]> code.delx.au - pulseaudio/blob - src/pulsecore/cli-command.c
5e45c1aa041fce3afc5a3bbc5a748e1defdcef07
[pulseaudio] / src / pulsecore / cli-command.c
1 /***
2 This file is part of PulseAudio.
3
4 Copyright 2004-2006 Lennart Poettering
5 Copyright 2006 Pierre Ossman <ossman@cendio.se> for Cendio AB
6
7 PulseAudio is free software; you can redistribute it and/or modify
8 it under the terms of the GNU Lesser General Public License as published
9 by the Free Software Foundation; either version 2 of the License,
10 or (at your option) any later version.
11
12 PulseAudio is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 General Public License for more details.
16
17 You should have received a copy of the GNU Lesser General Public License
18 along with PulseAudio; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
20 USA.
21 ***/
22
23 #ifdef HAVE_CONFIG_H
24 #include <config.h>
25 #endif
26
27 #include <stdio.h>
28 #include <string.h>
29 #include <stdlib.h>
30 #include <errno.h>
31 #include <unistd.h>
32 #include <ltdl.h>
33
34 #include <pulse/xmalloc.h>
35
36 #include <pulsecore/module.h>
37 #include <pulsecore/sink.h>
38 #include <pulsecore/source.h>
39 #include <pulsecore/client.h>
40 #include <pulsecore/sink-input.h>
41 #include <pulsecore/source-output.h>
42 #include <pulsecore/tokenizer.h>
43 #include <pulsecore/strbuf.h>
44 #include <pulsecore/namereg.h>
45 #include <pulsecore/cli-text.h>
46 #include <pulsecore/core-scache.h>
47 #include <pulsecore/sample-util.h>
48 #include <pulsecore/sound-file.h>
49 #include <pulsecore/play-memchunk.h>
50 #include <pulsecore/sound-file-stream.h>
51 #include <pulsecore/shared.h>
52 #include <pulsecore/core-util.h>
53 #include <pulsecore/core-error.h>
54 #include <pulsecore/modinfo.h>
55
56 #include "cli-command.h"
57
58 struct command {
59 const char *name;
60 int (*proc) (pa_core *c, pa_tokenizer*t, pa_strbuf *buf, pa_bool_t *fail);
61 const char *help;
62 unsigned args;
63 };
64
65 #define META_INCLUDE ".include"
66 #define META_FAIL ".fail"
67 #define META_NOFAIL ".nofail"
68 #define META_IFEXISTS ".ifexists"
69 #define META_ELSE ".else"
70 #define META_ENDIF ".endif"
71
72 enum {
73 IFSTATE_NONE = -1,
74 IFSTATE_FALSE = 0,
75 IFSTATE_TRUE = 1,
76 };
77
78 /* Prototypes for all available commands */
79 static int pa_cli_command_exit(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
80 static int pa_cli_command_help(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
81 static int pa_cli_command_modules(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
82 static int pa_cli_command_clients(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
83 static int pa_cli_command_cards(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
84 static int pa_cli_command_sinks(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
85 static int pa_cli_command_sources(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
86 static int pa_cli_command_sink_inputs(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
87 static int pa_cli_command_source_outputs(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
88 static int pa_cli_command_stat(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
89 static int pa_cli_command_info(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
90 static int pa_cli_command_load(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
91 static int pa_cli_command_unload(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
92 static int pa_cli_command_describe(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
93 static int pa_cli_command_sink_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
94 static int pa_cli_command_sink_input_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
95 static int pa_cli_command_source_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
96 static int pa_cli_command_sink_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
97 static int pa_cli_command_source_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
98 static int pa_cli_command_sink_input_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
99 static int pa_cli_command_sink_default(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
100 static int pa_cli_command_source_default(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
101 static int pa_cli_command_kill_client(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
102 static int pa_cli_command_kill_sink_input(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
103 static int pa_cli_command_kill_source_output(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
104 static int pa_cli_command_scache_play(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
105 static int pa_cli_command_scache_remove(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
106 static int pa_cli_command_scache_list(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
107 static int pa_cli_command_scache_load(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
108 static int pa_cli_command_scache_load_dir(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
109 static int pa_cli_command_play_file(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
110 static int pa_cli_command_dump(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
111 static int pa_cli_command_list_shared_props(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
112 static int pa_cli_command_move_sink_input(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
113 static int pa_cli_command_move_source_output(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
114 static int pa_cli_command_vacuum(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
115 static int pa_cli_command_suspend_sink(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
116 static int pa_cli_command_suspend_source(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
117 static int pa_cli_command_suspend(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
118 static int pa_cli_command_log_level(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
119 static int pa_cli_command_log_meta(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
120 static int pa_cli_command_log_time(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
121 static int pa_cli_command_log_backtrace(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
122 static int pa_cli_command_update_sink_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
123 static int pa_cli_command_update_source_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
124 static int pa_cli_command_update_sink_input_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
125 static int pa_cli_command_update_source_output_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
126 static int pa_cli_command_card_profile(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
127
128 /* A method table for all available commands */
129
130 static const struct command commands[] = {
131 { "exit", pa_cli_command_exit, "Terminate the daemon", 1 },
132 { "help", pa_cli_command_help, "Show this help", 1 },
133 { "list-modules", pa_cli_command_modules, "List loaded modules", 1 },
134 { "list-sinks", pa_cli_command_sinks, "List loaded sinks", 1 },
135 { "list-sources", pa_cli_command_sources, "List loaded sources", 1 },
136 { "list-clients", pa_cli_command_clients, "List loaded clients", 1 },
137 { "list-sink-inputs", pa_cli_command_sink_inputs, "List sink inputs", 1 },
138 { "list-source-outputs", pa_cli_command_source_outputs, "List source outputs", 1 },
139 { "list-cards", pa_cli_command_cards, "List cards", 1 },
140 { "stat", pa_cli_command_stat, "Show memory block statistics", 1 },
141 { "info", pa_cli_command_info, "Show comprehensive status", 1 },
142 { "ls", pa_cli_command_info, NULL, 1 },
143 { "list", pa_cli_command_info, NULL, 1 },
144 { "load-module", pa_cli_command_load, "Load a module (args: name, arguments)", 3},
145 { "unload-module", pa_cli_command_unload, "Unload a module (args: index)", 2},
146 { "describe-module", pa_cli_command_describe, "Describe a module (arg: name)", 2},
147 { "set-sink-volume", pa_cli_command_sink_volume, "Set the volume of a sink (args: index|name, volume)", 3},
148 { "set-sink-input-volume", pa_cli_command_sink_input_volume, "Set the volume of a sink input (args: index, volume)", 3},
149 { "set-source-volume", pa_cli_command_source_volume, "Set the volume of a source (args: index|name, volume)", 3},
150 { "set-sink-mute", pa_cli_command_sink_mute, "Set the mute switch of a sink (args: index|name, bool)", 3},
151 { "set-sink-input-mute", pa_cli_command_sink_input_mute, "Set the mute switch of a sink input (args: index, bool)", 3},
152 { "set-source-mute", pa_cli_command_source_mute, "Set the mute switch of a source (args: index|name, bool)", 3},
153 { "update-sink-proplist", pa_cli_command_update_sink_proplist, "Update the properties of a sink (args: index|name, properties)", 3},
154 { "update-source-proplist", pa_cli_command_update_source_proplist, "Update the properties of a source (args: index|name, properties)", 3},
155 { "update-sink-input-proplist", pa_cli_command_update_sink_input_proplist, "Update the properties of a sink input (args: index, properties)", 3},
156 { "update-source-output-proplist", pa_cli_command_update_source_output_proplist, "Update the properties of a source_output (args: index, properties)", 3},
157 { "set-default-sink", pa_cli_command_sink_default, "Set the default sink (args: index|name)", 2},
158 { "set-default-source", pa_cli_command_source_default, "Set the default source (args: index|name)", 2},
159 { "kill-client", pa_cli_command_kill_client, "Kill a client (args: index)", 2},
160 { "kill-sink-input", pa_cli_command_kill_sink_input, "Kill a sink input (args: index)", 2},
161 { "kill-source-output", pa_cli_command_kill_source_output, "Kill a source output (args: index)", 2},
162 { "list-samples", pa_cli_command_scache_list, "List all entries in the sample cache", 1},
163 { "play-sample", pa_cli_command_scache_play, "Play a sample from the sample cache (args: name, sink|index)", 3},
164 { "remove-sample", pa_cli_command_scache_remove, "Remove a sample from the sample cache (args: name)", 2},
165 { "load-sample", pa_cli_command_scache_load, "Load a sound file into the sample cache (args: name, filename)", 3},
166 { "load-sample-lazy", pa_cli_command_scache_load, "Lazily load a sound file into the sample cache (args: name, filename)", 3},
167 { "load-sample-dir-lazy", pa_cli_command_scache_load_dir, "Lazily load all files in a directory into the sample cache (args: pathname)", 2},
168 { "play-file", pa_cli_command_play_file, "Play a sound file (args: filename, sink|index)", 3},
169 { "dump", pa_cli_command_dump, "Dump daemon configuration", 1},
170 { "shared", pa_cli_command_list_shared_props, NULL, 1},
171 { "move-sink-input", pa_cli_command_move_sink_input, "Move sink input to another sink (args: index, sink)", 3},
172 { "move-source-output", pa_cli_command_move_source_output, "Move source output to another source (args: index, source)", 3},
173 { "vacuum", pa_cli_command_vacuum, NULL, 1},
174 { "suspend-sink", pa_cli_command_suspend_sink, "Suspend sink (args: index|name, bool)", 3},
175 { "suspend-source", pa_cli_command_suspend_source, "Suspend source (args: index|name, bool)", 3},
176 { "suspend", pa_cli_command_suspend, "Suspend all sinks and all sources (args: bool)", 2},
177 { "set-card-profile", pa_cli_command_card_profile, "Change the profile of a card (aargs: index, name)", 3},
178 { "set-log-level", pa_cli_command_log_level, "Change the log level (args: numeric level)", 2},
179 { "set-log-meta", pa_cli_command_log_meta, "Show source code location in log messages (args: bool)", 2},
180 { "set-log-time", pa_cli_command_log_time, "Show timestamps in log messages (args: bool)", 2},
181 { "set-log-backtrace", pa_cli_command_log_backtrace, "Show bakctrace in log messages (args: frames)", 2},
182 { NULL, NULL, NULL, 0 }
183 };
184
185 static const char whitespace[] = " \t\n\r";
186 static const char linebreak[] = "\n\r";
187
188 static uint32_t parse_index(const char *n) {
189 uint32_t idx;
190
191 if (pa_atou(n, &idx) < 0)
192 return (uint32_t) PA_IDXSET_INVALID;
193
194 return idx;
195 }
196
197 static int pa_cli_command_exit(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
198 pa_core_assert_ref(c);
199 pa_assert(t);
200 pa_assert(buf);
201 pa_assert(fail);
202
203 if (pa_core_exit(c, FALSE, 0) < 0)
204 pa_strbuf_puts(buf, "Not allowed to terminate daemon.\n");
205
206 return 0;
207 }
208
209 static int pa_cli_command_help(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
210 const struct command*command;
211
212 pa_core_assert_ref(c);
213 pa_assert(t);
214 pa_assert(buf);
215 pa_assert(fail);
216
217 pa_strbuf_puts(buf, "Available commands:\n");
218
219 for (command = commands; command->name; command++)
220 if (command->help)
221 pa_strbuf_printf(buf, " %-25s %s\n", command->name, command->help);
222 return 0;
223 }
224
225 static int pa_cli_command_modules(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
226 char *s;
227
228 pa_core_assert_ref(c);
229 pa_assert(t);
230 pa_assert(buf);
231 pa_assert(fail);
232
233 pa_assert_se(s = pa_module_list_to_string(c));
234 pa_strbuf_puts(buf, s);
235 pa_xfree(s);
236 return 0;
237 }
238
239 static int pa_cli_command_clients(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
240 char *s;
241
242 pa_core_assert_ref(c);
243 pa_assert(t);
244 pa_assert(buf);
245 pa_assert(fail);
246
247 pa_assert_se(s = pa_client_list_to_string(c));
248 pa_strbuf_puts(buf, s);
249 pa_xfree(s);
250 return 0;
251 }
252
253 static int pa_cli_command_cards(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
254 char *s;
255
256 pa_core_assert_ref(c);
257 pa_assert(t);
258 pa_assert(buf);
259 pa_assert(fail);
260
261 pa_assert_se(s = pa_card_list_to_string(c));
262 pa_strbuf_puts(buf, s);
263 pa_xfree(s);
264 return 0;
265 }
266
267 static int pa_cli_command_sinks(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
268 char *s;
269
270 pa_core_assert_ref(c);
271 pa_assert(t);
272 pa_assert(buf);
273 pa_assert(fail);
274
275 pa_assert_se(s = pa_sink_list_to_string(c));
276 pa_strbuf_puts(buf, s);
277 pa_xfree(s);
278 return 0;
279 }
280
281 static int pa_cli_command_sources(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
282 char *s;
283
284 pa_core_assert_ref(c);
285 pa_assert(t);
286 pa_assert(buf);
287 pa_assert(fail);
288
289 pa_assert_se(s = pa_source_list_to_string(c));
290 pa_strbuf_puts(buf, s);
291 pa_xfree(s);
292 return 0;
293 }
294
295 static int pa_cli_command_sink_inputs(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
296 char *s;
297
298 pa_core_assert_ref(c);
299 pa_assert(t);
300 pa_assert(buf);
301 pa_assert(fail);
302
303 pa_assert_se(s = pa_sink_input_list_to_string(c));
304 pa_strbuf_puts(buf, s);
305 pa_xfree(s);
306 return 0;
307 }
308
309 static int pa_cli_command_source_outputs(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
310 char *s;
311
312 pa_core_assert_ref(c);
313 pa_assert(t);
314 pa_assert(buf);
315 pa_assert(fail);
316
317 pa_assert_se(s = pa_source_output_list_to_string(c));
318 pa_strbuf_puts(buf, s);
319 pa_xfree(s);
320 return 0;
321 }
322
323 static int pa_cli_command_stat(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
324 char s[256];
325 const pa_mempool_stat *stat;
326 unsigned k;
327 pa_sink *def_sink;
328 pa_source *def_source;
329
330 static const char* const type_table[PA_MEMBLOCK_TYPE_MAX] = {
331 [PA_MEMBLOCK_POOL] = "POOL",
332 [PA_MEMBLOCK_POOL_EXTERNAL] = "POOL_EXTERNAL",
333 [PA_MEMBLOCK_APPENDED] = "APPENDED",
334 [PA_MEMBLOCK_USER] = "USER",
335 [PA_MEMBLOCK_FIXED] = "FIXED",
336 [PA_MEMBLOCK_IMPORTED] = "IMPORTED",
337 };
338
339 pa_core_assert_ref(c);
340 pa_assert(t);
341 pa_assert(buf);
342 pa_assert(fail);
343
344 stat = pa_mempool_get_stat(c->mempool);
345
346 pa_strbuf_printf(buf, "Memory blocks currently allocated: %u, size: %s.\n",
347 (unsigned) pa_atomic_load(&stat->n_allocated),
348 pa_bytes_snprint(s, sizeof(s), (unsigned) pa_atomic_load(&stat->allocated_size)));
349
350 pa_strbuf_printf(buf, "Memory blocks allocated during the whole lifetime: %u, size: %s.\n",
351 (unsigned) pa_atomic_load(&stat->n_accumulated),
352 pa_bytes_snprint(s, sizeof(s), (unsigned) pa_atomic_load(&stat->accumulated_size)));
353
354 pa_strbuf_printf(buf, "Memory blocks imported from other processes: %u, size: %s.\n",
355 (unsigned) pa_atomic_load(&stat->n_imported),
356 pa_bytes_snprint(s, sizeof(s), (unsigned) pa_atomic_load(&stat->imported_size)));
357
358 pa_strbuf_printf(buf, "Memory blocks exported to other processes: %u, size: %s.\n",
359 (unsigned) pa_atomic_load(&stat->n_exported),
360 pa_bytes_snprint(s, sizeof(s), (unsigned) pa_atomic_load(&stat->exported_size)));
361
362 pa_strbuf_printf(buf, "Total sample cache size: %s.\n",
363 pa_bytes_snprint(s, sizeof(s), (unsigned) pa_scache_total_size(c)));
364
365 pa_strbuf_printf(buf, "Default sample spec: %s\n",
366 pa_sample_spec_snprint(s, sizeof(s), &c->default_sample_spec));
367
368 def_sink = pa_namereg_get_default_sink(c);
369 def_source = pa_namereg_get_default_source(c);
370 pa_strbuf_printf(buf, "Default sink name: %s\n"
371 "Default source name: %s\n",
372 def_sink ? def_sink->name : "none",
373 def_source ? def_source->name : "none");
374
375 for (k = 0; k < PA_MEMBLOCK_TYPE_MAX; k++)
376 pa_strbuf_printf(buf,
377 "Memory blocks of type %s: %u allocated/%u accumulated.\n",
378 type_table[k],
379 (unsigned) pa_atomic_load(&stat->n_allocated_by_type[k]),
380 (unsigned) pa_atomic_load(&stat->n_accumulated_by_type[k]));
381
382 return 0;
383 }
384
385 static int pa_cli_command_info(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
386 pa_core_assert_ref(c);
387 pa_assert(t);
388 pa_assert(buf);
389 pa_assert(fail);
390
391 pa_cli_command_stat(c, t, buf, fail);
392 pa_cli_command_modules(c, t, buf, fail);
393 pa_cli_command_sinks(c, t, buf, fail);
394 pa_cli_command_sources(c, t, buf, fail);
395 pa_cli_command_clients(c, t, buf, fail);
396 pa_cli_command_cards(c, t, buf, fail);
397 pa_cli_command_sink_inputs(c, t, buf, fail);
398 pa_cli_command_source_outputs(c, t, buf, fail);
399 pa_cli_command_scache_list(c, t, buf, fail);
400 return 0;
401 }
402
403 static int pa_cli_command_load(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
404 const char *name;
405
406 pa_core_assert_ref(c);
407 pa_assert(t);
408 pa_assert(buf);
409 pa_assert(fail);
410
411 if (!(name = pa_tokenizer_get(t, 1))) {
412 pa_strbuf_puts(buf, "You need to specify the module name and optionally arguments.\n");
413 return -1;
414 }
415
416 if (!pa_module_load(c, name, pa_tokenizer_get(t, 2))) {
417 pa_strbuf_puts(buf, "Module load failed.\n");
418 return -1;
419 }
420
421 return 0;
422 }
423
424 static int pa_cli_command_unload(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
425 pa_module *m;
426 uint32_t idx;
427 const char *i;
428 char *e;
429
430 pa_core_assert_ref(c);
431 pa_assert(t);
432 pa_assert(buf);
433 pa_assert(fail);
434
435 if (!(i = pa_tokenizer_get(t, 1))) {
436 pa_strbuf_puts(buf, "You need to specify the module index.\n");
437 return -1;
438 }
439
440 idx = (uint32_t) strtoul(i, &e, 10);
441 if (*e || !(m = pa_idxset_get_by_index(c->modules, idx))) {
442 pa_strbuf_puts(buf, "Invalid module index.\n");
443 return -1;
444 }
445
446 pa_module_unload_request(m, FALSE);
447 return 0;
448 }
449
450 static int pa_cli_command_describe(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
451 const char *name;
452 pa_modinfo *i;
453
454 pa_core_assert_ref(c);
455 pa_assert(t);
456 pa_assert(buf);
457 pa_assert(fail);
458
459 if (!(name = pa_tokenizer_get(t, 1))) {
460 pa_strbuf_puts(buf, "You need to specify the module name.\n");
461 return -1;
462 }
463
464 if ((i = pa_modinfo_get_by_name(name))) {
465
466 pa_strbuf_printf(buf, "Name: %s\n", name);
467
468 if (!i->description && !i->version && !i->author && !i->usage)
469 pa_strbuf_printf(buf, "No module information available\n");
470 else {
471 if (i->version)
472 pa_strbuf_printf(buf, "Version: %s\n", i->version);
473 if (i->description)
474 pa_strbuf_printf(buf, "Description: %s\n", i->description);
475 if (i->author)
476 pa_strbuf_printf(buf, "Author: %s\n", i->author);
477 if (i->usage)
478 pa_strbuf_printf(buf, "Usage: %s\n", i->usage);
479 pa_strbuf_printf(buf, "Load Once: %s\n", pa_yes_no(i->load_once));
480 }
481
482 pa_modinfo_free(i);
483 } else
484 pa_strbuf_puts(buf, "Failed to open module.\n");
485
486 return 0;
487 }
488
489 static int pa_cli_command_sink_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
490 const char *n, *v;
491 pa_sink *sink;
492 uint32_t volume;
493 pa_cvolume cvolume;
494
495 pa_core_assert_ref(c);
496 pa_assert(t);
497 pa_assert(buf);
498 pa_assert(fail);
499
500 if (!(n = pa_tokenizer_get(t, 1))) {
501 pa_strbuf_puts(buf, "You need to specify a sink either by its name or its index.\n");
502 return -1;
503 }
504
505 if (!(v = pa_tokenizer_get(t, 2))) {
506 pa_strbuf_puts(buf, "You need to specify a volume >= 0. (0 is muted, 0x10000 is normal volume)\n");
507 return -1;
508 }
509
510 if (pa_atou(v, &volume) < 0) {
511 pa_strbuf_puts(buf, "Failed to parse volume.\n");
512 return -1;
513 }
514
515 if (!(sink = pa_namereg_get(c, n, PA_NAMEREG_SINK))) {
516 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
517 return -1;
518 }
519
520 pa_cvolume_set(&cvolume, sink->sample_spec.channels, volume);
521 pa_sink_set_volume(sink, &cvolume, TRUE, TRUE);
522 return 0;
523 }
524
525 static int pa_cli_command_sink_input_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
526 const char *n, *v;
527 pa_sink_input *si;
528 pa_volume_t volume;
529 pa_cvolume cvolume;
530 uint32_t idx;
531
532 pa_core_assert_ref(c);
533 pa_assert(t);
534 pa_assert(buf);
535 pa_assert(fail);
536
537 if (!(n = pa_tokenizer_get(t, 1))) {
538 pa_strbuf_puts(buf, "You need to specify a sink input by its index.\n");
539 return -1;
540 }
541
542 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
543 pa_strbuf_puts(buf, "Failed to parse index.\n");
544 return -1;
545 }
546
547 if (!(v = pa_tokenizer_get(t, 2))) {
548 pa_strbuf_puts(buf, "You need to specify a volume >= 0. (0 is muted, 0x10000 is normal volume)\n");
549 return -1;
550 }
551
552 if (pa_atou(v, &volume) < 0) {
553 pa_strbuf_puts(buf, "Failed to parse volume.\n");
554 return -1;
555 }
556
557 if (!(si = pa_idxset_get_by_index(c->sink_inputs, (uint32_t) idx))) {
558 pa_strbuf_puts(buf, "No sink input found with this index.\n");
559 return -1;
560 }
561
562 pa_cvolume_set(&cvolume, si->sample_spec.channels, volume);
563 pa_sink_input_set_volume(si, &cvolume, TRUE);
564 return 0;
565 }
566
567 static int pa_cli_command_source_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
568 const char *n, *v;
569 pa_source *source;
570 uint32_t volume;
571 pa_cvolume cvolume;
572
573 pa_core_assert_ref(c);
574 pa_assert(t);
575 pa_assert(buf);
576 pa_assert(fail);
577
578 if (!(n = pa_tokenizer_get(t, 1))) {
579 pa_strbuf_puts(buf, "You need to specify a source either by its name or its index.\n");
580 return -1;
581 }
582
583 if (!(v = pa_tokenizer_get(t, 2))) {
584 pa_strbuf_puts(buf, "You need to specify a volume >= 0. (0 is muted, 0x10000 is normal volume)\n");
585 return -1;
586 }
587
588 if (pa_atou(v, &volume) < 0) {
589 pa_strbuf_puts(buf, "Failed to parse volume.\n");
590 return -1;
591 }
592
593 if (!(source = pa_namereg_get(c, n, PA_NAMEREG_SOURCE))) {
594 pa_strbuf_puts(buf, "No source found by this name or index.\n");
595 return -1;
596 }
597
598 pa_cvolume_set(&cvolume, source->sample_spec.channels, volume);
599 pa_source_set_volume(source, &cvolume);
600 return 0;
601 }
602
603 static int pa_cli_command_sink_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
604 const char *n, *m;
605 pa_sink *sink;
606 int mute;
607
608 pa_core_assert_ref(c);
609 pa_assert(t);
610 pa_assert(buf);
611 pa_assert(fail);
612
613 if (!(n = pa_tokenizer_get(t, 1))) {
614 pa_strbuf_puts(buf, "You need to specify a sink either by its name or its index.\n");
615 return -1;
616 }
617
618 if (!(m = pa_tokenizer_get(t, 2))) {
619 pa_strbuf_puts(buf, "You need to specify a mute switch setting (0/1).\n");
620 return -1;
621 }
622
623 if ((mute = pa_parse_boolean(m)) < 0) {
624 pa_strbuf_puts(buf, "Failed to parse mute switch.\n");
625 return -1;
626 }
627
628 if (!(sink = pa_namereg_get(c, n, PA_NAMEREG_SINK))) {
629 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
630 return -1;
631 }
632
633 pa_sink_set_mute(sink, mute);
634 return 0;
635 }
636
637 static int pa_cli_command_source_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
638 const char *n, *m;
639 pa_source *source;
640 int mute;
641
642 pa_core_assert_ref(c);
643 pa_assert(t);
644 pa_assert(buf);
645 pa_assert(fail);
646
647 if (!(n = pa_tokenizer_get(t, 1))) {
648 pa_strbuf_puts(buf, "You need to specify a source either by its name or its index.\n");
649 return -1;
650 }
651
652 if (!(m = pa_tokenizer_get(t, 2))) {
653 pa_strbuf_puts(buf, "You need to specify a mute switch setting (0/1).\n");
654 return -1;
655 }
656
657 if ((mute = pa_parse_boolean(m)) < 0) {
658 pa_strbuf_puts(buf, "Failed to parse mute switch.\n");
659 return -1;
660 }
661
662 if (!(source = pa_namereg_get(c, n, PA_NAMEREG_SOURCE))) {
663 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
664 return -1;
665 }
666
667 pa_source_set_mute(source, mute);
668 return 0;
669 }
670
671 static int pa_cli_command_update_sink_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
672 const char *n, *s;
673 pa_sink *sink;
674 pa_proplist *p;
675
676 pa_core_assert_ref(c);
677 pa_assert(t);
678 pa_assert(buf);
679 pa_assert(fail);
680
681 if (!(n = pa_tokenizer_get(t, 1))) {
682 pa_strbuf_puts(buf, "You need to specify a sink either by its name or its index.\n");
683 return -1;
684 }
685
686 if (!(s = pa_tokenizer_get(t, 2))) {
687 pa_strbuf_puts(buf, "You need to specify a \"key=value\" argument.\n");
688 return -1;
689 }
690
691 if (!(sink = pa_namereg_get(c, n, PA_NAMEREG_SINK))) {
692 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
693 return -1;
694 }
695
696 p = pa_proplist_from_string(s);
697
698 pa_sink_update_proplist(sink, PA_UPDATE_REPLACE, p);
699
700 pa_proplist_free(p);
701
702 return 0;
703 }
704
705 static int pa_cli_command_update_source_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
706 const char *n, *s;
707 pa_source *source;
708 pa_proplist *p;
709
710 pa_core_assert_ref(c);
711 pa_assert(t);
712 pa_assert(buf);
713 pa_assert(fail);
714
715 if (!(n = pa_tokenizer_get(t, 1))) {
716 pa_strbuf_puts(buf, "You need to specify a source either by its name or its index.\n");
717 return -1;
718 }
719
720 if (!(s = pa_tokenizer_get(t, 2))) {
721 pa_strbuf_puts(buf, "You need to specify a \"key=value\" argument.\n");
722 return -1;
723 }
724
725 if (!(source = pa_namereg_get(c, n, PA_NAMEREG_SOURCE))) {
726 pa_strbuf_puts(buf, "No source found by this name or index.\n");
727 return -1;
728 }
729
730 p = pa_proplist_from_string(s);
731
732 pa_source_update_proplist(source, PA_UPDATE_REPLACE, p);
733
734 pa_proplist_free(p);
735
736 return 0;
737 }
738
739 static int pa_cli_command_update_sink_input_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
740 const char *n, *s;
741 pa_sink_input *si;
742 uint32_t idx;
743 pa_proplist *p;
744
745 pa_core_assert_ref(c);
746 pa_assert(t);
747 pa_assert(buf);
748 pa_assert(fail);
749
750 if (!(n = pa_tokenizer_get(t, 1))) {
751 pa_strbuf_puts(buf, "You need to specify a sink input either by index.\n");
752 return -1;
753 }
754
755 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
756 pa_strbuf_puts(buf, "Failed to parse index.\n");
757 return -1;
758 }
759
760 if (!(s = pa_tokenizer_get(t, 2))) {
761 pa_strbuf_puts(buf, "You need to specify a \"key=value\" argument.\n");
762 return -1;
763 }
764
765 if (!(si = pa_idxset_get_by_index(c->sink_inputs, (uint32_t) idx))) {
766 pa_strbuf_puts(buf, "No sink input found with this index.\n");
767 return -1;
768 }
769
770 p = pa_proplist_from_string(s);
771
772 pa_sink_input_update_proplist(si, PA_UPDATE_REPLACE, p);
773
774 pa_proplist_free(p);
775
776 return 0;
777 }
778
779 static int pa_cli_command_update_source_output_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
780 const char *n, *s;
781 pa_source_output *so;
782 uint32_t idx;
783 pa_proplist *p;
784
785 pa_core_assert_ref(c);
786 pa_assert(t);
787 pa_assert(buf);
788 pa_assert(fail);
789
790 if (!(n = pa_tokenizer_get(t, 1))) {
791 pa_strbuf_puts(buf, "You need to specify a source output by its index.\n");
792 return -1;
793 }
794
795 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
796 pa_strbuf_puts(buf, "Failed to parse index.\n");
797 return -1;
798 }
799
800 if (!(s = pa_tokenizer_get(t, 2))) {
801 pa_strbuf_puts(buf, "You need to specify a \"key=value\" argument.\n");
802 return -1;
803 }
804
805 if (!(so = pa_idxset_get_by_index(c->source_outputs, (uint32_t) idx))) {
806 pa_strbuf_puts(buf, "No source output found with this index.\n");
807 return -1;
808 }
809
810 p = pa_proplist_from_string(s);
811
812 pa_source_output_update_proplist(so, PA_UPDATE_REPLACE, p);
813
814 pa_proplist_free(p);
815
816 return 0;
817 }
818
819 static int pa_cli_command_sink_input_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
820 const char *n, *v;
821 pa_sink_input *si;
822 uint32_t idx;
823 int mute;
824
825 pa_core_assert_ref(c);
826 pa_assert(t);
827 pa_assert(buf);
828 pa_assert(fail);
829
830 if (!(n = pa_tokenizer_get(t, 1))) {
831 pa_strbuf_puts(buf, "You need to specify a sink input by its index.\n");
832 return -1;
833 }
834
835 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
836 pa_strbuf_puts(buf, "Failed to parse index.\n");
837 return -1;
838 }
839
840 if (!(v = pa_tokenizer_get(t, 2))) {
841 pa_strbuf_puts(buf, "You need to specify a mute switch setting (0/1).\n");
842 return -1;
843 }
844
845 if ((mute = pa_parse_boolean(v)) < 0) {
846 pa_strbuf_puts(buf, "Failed to parse mute switch.\n");
847 return -1;
848 }
849
850 if (!(si = pa_idxset_get_by_index(c->sink_inputs, (uint32_t) idx))) {
851 pa_strbuf_puts(buf, "No sink input found with this index.\n");
852 return -1;
853 }
854
855 pa_sink_input_set_mute(si, mute, TRUE);
856 return 0;
857 }
858
859 static int pa_cli_command_sink_default(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
860 const char *n;
861 pa_sink *s;
862
863 pa_core_assert_ref(c);
864 pa_assert(t);
865 pa_assert(buf);
866 pa_assert(fail);
867
868 if (!(n = pa_tokenizer_get(t, 1))) {
869 pa_strbuf_puts(buf, "You need to specify a sink either by its name or its index.\n");
870 return -1;
871 }
872
873 if ((s = pa_namereg_get(c, n, PA_NAMEREG_SINK)))
874 pa_namereg_set_default_sink(c, s);
875 else
876 pa_strbuf_printf(buf, "Sink %s does not exist.\n", n);
877
878 return 0;
879 }
880
881 static int pa_cli_command_source_default(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
882 const char *n;
883 pa_source *s;
884
885 pa_core_assert_ref(c);
886 pa_assert(t);
887 pa_assert(buf);
888 pa_assert(fail);
889
890 if (!(n = pa_tokenizer_get(t, 1))) {
891 pa_strbuf_puts(buf, "You need to specify a source either by its name or its index.\n");
892 return -1;
893 }
894
895 if ((s = pa_namereg_get(c, n, PA_NAMEREG_SOURCE)))
896 pa_namereg_set_default_source(c, s);
897 else
898 pa_strbuf_printf(buf, "Source %s does not exist.\n", n);
899 return 0;
900 }
901
902 static int pa_cli_command_kill_client(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
903 const char *n;
904 pa_client *client;
905 uint32_t idx;
906
907 pa_core_assert_ref(c);
908 pa_assert(t);
909 pa_assert(buf);
910 pa_assert(fail);
911
912 if (!(n = pa_tokenizer_get(t, 1))) {
913 pa_strbuf_puts(buf, "You need to specify a client by its index.\n");
914 return -1;
915 }
916
917 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
918 pa_strbuf_puts(buf, "Failed to parse index.\n");
919 return -1;
920 }
921
922 if (!(client = pa_idxset_get_by_index(c->clients, idx))) {
923 pa_strbuf_puts(buf, "No client found by this index.\n");
924 return -1;
925 }
926
927 pa_client_kill(client);
928 return 0;
929 }
930
931 static int pa_cli_command_kill_sink_input(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
932 const char *n;
933 pa_sink_input *sink_input;
934 uint32_t idx;
935
936 pa_core_assert_ref(c);
937 pa_assert(t);
938 pa_assert(buf);
939 pa_assert(fail);
940
941 if (!(n = pa_tokenizer_get(t, 1))) {
942 pa_strbuf_puts(buf, "You need to specify a sink input by its index.\n");
943 return -1;
944 }
945
946 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
947 pa_strbuf_puts(buf, "Failed to parse index.\n");
948 return -1;
949 }
950
951 if (!(sink_input = pa_idxset_get_by_index(c->sink_inputs, idx))) {
952 pa_strbuf_puts(buf, "No sink input found by this index.\n");
953 return -1;
954 }
955
956 pa_sink_input_kill(sink_input);
957 return 0;
958 }
959
960 static int pa_cli_command_kill_source_output(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
961 const char *n;
962 pa_source_output *source_output;
963 uint32_t idx;
964
965 pa_core_assert_ref(c);
966 pa_assert(t);
967 pa_assert(buf);
968 pa_assert(fail);
969
970 if (!(n = pa_tokenizer_get(t, 1))) {
971 pa_strbuf_puts(buf, "You need to specify a source output by its index.\n");
972 return -1;
973 }
974
975 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
976 pa_strbuf_puts(buf, "Failed to parse index.\n");
977 return -1;
978 }
979
980 if (!(source_output = pa_idxset_get_by_index(c->source_outputs, idx))) {
981 pa_strbuf_puts(buf, "No source output found by this index.\n");
982 return -1;
983 }
984
985 pa_source_output_kill(source_output);
986 return 0;
987 }
988
989 static int pa_cli_command_scache_list(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
990 char *s;
991
992 pa_core_assert_ref(c);
993 pa_assert(t);
994 pa_assert(buf);
995 pa_assert(fail);
996
997 pa_assert_se(s = pa_scache_list_to_string(c));
998 pa_strbuf_puts(buf, s);
999 pa_xfree(s);
1000
1001 return 0;
1002 }
1003
1004 static int pa_cli_command_scache_play(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1005 const char *n, *sink_name;
1006 pa_sink *sink;
1007 uint32_t idx;
1008
1009 pa_core_assert_ref(c);
1010 pa_assert(t);
1011 pa_assert(buf);
1012 pa_assert(fail);
1013
1014 if (!(n = pa_tokenizer_get(t, 1)) || !(sink_name = pa_tokenizer_get(t, 2))) {
1015 pa_strbuf_puts(buf, "You need to specify a sample name and a sink name.\n");
1016 return -1;
1017 }
1018
1019 if (!(sink = pa_namereg_get(c, sink_name, PA_NAMEREG_SINK))) {
1020 pa_strbuf_puts(buf, "No sink by that name.\n");
1021 return -1;
1022 }
1023
1024 if (pa_scache_play_item(c, n, sink, PA_VOLUME_NORM, NULL, &idx) < 0) {
1025 pa_strbuf_puts(buf, "Failed to play sample.\n");
1026 return -1;
1027 }
1028
1029 pa_strbuf_printf(buf, "Playing on sink input #%i\n", idx);
1030
1031 return 0;
1032 }
1033
1034 static int pa_cli_command_scache_remove(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1035 const char *n;
1036
1037 pa_core_assert_ref(c);
1038 pa_assert(t);
1039 pa_assert(buf);
1040 pa_assert(fail);
1041
1042 if (!(n = pa_tokenizer_get(t, 1))) {
1043 pa_strbuf_puts(buf, "You need to specify a sample name.\n");
1044 return -1;
1045 }
1046
1047 if (pa_scache_remove_item(c, n) < 0) {
1048 pa_strbuf_puts(buf, "Failed to remove sample.\n");
1049 return -1;
1050 }
1051
1052 return 0;
1053 }
1054
1055 static int pa_cli_command_scache_load(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1056 const char *fname, *n;
1057 int r;
1058
1059 pa_core_assert_ref(c);
1060 pa_assert(t);
1061 pa_assert(buf);
1062 pa_assert(fail);
1063
1064 if (!(fname = pa_tokenizer_get(t, 2)) || !(n = pa_tokenizer_get(t, 1))) {
1065 pa_strbuf_puts(buf, "You need to specify a file name and a sample name.\n");
1066 return -1;
1067 }
1068
1069 if (strstr(pa_tokenizer_get(t, 0), "lazy"))
1070 r = pa_scache_add_file_lazy(c, n, fname, NULL);
1071 else
1072 r = pa_scache_add_file(c, n, fname, NULL);
1073
1074 if (r < 0)
1075 pa_strbuf_puts(buf, "Failed to load sound file.\n");
1076
1077 return 0;
1078 }
1079
1080 static int pa_cli_command_scache_load_dir(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1081 const char *pname;
1082
1083 pa_core_assert_ref(c);
1084 pa_assert(t);
1085 pa_assert(buf);
1086 pa_assert(fail);
1087
1088 if (!(pname = pa_tokenizer_get(t, 1))) {
1089 pa_strbuf_puts(buf, "You need to specify a path name.\n");
1090 return -1;
1091 }
1092
1093 if (pa_scache_add_directory_lazy(c, pname) < 0) {
1094 pa_strbuf_puts(buf, "Failed to load directory.\n");
1095 return -1;
1096 }
1097
1098 return 0;
1099 }
1100
1101 static int pa_cli_command_play_file(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1102 const char *fname, *sink_name;
1103 pa_sink *sink;
1104
1105 pa_core_assert_ref(c);
1106 pa_assert(t);
1107 pa_assert(buf);
1108 pa_assert(fail);
1109
1110 if (!(fname = pa_tokenizer_get(t, 1)) || !(sink_name = pa_tokenizer_get(t, 2))) {
1111 pa_strbuf_puts(buf, "You need to specify a file name and a sink name.\n");
1112 return -1;
1113 }
1114
1115 if (!(sink = pa_namereg_get(c, sink_name, PA_NAMEREG_SINK))) {
1116 pa_strbuf_puts(buf, "No sink by that name.\n");
1117 return -1;
1118 }
1119
1120
1121 return pa_play_file(sink, fname, NULL);
1122 }
1123
1124 static int pa_cli_command_list_shared_props(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1125 pa_core_assert_ref(c);
1126 pa_assert(t);
1127 pa_assert(buf);
1128 pa_assert(fail);
1129
1130 pa_shared_dump(c, buf);
1131 return 0;
1132 }
1133
1134 static int pa_cli_command_vacuum(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1135 pa_core_assert_ref(c);
1136 pa_assert(t);
1137 pa_assert(buf);
1138 pa_assert(fail);
1139
1140 pa_mempool_vacuum(c->mempool);
1141
1142 return 0;
1143 }
1144
1145 static int pa_cli_command_move_sink_input(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1146 const char *n, *k;
1147 pa_sink_input *si;
1148 pa_sink *sink;
1149 uint32_t idx;
1150
1151 pa_core_assert_ref(c);
1152 pa_assert(t);
1153 pa_assert(buf);
1154 pa_assert(fail);
1155
1156 if (!(n = pa_tokenizer_get(t, 1))) {
1157 pa_strbuf_puts(buf, "You need to specify a sink input by its index.\n");
1158 return -1;
1159 }
1160
1161 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
1162 pa_strbuf_puts(buf, "Failed to parse index.\n");
1163 return -1;
1164 }
1165
1166 if (!(k = pa_tokenizer_get(t, 2))) {
1167 pa_strbuf_puts(buf, "You need to specify a sink.\n");
1168 return -1;
1169 }
1170
1171 if (!(si = pa_idxset_get_by_index(c->sink_inputs, (uint32_t) idx))) {
1172 pa_strbuf_puts(buf, "No sink input found with this index.\n");
1173 return -1;
1174 }
1175
1176 if (!(sink = pa_namereg_get(c, k, PA_NAMEREG_SINK))) {
1177 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
1178 return -1;
1179 }
1180
1181 if (pa_sink_input_move_to(si, sink, TRUE) < 0) {
1182 pa_strbuf_puts(buf, "Moved failed.\n");
1183 return -1;
1184 }
1185 return 0;
1186 }
1187
1188 static int pa_cli_command_move_source_output(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1189 const char *n, *k;
1190 pa_source_output *so;
1191 pa_source *source;
1192 uint32_t idx;
1193
1194 pa_core_assert_ref(c);
1195 pa_assert(t);
1196 pa_assert(buf);
1197 pa_assert(fail);
1198
1199 if (!(n = pa_tokenizer_get(t, 1))) {
1200 pa_strbuf_puts(buf, "You need to specify a source output by its index.\n");
1201 return -1;
1202 }
1203
1204 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
1205 pa_strbuf_puts(buf, "Failed to parse index.\n");
1206 return -1;
1207 }
1208
1209 if (!(k = pa_tokenizer_get(t, 2))) {
1210 pa_strbuf_puts(buf, "You need to specify a source.\n");
1211 return -1;
1212 }
1213
1214 if (!(so = pa_idxset_get_by_index(c->source_outputs, (uint32_t) idx))) {
1215 pa_strbuf_puts(buf, "No source output found with this index.\n");
1216 return -1;
1217 }
1218
1219 if (!(source = pa_namereg_get(c, k, PA_NAMEREG_SOURCE))) {
1220 pa_strbuf_puts(buf, "No source found by this name or index.\n");
1221 return -1;
1222 }
1223
1224 if (pa_source_output_move_to(so, source, TRUE) < 0) {
1225 pa_strbuf_puts(buf, "Moved failed.\n");
1226 return -1;
1227 }
1228 return 0;
1229 }
1230
1231 static int pa_cli_command_suspend_sink(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1232 const char *n, *m;
1233 pa_sink *sink;
1234 int suspend;
1235
1236 pa_core_assert_ref(c);
1237 pa_assert(t);
1238 pa_assert(buf);
1239 pa_assert(fail);
1240
1241 if (!(n = pa_tokenizer_get(t, 1))) {
1242 pa_strbuf_puts(buf, "You need to specify a sink either by its name or its index.\n");
1243 return -1;
1244 }
1245
1246 if (!(m = pa_tokenizer_get(t, 2))) {
1247 pa_strbuf_puts(buf, "You need to specify a suspend switch setting (0/1).\n");
1248 return -1;
1249 }
1250
1251 if ((suspend = pa_parse_boolean(m)) < 0) {
1252 pa_strbuf_puts(buf, "Failed to parse suspend switch.\n");
1253 return -1;
1254 }
1255
1256 if (!(sink = pa_namereg_get(c, n, PA_NAMEREG_SINK))) {
1257 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
1258 return -1;
1259 }
1260
1261 pa_sink_suspend(sink, suspend);
1262 return 0;
1263 }
1264
1265 static int pa_cli_command_suspend_source(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1266 const char *n, *m;
1267 pa_source *source;
1268 int suspend;
1269
1270 pa_core_assert_ref(c);
1271 pa_assert(t);
1272 pa_assert(buf);
1273 pa_assert(fail);
1274
1275 if (!(n = pa_tokenizer_get(t, 1))) {
1276 pa_strbuf_puts(buf, "You need to specify a source either by its name or its index.\n");
1277 return -1;
1278 }
1279
1280 if (!(m = pa_tokenizer_get(t, 2))) {
1281 pa_strbuf_puts(buf, "You need to specify a suspend switch setting (0/1).\n");
1282 return -1;
1283 }
1284
1285 if ((suspend = pa_parse_boolean(m)) < 0) {
1286 pa_strbuf_puts(buf, "Failed to parse suspend switch.\n");
1287 return -1;
1288 }
1289
1290 if (!(source = pa_namereg_get(c, n, PA_NAMEREG_SOURCE))) {
1291 pa_strbuf_puts(buf, "No source found by this name or index.\n");
1292 return -1;
1293 }
1294
1295 pa_source_suspend(source, suspend);
1296 return 0;
1297 }
1298
1299 static int pa_cli_command_suspend(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1300 const char *m;
1301 int suspend;
1302 int ret;
1303
1304 pa_core_assert_ref(c);
1305 pa_assert(t);
1306 pa_assert(buf);
1307 pa_assert(fail);
1308
1309 if (!(m = pa_tokenizer_get(t, 1))) {
1310 pa_strbuf_puts(buf, "You need to specify a suspend switch setting (0/1).\n");
1311 return -1;
1312 }
1313
1314 if ((suspend = pa_parse_boolean(m)) < 0) {
1315 pa_strbuf_puts(buf, "Failed to parse suspend switch.\n");
1316 return -1;
1317 }
1318
1319 ret = - (pa_sink_suspend_all(c, suspend) < 0);
1320 if (pa_source_suspend_all(c, suspend) < 0)
1321 ret = -1;
1322
1323 if (ret < 0)
1324 pa_strbuf_puts(buf, "Failed to resume/suspend all sinks/sources.\n");
1325
1326 return 0;
1327 }
1328
1329 static int pa_cli_command_log_level(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1330 const char *m;
1331 uint32_t level;
1332
1333 pa_core_assert_ref(c);
1334 pa_assert(t);
1335 pa_assert(buf);
1336 pa_assert(fail);
1337
1338 if (!(m = pa_tokenizer_get(t, 1))) {
1339 pa_strbuf_puts(buf, "You need to specify a log level (0..4).\n");
1340 return -1;
1341 }
1342
1343 if (pa_atou(m, &level) < 0 || level >= PA_LOG_LEVEL_MAX) {
1344 pa_strbuf_puts(buf, "Failed to parse log level.\n");
1345 return -1;
1346 }
1347
1348 pa_log_set_maximal_level(level);
1349
1350 return 0;
1351 }
1352
1353 static int pa_cli_command_log_meta(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1354 const char *m;
1355 pa_bool_t b;
1356
1357 pa_core_assert_ref(c);
1358 pa_assert(t);
1359 pa_assert(buf);
1360 pa_assert(fail);
1361
1362 if (!(m = pa_tokenizer_get(t, 1))) {
1363 pa_strbuf_puts(buf, "You need to specify a boolean.\n");
1364 return -1;
1365 }
1366
1367 if ((b = pa_parse_boolean(m)) < 0) {
1368 pa_strbuf_puts(buf, "Failed to parse log meta switch.\n");
1369 return -1;
1370 }
1371
1372 pa_log_set_show_meta(b);
1373
1374 return 0;
1375 }
1376
1377 static int pa_cli_command_log_time(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1378 const char *m;
1379 pa_bool_t b;
1380
1381 pa_core_assert_ref(c);
1382 pa_assert(t);
1383 pa_assert(buf);
1384 pa_assert(fail);
1385
1386 if (!(m = pa_tokenizer_get(t, 1))) {
1387 pa_strbuf_puts(buf, "You need to specify a boolean.\n");
1388 return -1;
1389 }
1390
1391 if ((b = pa_parse_boolean(m)) < 0) {
1392 pa_strbuf_puts(buf, "Failed to parse log meta switch.\n");
1393 return -1;
1394 }
1395
1396 pa_log_set_show_time(b);
1397
1398 return 0;
1399 }
1400
1401 static int pa_cli_command_log_backtrace(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1402 const char *m;
1403 uint32_t nframes;
1404
1405 pa_core_assert_ref(c);
1406 pa_assert(t);
1407 pa_assert(buf);
1408 pa_assert(fail);
1409
1410 if (!(m = pa_tokenizer_get(t, 1))) {
1411 pa_strbuf_puts(buf, "You need to specify a backtrace level.\n");
1412 return -1;
1413 }
1414
1415 if (pa_atou(m, &nframes) < 0 || nframes >= 1000) {
1416 pa_strbuf_puts(buf, "Failed to parse backtrace level.\n");
1417 return -1;
1418 }
1419
1420 pa_log_set_show_backtrace(nframes);
1421
1422 return 0;
1423 }
1424
1425 static int pa_cli_command_card_profile(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1426 const char *n, *p;
1427 pa_card *card;
1428
1429 pa_core_assert_ref(c);
1430 pa_assert(t);
1431 pa_assert(buf);
1432 pa_assert(fail);
1433
1434 if (!(n = pa_tokenizer_get(t, 1))) {
1435 pa_strbuf_puts(buf, "You need to specify a card either by its name or its index.\n");
1436 return -1;
1437 }
1438
1439 if (!(p = pa_tokenizer_get(t, 2))) {
1440 pa_strbuf_puts(buf, "You need to specify a profile by its name.\n");
1441 return -1;
1442 }
1443
1444 if (!(card = pa_namereg_get(c, n, PA_NAMEREG_CARD))) {
1445 pa_strbuf_puts(buf, "No card found by this name or index.\n");
1446 return -1;
1447 }
1448
1449 if (pa_card_set_profile(card, p) < 0) {
1450 pa_strbuf_printf(buf, "Failed to set card profile to '%s'.\n", p);
1451 return -1;
1452 }
1453
1454 return 0;
1455 }
1456
1457 static int pa_cli_command_dump(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1458 pa_module *m;
1459 pa_sink *sink;
1460 pa_source *source;
1461 pa_card *card;
1462 int nl;
1463 uint32_t idx;
1464 char txt[256];
1465 time_t now;
1466
1467 pa_core_assert_ref(c);
1468 pa_assert(t);
1469 pa_assert(buf);
1470 pa_assert(fail);
1471
1472 time(&now);
1473
1474 #ifdef HAVE_CTIME_R
1475 pa_strbuf_printf(buf, "### Configuration dump generated at %s\n", ctime_r(&now, txt));
1476 #else
1477 pa_strbuf_printf(buf, "### Configuration dump generated at %s\n", ctime(&now));
1478 #endif
1479
1480 for (m = pa_idxset_first(c->modules, &idx); m; m = pa_idxset_next(c->modules, &idx)) {
1481
1482 pa_strbuf_printf(buf, "load-module %s", m->name);
1483
1484 if (m->argument)
1485 pa_strbuf_printf(buf, " %s", m->argument);
1486
1487 pa_strbuf_puts(buf, "\n");
1488 }
1489
1490 nl = 0;
1491
1492 for (sink = pa_idxset_first(c->sinks, &idx); sink; sink = pa_idxset_next(c->sinks, &idx)) {
1493
1494 if (!nl) {
1495 pa_strbuf_puts(buf, "\n");
1496 nl = 1;
1497 }
1498
1499 pa_strbuf_printf(buf, "set-sink-volume %s 0x%03x\n", sink->name, pa_cvolume_avg(pa_sink_get_volume(sink, FALSE)));
1500 pa_strbuf_printf(buf, "set-sink-mute %s %s\n", sink->name, pa_yes_no(pa_sink_get_mute(sink, FALSE)));
1501 pa_strbuf_printf(buf, "suspend-sink %s %s\n", sink->name, pa_yes_no(pa_sink_get_state(sink) == PA_SINK_SUSPENDED));
1502 }
1503
1504 for (source = pa_idxset_first(c->sources, &idx); source; source = pa_idxset_next(c->sources, &idx)) {
1505
1506 if (!nl) {
1507 pa_strbuf_puts(buf, "\n");
1508 nl = 1;
1509 }
1510
1511 pa_strbuf_printf(buf, "set-source-volume %s 0x%03x\n", source->name, pa_cvolume_avg(pa_source_get_volume(source, FALSE)));
1512 pa_strbuf_printf(buf, "set-source-mute %s %s\n", source->name, pa_yes_no(pa_source_get_mute(source, FALSE)));
1513 pa_strbuf_printf(buf, "suspend-source %s %s\n", source->name, pa_yes_no(pa_source_get_state(source) == PA_SOURCE_SUSPENDED));
1514 }
1515
1516 for (card = pa_idxset_first(c->cards, &idx); card; card = pa_idxset_next(c->cards, &idx)) {
1517
1518 if (!nl) {
1519 pa_strbuf_puts(buf, "\n");
1520 nl = 1;
1521 }
1522
1523 if (card->active_profile)
1524 pa_strbuf_printf(buf, "set-card-profile %s %s\n", card->name, card->active_profile->name);
1525 }
1526
1527 nl = 0;
1528
1529 if ((sink = pa_namereg_get_default_sink(c))) {
1530 if (!nl) {
1531 pa_strbuf_puts(buf, "\n");
1532 nl = 1;
1533 }
1534 pa_strbuf_printf(buf, "set-default-sink %s\n", sink->name);
1535 }
1536
1537 if ((source = pa_namereg_get_default_source(c))) {
1538 if (!nl) {
1539 pa_strbuf_puts(buf, "\n");
1540 nl = 1;
1541 }
1542 pa_strbuf_printf(buf, "set-default-source %s\n", source->name);
1543 }
1544
1545 pa_strbuf_puts(buf, "\n### EOF\n");
1546
1547 return 0;
1548 }
1549
1550 int pa_cli_command_execute_line_stateful(pa_core *c, const char *s, pa_strbuf *buf, pa_bool_t *fail, int *ifstate) {
1551 const char *cs;
1552
1553 pa_assert(c);
1554 pa_assert(s);
1555 pa_assert(buf);
1556
1557 cs = s+strspn(s, whitespace);
1558
1559 if (*cs == '#' || !*cs)
1560 return 0;
1561 else if (*cs == '.') {
1562 if (!strcmp(cs, META_ELSE)) {
1563 if (!ifstate || *ifstate == IFSTATE_NONE) {
1564 pa_strbuf_printf(buf, "Meta command %s is not valid in this context\n", cs);
1565 return -1;
1566 } else if (*ifstate == IFSTATE_TRUE)
1567 *ifstate = IFSTATE_FALSE;
1568 else
1569 *ifstate = IFSTATE_TRUE;
1570 return 0;
1571 } else if (!strcmp(cs, META_ENDIF)) {
1572 if (!ifstate || *ifstate == IFSTATE_NONE) {
1573 pa_strbuf_printf(buf, "Meta command %s is not valid in this context\n", cs);
1574 return -1;
1575 } else
1576 *ifstate = IFSTATE_NONE;
1577 return 0;
1578 }
1579 if (ifstate && *ifstate == IFSTATE_FALSE)
1580 return 0;
1581 if (!strcmp(cs, META_FAIL))
1582 *fail = TRUE;
1583 else if (!strcmp(cs, META_NOFAIL))
1584 *fail = FALSE;
1585 else {
1586 size_t l;
1587 l = strcspn(cs, whitespace);
1588
1589 if (l == sizeof(META_INCLUDE)-1 && !strncmp(cs, META_INCLUDE, l)) {
1590 const char *filename = cs+l+strspn(cs+l, whitespace);
1591 if (pa_cli_command_execute_file(c, filename, buf, fail) < 0)
1592 if (*fail)
1593 return -1;
1594 } else if (l == sizeof(META_IFEXISTS)-1 && !strncmp(cs, META_IFEXISTS, l)) {
1595 if (!ifstate) {
1596 pa_strbuf_printf(buf, "Meta command %s is not valid in this context\n", cs);
1597 return -1;
1598 } else if (*ifstate != IFSTATE_NONE) {
1599 pa_strbuf_printf(buf, "Nested %s commands not supported\n", cs);
1600 return -1;
1601 } else {
1602 const char *filename = cs+l+strspn(cs+l, whitespace);
1603
1604 /* Search DL_SEARCH_PATH unless the filename is absolute */
1605 if (filename[0] == PA_PATH_SEP_CHAR) {
1606
1607 *ifstate = access(filename, F_OK) == 0 ? IFSTATE_TRUE : IFSTATE_FALSE;
1608 pa_log_debug("Checking for existance of '%s': %s", filename, *ifstate == IFSTATE_TRUE ? "success" : "failure");
1609
1610 } else {
1611 const char *paths, *state = NULL;
1612 char *p;
1613
1614 if (!(paths = lt_dlgetsearchpath()))
1615 return -1;
1616
1617 while ((p = pa_split(paths, ":", &state))) {
1618 char *pathname;
1619
1620 pathname = pa_sprintf_malloc("%s" PA_PATH_SEP "%s", p, filename);
1621 pa_xfree(p);
1622
1623 *ifstate = access(pathname, F_OK) == 0 ? IFSTATE_TRUE : IFSTATE_FALSE;
1624 pa_log_debug("Checking for existance of '%s': %s", pathname, *ifstate == IFSTATE_TRUE ? "success" : "failure");
1625
1626 pa_xfree(pathname);
1627
1628 if (*ifstate == IFSTATE_TRUE)
1629 break;
1630 }
1631 }
1632
1633 }
1634 } else {
1635 pa_strbuf_printf(buf, "Invalid meta command: %s\n", cs);
1636 if (*fail) return -1;
1637 }
1638 }
1639 } else {
1640 const struct command*command;
1641 int unknown = 1;
1642 size_t l;
1643
1644 if (ifstate && *ifstate == IFSTATE_FALSE)
1645 return 0;
1646
1647 l = strcspn(cs, whitespace);
1648
1649 for (command = commands; command->name; command++)
1650 if (strlen(command->name) == l && !strncmp(cs, command->name, l)) {
1651 int ret;
1652 pa_tokenizer *t = pa_tokenizer_new(cs, command->args);
1653 pa_assert(t);
1654 ret = command->proc(c, t, buf, fail);
1655 pa_tokenizer_free(t);
1656 unknown = 0;
1657
1658 if (ret < 0 && *fail)
1659 return -1;
1660
1661 break;
1662 }
1663
1664 if (unknown) {
1665 pa_strbuf_printf(buf, "Unknown command: %s\n", cs);
1666 if (*fail)
1667 return -1;
1668 }
1669 }
1670
1671 return 0;
1672 }
1673
1674 int pa_cli_command_execute_line(pa_core *c, const char *s, pa_strbuf *buf, pa_bool_t *fail) {
1675 return pa_cli_command_execute_line_stateful(c, s, buf, fail, NULL);
1676 }
1677
1678 int pa_cli_command_execute_file_stream(pa_core *c, FILE *f, pa_strbuf *buf, pa_bool_t *fail) {
1679 char line[1024];
1680 int ifstate = IFSTATE_NONE;
1681 int ret = -1;
1682 pa_bool_t _fail = TRUE;
1683
1684 pa_assert(c);
1685 pa_assert(f);
1686 pa_assert(buf);
1687
1688 if (!fail)
1689 fail = &_fail;
1690
1691 while (fgets(line, sizeof(line), f)) {
1692 pa_strip_nl(line);
1693
1694 if (pa_cli_command_execute_line_stateful(c, line, buf, fail, &ifstate) < 0 && *fail)
1695 goto fail;
1696 }
1697
1698 ret = 0;
1699
1700 fail:
1701
1702 return ret;
1703 }
1704
1705 int pa_cli_command_execute_file(pa_core *c, const char *fn, pa_strbuf *buf, pa_bool_t *fail) {
1706 FILE *f = NULL;
1707 int ret = -1;
1708 pa_bool_t _fail = TRUE;
1709
1710 pa_assert(c);
1711 pa_assert(fn);
1712 pa_assert(buf);
1713
1714 if (!fail)
1715 fail = &_fail;
1716
1717 if (!(f = fopen(fn, "r"))) {
1718 pa_strbuf_printf(buf, "open('%s') failed: %s\n", fn, pa_cstrerror(errno));
1719 if (!*fail)
1720 ret = 0;
1721 goto fail;
1722 }
1723
1724 ret = pa_cli_command_execute_file_stream(c, f, buf, fail);
1725
1726 ret = 0;
1727
1728 fail:
1729 if (f)
1730 fclose(f);
1731
1732 return ret;
1733 }
1734
1735 int pa_cli_command_execute(pa_core *c, const char *s, pa_strbuf *buf, pa_bool_t *fail) {
1736 const char *p;
1737 int ifstate = IFSTATE_NONE;
1738 pa_bool_t _fail = TRUE;
1739
1740 pa_assert(c);
1741 pa_assert(s);
1742 pa_assert(buf);
1743
1744 if (!fail)
1745 fail = &_fail;
1746
1747 p = s;
1748 while (*p) {
1749 size_t l = strcspn(p, linebreak);
1750 char *line = pa_xstrndup(p, l);
1751
1752 if (pa_cli_command_execute_line_stateful(c, line, buf, fail, &ifstate) < 0 && *fail) {
1753 pa_xfree(line);
1754 return -1;
1755 }
1756 pa_xfree(line);
1757
1758 p += l;
1759 p += strspn(p, linebreak);
1760 }
1761
1762 return 0;
1763 }