|
|
|
s->source_output->suspend = source_output_suspend_cb;
|
2004-07-10 16:50:22 +00:00
|
|
|
s->source_output->userdata = s;
|
|
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
s->memblockq = pa_memblockq_new(
|
|
|
|
|
0,
|
2007-10-28 19:13:50 +00:00
|
|
|
*maxlength,
|
2006-02-20 04:05:16 +00:00
|
|
|
0,
|
2007-11-21 01:30:40 +00:00
|
|
|
base = pa_frame_size(&s->source_output->sample_spec),
|
2006-02-20 04:05:16 +00:00
|
|
|
1,
|
|
|
|
|
0,
|
2006-08-18 19:55:18 +00:00
|
|
|
NULL);
|
2004-07-10 16:50:22 +00:00
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
*maxlength = pa_memblockq_get_maxlength(s->memblockq);
|
|
|
|
|
|
2004-07-10 16:50:22 +00:00
|
|
|
s->fragment_size = (fragment_size/base)*base;
|
2007-10-28 19:13:50 +00:00
|
|
|
if (s->fragment_size <= 0)
|
2004-07-10 16:50:22 +00:00
|
|
|
s->fragment_size = base;
|
2007-11-21 01:30:40 +00:00
|
|
|
|
|
|
|
|
if (s->fragment_size > *maxlength)
|
|
|
|
|
s->fragment_size = *maxlength;
|
|
|
|
|
|
|
|
|
|
*ss = s->source_output->sample_spec;
|
|
|
|
|
*map = s->source_output->channel_map;
|
2004-07-10 16:50:22 +00:00
|
|
|
|
|
|
|
|
pa_idxset_put(c->record_streams, s, &s->index);
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
pa_source_output_put(s->source_output);
|
2004-07-10 16:50:22 +00:00
|
|
|
return s;
|
|
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void playback_stream_unlink(playback_stream *s) {
|
|
|
|
|
pa_assert(s);
|
|
|
|
|
|
|
|
|
|
if (!s->connection)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
if (s->sink_input) {
|
|
|
|
|
pa_sink_input_unlink(s->sink_input);
|
|
|
|
|
pa_sink_input_unref(s->sink_input);
|
|
|
|
|
s->sink_input = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (s->drain_request)
|
|
|
|
|
pa_pstream_send_error(s->connection->pstream, s->drain_tag, PA_ERR_NOENTITY);
|
|
|
|
|
|
|
|
|
|
pa_assert_se(pa_idxset_remove_by_data(s->connection->output_streams, s, NULL) == s);
|
|
|
|
|
s->connection = NULL;
|
|
|
|
|
playback_stream_unref(s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void playback_stream_free(pa_object* o) {
|
|
|
|
|
playback_stream *s = PLAYBACK_STREAM(o);
|
|
|
|
|
pa_assert(s);
|
|
|
|
|
|
|
|
|
|
playback_stream_unlink(s);
|
|
|
|
|
|
|
|
|
|
pa_memblockq_free(s->memblockq);
|
|
|
|
|
pa_xfree(s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int playback_stream_process_msg(pa_msgobject *o, int code, void*userdata, int64_t offset, pa_memchunk *chunk) {
|
|
|
|
|
playback_stream *s = PLAYBACK_STREAM(o);
|
|
|
|
|
playback_stream_assert_ref(s);
|
|
|
|
|
|
|
|
|
|
if (!s->connection)
|
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
|
|
switch (code) {
|
|
|
|
|
case PLAYBACK_STREAM_MESSAGE_REQUEST_DATA: {
|
|
|
|
|
pa_tagstruct *t;
|
|
|
|
|
uint32_t l = 0;
|
|
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
|
int32_t k;
|
|
|
|
|
|
|
|
|
|
if ((k = pa_atomic_load(&s->missing)) <= 0)
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
l += k;
|
|
|
|
|
|
|
|
|
|
if (l < s->minreq)
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
if (pa_atomic_sub(&s->missing, k) <= k)
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (l < s->minreq)
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
t = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(t, PA_COMMAND_REQUEST);
|
|
|
|
|
pa_tagstruct_putu32(t, (uint32_t) -1); /* tag */
|
|
|
|
|
pa_tagstruct_putu32(t, s->index);
|
|
|
|
|
pa_tagstruct_putu32(t, l);
|
|
|
|
|
pa_pstream_send_tagstruct(s->connection->pstream, t);
|
|
|
|
|
|
|
|
|
|
/* pa_log("Requesting %u bytes", l); */
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
case PLAYBACK_STREAM_MESSAGE_UNDERFLOW: {
|
|
|
|
|
pa_tagstruct *t;
|
|
|
|
|
|
|
|
|
|
/* Report that we're empty */
|
|
|
|
|
t = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(t, PA_COMMAND_UNDERFLOW);
|
|
|
|
|
pa_tagstruct_putu32(t, (uint32_t) -1); /* tag */
|
|
|
|
|
pa_tagstruct_putu32(t, s->index);
|
|
|
|
|
pa_pstream_send_tagstruct(s->connection->pstream, t);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
case PLAYBACK_STREAM_MESSAGE_OVERFLOW: {
|
|
|
|
|
pa_tagstruct *t;
|
|
|
|
|
|
|
|
|
|
/* Notify the user we're overflowed*/
|
|
|
|
|
t = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(t, PA_COMMAND_OVERFLOW);
|
|
|
|
|
pa_tagstruct_putu32(t, (uint32_t) -1); /* tag */
|
|
|
|
|
pa_tagstruct_putu32(t, s->index);
|
|
|
|
|
pa_pstream_send_tagstruct(s->connection->pstream, t);
|
|
|
|
|
break;
|
|
|
|
|
}
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
case PLAYBACK_STREAM_MESSAGE_DRAIN_ACK:
|
|
|
|
|
pa_pstream_send_simple_ack(s->connection->pstream, PA_PTR_TO_UINT(userdata));
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static playback_stream* playback_stream_new(
|
|
|
|
|
connection *c,
|
2006-08-13 16:19:56 +00:00
|
|
|
pa_sink *sink,
|
2007-11-21 01:30:40 +00:00
|
|
|
pa_sample_spec *ss,
|
|
|
|
|
pa_channel_map *map,
|
2006-08-13 16:19:56 +00:00
|
|
|
const char *name,
|
2007-10-28 19:13:50 +00:00
|
|
|
uint32_t *maxlength,
|
|
|
|
|
uint32_t *tlength,
|
|
|
|
|
uint32_t *prebuf,
|
|
|
|
|
uint32_t *minreq,
|
2006-08-13 16:19:56 +00:00
|
|
|
pa_cvolume *volume,
|
2007-10-28 19:13:50 +00:00
|
|
|
uint32_t syncid,
|
2007-11-21 01:30:40 +00:00
|
|
|
uint32_t *missing,
|
|
|
|
|
pa_sink_input_flags_t flags) {
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
playback_stream *s, *ssync;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sink_input *sink_input;
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_memblock *silence;
|
|
|
|
|
uint32_t idx;
|
|
|
|
|
int64_t start_index;
|
2006-08-13 16:19:56 +00:00
|
|
|
pa_sink_input_new_data data;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(ss);
|
|
|
|
|
pa_assert(name);
|
|
|
|
|
pa_assert(maxlength);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
/* Find syncid group */
|
2006-02-24 15:12:42 +00:00
|
|
|
for (ssync = pa_idxset_first(c->output_streams, &idx); ssync; ssync = pa_idxset_next(c->output_streams, &idx)) {
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (!playback_stream_isinstance(ssync))
|
2006-02-20 04:05:16 +00:00
|
|
|
continue;
|
|
|
|
|
|
2006-02-24 15:12:42 +00:00
|
|
|
if (ssync->syncid == syncid)
|
2006-02-20 04:05:16 +00:00
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Synced streams must connect to the same sink */
|
2007-10-28 19:13:50 +00:00
|
|
|
if (ssync) {
|
|
|
|
|
|
|
|
|
|
if (!sink)
|
|
|
|
|
sink = ssync->sink_input->sink;
|
|
|
|
|
else if (sink != ssync->sink_input->sink)
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2006-08-13 16:19:56 +00:00
|
|
|
|
|
|
|
|
pa_sink_input_new_data_init(&data);
|
|
|
|
|
data.sink = sink;
|
|
|
|
|
data.driver = __FILE__;
|
|
|
|
|
data.name = name;
|
|
|
|
|
pa_sink_input_new_data_set_sample_spec(&data, ss);
|
|
|
|
|
pa_sink_input_new_data_set_channel_map(&data, map);
|
|
|
|
|
pa_sink_input_new_data_set_volume(&data, volume);
|
|
|
|
|
data.module = c->protocol->module;
|
|
|
|
|
data.client = c->client;
|
2007-10-28 19:13:50 +00:00
|
|
|
data.sync_base = ssync ? ssync->sink_input : NULL;
|
2006-08-13 16:19:56 +00:00
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
if (!(sink_input = pa_sink_input_new(c->protocol->core, &data, flags)))
|
2004-07-10 16:50:22 +00:00
|
|
|
return NULL;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
s = pa_msgobject_new(playback_stream);
|
|
|
|
|
s->parent.parent.parent.free = playback_stream_free;
|
|
|
|
|
s->parent.parent.process_msg = playback_stream_process_msg;
|
2004-06-20 01:12:13 +00:00
|
|
|
s->connection = c;
|
2006-02-20 04:05:16 +00:00
|
|
|
s->syncid = syncid;
|
2004-07-10 16:50:22 +00:00
|
|
|
s->sink_input = sink_input;
|
2006-02-20 04:05:16 +00:00
|
|
|
s->underrun = 1;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
s->sink_input->parent.process_msg = sink_input_process_msg;
|
2004-06-23 23:17:30 +00:00
|
|
|
s->sink_input->peek = sink_input_peek_cb;
|
|
|
|
|
s->sink_input->drop = sink_input_drop_cb;
|
|
|
|
|
s->sink_input->kill = sink_input_kill_cb;
|
2007-11-21 01:30:40 +00:00
|
|
|
s->sink_input->moved = sink_input_moved_cb;
|
|
|
|
|
s->sink_input->suspend = sink_input_suspend_cb;
|
2004-06-23 23:17:30 +00:00
|
|
|
s->sink_input->userdata = s;
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
start_index = ssync ? pa_memblockq_get_read_index(ssync->memblockq) : 0;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
silence = pa_silence_memblock_new(c->protocol->core->mempool, &s->sink_input->sample_spec, 0);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
s->memblockq = pa_memblockq_new(
|
|
|
|
|
start_index,
|
2007-10-28 19:13:50 +00:00
|
|
|
*maxlength,
|
|
|
|
|
*tlength,
|
2007-11-21 01:30:40 +00:00
|
|
|
pa_frame_size(&s->sink_input->sample_spec),
|
2007-10-28 19:13:50 +00:00
|
|
|
*prebuf,
|
|
|
|
|
*minreq,
|
2006-08-18 19:55:18 +00:00
|
|
|
silence);
|
2006-02-20 04:05:16 +00:00
|
|
|
|
|
|
|
|
pa_memblock_unref(silence);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
*maxlength = (uint32_t) pa_memblockq_get_maxlength(s->memblockq);
|
|
|
|
|
*tlength = (uint32_t) pa_memblockq_get_tlength(s->memblockq);
|
|
|
|
|
*prebuf = (uint32_t) pa_memblockq_get_prebuf(s->memblockq);
|
|
|
|
|
*minreq = (uint32_t) pa_memblockq_get_minreq(s->memblockq);
|
|
|
|
|
*missing = (uint32_t) pa_memblockq_pop_missing(s->memblockq);
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
*ss = s->sink_input->sample_spec;
|
|
|
|
|
*map = s->sink_input->channel_map;
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
s->minreq = pa_memblockq_get_minreq(s->memblockq);
|
|
|
|
|
pa_atomic_store(&s->missing, 0);
|
2004-07-07 22:02:15 +00:00
|
|
|
s->drain_request = 0;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-08-03 19:26:56 +00:00
|
|
|
pa_idxset_put(c->output_streams, s, &s->index);
|
2006-02-20 04:05:16 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_sink_input_put(s->sink_input);
|
|
|
|
|
|
2004-06-20 01:12:13 +00:00
|
|
|
return s;
|
|
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static int connection_process_msg(pa_msgobject *o, int code, void*userdata, int64_t offset, pa_memchunk *chunk) {
|
|
|
|
|
connection *c = CONNECTION(o);
|
|
|
|
|
connection_assert_ref(c);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (!c->protocol)
|
|
|
|
|
return -1;
|
2006-02-20 04:05:16 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
switch (code) {
|
2004-07-07 22:02:15 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
case CONNECTION_MESSAGE_REVOKE:
|
|
|
|
|
pa_pstream_send_revoke(c->pstream, PA_PTR_TO_UINT(userdata));
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case CONNECTION_MESSAGE_RELEASE:
|
|
|
|
|
pa_pstream_send_release(c->pstream, PA_PTR_TO_UINT(userdata));
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void connection_unlink(connection *c) {
|
|
|
|
|
record_stream *r;
|
|
|
|
|
output_stream *o;
|
|
|
|
|
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
|
|
|
|
|
if (!c->protocol)
|
|
|
|
|
return;
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2004-07-03 23:35:12 +00:00
|
|
|
while ((r = pa_idxset_first(c->record_streams, NULL)))
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream_unlink(r);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2004-08-03 19:26:56 +00:00
|
|
|
while ((o = pa_idxset_first(c->output_streams, NULL)))
|
2007-10-28 19:13:50 +00:00
|
|
|
if (playback_stream_isinstance(o))
|
|
|
|
|
playback_stream_unlink(PLAYBACK_STREAM(o));
|
2004-08-03 19:26:56 +00:00
|
|
|
else
|
2007-10-28 19:13:50 +00:00
|
|
|
upload_stream_unlink(UPLOAD_STREAM(o));
|
2004-08-11 15:11:26 +00:00
|
|
|
|
|
|
|
|
if (c->subscription)
|
|
|
|
|
pa_subscription_free(c->subscription);
|
2004-11-18 00:28:26 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (c->pstream)
|
|
|
|
|
pa_pstream_unlink(c->pstream);
|
|
|
|
|
|
|
|
|
|
if (c->auth_timeout_event) {
|
2004-11-18 00:28:26 +00:00
|
|
|
c->protocol->core->mainloop->time_free(c->auth_timeout_event);
|
2007-10-28 19:13:50 +00:00
|
|
|
c->auth_timeout_event = NULL;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert_se(pa_idxset_remove_by_data(c->protocol->connections, c, NULL) == c);
|
|
|
|
|
c->protocol = NULL;
|
|
|
|
|
connection_unref(c);
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void connection_free(pa_object *o) {
|
|
|
|
|
connection *c = CONNECTION(o);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(c);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_unlink(c);
|
2004-06-27 17:50:02 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_idxset_free(c->record_streams, NULL, NULL);
|
|
|
|
|
pa_idxset_free(c->output_streams, NULL, NULL);
|
2004-07-07 00:22:46 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_pdispatch_unref(c->pdispatch);
|
|
|
|
|
pa_pstream_unref(c->pstream);
|
|
|
|
|
pa_client_free(c->client);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_xfree(c);
|
|
|
|
|
}
|
2004-06-27 17:50:02 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
/* Called from thread context */
|
|
|
|
|
static void request_bytes(playback_stream *s) {
|
|
|
|
|
size_t m, previous_missing;
|
2004-06-27 17:50:02 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
playback_stream_assert_ref(s);
|
|
|
|
|
|
|
|
|
|
m = pa_memblockq_pop_missing(s->memblockq);
|
|
|
|
|
|
|
|
|
|
if (m <= 0)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
/* pa_log("request_bytes(%u)", m); */
|
|
|
|
|
|
|
|
|
|
previous_missing = pa_atomic_add(&s->missing, m);
|
|
|
|
|
if (previous_missing < s->minreq && previous_missing+m >= s->minreq) {
|
|
|
|
|
pa_assert(pa_thread_mq_get());
|
|
|
|
|
pa_asyncmsgq_post(pa_thread_mq_get()->outq, PA_MSGOBJECT(s), PLAYBACK_STREAM_MESSAGE_REQUEST_DATA, NULL, 0, NULL, NULL);
|
|
|
|
|
}
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void send_memblock(connection *c) {
|
2004-07-10 16:50:22 +00:00
|
|
|
uint32_t start;
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream *r;
|
2004-07-10 16:50:22 +00:00
|
|
|
|
|
|
|
|
start = PA_IDXSET_INVALID;
|
|
|
|
|
for (;;) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_memchunk chunk;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (!(r = RECORD_STREAM(pa_idxset_rrobin(c->record_streams, &c->rrobin_index))))
|
2004-07-10 16:50:22 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
if (start == PA_IDXSET_INVALID)
|
|
|
|
|
start = c->rrobin_index;
|
|
|
|
|
else if (start == c->rrobin_index)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
if (pa_memblockq_peek(r->memblockq, &chunk) >= 0) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_memchunk schunk = chunk;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-06 18:55:47 +00:00
|
|
|
if (schunk.length > r->fragment_size)
|
|
|
|
|
schunk.length = r->fragment_size;
|
2004-07-10 16:50:22 +00:00
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_pstream_send_memblock(c->pstream, r->index, 0, PA_SEEK_RELATIVE, &schunk);
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
pa_memblockq_drop(r->memblockq, schunk.length);
|
2004-09-06 18:55:47 +00:00
|
|
|
pa_memblock_unref(schunk.memblock);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-07-10 16:50:22 +00:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void send_playback_stream_killed(playback_stream *p) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *t;
|
2007-10-28 19:13:50 +00:00
|
|
|
playback_stream_assert_ref(p);
|
2004-07-10 19:04:21 +00:00
|
|
|
|
|
|
|
|
t = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(t, PA_COMMAND_PLAYBACK_STREAM_KILLED);
|
|
|
|
|
pa_tagstruct_putu32(t, (uint32_t) -1); /* tag */
|
|
|
|
|
pa_tagstruct_putu32(t, p->index);
|
|
|
|
|
pa_pstream_send_tagstruct(p->connection->pstream, t);
|
|
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void send_record_stream_killed(record_stream *r) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *t;
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream_assert_ref(r);
|
2004-07-10 19:04:21 +00:00
|
|
|
|
|
|
|
|
t = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(t, PA_COMMAND_RECORD_STREAM_KILLED);
|
|
|
|
|
pa_tagstruct_putu32(t, (uint32_t) -1); /* tag */
|
|
|
|
|
pa_tagstruct_putu32(t, r->index);
|
|
|
|
|
pa_pstream_send_tagstruct(r->connection->pstream, t);
|
|
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
/*** sink input callbacks ***/
|
2004-06-23 23:17:30 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
/* Called from thread context */
|
|
|
|
|
static int sink_input_process_msg(pa_msgobject *o, int code, void *userdata, int64_t offset, pa_memchunk *chunk) {
|
|
|
|
|
pa_sink_input *i = PA_SINK_INPUT(o);
|
|
|
|
|
playback_stream *s;
|
2004-06-23 23:17:30 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_sink_input_assert_ref(i);
|
|
|
|
|
s = PLAYBACK_STREAM(i->userdata);
|
|
|
|
|
playback_stream_assert_ref(s);
|
|
|
|
|
|
|
|
|
|
switch (code) {
|
|
|
|
|
|
|
|
|
|
case SINK_INPUT_MESSAGE_SEEK:
|
|
|
|
|
pa_memblockq_seek(s->memblockq, offset, PA_PTR_TO_UINT(userdata));
|
|
|
|
|
request_bytes(s);
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
case SINK_INPUT_MESSAGE_POST_DATA: {
|
|
|
|
|
pa_assert(chunk);
|
|
|
|
|
|
|
|
|
|
/* pa_log("sink input post: %u", chunk->length); */
|
|
|
|
|
|
|
|
|
|
if (pa_memblockq_push_align(s->memblockq, chunk) < 0) {
|
|
|
|
|
|
|
|
|
|
pa_log_warn("Failed to push data into queue");
|
|
|
|
|
pa_asyncmsgq_post(pa_thread_mq_get()->outq, PA_MSGOBJECT(s), PLAYBACK_STREAM_MESSAGE_OVERFLOW, NULL, 0, NULL, NULL);
|
|
|
|
|
pa_memblockq_seek(s->memblockq, chunk->length, PA_SEEK_RELATIVE);
|
|
|
|
|
}
|
2006-02-20 04:05:16 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
request_bytes(s);
|
2006-02-20 04:05:16 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
s->underrun = 0;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
case SINK_INPUT_MESSAGE_DRAIN: {
|
|
|
|
|
|
|
|
|
|
pa_memblockq_prebuf_disable(s->memblockq);
|
2006-02-20 04:05:16 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (!pa_memblockq_is_readable(s->memblockq))
|
|
|
|
|
pa_asyncmsgq_post(pa_thread_mq_get()->outq, PA_MSGOBJECT(s), PLAYBACK_STREAM_MESSAGE_DRAIN_ACK, userdata, 0, NULL, NULL);
|
|
|
|
|
else {
|
|
|
|
|
s->drain_tag = PA_PTR_TO_UINT(userdata);
|
|
|
|
|
s->drain_request = 1;
|
|
|
|
|
}
|
|
|
|
|
request_bytes(s);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
case SINK_INPUT_MESSAGE_FLUSH:
|
|
|
|
|
case SINK_INPUT_MESSAGE_PREBUF_FORCE:
|
|
|
|
|
case SINK_INPUT_MESSAGE_TRIGGER: {
|
|
|
|
|
|
|
|
|
|
pa_sink_input *isync;
|
|
|
|
|
void (*func)(pa_memblockq *bq);
|
|
|
|
|
|
|
|
|
|
switch (code) {
|
|
|
|
|
case SINK_INPUT_MESSAGE_FLUSH:
|
|
|
|
|
func = pa_memblockq_flush;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case SINK_INPUT_MESSAGE_PREBUF_FORCE:
|
|
|
|
|
func = pa_memblockq_prebuf_force;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case SINK_INPUT_MESSAGE_TRIGGER:
|
|
|
|
|
func = pa_memblockq_prebuf_disable;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
pa_assert_not_reached();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func(s->memblockq);
|
|
|
|
|
s->underrun = 0;
|
|
|
|
|
request_bytes(s);
|
|
|
|
|
|
|
|
|
|
/* Do the same for all other members in the sync group */
|
|
|
|
|
for (isync = i->sync_prev; isync; isync = isync->sync_prev) {
|
|
|
|
|
playback_stream *ssync = PLAYBACK_STREAM(isync->userdata);
|
|
|
|
|
func(ssync->memblockq);
|
|
|
|
|
ssync->underrun = 0;
|
|
|
|
|
request_bytes(ssync);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (isync = i->sync_next; isync; isync = isync->sync_next) {
|
|
|
|
|
playback_stream *ssync = PLAYBACK_STREAM(isync->userdata);
|
|
|
|
|
func(ssync->memblockq);
|
|
|
|
|
ssync->underrun = 0;
|
|
|
|
|
request_bytes(ssync);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
case SINK_INPUT_MESSAGE_UPDATE_LATENCY:
|
|
|
|
|
|
|
|
|
|
s->read_index = pa_memblockq_get_read_index(s->memblockq);
|
|
|
|
|
s->write_index = pa_memblockq_get_write_index(s->memblockq);
|
|
|
|
|
s->resampled_chunk_length = s->sink_input->thread_info.resampled_chunk.memblock ? s->sink_input->thread_info.resampled_chunk.length : 0;
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
case PA_SINK_INPUT_MESSAGE_SET_STATE:
|
|
|
|
|
|
|
|
|
|
pa_memblockq_prebuf_force(s->memblockq);
|
|
|
|
|
request_bytes(s);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case PA_SINK_INPUT_MESSAGE_GET_LATENCY: {
|
|
|
|
|
pa_usec_t *r = userdata;
|
|
|
|
|
|
|
|
|
|
*r = pa_bytes_to_usec(pa_memblockq_get_length(s->memblockq), &i->sample_spec);
|
|
|
|
|
|
|
|
|
|
/* Fall through, the default handler will add in the extra
|
|
|
|
|
* latency added by the resampler */
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return pa_sink_input_process_msg(o, code, userdata, offset, chunk);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Called from thread context */
|
|
|
|
|
static int sink_input_peek_cb(pa_sink_input *i, size_t length, pa_memchunk *chunk) {
|
|
|
|
|
playback_stream *s;
|
|
|
|
|
|
|
|
|
|
pa_sink_input_assert_ref(i);
|
|
|
|
|
s = PLAYBACK_STREAM(i->userdata);
|
|
|
|
|
playback_stream_assert_ref(s);
|
|
|
|
|
pa_assert(chunk);
|
|
|
|
|
|
|
|
|
|
if (pa_memblockq_get_length(s->memblockq) <= 0 && !s->underrun) {
|
|
|
|
|
pa_asyncmsgq_post(pa_thread_mq_get()->outq, PA_MSGOBJECT(s), PLAYBACK_STREAM_MESSAGE_UNDERFLOW, NULL, 0, NULL, NULL);
|
2006-02-20 04:05:16 +00:00
|
|
|
s->underrun = 1;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
if (pa_memblockq_peek(s->memblockq, chunk) < 0) {
|
2007-10-28 19:13:50 +00:00
|
|
|
/* pa_log("peek: failure"); */
|
2004-06-23 23:17:30 +00:00
|
|
|
return -1;
|
2006-02-20 04:05:16 +00:00
|
|
|
}
|
2004-06-23 23:17:30 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
/* pa_log("peek: %u", chunk->length); */
|
|
|
|
|
|
|
|
|
|
request_bytes(s);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-06-23 23:17:30 +00:00
|
|
|
return 0;
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
/* Called from thread context */
|
|
|
|
|
static void sink_input_drop_cb(pa_sink_input *i, size_t length) {
|
|
|
|
|
playback_stream *s;
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_sink_input_assert_ref(i);
|
|
|
|
|
s = PLAYBACK_STREAM(i->userdata);
|
|
|
|
|
playback_stream_assert_ref(s);
|
|
|
|
|
pa_assert(length > 0);
|
2006-02-20 04:05:16 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_memblockq_drop(s->memblockq, length);
|
2004-07-07 22:02:15 +00:00
|
|
|
|
|
|
|
|
if (s->drain_request && !pa_memblockq_is_readable(s->memblockq)) {
|
|
|
|
|
s->drain_request = 0;
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_asyncmsgq_post(pa_thread_mq_get()->outq, PA_MSGOBJECT(s), PLAYBACK_STREAM_MESSAGE_DRAIN_ACK, PA_UINT_TO_PTR(s->drain_tag), 0, NULL, NULL);
|
2004-07-07 22:02:15 +00:00
|
|
|
}
|
2004-08-27 01:29:49 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
request_bytes(s);
|
2004-06-23 23:17:30 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
/* pa_log("after_drop: %u %u", pa_memblockq_get_length(s->memblockq), pa_memblockq_is_readable(s->memblockq)); */
|
2004-06-23 23:17:30 +00:00
|
|
|
}
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
/* Called from main context */
|
2007-10-28 19:13:50 +00:00
|
|
|
static void sink_input_kill_cb(pa_sink_input *i) {
|
|
|
|
|
playback_stream *s;
|
2004-06-23 23:17:30 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_sink_input_assert_ref(i);
|
|
|
|
|
s = PLAYBACK_STREAM(i->userdata);
|
|
|
|
|
playback_stream_assert_ref(s);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
send_playback_stream_killed(s);
|
|
|
|
|
playback_stream_unlink(s);
|
2004-06-23 23:17:30 +00:00
|
|
|
}
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
/* Called from main context */
|
|
|
|
|
static void sink_input_suspend_cb(pa_sink_input *i, pa_bool_t suspend) {
|
|
|
|
|
playback_stream *s;
|
|
|
|
|
pa_tagstruct *t;
|
|
|
|
|
|
|
|
|
|
pa_sink_input_assert_ref(i);
|
|
|
|
|
s = PLAYBACK_STREAM(i->userdata);
|
|
|
|
|
playback_stream_assert_ref(s);
|
|
|
|
|
|
2008-01-04 14:59:09 +00:00
|
|
|
if (s->connection->version < 12)
|
|
|
|
|
return;
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
t = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(t, PA_COMMAND_PLAYBACK_STREAM_SUSPENDED);
|
|
|
|
|
pa_tagstruct_putu32(t, (uint32_t) -1); /* tag */
|
|
|
|
|
pa_tagstruct_putu32(t, s->index);
|
|
|
|
|
pa_tagstruct_put_boolean(t, suspend);
|
|
|
|
|
pa_pstream_send_tagstruct(s->connection->pstream, t);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Called from main context */
|
|
|
|
|
static void sink_input_moved_cb(pa_sink_input *i) {
|
|
|
|
|
playback_stream *s;
|
|
|
|
|
pa_tagstruct *t;
|
|
|
|
|
|
|
|
|
|
pa_sink_input_assert_ref(i);
|
|
|
|
|
s = PLAYBACK_STREAM(i->userdata);
|
|
|
|
|
playback_stream_assert_ref(s);
|
|
|
|
|
|
2008-01-04 14:59:09 +00:00
|
|
|
if (s->connection->version < 12)
|
|
|
|
|
return;
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
t = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(t, PA_COMMAND_PLAYBACK_STREAM_MOVED);
|
|
|
|
|
pa_tagstruct_putu32(t, (uint32_t) -1); /* tag */
|
|
|
|
|
pa_tagstruct_putu32(t, s->index);
|
|
|
|
|
pa_tagstruct_putu32(t, i->sink->index);
|
|
|
|
|
pa_tagstruct_puts(t, i->sink->name);
|
|
|
|
|
pa_tagstruct_put_boolean(t, pa_sink_get_state(i->sink) == PA_SINK_SUSPENDED);
|
|
|
|
|
pa_pstream_send_tagstruct(s->connection->pstream, t);
|
|
|
|
|
}
|
|
|
|
|
|
2004-07-10 16:50:22 +00:00
|
|
|
/*** source_output callbacks ***/
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
/* Called from thread context */
|
2006-01-11 01:17:39 +00:00
|
|
|
static void source_output_push_cb(pa_source_output *o, const pa_memchunk *chunk) {
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream *s;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_source_output_assert_ref(o);
|
|
|
|
|
s = RECORD_STREAM(o->userdata);
|
|
|
|
|
record_stream_assert_ref(s);
|
|
|
|
|
pa_assert(chunk);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_asyncmsgq_post(pa_thread_mq_get()->outq, PA_MSGOBJECT(s), RECORD_STREAM_MESSAGE_POST_DATA, NULL, 0, chunk, NULL);
|
2004-07-10 16:50:22 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void source_output_kill_cb(pa_source_output *o) {
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream *s;
|
|
|
|
|
|
|
|
|
|
pa_source_output_assert_ref(o);
|
|
|
|
|
s = RECORD_STREAM(o->userdata);
|
|
|
|
|
record_stream_assert_ref(s);
|
|
|
|
|
|
|
|
|
|
send_record_stream_killed(s);
|
|
|
|
|
record_stream_unlink(s);
|
2004-07-10 16:50:22 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static pa_usec_t source_output_get_latency_cb(pa_source_output *o) {
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream *s;
|
|
|
|
|
|
|
|
|
|
pa_source_output_assert_ref(o);
|
|
|
|
|
s = RECORD_STREAM(o->userdata);
|
|
|
|
|
record_stream_assert_ref(s);
|
2004-09-16 00:05:56 +00:00
|
|
|
|
2006-08-18 21:38:40 +00:00
|
|
|
/*pa_log("get_latency: %u", pa_memblockq_get_length(s->memblockq));*/
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-16 00:05:56 +00:00
|
|
|
return pa_bytes_to_usec(pa_memblockq_get_length(s->memblockq), &o->sample_spec);
|
|
|
|
|
}
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
/* Called from main context */
|
|
|
|
|
static void source_output_suspend_cb(pa_source_output *o, pa_bool_t suspend) {
|
|
|
|
|
record_stream *s;
|
|
|
|
|
pa_tagstruct *t;
|
|
|
|
|
|
|
|
|
|
pa_source_output_assert_ref(o);
|
|
|
|
|
s = RECORD_STREAM(o->userdata);
|
|
|
|
|
record_stream_assert_ref(s);
|
|
|
|
|
|
2008-01-04 14:59:09 +00:00
|
|
|
if (s->connection->version < 12)
|
|
|
|
|
return;
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
t = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(t, PA_COMMAND_RECORD_STREAM_SUSPENDED);
|
|
|
|
|
pa_tagstruct_putu32(t, (uint32_t) -1); /* tag */
|
|
|
|
|
pa_tagstruct_putu32(t, s->index);
|
|
|
|
|
pa_tagstruct_put_boolean(t, suspend);
|
|
|
|
|
pa_pstream_send_tagstruct(s->connection->pstream, t);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Called from main context */
|
|
|
|
|
static void source_output_moved_cb(pa_source_output *o) {
|
|
|
|
|
record_stream *s;
|
|
|
|
|
pa_tagstruct *t;
|
|
|
|
|
|
|
|
|
|
pa_source_output_assert_ref(o);
|
|
|
|
|
s = RECORD_STREAM(o->userdata);
|
|
|
|
|
record_stream_assert_ref(s);
|
|
|
|
|
|
2008-01-04 14:59:09 +00:00
|
|
|
if (s->connection->version < 12)
|
|
|
|
|
return;
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
t = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(t, PA_COMMAND_RECORD_STREAM_MOVED);
|
|
|
|
|
pa_tagstruct_putu32(t, (uint32_t) -1); /* tag */
|
|
|
|
|
pa_tagstruct_putu32(t, s->index);
|
|
|
|
|
pa_tagstruct_putu32(t, o->source->index);
|
|
|
|
|
pa_tagstruct_puts(t, o->source->name);
|
|
|
|
|
pa_pstream_send_tagstruct(s->connection->pstream, t);
|
|
|
|
|
}
|
|
|
|
|
|
2004-06-23 23:17:30 +00:00
|
|
|
/*** pdispatch callbacks ***/
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void protocol_error(connection *c) {
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log("protocol error, kicking client");
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_unlink(c);
|
2004-07-07 00:22:46 +00:00
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
#define CHECK_VALIDITY(pstream, expression, tag, error) do { \
|
|
|
|
|
if (!(expression)) { \
|
|
|
|
|
pa_pstream_send_error((pstream), (tag), (error)); \
|
|
|
|
|
return; \
|
|
|
|
|
} \
|
|
|
|
|
} while(0);
|
|
|
|
|
|
|
|
|
|
static pa_tagstruct *reply_new(uint32_t tag) {
|
|
|
|
|
pa_tagstruct *reply;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(reply, PA_COMMAND_REPLY);
|
|
|
|
|
pa_tagstruct_putu32(reply, tag);
|
|
|
|
|
return reply;
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_create_playback_stream(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
playback_stream *s;
|
|
|
|
|
uint32_t maxlength, tlength, prebuf, minreq, sink_index, syncid, missing;
|
2004-08-03 19:26:56 +00:00
|
|
|
const char *name, *sink_name;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sample_spec ss;
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_channel_map map;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2006-08-19 23:06:45 +00:00
|
|
|
pa_sink *sink = NULL;
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_cvolume volume;
|
2004-09-26 17:02:26 +00:00
|
|
|
int corked;
|
2007-11-21 01:30:40 +00:00
|
|
|
int no_remap = 0, no_remix = 0, fix_format = 0, fix_rate = 0, fix_channels = 0, no_move = 0, variable_rate = 0;
|
|
|
|
|
pa_sink_input_flags_t flags = 0;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-01-28 01:07:09 +00:00
|
|
|
if (pa_tagstruct_get(
|
|
|
|
|
t,
|
|
|
|
|
PA_TAG_STRING, &name,
|
|
|
|
|
PA_TAG_SAMPLE_SPEC, &ss,
|
|
|
|
|
PA_TAG_CHANNEL_MAP, &map,
|
|
|
|
|
PA_TAG_U32, &sink_index,
|
|
|
|
|
PA_TAG_STRING, &sink_name,
|
|
|
|
|
PA_TAG_U32, &maxlength,
|
|
|
|
|
PA_TAG_BOOLEAN, &corked,
|
|
|
|
|
PA_TAG_U32, &tlength,
|
|
|
|
|
PA_TAG_U32, &prebuf,
|
|
|
|
|
PA_TAG_U32, &minreq,
|
2006-02-20 04:05:16 +00:00
|
|
|
PA_TAG_U32, &syncid,
|
2006-01-28 01:07:09 +00:00
|
|
|
PA_TAG_CVOLUME, &volume,
|
2007-11-21 01:30:40 +00:00
|
|
|
PA_TAG_INVALID) < 0 || !name) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (c->version >= 12) {
|
|
|
|
|
/* Since 0.9.8 the user can ask for a couple of additional flags */
|
|
|
|
|
|
|
|
|
|
if (pa_tagstruct_get_boolean(t, &no_remap) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &no_remix) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &fix_format) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &fix_rate) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &fix_channels) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &no_move) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &variable_rate) < 0) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!pa_tagstruct_eof(t)) {
|
2004-07-07 00:22:46 +00:00
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, name && pa_utf8_valid(name), tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, sink_index != PA_INVALID_INDEX || !sink_name || (*sink_name && pa_utf8_valid(name)), tag, PA_ERR_INVALID);
|
2006-04-23 21:01:44 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, pa_channel_map_valid(&map), tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, pa_sample_spec_valid(&ss), tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, pa_cvolume_valid(&volume), tag, PA_ERR_INVALID);
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, map.channels == ss.channels && volume.channels == ss.channels, tag, PA_ERR_INVALID);
|
2007-11-21 01:30:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, maxlength > 0, tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, maxlength <= MAX_MEMBLOCKQ_LENGTH, tag, PA_ERR_INVALID);
|
2007-05-29 17:24:48 +00:00
|
|
|
|
2006-08-19 23:06:45 +00:00
|
|
|
if (sink_index != PA_INVALID_INDEX) {
|
2004-07-03 23:35:12 +00:00
|
|
|
sink = pa_idxset_get_by_index(c->protocol->core->sinks, sink_index);
|
2006-08-19 23:06:45 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, sink, tag, PA_ERR_NOENTITY);
|
|
|
|
|
} else if (sink_name) {
|
2004-09-19 23:12:41 +00:00
|
|
|
sink = pa_namereg_get(c->protocol->core, sink_name, PA_NAMEREG_SINK, 1);
|
2006-08-19 23:06:45 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, sink, tag, PA_ERR_NOENTITY);
|
|
|
|
|
}
|
2006-02-22 18:54:21 +00:00
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
flags =
|
|
|
|
|
(corked ? PA_SINK_INPUT_START_CORKED : 0) |
|
|
|
|
|
(no_remap ? PA_SINK_INPUT_NO_REMAP : 0) |
|
|
|
|
|
(no_remix ? PA_SINK_INPUT_NO_REMIX : 0) |
|
|
|
|
|
(fix_format ? PA_SINK_INPUT_FIX_FORMAT : 0) |
|
|
|
|
|
(fix_rate ? PA_SINK_INPUT_FIX_RATE : 0) |
|
|
|
|
|
(fix_channels ? PA_SINK_INPUT_FIX_CHANNELS : 0) |
|
|
|
|
|
(no_move ? PA_SINK_INPUT_DONT_MOVE : 0) |
|
|
|
|
|
(variable_rate ? PA_SINK_INPUT_VARIABLE_RATE : 0);
|
|
|
|
|
|
|
|
|
|
s = playback_stream_new(c, sink, &ss, &map, name, &maxlength, &tlength, &prebuf, &minreq, &volume, syncid, &missing, flags);
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_INVALID);
|
2004-09-26 17:02:26 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2004-07-03 23:35:12 +00:00
|
|
|
pa_tagstruct_putu32(reply, s->index);
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(s->sink_input);
|
2004-07-03 23:35:12 +00:00
|
|
|
pa_tagstruct_putu32(reply, s->sink_input->index);
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_tagstruct_putu32(reply, missing);
|
|
|
|
|
|
|
|
|
|
/* pa_log("initial request is %u", missing); */
|
2006-05-25 23:20:28 +00:00
|
|
|
|
|
|
|
|
if (c->version >= 9) {
|
2007-11-21 01:30:40 +00:00
|
|
|
/* Since 0.9.0 we support sending the buffer metrics back to the client */
|
2006-05-25 23:20:28 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) maxlength);
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) tlength);
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) prebuf);
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) minreq);
|
2006-05-25 23:20:28 +00:00
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
if (c->version >= 12) {
|
|
|
|
|
/* Since 0.9.8 we support sending the chosen sample
|
|
|
|
|
* spec/channel map/device/suspend status back to the
|
|
|
|
|
* client */
|
|
|
|
|
|
|
|
|
|
pa_tagstruct_put_sample_spec(reply, &ss);
|
|
|
|
|
pa_tagstruct_put_channel_map(reply, &map);
|
|
|
|
|
|
|
|
|
|
pa_tagstruct_putu32(reply, s->sink_input->sink->index);
|
|
|
|
|
pa_tagstruct_puts(reply, s->sink_input->sink->name);
|
|
|
|
|
|
|
|
|
|
pa_tagstruct_put_boolean(reply, pa_sink_get_state(s->sink_input->sink) == PA_SINK_SUSPENDED);
|
|
|
|
|
}
|
|
|
|
|
|
2004-07-03 23:35:12 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_delete_stream(PA_GCC_UNUSED pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2004-06-20 01:12:13 +00:00
|
|
|
uint32_t channel;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-07-03 23:35:12 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &channel) < 0 ||
|
2004-07-07 00:22:46 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
switch (command) {
|
|
|
|
|
|
|
|
|
|
case PA_COMMAND_DELETE_PLAYBACK_STREAM: {
|
|
|
|
|
playback_stream *s;
|
|
|
|
|
if (!(s = pa_idxset_get_by_index(c->output_streams, channel)) || !playback_stream_isinstance(s)) {
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_EXIST);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
playback_stream_unlink(s);
|
|
|
|
|
break;
|
2004-08-03 19:26:56 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
case PA_COMMAND_DELETE_RECORD_STREAM: {
|
|
|
|
|
record_stream *s;
|
|
|
|
|
if (!(s = pa_idxset_get_by_index(c->record_streams, channel))) {
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_EXIST);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
record_stream_unlink(s);
|
|
|
|
|
break;
|
2004-08-03 19:26:56 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
case PA_COMMAND_DELETE_UPLOAD_STREAM: {
|
|
|
|
|
upload_stream *s;
|
|
|
|
|
|
|
|
|
|
if (!(s = pa_idxset_get_by_index(c->output_streams, channel)) || !upload_stream_isinstance(s)) {
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_EXIST);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
upload_stream_unlink(s);
|
|
|
|
|
break;
|
2004-08-03 19:26:56 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
default:
|
|
|
|
|
pa_assert_not_reached();
|
2004-08-03 19:26:56 +00:00
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-07-10 16:50:22 +00:00
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_create_record_stream(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
record_stream *s;
|
2006-02-27 09:09:15 +00:00
|
|
|
uint32_t maxlength, fragment_size;
|
2004-07-10 16:50:22 +00:00
|
|
|
uint32_t source_index;
|
2004-08-03 19:26:56 +00:00
|
|
|
const char *name, *source_name;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sample_spec ss;
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_channel_map map;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2006-08-19 23:06:45 +00:00
|
|
|
pa_source *source = NULL;
|
2004-09-29 17:38:45 +00:00
|
|
|
int corked;
|
2007-11-21 01:30:40 +00:00
|
|
|
int no_remap = 0, no_remix = 0, fix_format = 0, fix_rate = 0, fix_channels = 0, no_move = 0, variable_rate = 0;
|
|
|
|
|
pa_source_output_flags_t flags = 0;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
if (pa_tagstruct_gets(t, &name) < 0 ||
|
2004-07-10 16:50:22 +00:00
|
|
|
pa_tagstruct_get_sample_spec(t, &ss) < 0 ||
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_tagstruct_get_channel_map(t, &map) < 0 ||
|
2004-07-10 16:50:22 +00:00
|
|
|
pa_tagstruct_getu32(t, &source_index) < 0 ||
|
2004-08-03 19:26:56 +00:00
|
|
|
pa_tagstruct_gets(t, &source_name) < 0 ||
|
2004-07-10 16:50:22 +00:00
|
|
|
pa_tagstruct_getu32(t, &maxlength) < 0 ||
|
2004-09-29 17:38:45 +00:00
|
|
|
pa_tagstruct_get_boolean(t, &corked) < 0 ||
|
2007-11-21 01:30:40 +00:00
|
|
|
pa_tagstruct_getu32(t, &fragment_size) < 0) {
|
2004-07-10 16:50:22 +00:00
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
if (c->version >= 12) {
|
|
|
|
|
/* Since 0.9.8 the user can ask for a couple of additional flags */
|
|
|
|
|
|
|
|
|
|
if (pa_tagstruct_get_boolean(t, &no_remap) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &no_remix) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &fix_format) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &fix_rate) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &fix_channels) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &no_move) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &variable_rate) < 0) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
flags =
|
|
|
|
|
(corked ? PA_SOURCE_OUTPUT_START_CORKED : 0) |
|
|
|
|
|
(no_remap ? PA_SOURCE_OUTPUT_NO_REMAP : 0) |
|
|
|
|
|
(no_remix ? PA_SOURCE_OUTPUT_NO_REMIX : 0) |
|
|
|
|
|
(fix_format ? PA_SOURCE_OUTPUT_FIX_FORMAT : 0) |
|
|
|
|
|
(fix_rate ? PA_SOURCE_OUTPUT_FIX_RATE : 0) |
|
|
|
|
|
(fix_channels ? PA_SOURCE_OUTPUT_FIX_CHANNELS : 0) |
|
|
|
|
|
(no_move ? PA_SOURCE_OUTPUT_DONT_MOVE : 0) |
|
|
|
|
|
(variable_rate ? PA_SOURCE_OUTPUT_VARIABLE_RATE : 0);
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, name && pa_utf8_valid(name), tag, PA_ERR_INVALID);
|
2006-04-23 21:01:44 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, pa_sample_spec_valid(&ss), tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, pa_channel_map_valid(&map), tag, PA_ERR_INVALID);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, source_index != PA_INVALID_INDEX || !source_name || (*source_name && pa_utf8_valid(source_name)), tag, PA_ERR_INVALID);
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, map.channels == ss.channels, tag, PA_ERR_INVALID);
|
2007-11-21 01:30:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, maxlength > 0, tag, PA_ERR_INVALID);
|
2006-02-22 21:02:27 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, maxlength <= MAX_MEMBLOCKQ_LENGTH, tag, PA_ERR_INVALID);
|
2004-07-10 16:50:22 +00:00
|
|
|
|
2006-08-19 23:06:45 +00:00
|
|
|
if (source_index != PA_INVALID_INDEX) {
|
2004-07-10 16:50:22 +00:00
|
|
|
source = pa_idxset_get_by_index(c->protocol->core->sources, source_index);
|
2006-08-19 23:06:45 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, source, tag, PA_ERR_NOENTITY);
|
|
|
|
|
} else if (source_name) {
|
2004-09-19 23:12:41 +00:00
|
|
|
source = pa_namereg_get(c->protocol->core, source_name, PA_NAMEREG_SOURCE, 1);
|
2006-08-19 23:06:45 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, source, tag, PA_ERR_NOENTITY);
|
2007-01-04 13:43:45 +00:00
|
|
|
}
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
s = record_stream_new(c, source, &ss, &map, name, &maxlength, fragment_size, flags);
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_INVALID);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2004-07-10 16:50:22 +00:00
|
|
|
pa_tagstruct_putu32(reply, s->index);
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(s->source_output);
|
2004-07-10 16:50:22 +00:00
|
|
|
pa_tagstruct_putu32(reply, s->source_output->index);
|
2006-05-25 23:20:28 +00:00
|
|
|
|
|
|
|
|
if (c->version >= 9) {
|
|
|
|
|
/* Since 0.9 we support sending the buffer metrics back to the client */
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) maxlength);
|
2006-05-25 23:20:28 +00:00
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) s->fragment_size);
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
if (c->version >= 12) {
|
|
|
|
|
/* Since 0.9.8 we support sending the chosen sample
|
|
|
|
|
* spec/channel map/device/suspend status back to the
|
|
|
|
|
* client */
|
|
|
|
|
|
|
|
|
|
pa_tagstruct_put_sample_spec(reply, &ss);
|
|
|
|
|
pa_tagstruct_put_channel_map(reply, &map);
|
|
|
|
|
|
|
|
|
|
pa_tagstruct_putu32(reply, s->source_output->source->index);
|
|
|
|
|
pa_tagstruct_puts(reply, s->source_output->source->name);
|
|
|
|
|
|
|
|
|
|
pa_tagstruct_put_boolean(reply, pa_source_get_state(s->source_output->source) == PA_SOURCE_SUSPENDED);
|
|
|
|
|
}
|
|
|
|
|
|
2004-07-10 16:50:22 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_exit(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-07-07 00:22:46 +00:00
|
|
|
if (!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-06-23 23:17:30 +00:00
|
|
|
c->protocol->core->mainloop->quit(c->protocol->core->mainloop, 0);
|
2004-07-03 23:35:12 +00:00
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag); /* nonsense */
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_auth(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2004-07-06 00:08:44 +00:00
|
|
|
const void*cookie;
|
2006-03-02 21:56:15 +00:00
|
|
|
pa_tagstruct *reply;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-07-06 00:08:44 +00:00
|
|
|
|
2006-03-02 21:56:15 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &c->version) < 0 ||
|
|
|
|
|
pa_tagstruct_get_arbitrary(t, &cookie, PA_NATIVE_COOKIE_LENGTH) < 0 ||
|
2004-07-07 00:22:46 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2004-09-12 23:40:53 +00:00
|
|
|
|
2006-03-02 21:56:15 +00:00
|
|
|
/* Minimum supported version */
|
|
|
|
|
if (c->version < 8) {
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_VERSION);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2004-09-12 23:40:53 +00:00
|
|
|
if (!c->authorized) {
|
2006-02-24 15:12:42 +00:00
|
|
|
int success = 0;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-07-19 21:48:35 +00:00
|
|
|
#ifdef HAVE_CREDS
|
|
|
|
|
const pa_creds *creds;
|
2006-02-24 15:12:42 +00:00
|
|
|
|
2006-07-19 21:48:35 +00:00
|
|
|
if ((creds = pa_pdispatch_creds(pd))) {
|
|
|
|
|
if (creds->uid == getuid())
|
2006-02-24 15:12:42 +00:00
|
|
|
success = 1;
|
2006-02-24 17:14:23 +00:00
|
|
|
else if (c->protocol->auth_group) {
|
|
|
|
|
int r;
|
2006-07-19 21:48:35 +00:00
|
|
|
gid_t gid;
|
|
|
|
|
|
|
|
|
|
if ((gid = pa_get_gid_of_group(c->protocol->auth_group)) == (gid_t) -1)
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log_warn("failed to get GID of group '%s'", c->protocol->auth_group);
|
2006-07-19 21:48:35 +00:00
|
|
|
else if (gid == creds->gid)
|
2006-02-24 17:14:23 +00:00
|
|
|
success = 1;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-07-19 21:48:35 +00:00
|
|
|
if (!success) {
|
|
|
|
|
if ((r = pa_uid_in_group(creds->uid, c->protocol->auth_group)) < 0)
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log_warn("failed to check group membership.");
|
2006-07-19 21:48:35 +00:00
|
|
|
else if (r > 0)
|
|
|
|
|
success = 1;
|
|
|
|
|
}
|
2006-02-24 17:14:23 +00:00
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log_info("Got credentials: uid=%lu gid=%lu success=%i",
|
2006-07-19 21:48:35 +00:00
|
|
|
(unsigned long) creds->uid,
|
|
|
|
|
(unsigned long) creds->gid,
|
2006-02-24 15:12:42 +00:00
|
|
|
success);
|
2006-08-18 23:44:35 +00:00
|
|
|
|
|
|
|
|
if (c->version >= 10 &&
|
|
|
|
|
pa_mempool_is_shared(c->protocol->core->mempool) &&
|
|
|
|
|
creds->uid == getuid()) {
|
|
|
|
|
|
|
|
|
|
pa_pstream_use_shm(c->pstream, 1);
|
|
|
|
|
pa_log_info("Enabled SHM for new connection");
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-24 15:12:42 +00:00
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
2006-07-20 18:43:20 +00:00
|
|
|
if (!success && memcmp(c->protocol->auth_cookie, cookie, PA_NATIVE_COOKIE_LENGTH) == 0)
|
2006-02-24 15:12:42 +00:00
|
|
|
success = 1;
|
|
|
|
|
|
|
|
|
|
if (!success) {
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log_warn("Denied access to client with invalid authorization data.");
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_ACCESS);
|
2004-09-12 23:40:53 +00:00
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-12 23:40:53 +00:00
|
|
|
c->authorized = 1;
|
2004-11-18 00:28:26 +00:00
|
|
|
if (c->auth_timeout_event) {
|
|
|
|
|
c->protocol->core->mainloop->time_free(c->auth_timeout_event);
|
|
|
|
|
c->auth_timeout_event = NULL;
|
|
|
|
|
}
|
2004-07-06 00:08:44 +00:00
|
|
|
}
|
2006-03-02 21:56:15 +00:00
|
|
|
|
|
|
|
|
reply = reply_new(tag);
|
|
|
|
|
pa_tagstruct_putu32(reply, PA_PROTOCOL_VERSION);
|
2006-08-18 23:44:35 +00:00
|
|
|
|
|
|
|
|
#ifdef HAVE_CREDS
|
|
|
|
|
{
|
|
|
|
|
/* SHM support is only enabled after both sides made sure they are the same user. */
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-08-18 23:44:35 +00:00
|
|
|
pa_creds ucred;
|
|
|
|
|
|
|
|
|
|
ucred.uid = getuid();
|
|
|
|
|
ucred.gid = getgid();
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-08-18 23:44:35 +00:00
|
|
|
pa_pstream_send_tagstruct_with_creds(c->pstream, reply, &ucred);
|
|
|
|
|
}
|
|
|
|
|
#else
|
2006-03-02 21:56:15 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
2006-08-18 23:44:35 +00:00
|
|
|
#endif
|
2004-07-06 00:08:44 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_set_client_name(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2004-07-06 00:08:44 +00:00
|
|
|
const char *name;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-07-06 00:08:44 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
if (pa_tagstruct_gets(t, &name) < 0 ||
|
2004-07-07 00:22:46 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2004-07-06 00:08:44 +00:00
|
|
|
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, name && pa_utf8_valid(name), tag, PA_ERR_INVALID);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-15 19:16:57 +00:00
|
|
|
pa_client_set_name(c->client, name);
|
2004-07-06 00:08:44 +00:00
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
2004-07-07 00:22:46 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_lookup(PA_GCC_UNUSED pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2004-07-07 00:22:46 +00:00
|
|
|
const char *name;
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx = PA_IDXSET_INVALID;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-07-07 00:22:46 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
if (pa_tagstruct_gets(t, &name) < 0 ||
|
2004-07-07 00:22:46 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, name && *name && pa_utf8_valid(name), tag, PA_ERR_INVALID);
|
2004-07-07 22:02:15 +00:00
|
|
|
|
2004-07-07 00:22:46 +00:00
|
|
|
if (command == PA_COMMAND_LOOKUP_SINK) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sink *sink;
|
2004-08-04 16:39:30 +00:00
|
|
|
if ((sink = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SINK, 1)))
|
2006-01-11 01:17:39 +00:00
|
|
|
idx = sink->index;
|
2004-07-07 00:22:46 +00:00
|
|
|
} else {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_source *source;
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(command == PA_COMMAND_LOOKUP_SOURCE);
|
2004-08-04 16:39:30 +00:00
|
|
|
if ((source = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SOURCE, 1)))
|
2006-01-11 01:17:39 +00:00
|
|
|
idx = source->index;
|
2004-07-07 00:22:46 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (idx == PA_IDXSET_INVALID)
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_NOENTITY);
|
2004-07-07 00:22:46 +00:00
|
|
|
else {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct_putu32(reply, idx);
|
2004-07-07 00:22:46 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
2004-07-06 00:08:44 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_drain_playback_stream(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
2007-10-28 19:13:50 +00:00
|
|
|
playback_stream *s;
|
|
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-07-07 22:02:15 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-07-07 22:02:15 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
s = pa_idxset_get_by_index(c->output_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2007-10-28 19:13:50 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, playback_stream_isinstance(s), tag, PA_ERR_NOENTITY);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_asyncmsgq_post(s->sink_input->sink->asyncmsgq, PA_MSGOBJECT(s->sink_input), SINK_INPUT_MESSAGE_DRAIN, PA_UINT_TO_PTR(tag), 0, NULL, NULL);
|
2007-01-04 13:43:45 +00:00
|
|
|
}
|
2004-07-07 22:02:15 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_stat(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2006-08-18 19:55:18 +00:00
|
|
|
const pa_mempool_stat *stat;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-07-15 20:51:55 +00:00
|
|
|
|
|
|
|
|
if (!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2004-07-15 20:51:55 +00:00
|
|
|
|
2006-08-18 19:55:18 +00:00
|
|
|
stat = pa_mempool_get_stat(c->protocol->core->mempool);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2007-05-27 20:38:14 +00:00
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) pa_atomic_load(&stat->n_allocated));
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) pa_atomic_load(&stat->allocated_size));
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) pa_atomic_load(&stat->n_accumulated));
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) pa_atomic_load(&stat->accumulated_size));
|
2004-09-01 22:46:27 +00:00
|
|
|
pa_tagstruct_putu32(reply, pa_scache_total_size(c->protocol->core));
|
2004-07-15 20:51:55 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_get_playback_latency(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2007-10-28 19:13:50 +00:00
|
|
|
playback_stream *s;
|
2004-09-10 22:35:12 +00:00
|
|
|
struct timeval tv, now;
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
2006-04-13 18:27:35 +00:00
|
|
|
pa_usec_t latency;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-09-10 22:35:12 +00:00
|
|
|
pa_tagstruct_get_timeval(t, &tv) < 0 ||
|
2004-07-15 21:18:18 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
s = pa_idxset_get_by_index(c->output_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2007-10-28 19:13:50 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, playback_stream_isinstance(s), tag, PA_ERR_NOENTITY);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, pa_asyncmsgq_send(s->sink_input->sink->asyncmsgq, PA_MSGOBJECT(s->sink_input), SINK_INPUT_MESSAGE_UPDATE_LATENCY, s, 0, NULL) == 0, tag, PA_ERR_NOENTITY)
|
2004-07-15 21:18:18 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2006-04-13 18:27:35 +00:00
|
|
|
|
|
|
|
|
latency = pa_sink_get_latency(s->sink_input->sink);
|
2007-10-28 19:13:50 +00:00
|
|
|
latency += pa_bytes_to_usec(s->resampled_chunk_length, &s->sink_input->sample_spec);
|
|
|
|
|
|
2006-04-13 18:27:35 +00:00
|
|
|
pa_tagstruct_put_usec(reply, latency);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-16 00:05:56 +00:00
|
|
|
pa_tagstruct_put_usec(reply, 0);
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_tagstruct_put_boolean(reply, pa_sink_input_get_state(s->sink_input) == PA_SINK_INPUT_RUNNING);
|
2004-09-10 22:35:12 +00:00
|
|
|
pa_tagstruct_put_timeval(reply, &tv);
|
2006-04-07 00:23:38 +00:00
|
|
|
pa_tagstruct_put_timeval(reply, pa_gettimeofday(&now));
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_tagstruct_puts64(reply, s->write_index);
|
|
|
|
|
pa_tagstruct_puts64(reply, s->read_index);
|
2004-07-15 21:18:18 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_get_record_latency(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream *s;
|
2004-09-16 00:05:56 +00:00
|
|
|
struct timeval tv, now;
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-16 00:05:56 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-09-16 00:05:56 +00:00
|
|
|
pa_tagstruct_get_timeval(t, &tv) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
s = pa_idxset_get_by_index(c->record_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2004-09-16 00:05:56 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2004-09-16 00:05:56 +00:00
|
|
|
pa_tagstruct_put_usec(reply, s->source_output->source->monitor_of ? pa_sink_get_latency(s->source_output->source->monitor_of) : 0);
|
|
|
|
|
pa_tagstruct_put_usec(reply, pa_source_get_latency(s->source_output->source));
|
|
|
|
|
pa_tagstruct_put_boolean(reply, 0);
|
|
|
|
|
pa_tagstruct_put_timeval(reply, &tv);
|
2006-04-07 00:23:38 +00:00
|
|
|
pa_tagstruct_put_timeval(reply, pa_gettimeofday(&now));
|
2006-03-02 14:22:25 +00:00
|
|
|
pa_tagstruct_puts64(reply, pa_memblockq_get_write_index(s->memblockq));
|
|
|
|
|
pa_tagstruct_puts64(reply, pa_memblockq_get_read_index(s->memblockq));
|
2004-09-16 00:05:56 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_create_upload_stream(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
upload_stream *s;
|
2006-02-27 09:09:15 +00:00
|
|
|
uint32_t length;
|
2004-08-03 19:26:56 +00:00
|
|
|
const char *name;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sample_spec ss;
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_channel_map map;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
|
|
|
|
if (pa_tagstruct_gets(t, &name) < 0 ||
|
2004-08-03 19:26:56 +00:00
|
|
|
pa_tagstruct_get_sample_spec(t, &ss) < 0 ||
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_tagstruct_get_channel_map(t, &map) < 0 ||
|
2004-08-03 19:26:56 +00:00
|
|
|
pa_tagstruct_getu32(t, &length) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-04-23 21:01:44 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, pa_sample_spec_valid(&ss), tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, pa_channel_map_valid(&map), tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, map.channels == ss.channels, tag, PA_ERR_INVALID);
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, (length % pa_frame_size(&ss)) == 0 && length > 0, tag, PA_ERR_INVALID);
|
2006-04-23 21:01:44 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, length <= PA_SCACHE_ENTRY_SIZE_MAX, tag, PA_ERR_TOOLARGE);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, name && *name && pa_utf8_valid(name), tag, PA_ERR_INVALID);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
s = upload_stream_new(c, &ss, &map, name, length);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_INVALID);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2004-08-03 19:26:56 +00:00
|
|
|
pa_tagstruct_putu32(reply, s->index);
|
|
|
|
|
pa_tagstruct_putu32(reply, length);
|
|
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_finish_upload_stream(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2004-08-03 19:26:56 +00:00
|
|
|
uint32_t channel;
|
2007-10-28 19:13:50 +00:00
|
|
|
upload_stream *s;
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-08-03 19:26:56 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &channel) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2004-08-03 19:26:56 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
s = pa_idxset_get_by_index(c->output_streams, channel);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2007-10-28 19:13:50 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, upload_stream_isinstance(s), tag, PA_ERR_NOENTITY);
|
2004-08-03 19:26:56 +00:00
|
|
|
|
2006-04-23 21:01:44 +00:00
|
|
|
if (pa_scache_add_item(c->protocol->core, s->name, &s->sample_spec, &s->channel_map, &s->memchunk, &idx) < 0)
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_INTERNAL);
|
|
|
|
|
else
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
upload_stream_unlink(s);
|
2004-08-03 19:26:56 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_play_sample(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-27 16:25:31 +00:00
|
|
|
uint32_t sink_index;
|
2006-04-23 19:49:01 +00:00
|
|
|
pa_volume_t volume;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sink *sink;
|
2004-08-03 19:26:56 +00:00
|
|
|
const char *name, *sink_name;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-08-03 19:26:56 +00:00
|
|
|
|
|
|
|
|
if (pa_tagstruct_getu32(t, &sink_index) < 0 ||
|
|
|
|
|
pa_tagstruct_gets(t, &sink_name) < 0 ||
|
2006-04-23 19:49:01 +00:00
|
|
|
pa_tagstruct_getu32(t, &volume) < 0 ||
|
2006-02-22 18:54:21 +00:00
|
|
|
pa_tagstruct_gets(t, &name) < 0 ||
|
2004-08-03 19:26:56 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, sink_index != PA_INVALID_INDEX || !sink_name || (*sink_name && pa_utf8_valid(name)), tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, name && *name && pa_utf8_valid(name), tag, PA_ERR_INVALID);
|
2004-08-03 19:26:56 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
if (sink_index != PA_INVALID_INDEX)
|
2004-08-03 19:26:56 +00:00
|
|
|
sink = pa_idxset_get_by_index(c->protocol->core->sinks, sink_index);
|
|
|
|
|
else
|
2004-09-19 23:12:41 +00:00
|
|
|
sink = pa_namereg_get(c->protocol->core, sink_name, PA_NAMEREG_SINK, 1);
|
2004-08-03 19:26:56 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, sink, tag, PA_ERR_NOENTITY);
|
2004-08-03 19:26:56 +00:00
|
|
|
|
2006-04-23 19:49:01 +00:00
|
|
|
if (pa_scache_play_item(c->protocol->core, name, sink, volume) < 0) {
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_NOENTITY);
|
2004-08-03 19:26:56 +00:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_remove_sample(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2004-08-03 19:26:56 +00:00
|
|
|
const char *name;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-08-03 19:26:56 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
if (pa_tagstruct_gets(t, &name) < 0 ||
|
2004-08-03 19:26:56 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, name && *name && pa_utf8_valid(name), tag, PA_ERR_INVALID);
|
2004-08-03 19:26:56 +00:00
|
|
|
|
|
|
|
|
if (pa_scache_remove_item(c->protocol->core, name) < 0) {
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_NOENTITY);
|
2004-08-03 19:26:56 +00:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2007-11-21 22:55:28 +00:00
|
|
|
static void fixup_sample_spec(connection *c, pa_sample_spec *fixed, const pa_sample_spec *original) {
|
|
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(fixed);
|
|
|
|
|
pa_assert(original);
|
|
|
|
|
|
|
|
|
|
*fixed = *original;
|
|
|
|
|
|
|
|
|
|
if (c->version < 12) {
|
|
|
|
|
/* Before protocol version 12 we didn't support S32 samples,
|
|
|
|
|
* so we need to lie about this to the client */
|
|
|
|
|
|
|
|
|
|
if (fixed->format == PA_SAMPLE_S32LE)
|
|
|
|
|
fixed->format = PA_SAMPLE_FLOAT32LE;
|
|
|
|
|
if (fixed->format == PA_SAMPLE_S32BE)
|
|
|
|
|
fixed->format = PA_SAMPLE_FLOAT32BE;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void sink_fill_tagstruct(connection *c, pa_tagstruct *t, pa_sink *sink) {
|
|
|
|
|
pa_sample_spec fixed_ss;
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(t);
|
|
|
|
|
pa_sink_assert_ref(sink);
|
|
|
|
|
|
2007-11-21 22:55:28 +00:00
|
|
|
fixup_sample_spec(c, &fixed_ss, &sink->sample_spec);
|
|
|
|
|
|
2006-01-28 01:07:09 +00:00
|
|
|
pa_tagstruct_put(
|
|
|
|
|
t,
|
|
|
|
|
PA_TAG_U32, sink->index,
|
|
|
|
|
PA_TAG_STRING, sink->name,
|
|
|
|
|
PA_TAG_STRING, sink->description,
|
2007-11-21 22:55:28 +00:00
|
|
|
PA_TAG_SAMPLE_SPEC, &fixed_ss,
|
2006-01-28 01:07:09 +00:00
|
|
|
PA_TAG_CHANNEL_MAP, &sink->channel_map,
|
2007-10-28 19:13:50 +00:00
|
|
|
PA_TAG_U32, sink->module ? sink->module->index : PA_INVALID_INDEX,
|
|
|
|
|
PA_TAG_CVOLUME, pa_sink_get_volume(sink),
|
|
|
|
|
PA_TAG_BOOLEAN, pa_sink_get_mute(sink),
|
2006-08-12 17:06:39 +00:00
|
|
|
PA_TAG_U32, sink->monitor_source ? sink->monitor_source->index : PA_INVALID_INDEX,
|
|
|
|
|
PA_TAG_STRING, sink->monitor_source ? sink->monitor_source->name : NULL,
|
2006-01-28 01:07:09 +00:00
|
|
|
PA_TAG_USEC, pa_sink_get_latency(sink),
|
|
|
|
|
PA_TAG_STRING, sink->driver,
|
2007-10-28 19:13:50 +00:00
|
|
|
PA_TAG_U32, sink->flags,
|
2006-01-28 01:07:09 +00:00
|
|
|
PA_TAG_INVALID);
|
2004-08-05 19:53:57 +00:00
|
|
|
}
|
|
|
|
|
|
2007-11-21 22:55:28 +00:00
|
|
|
static void source_fill_tagstruct(connection *c, pa_tagstruct *t, pa_source *source) {
|
|
|
|
|
pa_sample_spec fixed_ss;
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(t);
|
|
|
|
|
pa_source_assert_ref(source);
|
|
|
|
|
|
2007-11-21 22:55:28 +00:00
|
|
|
fixup_sample_spec(c, &fixed_ss, &source->sample_spec);
|
|
|
|
|
|
2006-02-22 14:11:23 +00:00
|
|
|
pa_tagstruct_put(
|
|
|
|
|
t,
|
|
|
|
|
PA_TAG_U32, source->index,
|
|
|
|
|
PA_TAG_STRING, source->name,
|
|
|
|
|
PA_TAG_STRING, source->description,
|
2007-11-21 22:55:28 +00:00
|
|
|
PA_TAG_SAMPLE_SPEC, &fixed_ss,
|
2006-02-22 14:11:23 +00:00
|
|
|
PA_TAG_CHANNEL_MAP, &source->channel_map,
|
2007-10-28 19:13:50 +00:00
|
|
|
PA_TAG_U32, source->module ? source->module->index : PA_INVALID_INDEX,
|
|
|
|
|
PA_TAG_CVOLUME, pa_source_get_volume(source),
|
|
|
|
|
PA_TAG_BOOLEAN, pa_source_get_mute(source),
|
2006-02-22 14:11:23 +00:00
|
|
|
PA_TAG_U32, source->monitor_of ? source->monitor_of->index : PA_INVALID_INDEX,
|
|
|
|
|
PA_TAG_STRING, source->monitor_of ? source->monitor_of->name : NULL,
|
|
|
|
|
PA_TAG_USEC, pa_source_get_latency(source),
|
|
|
|
|
PA_TAG_STRING, source->driver,
|
2007-10-28 19:13:50 +00:00
|
|
|
PA_TAG_U32, source->flags,
|
2006-02-22 14:11:23 +00:00
|
|
|
PA_TAG_INVALID);
|
2004-08-05 19:53:57 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void client_fill_tagstruct(pa_tagstruct *t, pa_client *client) {
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(t);
|
|
|
|
|
pa_assert(client);
|
|
|
|
|
|
2004-08-12 23:25:28 +00:00
|
|
|
pa_tagstruct_putu32(t, client->index);
|
|
|
|
|
pa_tagstruct_puts(t, client->name);
|
2006-02-22 18:54:21 +00:00
|
|
|
pa_tagstruct_putu32(t, client->owner ? client->owner->index : PA_INVALID_INDEX);
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_tagstruct_puts(t, client->driver);
|
2004-08-12 23:25:28 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void module_fill_tagstruct(pa_tagstruct *t, pa_module *module) {
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(t);
|
|
|
|
|
pa_assert(module);
|
|
|
|
|
|
2004-08-12 23:25:28 +00:00
|
|
|
pa_tagstruct_putu32(t, module->index);
|
|
|
|
|
pa_tagstruct_puts(t, module->name);
|
2004-09-19 23:12:41 +00:00
|
|
|
pa_tagstruct_puts(t, module->argument);
|
2004-08-12 23:25:28 +00:00
|
|
|
pa_tagstruct_putu32(t, module->n_used);
|
2004-09-04 00:27:36 +00:00
|
|
|
pa_tagstruct_put_boolean(t, module->auto_unload);
|
2004-08-12 23:25:28 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void sink_input_fill_tagstruct(connection *c, pa_tagstruct *t, pa_sink_input *s) {
|
2007-11-21 22:55:28 +00:00
|
|
|
pa_sample_spec fixed_ss;
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(t);
|
|
|
|
|
pa_sink_input_assert_ref(s);
|
|
|
|
|
|
2007-11-21 22:55:28 +00:00
|
|
|
fixup_sample_spec(c, &fixed_ss, &s->sample_spec);
|
|
|
|
|
|
2004-08-16 19:55:02 +00:00
|
|
|
pa_tagstruct_putu32(t, s->index);
|
2004-09-19 23:12:41 +00:00
|
|
|
pa_tagstruct_puts(t, s->name);
|
2006-08-13 16:19:56 +00:00
|
|
|
pa_tagstruct_putu32(t, s->module ? s->module->index : PA_INVALID_INDEX);
|
2006-02-22 18:54:21 +00:00
|
|
|
pa_tagstruct_putu32(t, s->client ? s->client->index : PA_INVALID_INDEX);
|
2004-08-16 19:55:02 +00:00
|
|
|
pa_tagstruct_putu32(t, s->sink->index);
|
2007-11-21 22:55:28 +00:00
|
|
|
pa_tagstruct_put_sample_spec(t, &fixed_ss);
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_tagstruct_put_channel_map(t, &s->channel_map);
|
|
|
|
|
pa_tagstruct_put_cvolume(t, &s->volume);
|
2004-09-12 13:14:49 +00:00
|
|
|
pa_tagstruct_put_usec(t, pa_sink_input_get_latency(s));
|
|
|
|
|
pa_tagstruct_put_usec(t, pa_sink_get_latency(s->sink));
|
2004-11-20 16:23:53 +00:00
|
|
|
pa_tagstruct_puts(t, pa_resample_method_to_string(pa_sink_input_get_resample_method(s)));
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_tagstruct_puts(t, s->driver);
|
2007-10-28 19:13:50 +00:00
|
|
|
if (c->version >= 11)
|
|
|
|
|
pa_tagstruct_put_boolean(t, pa_sink_input_get_mute(s));
|
2004-08-16 19:55:02 +00:00
|
|
|
}
|
|
|
|
|
|
2007-11-21 22:55:28 +00:00
|
|
|
static void source_output_fill_tagstruct(connection *c, pa_tagstruct *t, pa_source_output *s) {
|
|
|
|
|
pa_sample_spec fixed_ss;
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(t);
|
|
|
|
|
pa_source_output_assert_ref(s);
|
|
|
|
|
|
2007-11-21 22:55:28 +00:00
|
|
|
fixup_sample_spec(c, &fixed_ss, &s->sample_spec);
|
|
|
|
|
|
2004-08-16 19:55:02 +00:00
|
|
|
pa_tagstruct_putu32(t, s->index);
|
2004-09-19 23:12:41 +00:00
|
|
|
pa_tagstruct_puts(t, s->name);
|
2006-08-13 19:55:17 +00:00
|
|
|
pa_tagstruct_putu32(t, s->module ? s->module->index : PA_INVALID_INDEX);
|
2006-02-22 18:54:21 +00:00
|
|
|
pa_tagstruct_putu32(t, s->client ? s->client->index : PA_INVALID_INDEX);
|
2004-08-16 19:55:02 +00:00
|
|
|
pa_tagstruct_putu32(t, s->source->index);
|
2007-11-21 22:55:28 +00:00
|
|
|
pa_tagstruct_put_sample_spec(t, &fixed_ss);
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_tagstruct_put_channel_map(t, &s->channel_map);
|
2004-09-16 00:05:56 +00:00
|
|
|
pa_tagstruct_put_usec(t, pa_source_output_get_latency(s));
|
|
|
|
|
pa_tagstruct_put_usec(t, pa_source_get_latency(s->source));
|
2004-11-20 16:23:53 +00:00
|
|
|
pa_tagstruct_puts(t, pa_resample_method_to_string(pa_source_output_get_resample_method(s)));
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_tagstruct_puts(t, s->driver);
|
2004-08-16 19:55:02 +00:00
|
|
|
}
|
|
|
|
|
|
2007-11-21 22:55:28 +00:00
|
|
|
static void scache_fill_tagstruct(connection *c, pa_tagstruct *t, pa_scache_entry *e) {
|
|
|
|
|
pa_sample_spec fixed_ss;
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(t);
|
|
|
|
|
pa_assert(e);
|
|
|
|
|
|
2007-11-21 22:55:28 +00:00
|
|
|
fixup_sample_spec(c, &fixed_ss, &e->sample_spec);
|
|
|
|
|
|
2004-08-19 23:14:59 +00:00
|
|
|
pa_tagstruct_putu32(t, e->index);
|
|
|
|
|
pa_tagstruct_puts(t, e->name);
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_tagstruct_put_cvolume(t, &e->volume);
|
2004-09-12 13:14:49 +00:00
|
|
|
pa_tagstruct_put_usec(t, pa_bytes_to_usec(e->memchunk.length, &e->sample_spec));
|
2007-11-21 22:55:28 +00:00
|
|
|
pa_tagstruct_put_sample_spec(t, &fixed_ss);
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_tagstruct_put_channel_map(t, &e->channel_map);
|
2004-09-01 22:46:27 +00:00
|
|
|
pa_tagstruct_putu32(t, e->memchunk.length);
|
2004-09-15 19:16:57 +00:00
|
|
|
pa_tagstruct_put_boolean(t, e->lazy);
|
|
|
|
|
pa_tagstruct_puts(t, e->filename);
|
2004-08-19 23:14:59 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_get_info(PA_GCC_UNUSED pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
|
|
|
|
pa_sink *sink = NULL;
|
|
|
|
|
pa_source *source = NULL;
|
|
|
|
|
pa_client *client = NULL;
|
|
|
|
|
pa_module *module = NULL;
|
|
|
|
|
pa_sink_input *si = NULL;
|
|
|
|
|
pa_source_output *so = NULL;
|
|
|
|
|
pa_scache_entry *sce = NULL;
|
2004-08-05 19:53:57 +00:00
|
|
|
const char *name;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-08-05 19:53:57 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-08-16 19:55:02 +00:00
|
|
|
(command != PA_COMMAND_GET_CLIENT_INFO &&
|
|
|
|
|
command != PA_COMMAND_GET_MODULE_INFO &&
|
|
|
|
|
command != PA_COMMAND_GET_SINK_INPUT_INFO &&
|
|
|
|
|
command != PA_COMMAND_GET_SOURCE_OUTPUT_INFO &&
|
|
|
|
|
pa_tagstruct_gets(t, &name) < 0) ||
|
2004-08-05 19:53:57 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2006-02-22 18:54:21 +00:00
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, idx != PA_INVALID_INDEX || !name || (*name && pa_utf8_valid(name)), tag, PA_ERR_INVALID);
|
2004-08-05 19:53:57 +00:00
|
|
|
|
|
|
|
|
if (command == PA_COMMAND_GET_SINK_INFO) {
|
2006-02-22 18:54:21 +00:00
|
|
|
if (idx != PA_INVALID_INDEX)
|
2006-01-11 01:17:39 +00:00
|
|
|
sink = pa_idxset_get_by_index(c->protocol->core->sinks, idx);
|
2004-08-05 19:53:57 +00:00
|
|
|
else
|
2004-09-19 23:12:41 +00:00
|
|
|
sink = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SINK, 1);
|
2004-08-12 23:25:28 +00:00
|
|
|
} else if (command == PA_COMMAND_GET_SOURCE_INFO) {
|
2006-02-22 18:54:21 +00:00
|
|
|
if (idx != PA_INVALID_INDEX)
|
2006-01-11 01:17:39 +00:00
|
|
|
source = pa_idxset_get_by_index(c->protocol->core->sources, idx);
|
2004-08-05 19:53:57 +00:00
|
|
|
else
|
2004-09-19 23:12:41 +00:00
|
|
|
source = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SOURCE, 1);
|
2004-08-12 23:25:28 +00:00
|
|
|
} else if (command == PA_COMMAND_GET_CLIENT_INFO)
|
2006-01-11 01:17:39 +00:00
|
|
|
client = pa_idxset_get_by_index(c->protocol->core->clients, idx);
|
2007-01-04 13:43:45 +00:00
|
|
|
else if (command == PA_COMMAND_GET_MODULE_INFO)
|
2006-01-11 01:17:39 +00:00
|
|
|
module = pa_idxset_get_by_index(c->protocol->core->modules, idx);
|
2004-08-16 19:55:02 +00:00
|
|
|
else if (command == PA_COMMAND_GET_SINK_INPUT_INFO)
|
2006-01-11 01:17:39 +00:00
|
|
|
si = pa_idxset_get_by_index(c->protocol->core->sink_inputs, idx);
|
2004-08-19 23:14:59 +00:00
|
|
|
else if (command == PA_COMMAND_GET_SOURCE_OUTPUT_INFO)
|
2006-01-11 01:17:39 +00:00
|
|
|
so = pa_idxset_get_by_index(c->protocol->core->source_outputs, idx);
|
2004-08-19 23:14:59 +00:00
|
|
|
else {
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(command == PA_COMMAND_GET_SAMPLE_INFO);
|
2006-02-22 18:54:21 +00:00
|
|
|
if (idx != PA_INVALID_INDEX)
|
2006-01-11 01:17:39 +00:00
|
|
|
sce = pa_idxset_get_by_index(c->protocol->core->scache, idx);
|
2004-08-19 23:14:59 +00:00
|
|
|
else
|
|
|
|
|
sce = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SAMPLE, 0);
|
2004-08-05 19:53:57 +00:00
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-08-19 23:14:59 +00:00
|
|
|
if (!sink && !source && !client && !module && !si && !so && !sce) {
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_NOENTITY);
|
2004-08-05 19:53:57 +00:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2004-08-05 19:53:57 +00:00
|
|
|
if (sink)
|
2007-11-21 22:55:28 +00:00
|
|
|
sink_fill_tagstruct(c, reply, sink);
|
2004-08-12 23:25:28 +00:00
|
|
|
else if (source)
|
2007-11-21 22:55:28 +00:00
|
|
|
source_fill_tagstruct(c, reply, source);
|
2004-08-12 23:25:28 +00:00
|
|
|
else if (client)
|
|
|
|
|
client_fill_tagstruct(reply, client);
|
2004-08-16 19:55:02 +00:00
|
|
|
else if (module)
|
2004-08-12 23:25:28 +00:00
|
|
|
module_fill_tagstruct(reply, module);
|
2004-08-16 19:55:02 +00:00
|
|
|
else if (si)
|
2007-10-28 19:13:50 +00:00
|
|
|
sink_input_fill_tagstruct(c, reply, si);
|
2004-08-19 23:14:59 +00:00
|
|
|
else if (so)
|
2007-11-21 22:55:28 +00:00
|
|
|
source_output_fill_tagstruct(c, reply, so);
|
2004-08-19 23:14:59 +00:00
|
|
|
else
|
2007-11-21 22:55:28 +00:00
|
|
|
scache_fill_tagstruct(c, reply, sce);
|
2004-08-05 19:53:57 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_get_info_list(PA_GCC_UNUSED pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_idxset *i;
|
|
|
|
|
uint32_t idx;
|
2004-08-05 19:53:57 +00:00
|
|
|
void *p;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-08-05 19:53:57 +00:00
|
|
|
|
|
|
|
|
if (!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
|
|
|
|
|
reply = reply_new(tag);
|
2004-08-05 19:53:57 +00:00
|
|
|
|
|
|
|
|
if (command == PA_COMMAND_GET_SINK_INFO_LIST)
|
|
|
|
|
i = c->protocol->core->sinks;
|
2004-08-12 23:25:28 +00:00
|
|
|
else if (command == PA_COMMAND_GET_SOURCE_INFO_LIST)
|
2004-08-05 19:53:57 +00:00
|
|
|
i = c->protocol->core->sources;
|
2004-08-12 23:25:28 +00:00
|
|
|
else if (command == PA_COMMAND_GET_CLIENT_INFO_LIST)
|
|
|
|
|
i = c->protocol->core->clients;
|
2004-08-16 19:55:02 +00:00
|
|
|
else if (command == PA_COMMAND_GET_MODULE_INFO_LIST)
|
2004-08-12 23:25:28 +00:00
|
|
|
i = c->protocol->core->modules;
|
2004-08-16 19:55:02 +00:00
|
|
|
else if (command == PA_COMMAND_GET_SINK_INPUT_INFO_LIST)
|
|
|
|
|
i = c->protocol->core->sink_inputs;
|
2004-08-19 23:14:59 +00:00
|
|
|
else if (command == PA_COMMAND_GET_SOURCE_OUTPUT_INFO_LIST)
|
2004-08-16 19:55:02 +00:00
|
|
|
i = c->protocol->core->source_outputs;
|
2004-08-19 23:14:59 +00:00
|
|
|
else {
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(command == PA_COMMAND_GET_SAMPLE_INFO_LIST);
|
2004-08-19 23:14:59 +00:00
|
|
|
i = c->protocol->core->scache;
|
2004-08-05 19:53:57 +00:00
|
|
|
}
|
2004-08-20 10:54:31 +00:00
|
|
|
|
|
|
|
|
if (i) {
|
2006-01-11 01:17:39 +00:00
|
|
|
for (p = pa_idxset_first(i, &idx); p; p = pa_idxset_next(i, &idx)) {
|
2004-08-20 10:54:31 +00:00
|
|
|
if (command == PA_COMMAND_GET_SINK_INFO_LIST)
|
2007-11-21 22:55:28 +00:00
|
|
|
sink_fill_tagstruct(c, reply, p);
|
2004-08-20 10:54:31 +00:00
|
|
|
else if (command == PA_COMMAND_GET_SOURCE_INFO_LIST)
|
2007-11-21 22:55:28 +00:00
|
|
|
source_fill_tagstruct(c, reply, p);
|
2004-08-20 10:54:31 +00:00
|
|
|
else if (command == PA_COMMAND_GET_CLIENT_INFO_LIST)
|
|
|
|
|
client_fill_tagstruct(reply, p);
|
|
|
|
|
else if (command == PA_COMMAND_GET_MODULE_INFO_LIST)
|
|
|
|
|
module_fill_tagstruct(reply, p);
|
|
|
|
|
else if (command == PA_COMMAND_GET_SINK_INPUT_INFO_LIST)
|
2007-10-28 19:13:50 +00:00
|
|
|
sink_input_fill_tagstruct(c, reply, p);
|
2007-01-04 13:43:45 +00:00
|
|
|
else if (command == PA_COMMAND_GET_SOURCE_OUTPUT_INFO_LIST)
|
2007-11-21 22:55:28 +00:00
|
|
|
source_output_fill_tagstruct(c, reply, p);
|
2004-08-20 10:54:31 +00:00
|
|
|
else {
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(command == PA_COMMAND_GET_SAMPLE_INFO_LIST);
|
2007-11-21 22:55:28 +00:00
|
|
|
scache_fill_tagstruct(c, reply, p);
|
2004-08-20 10:54:31 +00:00
|
|
|
}
|
2004-08-05 19:53:57 +00:00
|
|
|
}
|
2004-08-20 10:54:31 +00:00
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-08-05 19:53:57 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_get_server_info(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2004-08-10 13:00:12 +00:00
|
|
|
char txt[256];
|
2004-09-07 14:58:42 +00:00
|
|
|
const char *n;
|
2007-11-21 22:55:28 +00:00
|
|
|
pa_sample_spec fixed_ss;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-08-10 13:00:12 +00:00
|
|
|
|
|
|
|
|
if (!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2004-08-10 13:00:12 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2004-08-10 13:00:12 +00:00
|
|
|
pa_tagstruct_puts(reply, PACKAGE_NAME);
|
|
|
|
|
pa_tagstruct_puts(reply, PACKAGE_VERSION);
|
|
|
|
|
pa_tagstruct_puts(reply, pa_get_user_name(txt, sizeof(txt)));
|
2004-11-17 00:05:25 +00:00
|
|
|
pa_tagstruct_puts(reply, pa_get_fqdn(txt, sizeof(txt)));
|
2007-11-21 22:55:28 +00:00
|
|
|
|
|
|
|
|
fixup_sample_spec(c, &fixed_ss, &c->protocol->core->default_sample_spec);
|
|
|
|
|
pa_tagstruct_put_sample_spec(reply, &fixed_ss);
|
2004-09-07 14:58:42 +00:00
|
|
|
|
|
|
|
|
n = pa_namereg_get_default_sink_name(c->protocol->core);
|
2004-09-19 23:12:41 +00:00
|
|
|
pa_tagstruct_puts(reply, n);
|
2004-09-07 14:58:42 +00:00
|
|
|
n = pa_namereg_get_default_source_name(c->protocol->core);
|
2004-09-19 23:12:41 +00:00
|
|
|
pa_tagstruct_puts(reply, n);
|
2004-12-12 22:58:53 +00:00
|
|
|
|
|
|
|
|
pa_tagstruct_putu32(reply, c->protocol->core->cookie);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-08-10 13:00:12 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-27 16:25:31 +00:00
|
|
|
static void subscription_cb(pa_core *core, pa_subscription_event_type_t e, uint32_t idx, void *userdata) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *t;
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
2004-08-11 15:11:26 +00:00
|
|
|
|
|
|
|
|
t = pa_tagstruct_new(NULL, 0);
|
|
|
|
|
pa_tagstruct_putu32(t, PA_COMMAND_SUBSCRIBE_EVENT);
|
|
|
|
|
pa_tagstruct_putu32(t, (uint32_t) -1);
|
|
|
|
|
pa_tagstruct_putu32(t, e);
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct_putu32(t, idx);
|
2004-08-11 15:11:26 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, t);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_subscribe(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_subscription_mask_t m;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-08-11 15:11:26 +00:00
|
|
|
|
|
|
|
|
if (pa_tagstruct_getu32(t, &m) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, (m & ~PA_SUBSCRIPTION_MASK_ALL) == 0, tag, PA_ERR_INVALID);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-08-11 15:11:26 +00:00
|
|
|
if (c->subscription)
|
|
|
|
|
pa_subscription_free(c->subscription);
|
|
|
|
|
|
|
|
|
|
if (m != 0) {
|
|
|
|
|
c->subscription = pa_subscription_new(c->protocol->core, m, subscription_cb, c);
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(c->subscription);
|
2004-08-11 15:11:26 +00:00
|
|
|
} else
|
|
|
|
|
c->subscription = NULL;
|
|
|
|
|
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
2004-08-15 13:15:51 +00:00
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
static void command_set_volume(
|
|
|
|
|
PA_GCC_UNUSED pa_pdispatch *pd,
|
|
|
|
|
uint32_t command,
|
|
|
|
|
uint32_t tag,
|
|
|
|
|
pa_tagstruct *t,
|
|
|
|
|
void *userdata) {
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-27 16:25:31 +00:00
|
|
|
uint32_t idx;
|
|
|
|
|
pa_cvolume volume;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sink *sink = NULL;
|
2006-02-22 14:11:23 +00:00
|
|
|
pa_source *source = NULL;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sink_input *si = NULL;
|
2004-08-15 13:15:51 +00:00
|
|
|
const char *name = NULL;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-08-15 13:15:51 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-08-15 13:15:51 +00:00
|
|
|
(command == PA_COMMAND_SET_SINK_VOLUME && pa_tagstruct_gets(t, &name) < 0) ||
|
2006-02-22 14:11:23 +00:00
|
|
|
(command == PA_COMMAND_SET_SOURCE_VOLUME && pa_tagstruct_gets(t, &name) < 0) ||
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_tagstruct_get_cvolume(t, &volume) ||
|
2004-08-15 13:15:51 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, idx != PA_INVALID_INDEX || !name || (*name && pa_utf8_valid(name)), tag, PA_ERR_INVALID);
|
2006-04-23 21:01:44 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, pa_cvolume_valid(&volume), tag, PA_ERR_INVALID);
|
2004-08-15 13:15:51 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
switch (command) {
|
|
|
|
|
|
|
|
|
|
case PA_COMMAND_SET_SINK_VOLUME:
|
|
|
|
|
if (idx != PA_INVALID_INDEX)
|
|
|
|
|
sink = pa_idxset_get_by_index(c->protocol->core->sinks, idx);
|
|
|
|
|
else
|
|
|
|
|
sink = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SINK, 1);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case PA_COMMAND_SET_SOURCE_VOLUME:
|
|
|
|
|
if (idx != PA_INVALID_INDEX)
|
|
|
|
|
source = pa_idxset_get_by_index(c->protocol->core->sources, idx);
|
|
|
|
|
else
|
|
|
|
|
source = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SOURCE, 1);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case PA_COMMAND_SET_SINK_INPUT_VOLUME:
|
|
|
|
|
si = pa_idxset_get_by_index(c->protocol->core->sink_inputs, idx);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
pa_assert_not_reached();
|
2004-08-15 13:15:51 +00:00
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, si || sink || source, tag, PA_ERR_NOENTITY);
|
2004-08-15 13:15:51 +00:00
|
|
|
|
|
|
|
|
if (sink)
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_sink_set_volume(sink, &volume);
|
2006-02-22 14:11:23 +00:00
|
|
|
else if (source)
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_source_set_volume(source, &volume);
|
2004-08-15 13:15:51 +00:00
|
|
|
else if (si)
|
2006-01-27 16:25:31 +00:00
|
|
|
pa_sink_input_set_volume(si, &volume);
|
2004-08-15 13:15:51 +00:00
|
|
|
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
2004-08-11 15:11:26 +00:00
|
|
|
}
|
|
|
|
|
|
2006-02-23 12:04:31 +00:00
|
|
|
static void command_set_mute(
|
|
|
|
|
PA_GCC_UNUSED pa_pdispatch *pd,
|
|
|
|
|
uint32_t command,
|
|
|
|
|
uint32_t tag,
|
|
|
|
|
pa_tagstruct *t,
|
|
|
|
|
void *userdata) {
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-02-23 12:04:31 +00:00
|
|
|
uint32_t idx;
|
|
|
|
|
int mute;
|
|
|
|
|
pa_sink *sink = NULL;
|
|
|
|
|
pa_source *source = NULL;
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_sink_input *si = NULL;
|
2006-02-23 12:04:31 +00:00
|
|
|
const char *name = NULL;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2006-02-23 12:04:31 +00:00
|
|
|
|
|
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2007-10-28 19:13:50 +00:00
|
|
|
(command == PA_COMMAND_SET_SINK_MUTE && pa_tagstruct_gets(t, &name) < 0) ||
|
|
|
|
|
(command == PA_COMMAND_SET_SOURCE_MUTE && pa_tagstruct_gets(t, &name) < 0) ||
|
2006-02-23 12:04:31 +00:00
|
|
|
pa_tagstruct_get_boolean(t, &mute) ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-23 12:04:31 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, idx != PA_INVALID_INDEX || !name || (*name && pa_utf8_valid(name)), tag, PA_ERR_INVALID);
|
2006-02-23 12:04:31 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
switch (command) {
|
|
|
|
|
|
|
|
|
|
case PA_COMMAND_SET_SINK_MUTE:
|
|
|
|
|
|
|
|
|
|
if (idx != PA_INVALID_INDEX)
|
|
|
|
|
sink = pa_idxset_get_by_index(c->protocol->core->sinks, idx);
|
|
|
|
|
else
|
|
|
|
|
sink = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SINK, 1);
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case PA_COMMAND_SET_SOURCE_MUTE:
|
|
|
|
|
if (idx != PA_INVALID_INDEX)
|
|
|
|
|
source = pa_idxset_get_by_index(c->protocol->core->sources, idx);
|
|
|
|
|
else
|
|
|
|
|
source = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SOURCE, 1);
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case PA_COMMAND_SET_SINK_INPUT_MUTE:
|
|
|
|
|
si = pa_idxset_get_by_index(c->protocol->core->sink_inputs, idx);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
pa_assert_not_reached();
|
2006-02-23 12:04:31 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, si || sink || source, tag, PA_ERR_NOENTITY);
|
2006-02-23 12:04:31 +00:00
|
|
|
|
|
|
|
|
if (sink)
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_sink_set_mute(sink, mute);
|
2006-02-23 12:04:31 +00:00
|
|
|
else if (source)
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_source_set_mute(source, mute);
|
|
|
|
|
else if (si)
|
|
|
|
|
pa_sink_input_set_mute(si, mute);
|
2006-02-23 12:04:31 +00:00
|
|
|
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_cork_playback_stream(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
2004-09-26 17:02:26 +00:00
|
|
|
int b;
|
2007-10-28 19:13:50 +00:00
|
|
|
playback_stream *s;
|
|
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-08-22 21:13:58 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-09-26 17:02:26 +00:00
|
|
|
pa_tagstruct_get_boolean(t, &b) < 0 ||
|
2004-08-22 21:13:58 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, idx != PA_INVALID_INDEX, tag, PA_ERR_INVALID);
|
|
|
|
|
s = pa_idxset_get_by_index(c->output_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2007-10-28 19:13:50 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, playback_stream_isinstance(s), tag, PA_ERR_NOENTITY);
|
2006-02-20 04:05:16 +00:00
|
|
|
|
2004-08-22 21:13:58 +00:00
|
|
|
pa_sink_input_cork(s->sink_input, b);
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
2007-01-04 13:43:45 +00:00
|
|
|
}
|
2006-02-20 04:05:16 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void command_trigger_or_flush_or_prebuf_playback_stream(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
|
|
|
|
connection *c = CONNECTION(userdata);
|
2006-02-20 04:05:16 +00:00
|
|
|
uint32_t idx;
|
2007-10-28 19:13:50 +00:00
|
|
|
playback_stream *s;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-08-22 21:13:58 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-08-22 21:13:58 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, idx != PA_INVALID_INDEX, tag, PA_ERR_INVALID);
|
|
|
|
|
s = pa_idxset_get_by_index(c->output_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2007-10-28 19:13:50 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, playback_stream_isinstance(s), tag, PA_ERR_NOENTITY);
|
2004-08-22 21:13:58 +00:00
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
switch (command) {
|
2007-10-28 19:13:50 +00:00
|
|
|
case PA_COMMAND_FLUSH_PLAYBACK_STREAM:
|
|
|
|
|
pa_asyncmsgq_send(s->sink_input->sink->asyncmsgq, PA_MSGOBJECT(s->sink_input), SINK_INPUT_MESSAGE_FLUSH, NULL, 0, NULL);
|
|
|
|
|
break;
|
|
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
case PA_COMMAND_PREBUF_PLAYBACK_STREAM:
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_asyncmsgq_send(s->sink_input->sink->asyncmsgq, PA_MSGOBJECT(s->sink_input), SINK_INPUT_MESSAGE_PREBUF_FORCE, NULL, 0, NULL);
|
2006-02-20 04:05:16 +00:00
|
|
|
break;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
case PA_COMMAND_TRIGGER_PLAYBACK_STREAM:
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_asyncmsgq_send(s->sink_input->sink->asyncmsgq, PA_MSGOBJECT(s->sink_input), SINK_INPUT_MESSAGE_TRIGGER, NULL, 0, NULL);
|
2006-02-20 04:05:16 +00:00
|
|
|
break;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
default:
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert_not_reached();
|
2004-08-27 01:29:49 +00:00
|
|
|
}
|
|
|
|
|
|
2004-08-22 21:13:58 +00:00
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
2004-08-15 13:15:51 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_cork_record_stream(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream *s;
|
2004-09-26 17:02:26 +00:00
|
|
|
int b;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-26 17:02:26 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-09-26 17:02:26 +00:00
|
|
|
pa_tagstruct_get_boolean(t, &b) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
s = pa_idxset_get_by_index(c->record_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2004-09-26 17:02:26 +00:00
|
|
|
|
|
|
|
|
pa_source_output_cork(s->source_output, b);
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_memblockq_prebuf_force(s->memblockq);
|
2004-09-26 17:02:26 +00:00
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_flush_record_stream(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream *s;
|
|
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-26 17:02:26 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-09-26 17:02:26 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
s = pa_idxset_get_by_index(c->record_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2004-09-26 17:02:26 +00:00
|
|
|
|
|
|
|
|
pa_memblockq_flush(s->memblockq);
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2007-11-21 01:30:40 +00:00
|
|
|
static void command_set_stream_buffer_attr(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
|
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
uint32_t idx;
|
|
|
|
|
uint32_t maxlength, tlength, prebuf, minreq, fragsize;
|
|
|
|
|
pa_tagstruct *reply;
|
|
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
|
|
|
|
|
|
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
|
|
|
|
|
if (command == PA_COMMAND_SET_PLAYBACK_STREAM_BUFFER_ATTR) {
|
|
|
|
|
playback_stream *s;
|
|
|
|
|
|
|
|
|
|
s = pa_idxset_get_by_index(c->output_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, playback_stream_isinstance(s), tag, PA_ERR_NOENTITY);
|
|
|
|
|
|
|
|
|
|
if (pa_tagstruct_get(
|
|
|
|
|
t,
|
|
|
|
|
PA_TAG_U32, &maxlength,
|
|
|
|
|
PA_TAG_U32, &tlength,
|
|
|
|
|
PA_TAG_U32, &prebuf,
|
|
|
|
|
PA_TAG_U32, &minreq,
|
|
|
|
|
PA_TAG_INVALID) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, maxlength > 0, tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, maxlength <= MAX_MEMBLOCKQ_LENGTH, tag, PA_ERR_INVALID);
|
|
|
|
|
|
|
|
|
|
pa_memblockq_set_maxlength(s->memblockq, maxlength);
|
|
|
|
|
pa_memblockq_set_tlength(s->memblockq, tlength);
|
|
|
|
|
pa_memblockq_set_prebuf(s->memblockq, prebuf);
|
|
|
|
|
pa_memblockq_set_minreq(s->memblockq, minreq);
|
|
|
|
|
|
|
|
|
|
reply = reply_new(tag);
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) pa_memblockq_get_maxlength(s->memblockq));
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) pa_memblockq_get_tlength(s->memblockq));
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) pa_memblockq_get_prebuf(s->memblockq));
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) pa_memblockq_get_minreq(s->memblockq));
|
|
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
record_stream *s;
|
|
|
|
|
size_t base;
|
|
|
|
|
pa_assert(command == PA_COMMAND_SET_RECORD_STREAM_BUFFER_ATTR);
|
|
|
|
|
|
|
|
|
|
s = pa_idxset_get_by_index(c->record_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
|
|
|
|
|
|
|
|
|
if (pa_tagstruct_get(
|
|
|
|
|
t,
|
|
|
|
|
PA_TAG_U32, &maxlength,
|
|
|
|
|
PA_TAG_U32, &fragsize,
|
|
|
|
|
PA_TAG_INVALID) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, maxlength > 0, tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, maxlength <= MAX_MEMBLOCKQ_LENGTH, tag, PA_ERR_INVALID);
|
|
|
|
|
|
|
|
|
|
pa_memblockq_set_maxlength(s->memblockq, maxlength);
|
|
|
|
|
|
|
|
|
|
base = pa_frame_size(&s->source_output->sample_spec);
|
|
|
|
|
s->fragment_size = (fragsize/base)*base;
|
|
|
|
|
if (s->fragment_size <= 0)
|
|
|
|
|
s->fragment_size = base;
|
|
|
|
|
|
|
|
|
|
if (s->fragment_size > pa_memblockq_get_maxlength(s->memblockq))
|
|
|
|
|
s->fragment_size = pa_memblockq_get_maxlength(s->memblockq);
|
|
|
|
|
|
|
|
|
|
reply = reply_new(tag);
|
|
|
|
|
pa_tagstruct_putu32(reply, (uint32_t) pa_memblockq_get_maxlength(s->memblockq));
|
|
|
|
|
pa_tagstruct_putu32(reply, s->fragment_size);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void command_update_stream_sample_rate(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
|
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
uint32_t idx;
|
|
|
|
|
uint32_t rate;
|
|
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
|
|
|
|
|
|
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
|
|
|
|
pa_tagstruct_getu32(t, &rate) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, rate > 0 && rate <= PA_RATE_MAX, tag, PA_ERR_INVALID);
|
|
|
|
|
|
|
|
|
|
if (command == PA_COMMAND_UPDATE_PLAYBACK_STREAM_SAMPLE_RATE) {
|
|
|
|
|
playback_stream *s;
|
|
|
|
|
|
|
|
|
|
s = pa_idxset_get_by_index(c->output_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, playback_stream_isinstance(s), tag, PA_ERR_NOENTITY);
|
|
|
|
|
|
|
|
|
|
pa_sink_input_set_rate(s->sink_input, rate);
|
|
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
record_stream *s;
|
|
|
|
|
pa_assert(command == PA_COMMAND_UPDATE_RECORD_STREAM_SAMPLE_RATE);
|
|
|
|
|
|
|
|
|
|
s = pa_idxset_get_by_index(c->record_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
|
|
|
|
|
|
|
|
|
pa_source_output_set_rate(s->source_output, rate);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_set_default_sink_or_source(PA_GCC_UNUSED pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2004-09-06 21:55:09 +00:00
|
|
|
const char *s;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-06 21:55:09 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
if (pa_tagstruct_gets(t, &s) < 0 ||
|
2004-09-06 21:55:09 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, !s || (*s && pa_utf8_valid(s)), tag, PA_ERR_INVALID);
|
2004-09-06 21:55:09 +00:00
|
|
|
|
|
|
|
|
pa_namereg_set_default(c->protocol->core, s, command == PA_COMMAND_SET_DEFAULT_SOURCE ? PA_NAMEREG_SOURCE : PA_NAMEREG_SINK);
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_set_stream_name(PA_GCC_UNUSED pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
2004-09-15 19:16:57 +00:00
|
|
|
const char *name;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2006-02-22 18:54:21 +00:00
|
|
|
pa_tagstruct_gets(t, &name) < 0 ||
|
2004-09-15 19:16:57 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, name && pa_utf8_valid(name), tag, PA_ERR_INVALID);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
|
|
|
|
if (command == PA_COMMAND_SET_PLAYBACK_STREAM_NAME) {
|
2007-10-28 19:13:50 +00:00
|
|
|
playback_stream *s;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
s = pa_idxset_get_by_index(c->output_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2007-10-28 19:13:50 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, playback_stream_isinstance(s), tag, PA_ERR_NOENTITY);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
|
|
|
|
pa_sink_input_set_name(s->sink_input, name);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-15 19:16:57 +00:00
|
|
|
} else {
|
2007-10-28 19:13:50 +00:00
|
|
|
record_stream *s;
|
2007-11-21 01:30:40 +00:00
|
|
|
pa_assert(command == PA_COMMAND_SET_RECORD_STREAM_NAME);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
s = pa_idxset_get_by_index(c->record_streams, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
|
|
|
|
pa_source_output_set_name(s->source_output, name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_kill(PA_GCC_UNUSED pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-09-15 19:16:57 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2006-02-22 18:54:21 +00:00
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
|
|
|
|
if (command == PA_COMMAND_KILL_CLIENT) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_client *client;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
client = pa_idxset_get_by_index(c->protocol->core->clients, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, client, tag, PA_ERR_NOENTITY);
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_ref(c);
|
2004-09-15 19:16:57 +00:00
|
|
|
pa_client_kill(client);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-15 19:16:57 +00:00
|
|
|
} else if (command == PA_COMMAND_KILL_SINK_INPUT) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_sink_input *s;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
s = pa_idxset_get_by_index(c->protocol->core->sink_inputs, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_ref(c);
|
2004-09-15 19:16:57 +00:00
|
|
|
pa_sink_input_kill(s);
|
|
|
|
|
} else {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_source_output *s;
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(command == PA_COMMAND_KILL_SOURCE_OUTPUT);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
s = pa_idxset_get_by_index(c->protocol->core->source_outputs, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, s, tag, PA_ERR_NOENTITY);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_ref(c);
|
2004-09-15 19:16:57 +00:00
|
|
|
pa_source_output_kill(s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_unref(c);
|
2004-09-15 19:16:57 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_load_module(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_module *m;
|
2004-09-15 19:16:57 +00:00
|
|
|
const char *name, *argument;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
if (pa_tagstruct_gets(t, &name) < 0 ||
|
2004-09-15 19:16:57 +00:00
|
|
|
pa_tagstruct_gets(t, &argument) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2006-02-22 18:54:21 +00:00
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, name && *name && pa_utf8_valid(name) && !strchr(name, '/'), tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, !argument || pa_utf8_valid(argument), tag, PA_ERR_INVALID);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-15 19:16:57 +00:00
|
|
|
if (!(m = pa_module_load(c->protocol->core, name, argument))) {
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_MODINITFAILED);
|
2004-09-15 19:16:57 +00:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2004-09-15 19:16:57 +00:00
|
|
|
pa_tagstruct_putu32(reply, m->index);
|
|
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_unload_module(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
|
|
|
|
pa_module *m;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
2004-09-15 19:16:57 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
m = pa_idxset_get_by_index(c->protocol->core->modules, idx);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, m, tag, PA_ERR_NOENTITY);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
|
|
|
|
pa_module_unload_request(m);
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_add_autoload(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2004-09-15 19:16:57 +00:00
|
|
|
const char *name, *module, *argument;
|
|
|
|
|
uint32_t type;
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t idx;
|
|
|
|
|
pa_tagstruct *reply;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2007-01-04 13:43:45 +00:00
|
|
|
if (pa_tagstruct_gets(t, &name) < 0 ||
|
|
|
|
|
pa_tagstruct_getu32(t, &type) < 0 ||
|
|
|
|
|
pa_tagstruct_gets(t, &module) < 0 ||
|
2004-09-15 19:16:57 +00:00
|
|
|
pa_tagstruct_gets(t, &argument) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, name && *name && pa_utf8_valid(name), tag, PA_ERR_INVALID);
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, type == 0 || type == 1, tag, PA_ERR_INVALID);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, module && *module && pa_utf8_valid(module), tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, !argument || pa_utf8_valid(argument), tag, PA_ERR_INVALID);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_autoload_add(c->protocol->core, name, type == 0 ? PA_NAMEREG_SINK : PA_NAMEREG_SOURCE, module, argument, &idx) < 0) {
|
2006-02-20 04:05:16 +00:00
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_EXIST);
|
2004-09-15 19:16:57 +00:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct_putu32(reply, idx);
|
2004-10-27 16:23:23 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
2004-09-15 19:16:57 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_remove_autoload(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2004-10-27 16:23:23 +00:00
|
|
|
const char *name = NULL;
|
2006-01-11 01:17:39 +00:00
|
|
|
uint32_t type, idx = PA_IDXSET_INVALID;
|
2004-10-27 16:23:23 +00:00
|
|
|
int r;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if ((pa_tagstruct_getu32(t, &idx) < 0 &&
|
2004-10-27 16:23:23 +00:00
|
|
|
(pa_tagstruct_gets(t, &name) < 0 ||
|
|
|
|
|
pa_tagstruct_getu32(t, &type) < 0)) ||
|
2004-09-15 19:16:57 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, name || idx != PA_IDXSET_INVALID, tag, PA_ERR_INVALID);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, !name || (*name && pa_utf8_valid(name) && (type == 0 || type == 1)), tag, PA_ERR_INVALID);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2007-01-04 13:43:45 +00:00
|
|
|
if (name)
|
2004-10-27 16:23:23 +00:00
|
|
|
r = pa_autoload_remove_by_name(c->protocol->core, name, type == 0 ? PA_NAMEREG_SINK : PA_NAMEREG_SOURCE);
|
|
|
|
|
else
|
2006-01-11 01:17:39 +00:00
|
|
|
r = pa_autoload_remove_by_index(c->protocol->core, idx);
|
2004-10-27 16:23:23 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, r >= 0, tag, PA_ERR_NOENTITY);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void autoload_fill_tagstruct(pa_tagstruct *t, const pa_autoload_entry *e) {
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(t && e);
|
2004-10-27 16:23:23 +00:00
|
|
|
|
|
|
|
|
pa_tagstruct_putu32(t, e->index);
|
2004-09-15 19:16:57 +00:00
|
|
|
pa_tagstruct_puts(t, e->name);
|
|
|
|
|
pa_tagstruct_putu32(t, e->type == PA_NAMEREG_SINK ? 0 : 1);
|
|
|
|
|
pa_tagstruct_puts(t, e->module);
|
|
|
|
|
pa_tagstruct_puts(t, e->argument);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_get_autoload_info(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
const pa_autoload_entry *a = NULL;
|
|
|
|
|
uint32_t type, idx;
|
2004-09-15 19:16:57 +00:00
|
|
|
const char *name;
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-10-27 16:23:23 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if ((pa_tagstruct_getu32(t, &idx) < 0 &&
|
2004-10-27 16:23:23 +00:00
|
|
|
(pa_tagstruct_gets(t, &name) < 0 ||
|
|
|
|
|
pa_tagstruct_getu32(t, &type) < 0)) ||
|
2004-09-15 19:16:57 +00:00
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, name || idx != PA_IDXSET_INVALID, tag, PA_ERR_INVALID);
|
2006-05-14 16:02:40 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, !name || (*name && (type == 0 || type == 1) && pa_utf8_valid(name)), tag, PA_ERR_INVALID);
|
2004-10-27 16:23:23 +00:00
|
|
|
|
|
|
|
|
if (name)
|
|
|
|
|
a = pa_autoload_get_by_name(c->protocol->core, name, type == 0 ? PA_NAMEREG_SINK : PA_NAMEREG_SOURCE);
|
|
|
|
|
else
|
2006-01-11 01:17:39 +00:00
|
|
|
a = pa_autoload_get_by_index(c->protocol->core, idx);
|
2004-10-27 16:23:23 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, a, tag, PA_ERR_NOENTITY);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2004-09-15 19:16:57 +00:00
|
|
|
autoload_fill_tagstruct(reply, a);
|
|
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void command_get_autoload_info_list(PA_GCC_UNUSED pa_pdispatch *pd, PA_GCC_UNUSED uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_tagstruct *reply;
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
|
|
|
|
if (!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
reply = reply_new(tag);
|
2004-09-15 19:16:57 +00:00
|
|
|
|
|
|
|
|
if (c->protocol->core->autoload_hashmap) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_autoload_entry *a;
|
2004-09-15 19:16:57 +00:00
|
|
|
void *state = NULL;
|
|
|
|
|
|
2004-10-30 01:55:16 +00:00
|
|
|
while ((a = pa_hashmap_iterate(c->protocol->core->autoload_hashmap, &state, NULL)))
|
2004-09-15 19:16:57 +00:00
|
|
|
autoload_fill_tagstruct(reply, a);
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-15 19:16:57 +00:00
|
|
|
pa_pstream_send_tagstruct(c->pstream, reply);
|
|
|
|
|
}
|
|
|
|
|
|
2006-07-31 21:54:46 +00:00
|
|
|
static void command_move_stream(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2006-07-31 21:54:46 +00:00
|
|
|
uint32_t idx = PA_INVALID_INDEX, idx_device = PA_INVALID_INDEX;
|
|
|
|
|
const char *name = NULL;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
2006-07-31 21:54:46 +00:00
|
|
|
|
|
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
|
|
|
|
pa_tagstruct_getu32(t, &idx_device) < 0 ||
|
|
|
|
|
pa_tagstruct_gets(t, &name) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-07-31 21:54:46 +00:00
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, idx != PA_INVALID_INDEX, tag, PA_ERR_INVALID);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, idx_device != PA_INVALID_INDEX || !name || (*name && pa_utf8_valid(name)), tag, PA_ERR_INVALID);
|
|
|
|
|
|
2006-08-03 22:32:23 +00:00
|
|
|
if (command == PA_COMMAND_MOVE_SINK_INPUT) {
|
|
|
|
|
pa_sink_input *si = NULL;
|
|
|
|
|
pa_sink *sink = NULL;
|
2006-07-31 21:54:46 +00:00
|
|
|
|
2006-08-03 22:32:23 +00:00
|
|
|
si = pa_idxset_get_by_index(c->protocol->core->sink_inputs, idx);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-08-03 22:32:23 +00:00
|
|
|
if (idx_device != PA_INVALID_INDEX)
|
|
|
|
|
sink = pa_idxset_get_by_index(c->protocol->core->sinks, idx_device);
|
|
|
|
|
else
|
|
|
|
|
sink = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SINK, 1);
|
|
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, si && sink, tag, PA_ERR_NOENTITY);
|
|
|
|
|
|
|
|
|
|
if (pa_sink_input_move_to(si, sink, 0) < 0) {
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_INVALID);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
pa_source_output *so = NULL;
|
|
|
|
|
pa_source *source;
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(command == PA_COMMAND_MOVE_SOURCE_OUTPUT);
|
|
|
|
|
|
2006-08-03 22:32:23 +00:00
|
|
|
so = pa_idxset_get_by_index(c->protocol->core->source_outputs, idx);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-08-03 22:32:23 +00:00
|
|
|
if (idx_device != PA_INVALID_INDEX)
|
|
|
|
|
source = pa_idxset_get_by_index(c->protocol->core->sources, idx_device);
|
|
|
|
|
else
|
|
|
|
|
source = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SOURCE, 1);
|
|
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, so && source, tag, PA_ERR_NOENTITY);
|
2006-07-31 21:54:46 +00:00
|
|
|
|
2006-08-03 22:32:23 +00:00
|
|
|
if (pa_source_output_move_to(so, source) < 0) {
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_INVALID);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-07-31 21:54:46 +00:00
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
2007-10-28 19:13:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void command_suspend(pa_pdispatch *pd, uint32_t command, uint32_t tag, pa_tagstruct *t, void *userdata) {
|
|
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
uint32_t idx = PA_INVALID_INDEX;
|
|
|
|
|
const char *name = NULL;
|
|
|
|
|
int b;
|
|
|
|
|
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(t);
|
|
|
|
|
|
|
|
|
|
if (pa_tagstruct_getu32(t, &idx) < 0 ||
|
|
|
|
|
pa_tagstruct_gets(t, &name) < 0 ||
|
|
|
|
|
pa_tagstruct_get_boolean(t, &b) < 0 ||
|
|
|
|
|
!pa_tagstruct_eof(t)) {
|
|
|
|
|
protocol_error(c);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, c->authorized, tag, PA_ERR_ACCESS);
|
|
|
|
|
CHECK_VALIDITY(c->pstream, idx != PA_INVALID_INDEX || !name || !*name || pa_utf8_valid(name), tag, PA_ERR_INVALID);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (command == PA_COMMAND_SUSPEND_SINK) {
|
|
|
|
|
|
|
|
|
|
if (idx == PA_INVALID_INDEX && name && !*name) {
|
|
|
|
|
|
|
|
|
|
if (pa_sink_suspend_all(c->protocol->core, b) < 0) {
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_INVALID);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
pa_sink *sink = NULL;
|
|
|
|
|
|
|
|
|
|
if (idx != PA_INVALID_INDEX)
|
|
|
|
|
sink = pa_idxset_get_by_index(c->protocol->core->sinks, idx);
|
|
|
|
|
else
|
|
|
|
|
sink = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SINK, 1);
|
|
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, sink, tag, PA_ERR_NOENTITY);
|
|
|
|
|
|
|
|
|
|
if (pa_sink_suspend(sink, b) < 0) {
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_INVALID);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
|
|
pa_assert(command == PA_COMMAND_SUSPEND_SOURCE);
|
|
|
|
|
|
|
|
|
|
if (idx == PA_INVALID_INDEX && name && !*name) {
|
|
|
|
|
|
|
|
|
|
if (pa_source_suspend_all(c->protocol->core, b) < 0) {
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_INVALID);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
pa_source *source;
|
|
|
|
|
|
|
|
|
|
if (idx != PA_INVALID_INDEX)
|
|
|
|
|
source = pa_idxset_get_by_index(c->protocol->core->sources, idx);
|
|
|
|
|
else
|
|
|
|
|
source = pa_namereg_get(c->protocol->core, name, PA_NAMEREG_SOURCE, 1);
|
|
|
|
|
|
|
|
|
|
CHECK_VALIDITY(c->pstream, source, tag, PA_ERR_NOENTITY);
|
|
|
|
|
|
|
|
|
|
if (pa_source_suspend(source, b) < 0) {
|
|
|
|
|
pa_pstream_send_error(c->pstream, tag, PA_ERR_INVALID);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pa_pstream_send_simple_ack(c->pstream, tag);
|
2006-07-31 21:54:46 +00:00
|
|
|
}
|
|
|
|
|
|
2004-06-23 23:17:30 +00:00
|
|
|
/*** pstream callbacks ***/
|
|
|
|
|
|
2006-07-19 21:48:35 +00:00
|
|
|
static void pstream_packet_callback(pa_pstream *p, pa_packet *packet, const pa_creds *creds, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
|
|
|
|
|
pa_assert(p);
|
|
|
|
|
pa_assert(packet);
|
|
|
|
|
connection_assert_ref(c);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2006-02-24 15:12:42 +00:00
|
|
|
if (pa_pdispatch_run(c->pdispatch, packet, creds, c) < 0) {
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log("invalid packet.");
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_unlink(c);
|
2004-06-23 23:17:30 +00:00
|
|
|
}
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
2006-02-20 04:05:16 +00:00
|
|
|
static void pstream_memblock_callback(pa_pstream *p, uint32_t channel, int64_t offset, pa_seek_mode_t seek, const pa_memchunk *chunk, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
output_stream *stream;
|
|
|
|
|
|
|
|
|
|
pa_assert(p);
|
|
|
|
|
pa_assert(chunk);
|
|
|
|
|
connection_assert_ref(c);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (!(stream = OUTPUT_STREAM(pa_idxset_get_by_index(c->output_streams, channel)))) {
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log("client sent block for invalid stream.");
|
2006-08-13 17:31:58 +00:00
|
|
|
/* Ignoring */
|
2004-07-07 00:22:46 +00:00
|
|
|
return;
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (playback_stream_isinstance(stream)) {
|
|
|
|
|
playback_stream *ps = PLAYBACK_STREAM(stream);
|
2006-02-20 04:05:16 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
if (seek != PA_SEEK_RELATIVE || offset != 0)
|
|
|
|
|
pa_asyncmsgq_post(ps->sink_input->sink->asyncmsgq, PA_MSGOBJECT(ps->sink_input), SINK_INPUT_MESSAGE_SEEK, PA_UINT_TO_PTR(seek), offset, NULL, NULL);
|
2006-02-20 04:05:16 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_asyncmsgq_post(ps->sink_input->sink->asyncmsgq, PA_MSGOBJECT(ps->sink_input), SINK_INPUT_MESSAGE_POST_DATA, NULL, 0, chunk, NULL);
|
2004-08-27 01:29:49 +00:00
|
|
|
|
2004-08-03 19:26:56 +00:00
|
|
|
} else {
|
2007-10-28 19:13:50 +00:00
|
|
|
upload_stream *u = UPLOAD_STREAM(stream);
|
2004-08-03 19:26:56 +00:00
|
|
|
size_t l;
|
|
|
|
|
|
|
|
|
|
if (!u->memchunk.memblock) {
|
|
|
|
|
if (u->length == chunk->length) {
|
|
|
|
|
u->memchunk = *chunk;
|
|
|
|
|
pa_memblock_ref(u->memchunk.memblock);
|
|
|
|
|
u->length = 0;
|
|
|
|
|
} else {
|
2006-08-18 19:55:18 +00:00
|
|
|
u->memchunk.memblock = pa_memblock_new(c->protocol->core->mempool, u->length);
|
2004-08-03 19:26:56 +00:00
|
|
|
u->memchunk.index = u->memchunk.length = 0;
|
|
|
|
|
}
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(u->memchunk.memblock);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
|
|
|
|
l = u->length;
|
2004-08-03 19:26:56 +00:00
|
|
|
if (l > chunk->length)
|
|
|
|
|
l = chunk->length;
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
|
2004-08-03 19:26:56 +00:00
|
|
|
if (l > 0) {
|
2007-10-28 19:13:50 +00:00
|
|
|
void *src, *dst;
|
|
|
|
|
dst = pa_memblock_acquire(u->memchunk.memblock);
|
|
|
|
|
src = pa_memblock_acquire(chunk->memblock);
|
|
|
|
|
|
|
|
|
|
memcpy((uint8_t*) dst + u->memchunk.index + u->memchunk.length,
|
|
|
|
|
(uint8_t*) src+chunk->index, l);
|
|
|
|
|
|
|
|
|
|
pa_memblock_release(u->memchunk.memblock);
|
|
|
|
|
pa_memblock_release(chunk->memblock);
|
|
|
|
|
|
2004-08-03 19:26:56 +00:00
|
|
|
u->memchunk.length += l;
|
|
|
|
|
u->length -= l;
|
|
|
|
|
}
|
|
|
|
|
}
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void pstream_die_callback(pa_pstream *p, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(p);
|
|
|
|
|
connection_assert_ref(c);
|
2004-06-08 23:54:24 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_unlink(c);
|
|
|
|
|
pa_log_info("connection died.");
|
|
|
|
|
}
|
2004-07-10 16:50:22 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void pstream_drain_callback(pa_pstream *p, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
|
|
|
|
|
pa_assert(p);
|
|
|
|
|
connection_assert_ref(c);
|
2004-07-10 16:50:22 +00:00
|
|
|
|
|
|
|
|
send_memblock(c);
|
|
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
static void pstream_revoke_callback(pa_pstream *p, uint32_t block_id, void *userdata) {
|
|
|
|
|
pa_thread_mq *q;
|
|
|
|
|
|
|
|
|
|
if (!(q = pa_thread_mq_get()))
|
|
|
|
|
pa_pstream_send_revoke(p, block_id);
|
|
|
|
|
else
|
|
|
|
|
pa_asyncmsgq_post(q->outq, PA_MSGOBJECT(userdata), CONNECTION_MESSAGE_REVOKE, PA_UINT_TO_PTR(block_id), 0, NULL, NULL);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void pstream_release_callback(pa_pstream *p, uint32_t block_id, void *userdata) {
|
|
|
|
|
pa_thread_mq *q;
|
|
|
|
|
|
|
|
|
|
if (!(q = pa_thread_mq_get()))
|
|
|
|
|
pa_pstream_send_release(p, block_id);
|
|
|
|
|
else
|
|
|
|
|
pa_asyncmsgq_post(q->outq, PA_MSGOBJECT(userdata), CONNECTION_MESSAGE_RELEASE, PA_UINT_TO_PTR(block_id), 0, NULL, NULL);
|
|
|
|
|
}
|
|
|
|
|
|
2004-07-06 00:08:44 +00:00
|
|
|
/*** client callbacks ***/
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void client_kill_cb(pa_client *c) {
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(c);
|
|
|
|
|
|
|
|
|
|
connection_unlink(CONNECTION(c->userdata));
|
2004-07-06 00:08:44 +00:00
|
|
|
}
|
|
|
|
|
|
2004-06-20 01:12:13 +00:00
|
|
|
/*** socket server callbacks ***/
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void auth_timeout(pa_mainloop_api*m, pa_time_event *e, const struct timeval *tv, void *userdata) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c = CONNECTION(userdata);
|
|
|
|
|
|
|
|
|
|
pa_assert(m);
|
|
|
|
|
pa_assert(tv);
|
|
|
|
|
connection_assert_ref(c);
|
|
|
|
|
pa_assert(c->auth_timeout_event == e);
|
2004-11-18 00:28:26 +00:00
|
|
|
|
|
|
|
|
if (!c->authorized)
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_unlink(c);
|
2004-11-18 00:28:26 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static void on_connection(PA_GCC_UNUSED pa_socket_server*s, pa_iochannel *io, void *userdata) {
|
|
|
|
|
pa_protocol_native *p = userdata;
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c;
|
2006-06-13 09:33:55 +00:00
|
|
|
char cname[256], pname[128];
|
2007-10-28 19:13:50 +00:00
|
|
|
|
|
|
|
|
pa_assert(s);
|
|
|
|
|
pa_assert(io);
|
|
|
|
|
pa_assert(p);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
if (pa_idxset_size(p->connections)+1 > MAX_CONNECTIONS) {
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log_warn("Warning! Too many connections (%u), dropping incoming connection.", MAX_CONNECTIONS);
|
2004-11-18 00:28:26 +00:00
|
|
|
pa_iochannel_free(io);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
c = pa_msgobject_new(connection);
|
|
|
|
|
c->parent.parent.free = connection_free;
|
|
|
|
|
c->parent.process_msg = connection_process_msg;
|
2004-09-14 23:08:39 +00:00
|
|
|
|
2006-07-20 18:43:20 +00:00
|
|
|
c->authorized = !!p->public;
|
2004-11-18 00:28:26 +00:00
|
|
|
|
2006-07-20 18:43:20 +00:00
|
|
|
if (!c->authorized && p->auth_ip_acl && pa_ip_acl_check(p->auth_ip_acl, pa_iochannel_get_recv_fd(io)) > 0) {
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log_info("Client authenticated by IP ACL.");
|
2006-07-20 18:43:20 +00:00
|
|
|
c->authorized = 1;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-11-18 00:28:26 +00:00
|
|
|
if (!c->authorized) {
|
|
|
|
|
struct timeval tv;
|
2006-01-10 17:51:06 +00:00
|
|
|
pa_gettimeofday(&tv);
|
2004-11-18 00:28:26 +00:00
|
|
|
tv.tv_sec += AUTH_TIMEOUT;
|
|
|
|
|
c->auth_timeout_event = p->core->mainloop->time_new(p->core->mainloop, &tv, auth_timeout, c);
|
|
|
|
|
} else
|
|
|
|
|
c->auth_timeout_event = NULL;
|
2006-05-25 23:20:28 +00:00
|
|
|
|
|
|
|
|
c->version = 8;
|
2004-06-20 01:12:13 +00:00
|
|
|
c->protocol = p;
|
2006-06-13 09:33:55 +00:00
|
|
|
pa_iochannel_socket_peer_to_string(io, pname, sizeof(pname));
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_snprintf(cname, sizeof(cname), "Native client (%s)", pname);
|
2006-06-13 09:33:55 +00:00
|
|
|
c->client = pa_client_new(p->core, __FILE__, cname);
|
2004-07-06 00:08:44 +00:00
|
|
|
c->client->kill = client_kill_cb;
|
|
|
|
|
c->client->userdata = c;
|
2004-07-10 20:56:38 +00:00
|
|
|
c->client->owner = p->module;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-08-18 19:55:18 +00:00
|
|
|
c->pstream = pa_pstream_new(p->core->mainloop, io, p->core->mempool);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2004-07-10 16:50:22 +00:00
|
|
|
pa_pstream_set_recieve_packet_callback(c->pstream, pstream_packet_callback, c);
|
|
|
|
|
pa_pstream_set_recieve_memblock_callback(c->pstream, pstream_memblock_callback, c);
|
|
|
|
|
pa_pstream_set_die_callback(c->pstream, pstream_die_callback, c);
|
|
|
|
|
pa_pstream_set_drain_callback(c->pstream, pstream_drain_callback, c);
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_pstream_set_revoke_callback(c->pstream, pstream_revoke_callback, c);
|
|
|
|
|
pa_pstream_set_release_callback(c->pstream, pstream_release_callback, c);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2004-07-03 23:35:12 +00:00
|
|
|
c->pdispatch = pa_pdispatch_new(p->core->mainloop, command_table, PA_COMMAND_MAX);
|
2004-06-23 23:17:30 +00:00
|
|
|
|
2004-07-03 23:35:12 +00:00
|
|
|
c->record_streams = pa_idxset_new(NULL, NULL);
|
2004-08-03 19:26:56 +00:00
|
|
|
c->output_streams = pa_idxset_new(NULL, NULL);
|
2004-06-20 01:12:13 +00:00
|
|
|
|
2004-07-10 16:50:22 +00:00
|
|
|
c->rrobin_index = PA_IDXSET_INVALID;
|
2004-08-11 15:11:26 +00:00
|
|
|
c->subscription = NULL;
|
2004-07-10 16:50:22 +00:00
|
|
|
|
2004-07-03 23:35:12 +00:00
|
|
|
pa_idxset_put(p->connections, c, NULL);
|
2006-02-24 15:12:42 +00:00
|
|
|
|
2006-07-19 21:48:35 +00:00
|
|
|
#ifdef HAVE_CREDS
|
2006-02-24 15:12:42 +00:00
|
|
|
if (pa_iochannel_creds_supported(io))
|
|
|
|
|
pa_iochannel_creds_enable(io);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-24 15:12:42 +00:00
|
|
|
#endif
|
2004-06-20 01:12:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*** module entry points ***/
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static int load_key(pa_protocol_native*p, const char*fn) {
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(p);
|
2004-11-07 20:48:46 +00:00
|
|
|
|
|
|
|
|
p->auth_cookie_in_property = 0;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-11-07 20:48:46 +00:00
|
|
|
if (!fn && pa_authkey_prop_get(p->core, PA_NATIVE_COOKIE_PROPERTY_NAME, p->auth_cookie, sizeof(p->auth_cookie)) >= 0) {
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log_info("using already loaded auth cookie.");
|
2004-11-07 20:48:46 +00:00
|
|
|
pa_authkey_prop_ref(p->core, PA_NATIVE_COOKIE_PROPERTY_NAME);
|
|
|
|
|
p->auth_cookie_in_property = 1;
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-11-07 20:48:46 +00:00
|
|
|
if (!fn)
|
|
|
|
|
fn = PA_NATIVE_COOKIE_FILE;
|
|
|
|
|
|
2004-11-21 21:31:28 +00:00
|
|
|
if (pa_authkey_load_auto(fn, p->auth_cookie, sizeof(p->auth_cookie)) < 0)
|
2004-11-07 20:48:46 +00:00
|
|
|
return -1;
|
|
|
|
|
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log_info("loading cookie from disk.");
|
2004-11-07 20:48:46 +00:00
|
|
|
|
|
|
|
|
if (pa_authkey_prop_put(p->core, PA_NATIVE_COOKIE_PROPERTY_NAME, p->auth_cookie, sizeof(p->auth_cookie)) >= 0)
|
|
|
|
|
p->auth_cookie_in_property = 1;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-11-07 20:48:46 +00:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
static pa_protocol_native* protocol_new_internal(pa_core *c, pa_module *m, pa_modargs *ma) {
|
|
|
|
|
pa_protocol_native *p;
|
2007-11-13 17:37:44 +00:00
|
|
|
pa_bool_t public = FALSE;
|
2006-07-20 18:43:20 +00:00
|
|
|
const char *acl;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_assert(c);
|
|
|
|
|
pa_assert(ma);
|
2004-06-08 23:54:24 +00:00
|
|
|
|
2006-02-24 17:14:23 +00:00
|
|
|
if (pa_modargs_get_value_boolean(ma, "auth-anonymous", &public) < 0) {
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log("auth-anonymous= expects a boolean argument.");
|
2004-07-11 22:20:08 +00:00
|
|
|
return NULL;
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-02-22 18:54:21 +00:00
|
|
|
p = pa_xnew(pa_protocol_native, 1);
|
2004-11-07 20:48:46 +00:00
|
|
|
p->core = c;
|
|
|
|
|
p->module = m;
|
|
|
|
|
p->public = public;
|
|
|
|
|
p->server = NULL;
|
2006-07-20 18:43:20 +00:00
|
|
|
p->auth_ip_acl = NULL;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-07-19 21:48:35 +00:00
|
|
|
#ifdef HAVE_CREDS
|
|
|
|
|
{
|
2007-11-13 17:37:44 +00:00
|
|
|
pa_bool_t a = 1;
|
2006-07-19 21:48:35 +00:00
|
|
|
if (pa_modargs_get_value_boolean(ma, "auth-group-enabled", &a) < 0) {
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log("auth-group-enabled= expects a boolean argument.");
|
2006-07-19 21:48:35 +00:00
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
p->auth_group = a ? pa_xstrdup(pa_modargs_get_value(ma, "auth-group", c->is_system_instance ? PA_ACCESS_GROUP : NULL)) : NULL;
|
|
|
|
|
|
|
|
|
|
if (p->auth_group)
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log_info("Allowing access to group '%s'.", p->auth_group);
|
2006-07-19 21:48:35 +00:00
|
|
|
}
|
2006-02-24 17:14:23 +00:00
|
|
|
#endif
|
2006-07-20 18:43:20 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
if ((acl = pa_modargs_get_value(ma, "auth-ip-acl", NULL))) {
|
|
|
|
|
|
|
|
|
|
if (!(p->auth_ip_acl = pa_ip_acl_new(acl))) {
|
2006-08-18 21:38:40 +00:00
|
|
|
pa_log("Failed to parse IP ACL '%s'", acl);
|
2006-07-20 18:43:20 +00:00
|
|
|
goto fail;
|
|
|
|
|
}
|
2004-07-06 00:08:44 +00:00
|
|
|
}
|
2004-07-10 20:56:38 +00:00
|
|
|
|
2006-07-20 18:43:20 +00:00
|
|
|
if (load_key(p, pa_modargs_get_value(ma, "cookie", NULL)) < 0)
|
|
|
|
|
goto fail;
|
|
|
|
|
|
2004-07-03 23:35:12 +00:00
|
|
|
p->connections = pa_idxset_new(NULL, NULL);
|
2004-06-08 23:54:24 +00:00
|
|
|
|
2004-09-01 21:12:27 +00:00
|
|
|
return p;
|
2006-07-20 18:43:20 +00:00
|
|
|
|
|
|
|
|
fail:
|
2006-07-20 22:46:41 +00:00
|
|
|
#ifdef HAVE_CREDS
|
2006-07-20 18:43:20 +00:00
|
|
|
pa_xfree(p->auth_group);
|
2006-07-20 22:46:41 +00:00
|
|
|
#endif
|
2006-07-20 18:43:20 +00:00
|
|
|
if (p->auth_ip_acl)
|
|
|
|
|
pa_ip_acl_free(p->auth_ip_acl);
|
|
|
|
|
pa_xfree(p);
|
|
|
|
|
return NULL;
|
2004-09-01 21:12:27 +00:00
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_protocol_native* pa_protocol_native_new(pa_core *core, pa_socket_server *server, pa_module *m, pa_modargs *ma) {
|
2004-11-11 21:18:33 +00:00
|
|
|
char t[256];
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_protocol_native *p;
|
2004-09-01 21:12:27 +00:00
|
|
|
|
|
|
|
|
if (!(p = protocol_new_internal(core, m, ma)))
|
|
|
|
|
return NULL;
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-01 21:12:27 +00:00
|
|
|
p->server = server;
|
2004-07-03 23:35:12 +00:00
|
|
|
pa_socket_server_set_callback(p->server, on_connection, p);
|
2004-11-11 21:18:33 +00:00
|
|
|
|
|
|
|
|
if (pa_socket_server_get_address(p->server, t, sizeof(t))) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_strlist *l;
|
2004-11-11 21:18:33 +00:00
|
|
|
l = pa_property_get(core, PA_NATIVE_SERVER_PROPERTY_NAME);
|
|
|
|
|
l = pa_strlist_prepend(l, t);
|
|
|
|
|
pa_property_replace(core, PA_NATIVE_SERVER_PROPERTY_NAME, l);
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-06-08 23:54:24 +00:00
|
|
|
return p;
|
|
|
|
|
}
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
void pa_protocol_native_free(pa_protocol_native *p) {
|
2007-10-28 19:13:50 +00:00
|
|
|
connection *c;
|
|
|
|
|
pa_assert(p);
|
2004-06-08 23:54:24 +00:00
|
|
|
|
2004-07-03 23:35:12 +00:00
|
|
|
while ((c = pa_idxset_first(p->connections, NULL)))
|
2007-10-28 19:13:50 +00:00
|
|
|
connection_unlink(c);
|
2004-07-03 23:35:12 +00:00
|
|
|
pa_idxset_free(p->connections, NULL, NULL);
|
2004-09-01 21:12:27 +00:00
|
|
|
|
2004-11-11 21:18:33 +00:00
|
|
|
if (p->server) {
|
|
|
|
|
char t[256];
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-11-11 21:18:33 +00:00
|
|
|
if (pa_socket_server_get_address(p->server, t, sizeof(t))) {
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_strlist *l;
|
2004-11-11 21:18:33 +00:00
|
|
|
l = pa_property_get(p->core, PA_NATIVE_SERVER_PROPERTY_NAME);
|
|
|
|
|
l = pa_strlist_remove(l, t);
|
|
|
|
|
|
|
|
|
|
if (l)
|
|
|
|
|
pa_property_replace(p->core, PA_NATIVE_SERVER_PROPERTY_NAME, l);
|
|
|
|
|
else
|
|
|
|
|
pa_property_remove(p->core, PA_NATIVE_SERVER_PROPERTY_NAME);
|
|
|
|
|
}
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-01 21:12:27 +00:00
|
|
|
pa_socket_server_unref(p->server);
|
2004-11-11 21:18:33 +00:00
|
|
|
}
|
2004-11-07 20:48:46 +00:00
|
|
|
|
|
|
|
|
if (p->auth_cookie_in_property)
|
|
|
|
|
pa_authkey_prop_unref(p->core, PA_NATIVE_COOKIE_PROPERTY_NAME);
|
2004-11-11 21:18:33 +00:00
|
|
|
|
2006-07-20 18:43:20 +00:00
|
|
|
if (p->auth_ip_acl)
|
|
|
|
|
pa_ip_acl_free(p->auth_ip_acl);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2006-07-19 21:48:35 +00:00
|
|
|
#ifdef HAVE_CREDS
|
2006-02-24 17:14:23 +00:00
|
|
|
pa_xfree(p->auth_group);
|
|
|
|
|
#endif
|
2004-08-04 16:39:30 +00:00
|
|
|
pa_xfree(p);
|
2004-06-08 23:54:24 +00:00
|
|
|
}
|
2004-09-01 21:12:27 +00:00
|
|
|
|
2007-10-28 19:13:50 +00:00
|
|
|
pa_protocol_native* pa_protocol_native_new_iochannel(
|
|
|
|
|
pa_core*core,
|
|
|
|
|
pa_iochannel *io,
|
|
|
|
|
pa_module *m,
|
|
|
|
|
pa_modargs *ma) {
|
|
|
|
|
|
2006-01-11 01:17:39 +00:00
|
|
|
pa_protocol_native *p;
|
2004-09-01 21:12:27 +00:00
|
|
|
|
|
|
|
|
if (!(p = protocol_new_internal(core, m, ma)))
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
on_connection(NULL, io, p);
|
2007-01-04 13:43:45 +00:00
|
|
|
|
2004-09-01 21:12:27 +00:00
|
|
|
return p;
|
|
|
|
|
}
|