]> code.delx.au - pulseaudio/blob - src/pulsecore/cli-command.c
store the default sink/source in proper pa_sink*/pa_source* pointers instead of a...
[pulseaudio] / src / pulsecore / cli-command.c
1 /***
2 This file is part of PulseAudio.
3
4 Copyright 2004-2006 Lennart Poettering
5 Copyright 2006 Pierre Ossman <ossman@cendio.se> for Cendio AB
6
7 PulseAudio is free software; you can redistribute it and/or modify
8 it under the terms of the GNU Lesser General Public License as published
9 by the Free Software Foundation; either version 2 of the License,
10 or (at your option) any later version.
11
12 PulseAudio is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 General Public License for more details.
16
17 You should have received a copy of the GNU Lesser General Public License
18 along with PulseAudio; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
20 USA.
21 ***/
22
23 #ifdef HAVE_CONFIG_H
24 #include <config.h>
25 #endif
26
27 #include <stdio.h>
28 #include <string.h>
29 #include <stdlib.h>
30 #include <errno.h>
31 #include <unistd.h>
32 #include <ltdl.h>
33
34 #include <pulse/xmalloc.h>
35
36 #include <pulsecore/module.h>
37 #include <pulsecore/sink.h>
38 #include <pulsecore/source.h>
39 #include <pulsecore/client.h>
40 #include <pulsecore/sink-input.h>
41 #include <pulsecore/source-output.h>
42 #include <pulsecore/tokenizer.h>
43 #include <pulsecore/strbuf.h>
44 #include <pulsecore/namereg.h>
45 #include <pulsecore/cli-text.h>
46 #include <pulsecore/core-scache.h>
47 #include <pulsecore/sample-util.h>
48 #include <pulsecore/sound-file.h>
49 #include <pulsecore/play-memchunk.h>
50 #include <pulsecore/sound-file-stream.h>
51 #include <pulsecore/shared.h>
52 #include <pulsecore/core-util.h>
53 #include <pulsecore/core-error.h>
54 #include <pulsecore/modinfo.h>
55
56 #include "cli-command.h"
57
58 struct command {
59 const char *name;
60 int (*proc) (pa_core *c, pa_tokenizer*t, pa_strbuf *buf, pa_bool_t *fail);
61 const char *help;
62 unsigned args;
63 };
64
65 #define META_INCLUDE ".include"
66 #define META_FAIL ".fail"
67 #define META_NOFAIL ".nofail"
68 #define META_IFEXISTS ".ifexists"
69 #define META_ELSE ".else"
70 #define META_ENDIF ".endif"
71
72 enum {
73 IFSTATE_NONE = -1,
74 IFSTATE_FALSE = 0,
75 IFSTATE_TRUE = 1,
76 };
77
78 /* Prototypes for all available commands */
79 static int pa_cli_command_exit(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
80 static int pa_cli_command_help(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
81 static int pa_cli_command_modules(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
82 static int pa_cli_command_clients(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
83 static int pa_cli_command_cards(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
84 static int pa_cli_command_sinks(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
85 static int pa_cli_command_sources(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
86 static int pa_cli_command_sink_inputs(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
87 static int pa_cli_command_source_outputs(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
88 static int pa_cli_command_stat(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
89 static int pa_cli_command_info(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
90 static int pa_cli_command_load(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
91 static int pa_cli_command_unload(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
92 static int pa_cli_command_describe(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
93 static int pa_cli_command_sink_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
94 static int pa_cli_command_sink_input_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
95 static int pa_cli_command_source_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
96 static int pa_cli_command_sink_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
97 static int pa_cli_command_source_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
98 static int pa_cli_command_sink_input_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
99 static int pa_cli_command_sink_default(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
100 static int pa_cli_command_source_default(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
101 static int pa_cli_command_kill_client(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
102 static int pa_cli_command_kill_sink_input(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
103 static int pa_cli_command_kill_source_output(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
104 static int pa_cli_command_scache_play(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
105 static int pa_cli_command_scache_remove(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
106 static int pa_cli_command_scache_list(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
107 static int pa_cli_command_scache_load(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
108 static int pa_cli_command_scache_load_dir(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
109 static int pa_cli_command_play_file(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
110 static int pa_cli_command_dump(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
111 static int pa_cli_command_list_shared_props(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
112 static int pa_cli_command_move_sink_input(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
113 static int pa_cli_command_move_source_output(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
114 static int pa_cli_command_vacuum(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
115 static int pa_cli_command_suspend_sink(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
116 static int pa_cli_command_suspend_source(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
117 static int pa_cli_command_suspend(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
118 static int pa_cli_command_log_level(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
119 static int pa_cli_command_log_meta(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
120 static int pa_cli_command_log_time(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
121 static int pa_cli_command_log_backtrace(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
122 static int pa_cli_command_update_sink_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
123 static int pa_cli_command_update_source_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
124 static int pa_cli_command_update_sink_input_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
125 static int pa_cli_command_update_source_output_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
126 static int pa_cli_command_card_profile(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail);
127
128 /* A method table for all available commands */
129
130 static const struct command commands[] = {
131 { "exit", pa_cli_command_exit, "Terminate the daemon", 1 },
132 { "help", pa_cli_command_help, "Show this help", 1 },
133 { "list-modules", pa_cli_command_modules, "List loaded modules", 1 },
134 { "list-sinks", pa_cli_command_sinks, "List loaded sinks", 1 },
135 { "list-sources", pa_cli_command_sources, "List loaded sources", 1 },
136 { "list-clients", pa_cli_command_clients, "List loaded clients", 1 },
137 { "list-sink-inputs", pa_cli_command_sink_inputs, "List sink inputs", 1 },
138 { "list-source-outputs", pa_cli_command_source_outputs, "List source outputs", 1 },
139 { "list-cards", pa_cli_command_cards, "List cards", 1 },
140 { "stat", pa_cli_command_stat, "Show memory block statistics", 1 },
141 { "info", pa_cli_command_info, "Show comprehensive status", 1 },
142 { "ls", pa_cli_command_info, NULL, 1 },
143 { "list", pa_cli_command_info, NULL, 1 },
144 { "load-module", pa_cli_command_load, "Load a module (args: name, arguments)", 3},
145 { "unload-module", pa_cli_command_unload, "Unload a module (args: index)", 2},
146 { "describe-module", pa_cli_command_describe, "Describe a module (arg: name)", 2},
147 { "set-sink-volume", pa_cli_command_sink_volume, "Set the volume of a sink (args: index|name, volume)", 3},
148 { "set-sink-input-volume", pa_cli_command_sink_input_volume, "Set the volume of a sink input (args: index, volume)", 3},
149 { "set-source-volume", pa_cli_command_source_volume, "Set the volume of a source (args: index|name, volume)", 3},
150 { "set-sink-mute", pa_cli_command_sink_mute, "Set the mute switch of a sink (args: index|name, bool)", 3},
151 { "set-sink-input-mute", pa_cli_command_sink_input_mute, "Set the mute switch of a sink input (args: index, bool)", 3},
152 { "set-source-mute", pa_cli_command_source_mute, "Set the mute switch of a source (args: index|name, bool)", 3},
153 { "update-sink-proplist", pa_cli_command_update_sink_proplist, "Update the properties of a sink (args: index|name, properties)", 3},
154 { "update-source-proplist", pa_cli_command_update_source_proplist, "Update the properties of a source (args: index|name, properties)", 3},
155 { "update-sink-input-proplist", pa_cli_command_update_sink_input_proplist, "Update the properties of a sink input (args: index, properties)", 3},
156 { "update-source-output-proplist", pa_cli_command_update_source_output_proplist, "Update the properties of a source_output (args: index, properties)", 3},
157 { "set-default-sink", pa_cli_command_sink_default, "Set the default sink (args: index|name)", 2},
158 { "set-default-source", pa_cli_command_source_default, "Set the default source (args: index|name)", 2},
159 { "kill-client", pa_cli_command_kill_client, "Kill a client (args: index)", 2},
160 { "kill-sink-input", pa_cli_command_kill_sink_input, "Kill a sink input (args: index)", 2},
161 { "kill-source-output", pa_cli_command_kill_source_output, "Kill a source output (args: index)", 2},
162 { "list-samples", pa_cli_command_scache_list, "List all entries in the sample cache", 1},
163 { "play-sample", pa_cli_command_scache_play, "Play a sample from the sample cache (args: name, sink|index)", 3},
164 { "remove-sample", pa_cli_command_scache_remove, "Remove a sample from the sample cache (args: name)", 2},
165 { "load-sample", pa_cli_command_scache_load, "Load a sound file into the sample cache (args: name, filename)", 3},
166 { "load-sample-lazy", pa_cli_command_scache_load, "Lazily load a sound file into the sample cache (args: name, filename)", 3},
167 { "load-sample-dir-lazy", pa_cli_command_scache_load_dir, "Lazily load all files in a directory into the sample cache (args: pathname)", 2},
168 { "play-file", pa_cli_command_play_file, "Play a sound file (args: filename, sink|index)", 3},
169 { "dump", pa_cli_command_dump, "Dump daemon configuration", 1},
170 { "shared", pa_cli_command_list_shared_props, NULL, 1},
171 { "move-sink-input", pa_cli_command_move_sink_input, "Move sink input to another sink (args: index, sink)", 3},
172 { "move-source-output", pa_cli_command_move_source_output, "Move source output to another source (args: index, source)", 3},
173 { "vacuum", pa_cli_command_vacuum, NULL, 1},
174 { "suspend-sink", pa_cli_command_suspend_sink, "Suspend sink (args: index|name, bool)", 3},
175 { "suspend-source", pa_cli_command_suspend_source, "Suspend source (args: index|name, bool)", 3},
176 { "suspend", pa_cli_command_suspend, "Suspend all sinks and all sources (args: bool)", 2},
177 { "set-card-profile", pa_cli_command_card_profile, "Change the profile of a card (aargs: index, name)", 3},
178 { "set-log-level", pa_cli_command_log_level, "Change the log level (args: numeric level)", 2},
179 { "set-log-meta", pa_cli_command_log_meta, "Show source code location in log messages (args: bool)", 2},
180 { "set-log-time", pa_cli_command_log_time, "Show timestamps in log messages (args: bool)", 2},
181 { "set-log-backtrace", pa_cli_command_log_backtrace, "Show bakctrace in log messages (args: frames)", 2},
182 { NULL, NULL, NULL, 0 }
183 };
184
185 static const char whitespace[] = " \t\n\r";
186 static const char linebreak[] = "\n\r";
187
188 static uint32_t parse_index(const char *n) {
189 uint32_t idx;
190
191 if (pa_atou(n, &idx) < 0)
192 return (uint32_t) PA_IDXSET_INVALID;
193
194 return idx;
195 }
196
197 static int pa_cli_command_exit(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
198 pa_core_assert_ref(c);
199 pa_assert(t);
200 pa_assert(buf);
201 pa_assert(fail);
202
203 if (pa_core_exit(c, FALSE, 0) < 0)
204 pa_strbuf_puts(buf, "Not allowed to terminate daemon.\n");
205
206 return 0;
207 }
208
209 static int pa_cli_command_help(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
210 const struct command*command;
211
212 pa_core_assert_ref(c);
213 pa_assert(t);
214 pa_assert(buf);
215 pa_assert(fail);
216
217 pa_strbuf_puts(buf, "Available commands:\n");
218
219 for (command = commands; command->name; command++)
220 if (command->help)
221 pa_strbuf_printf(buf, " %-25s %s\n", command->name, command->help);
222 return 0;
223 }
224
225 static int pa_cli_command_modules(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
226 char *s;
227
228 pa_core_assert_ref(c);
229 pa_assert(t);
230 pa_assert(buf);
231 pa_assert(fail);
232
233 pa_assert_se(s = pa_module_list_to_string(c));
234 pa_strbuf_puts(buf, s);
235 pa_xfree(s);
236 return 0;
237 }
238
239 static int pa_cli_command_clients(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
240 char *s;
241
242 pa_core_assert_ref(c);
243 pa_assert(t);
244 pa_assert(buf);
245 pa_assert(fail);
246
247 pa_assert_se(s = pa_client_list_to_string(c));
248 pa_strbuf_puts(buf, s);
249 pa_xfree(s);
250 return 0;
251 }
252
253 static int pa_cli_command_cards(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
254 char *s;
255
256 pa_core_assert_ref(c);
257 pa_assert(t);
258 pa_assert(buf);
259 pa_assert(fail);
260
261 pa_assert_se(s = pa_card_list_to_string(c));
262 pa_strbuf_puts(buf, s);
263 pa_xfree(s);
264 return 0;
265 }
266
267 static int pa_cli_command_sinks(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
268 char *s;
269
270 pa_core_assert_ref(c);
271 pa_assert(t);
272 pa_assert(buf);
273 pa_assert(fail);
274
275 pa_assert_se(s = pa_sink_list_to_string(c));
276 pa_strbuf_puts(buf, s);
277 pa_xfree(s);
278 return 0;
279 }
280
281 static int pa_cli_command_sources(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
282 char *s;
283
284 pa_core_assert_ref(c);
285 pa_assert(t);
286 pa_assert(buf);
287 pa_assert(fail);
288
289 pa_assert_se(s = pa_source_list_to_string(c));
290 pa_strbuf_puts(buf, s);
291 pa_xfree(s);
292 return 0;
293 }
294
295 static int pa_cli_command_sink_inputs(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
296 char *s;
297
298 pa_core_assert_ref(c);
299 pa_assert(t);
300 pa_assert(buf);
301 pa_assert(fail);
302
303 pa_assert_se(s = pa_sink_input_list_to_string(c));
304 pa_strbuf_puts(buf, s);
305 pa_xfree(s);
306 return 0;
307 }
308
309 static int pa_cli_command_source_outputs(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
310 char *s;
311
312 pa_core_assert_ref(c);
313 pa_assert(t);
314 pa_assert(buf);
315 pa_assert(fail);
316
317 pa_assert_se(s = pa_source_output_list_to_string(c));
318 pa_strbuf_puts(buf, s);
319 pa_xfree(s);
320 return 0;
321 }
322
323 static int pa_cli_command_stat(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
324 char s[256];
325 const pa_mempool_stat *stat;
326 unsigned k;
327 pa_sink *def_sink;
328 pa_source *def_source;
329
330 static const char* const type_table[PA_MEMBLOCK_TYPE_MAX] = {
331 [PA_MEMBLOCK_POOL] = "POOL",
332 [PA_MEMBLOCK_POOL_EXTERNAL] = "POOL_EXTERNAL",
333 [PA_MEMBLOCK_APPENDED] = "APPENDED",
334 [PA_MEMBLOCK_USER] = "USER",
335 [PA_MEMBLOCK_FIXED] = "FIXED",
336 [PA_MEMBLOCK_IMPORTED] = "IMPORTED",
337 };
338
339 pa_core_assert_ref(c);
340 pa_assert(t);
341 pa_assert(buf);
342 pa_assert(fail);
343
344 stat = pa_mempool_get_stat(c->mempool);
345
346 pa_strbuf_printf(buf, "Memory blocks currently allocated: %u, size: %s.\n",
347 (unsigned) pa_atomic_load(&stat->n_allocated),
348 pa_bytes_snprint(s, sizeof(s), (unsigned) pa_atomic_load(&stat->allocated_size)));
349
350 pa_strbuf_printf(buf, "Memory blocks allocated during the whole lifetime: %u, size: %s.\n",
351 (unsigned) pa_atomic_load(&stat->n_accumulated),
352 pa_bytes_snprint(s, sizeof(s), (unsigned) pa_atomic_load(&stat->accumulated_size)));
353
354 pa_strbuf_printf(buf, "Memory blocks imported from other processes: %u, size: %s.\n",
355 (unsigned) pa_atomic_load(&stat->n_imported),
356 pa_bytes_snprint(s, sizeof(s), (unsigned) pa_atomic_load(&stat->imported_size)));
357
358 pa_strbuf_printf(buf, "Memory blocks exported to other processes: %u, size: %s.\n",
359 (unsigned) pa_atomic_load(&stat->n_exported),
360 pa_bytes_snprint(s, sizeof(s), (unsigned) pa_atomic_load(&stat->exported_size)));
361
362 pa_strbuf_printf(buf, "Total sample cache size: %s.\n",
363 pa_bytes_snprint(s, sizeof(s), (unsigned) pa_scache_total_size(c)));
364
365 pa_strbuf_printf(buf, "Default sample spec: %s\n",
366 pa_sample_spec_snprint(s, sizeof(s), &c->default_sample_spec));
367
368 def_sink = pa_namereg_get_default_sink(c);
369 def_source = pa_namereg_get_default_source(c);
370 pa_strbuf_printf(buf, "Default sink name: %s\n"
371 "Default source name: %s\n",
372 def_sink ? def_sink->name : "none",
373 def_source ? def_source->name : "none");
374
375 for (k = 0; k < PA_MEMBLOCK_TYPE_MAX; k++)
376 pa_strbuf_printf(buf,
377 "Memory blocks of type %s: %u allocated/%u accumulated.\n",
378 type_table[k],
379 (unsigned) pa_atomic_load(&stat->n_allocated_by_type[k]),
380 (unsigned) pa_atomic_load(&stat->n_accumulated_by_type[k]));
381
382 return 0;
383 }
384
385 static int pa_cli_command_info(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
386 pa_core_assert_ref(c);
387 pa_assert(t);
388 pa_assert(buf);
389 pa_assert(fail);
390
391 pa_cli_command_stat(c, t, buf, fail);
392 pa_cli_command_modules(c, t, buf, fail);
393 pa_cli_command_sinks(c, t, buf, fail);
394 pa_cli_command_sources(c, t, buf, fail);
395 pa_cli_command_clients(c, t, buf, fail);
396 pa_cli_command_cards(c, t, buf, fail);
397 pa_cli_command_sink_inputs(c, t, buf, fail);
398 pa_cli_command_source_outputs(c, t, buf, fail);
399 pa_cli_command_scache_list(c, t, buf, fail);
400 return 0;
401 }
402
403 static int pa_cli_command_load(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
404 pa_module *m;
405 const char *name;
406
407 pa_core_assert_ref(c);
408 pa_assert(t);
409 pa_assert(buf);
410 pa_assert(fail);
411
412 if (!(name = pa_tokenizer_get(t, 1))) {
413 pa_strbuf_puts(buf, "You need to specify the module name and optionally arguments.\n");
414 return -1;
415 }
416
417 if (!(m = pa_module_load(c, name, pa_tokenizer_get(t, 2)))) {
418 pa_strbuf_puts(buf, "Module load failed.\n");
419 return -1;
420 }
421
422 return 0;
423 }
424
425 static int pa_cli_command_unload(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
426 pa_module *m;
427 uint32_t idx;
428 const char *i;
429 char *e;
430
431 pa_core_assert_ref(c);
432 pa_assert(t);
433 pa_assert(buf);
434 pa_assert(fail);
435
436 if (!(i = pa_tokenizer_get(t, 1))) {
437 pa_strbuf_puts(buf, "You need to specify the module index.\n");
438 return -1;
439 }
440
441 idx = (uint32_t) strtoul(i, &e, 10);
442 if (*e || !(m = pa_idxset_get_by_index(c->modules, idx))) {
443 pa_strbuf_puts(buf, "Invalid module index.\n");
444 return -1;
445 }
446
447 pa_module_unload_request(m, FALSE);
448 return 0;
449 }
450
451 static int pa_cli_command_describe(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
452 const char *name;
453 pa_modinfo *i;
454
455 pa_core_assert_ref(c);
456 pa_assert(t);
457 pa_assert(buf);
458 pa_assert(fail);
459
460 if (!(name = pa_tokenizer_get(t, 1))) {
461 pa_strbuf_puts(buf, "You need to specify the module name.\n");
462 return -1;
463 }
464
465 if ((i = pa_modinfo_get_by_name(name))) {
466
467 pa_strbuf_printf(buf, "Name: %s\n", name);
468
469 if (!i->description && !i->version && !i->author && !i->usage)
470 pa_strbuf_printf(buf, "No module information available\n");
471 else {
472 if (i->version)
473 pa_strbuf_printf(buf, "Version: %s\n", i->version);
474 if (i->description)
475 pa_strbuf_printf(buf, "Description: %s\n", i->description);
476 if (i->author)
477 pa_strbuf_printf(buf, "Author: %s\n", i->author);
478 if (i->usage)
479 pa_strbuf_printf(buf, "Usage: %s\n", i->usage);
480 pa_strbuf_printf(buf, "Load Once: %s\n", pa_yes_no(i->load_once));
481 }
482
483 pa_modinfo_free(i);
484 } else
485 pa_strbuf_puts(buf, "Failed to open module.\n");
486
487 return 0;
488 }
489
490 static int pa_cli_command_sink_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
491 const char *n, *v;
492 pa_sink *sink;
493 uint32_t volume;
494 pa_cvolume cvolume;
495
496 pa_core_assert_ref(c);
497 pa_assert(t);
498 pa_assert(buf);
499 pa_assert(fail);
500
501 if (!(n = pa_tokenizer_get(t, 1))) {
502 pa_strbuf_puts(buf, "You need to specify a sink either by its name or its index.\n");
503 return -1;
504 }
505
506 if (!(v = pa_tokenizer_get(t, 2))) {
507 pa_strbuf_puts(buf, "You need to specify a volume >= 0. (0 is muted, 0x10000 is normal volume)\n");
508 return -1;
509 }
510
511 if (pa_atou(v, &volume) < 0) {
512 pa_strbuf_puts(buf, "Failed to parse volume.\n");
513 return -1;
514 }
515
516 if (!(sink = pa_namereg_get(c, n, PA_NAMEREG_SINK))) {
517 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
518 return -1;
519 }
520
521 pa_cvolume_set(&cvolume, sink->sample_spec.channels, volume);
522 pa_sink_set_volume(sink, &cvolume, TRUE, TRUE);
523 return 0;
524 }
525
526 static int pa_cli_command_sink_input_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
527 const char *n, *v;
528 pa_sink_input *si;
529 pa_volume_t volume;
530 pa_cvolume cvolume;
531 uint32_t idx;
532
533 pa_core_assert_ref(c);
534 pa_assert(t);
535 pa_assert(buf);
536 pa_assert(fail);
537
538 if (!(n = pa_tokenizer_get(t, 1))) {
539 pa_strbuf_puts(buf, "You need to specify a sink input by its index.\n");
540 return -1;
541 }
542
543 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
544 pa_strbuf_puts(buf, "Failed to parse index.\n");
545 return -1;
546 }
547
548 if (!(v = pa_tokenizer_get(t, 2))) {
549 pa_strbuf_puts(buf, "You need to specify a volume >= 0. (0 is muted, 0x10000 is normal volume)\n");
550 return -1;
551 }
552
553 if (pa_atou(v, &volume) < 0) {
554 pa_strbuf_puts(buf, "Failed to parse volume.\n");
555 return -1;
556 }
557
558 if (!(si = pa_idxset_get_by_index(c->sink_inputs, (uint32_t) idx))) {
559 pa_strbuf_puts(buf, "No sink input found with this index.\n");
560 return -1;
561 }
562
563 pa_cvolume_set(&cvolume, si->sample_spec.channels, volume);
564 pa_sink_input_set_volume(si, &cvolume, TRUE);
565 return 0;
566 }
567
568 static int pa_cli_command_source_volume(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
569 const char *n, *v;
570 pa_source *source;
571 uint32_t volume;
572 pa_cvolume cvolume;
573
574 pa_core_assert_ref(c);
575 pa_assert(t);
576 pa_assert(buf);
577 pa_assert(fail);
578
579 if (!(n = pa_tokenizer_get(t, 1))) {
580 pa_strbuf_puts(buf, "You need to specify a source either by its name or its index.\n");
581 return -1;
582 }
583
584 if (!(v = pa_tokenizer_get(t, 2))) {
585 pa_strbuf_puts(buf, "You need to specify a volume >= 0. (0 is muted, 0x10000 is normal volume)\n");
586 return -1;
587 }
588
589 if (pa_atou(v, &volume) < 0) {
590 pa_strbuf_puts(buf, "Failed to parse volume.\n");
591 return -1;
592 }
593
594 if (!(source = pa_namereg_get(c, n, PA_NAMEREG_SOURCE))) {
595 pa_strbuf_puts(buf, "No source found by this name or index.\n");
596 return -1;
597 }
598
599 pa_cvolume_set(&cvolume, source->sample_spec.channels, volume);
600 pa_source_set_volume(source, &cvolume);
601 return 0;
602 }
603
604 static int pa_cli_command_sink_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
605 const char *n, *m;
606 pa_sink *sink;
607 int mute;
608
609 pa_core_assert_ref(c);
610 pa_assert(t);
611 pa_assert(buf);
612 pa_assert(fail);
613
614 if (!(n = pa_tokenizer_get(t, 1))) {
615 pa_strbuf_puts(buf, "You need to specify a sink either by its name or its index.\n");
616 return -1;
617 }
618
619 if (!(m = pa_tokenizer_get(t, 2))) {
620 pa_strbuf_puts(buf, "You need to specify a mute switch setting (0/1).\n");
621 return -1;
622 }
623
624 if ((mute = pa_parse_boolean(m)) < 0) {
625 pa_strbuf_puts(buf, "Failed to parse mute switch.\n");
626 return -1;
627 }
628
629 if (!(sink = pa_namereg_get(c, n, PA_NAMEREG_SINK))) {
630 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
631 return -1;
632 }
633
634 pa_sink_set_mute(sink, mute);
635 return 0;
636 }
637
638 static int pa_cli_command_source_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
639 const char *n, *m;
640 pa_source *source;
641 int mute;
642
643 pa_core_assert_ref(c);
644 pa_assert(t);
645 pa_assert(buf);
646 pa_assert(fail);
647
648 if (!(n = pa_tokenizer_get(t, 1))) {
649 pa_strbuf_puts(buf, "You need to specify a source either by its name or its index.\n");
650 return -1;
651 }
652
653 if (!(m = pa_tokenizer_get(t, 2))) {
654 pa_strbuf_puts(buf, "You need to specify a mute switch setting (0/1).\n");
655 return -1;
656 }
657
658 if ((mute = pa_parse_boolean(m)) < 0) {
659 pa_strbuf_puts(buf, "Failed to parse mute switch.\n");
660 return -1;
661 }
662
663 if (!(source = pa_namereg_get(c, n, PA_NAMEREG_SOURCE))) {
664 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
665 return -1;
666 }
667
668 pa_source_set_mute(source, mute);
669 return 0;
670 }
671
672 static int pa_cli_command_update_sink_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
673 const char *n, *s;
674 pa_sink *sink;
675 pa_proplist *p;
676
677 pa_core_assert_ref(c);
678 pa_assert(t);
679 pa_assert(buf);
680 pa_assert(fail);
681
682 if (!(n = pa_tokenizer_get(t, 1))) {
683 pa_strbuf_puts(buf, "You need to specify a sink either by its name or its index.\n");
684 return -1;
685 }
686
687 if (!(s = pa_tokenizer_get(t, 2))) {
688 pa_strbuf_puts(buf, "You need to specify a \"key=value\" argument.\n");
689 return -1;
690 }
691
692 if (!(sink = pa_namereg_get(c, n, PA_NAMEREG_SINK))) {
693 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
694 return -1;
695 }
696
697 p = pa_proplist_from_string(s);
698
699 pa_sink_update_proplist(sink, PA_UPDATE_REPLACE, p);
700
701 pa_proplist_free(p);
702
703 return 0;
704 }
705
706 static int pa_cli_command_update_source_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
707 const char *n, *s;
708 pa_source *source;
709 pa_proplist *p;
710
711 pa_core_assert_ref(c);
712 pa_assert(t);
713 pa_assert(buf);
714 pa_assert(fail);
715
716 if (!(n = pa_tokenizer_get(t, 1))) {
717 pa_strbuf_puts(buf, "You need to specify a source either by its name or its index.\n");
718 return -1;
719 }
720
721 if (!(s = pa_tokenizer_get(t, 2))) {
722 pa_strbuf_puts(buf, "You need to specify a \"key=value\" argument.\n");
723 return -1;
724 }
725
726 if (!(source = pa_namereg_get(c, n, PA_NAMEREG_SOURCE))) {
727 pa_strbuf_puts(buf, "No source found by this name or index.\n");
728 return -1;
729 }
730
731 p = pa_proplist_from_string(s);
732
733 pa_source_update_proplist(source, PA_UPDATE_REPLACE, p);
734
735 pa_proplist_free(p);
736
737 return 0;
738 }
739
740 static int pa_cli_command_update_sink_input_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
741 const char *n, *s;
742 pa_sink_input *si;
743 uint32_t idx;
744 pa_proplist *p;
745
746 pa_core_assert_ref(c);
747 pa_assert(t);
748 pa_assert(buf);
749 pa_assert(fail);
750
751 if (!(n = pa_tokenizer_get(t, 1))) {
752 pa_strbuf_puts(buf, "You need to specify a sink input either by index.\n");
753 return -1;
754 }
755
756 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
757 pa_strbuf_puts(buf, "Failed to parse index.\n");
758 return -1;
759 }
760
761 if (!(s = pa_tokenizer_get(t, 2))) {
762 pa_strbuf_puts(buf, "You need to specify a \"key=value\" argument.\n");
763 return -1;
764 }
765
766 if (!(si = pa_idxset_get_by_index(c->sink_inputs, (uint32_t) idx))) {
767 pa_strbuf_puts(buf, "No sink input found with this index.\n");
768 return -1;
769 }
770
771 p = pa_proplist_from_string(s);
772
773 pa_sink_input_update_proplist(si, PA_UPDATE_REPLACE, p);
774
775 pa_proplist_free(p);
776
777 return 0;
778 }
779
780 static int pa_cli_command_update_source_output_proplist(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
781 const char *n, *s;
782 pa_source_output *so;
783 uint32_t idx;
784 pa_proplist *p;
785
786 pa_core_assert_ref(c);
787 pa_assert(t);
788 pa_assert(buf);
789 pa_assert(fail);
790
791 if (!(n = pa_tokenizer_get(t, 1))) {
792 pa_strbuf_puts(buf, "You need to specify a source output by its index.\n");
793 return -1;
794 }
795
796 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
797 pa_strbuf_puts(buf, "Failed to parse index.\n");
798 return -1;
799 }
800
801 if (!(s = pa_tokenizer_get(t, 2))) {
802 pa_strbuf_puts(buf, "You need to specify a \"key=value\" argument.\n");
803 return -1;
804 }
805
806 if (!(so = pa_idxset_get_by_index(c->source_outputs, (uint32_t) idx))) {
807 pa_strbuf_puts(buf, "No source output found with this index.\n");
808 return -1;
809 }
810
811 p = pa_proplist_from_string(s);
812
813 pa_source_output_update_proplist(so, PA_UPDATE_REPLACE, p);
814
815 pa_proplist_free(p);
816
817 return 0;
818 }
819
820 static int pa_cli_command_sink_input_mute(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
821 const char *n, *v;
822 pa_sink_input *si;
823 uint32_t idx;
824 int mute;
825
826 pa_core_assert_ref(c);
827 pa_assert(t);
828 pa_assert(buf);
829 pa_assert(fail);
830
831 if (!(n = pa_tokenizer_get(t, 1))) {
832 pa_strbuf_puts(buf, "You need to specify a sink input by its index.\n");
833 return -1;
834 }
835
836 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
837 pa_strbuf_puts(buf, "Failed to parse index.\n");
838 return -1;
839 }
840
841 if (!(v = pa_tokenizer_get(t, 2))) {
842 pa_strbuf_puts(buf, "You need to specify a mute switch setting (0/1).\n");
843 return -1;
844 }
845
846 if ((mute = pa_parse_boolean(v)) < 0) {
847 pa_strbuf_puts(buf, "Failed to parse mute switch.\n");
848 return -1;
849 }
850
851 if (!(si = pa_idxset_get_by_index(c->sink_inputs, (uint32_t) idx))) {
852 pa_strbuf_puts(buf, "No sink input found with this index.\n");
853 return -1;
854 }
855
856 pa_sink_input_set_mute(si, mute, TRUE);
857 return 0;
858 }
859
860 static int pa_cli_command_sink_default(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
861 const char *n;
862 pa_sink *s;
863
864 pa_core_assert_ref(c);
865 pa_assert(t);
866 pa_assert(buf);
867 pa_assert(fail);
868
869 if (!(n = pa_tokenizer_get(t, 1))) {
870 pa_strbuf_puts(buf, "You need to specify a sink either by its name or its index.\n");
871 return -1;
872 }
873
874 if ((s = pa_namereg_get(c, n, PA_NAMEREG_SINK)))
875 pa_namereg_set_default_sink(c, s);
876 else
877 pa_strbuf_printf(buf, "Sink %s does not exist.\n", n);
878
879 return 0;
880 }
881
882 static int pa_cli_command_source_default(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
883 const char *n;
884 pa_source *s;
885
886 pa_core_assert_ref(c);
887 pa_assert(t);
888 pa_assert(buf);
889 pa_assert(fail);
890
891 if (!(n = pa_tokenizer_get(t, 1))) {
892 pa_strbuf_puts(buf, "You need to specify a source either by its name or its index.\n");
893 return -1;
894 }
895
896 if ((s = pa_namereg_get(c, n, PA_NAMEREG_SOURCE)))
897 pa_namereg_set_default_source(c, s);
898 else
899 pa_strbuf_printf(buf, "Source %s does not exist.\n", n);
900 return 0;
901 }
902
903 static int pa_cli_command_kill_client(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
904 const char *n;
905 pa_client *client;
906 uint32_t idx;
907
908 pa_core_assert_ref(c);
909 pa_assert(t);
910 pa_assert(buf);
911 pa_assert(fail);
912
913 if (!(n = pa_tokenizer_get(t, 1))) {
914 pa_strbuf_puts(buf, "You need to specify a client by its index.\n");
915 return -1;
916 }
917
918 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
919 pa_strbuf_puts(buf, "Failed to parse index.\n");
920 return -1;
921 }
922
923 if (!(client = pa_idxset_get_by_index(c->clients, idx))) {
924 pa_strbuf_puts(buf, "No client found by this index.\n");
925 return -1;
926 }
927
928 pa_client_kill(client);
929 return 0;
930 }
931
932 static int pa_cli_command_kill_sink_input(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
933 const char *n;
934 pa_sink_input *sink_input;
935 uint32_t idx;
936
937 pa_core_assert_ref(c);
938 pa_assert(t);
939 pa_assert(buf);
940 pa_assert(fail);
941
942 if (!(n = pa_tokenizer_get(t, 1))) {
943 pa_strbuf_puts(buf, "You need to specify a sink input by its index.\n");
944 return -1;
945 }
946
947 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
948 pa_strbuf_puts(buf, "Failed to parse index.\n");
949 return -1;
950 }
951
952 if (!(sink_input = pa_idxset_get_by_index(c->sink_inputs, idx))) {
953 pa_strbuf_puts(buf, "No sink input found by this index.\n");
954 return -1;
955 }
956
957 pa_sink_input_kill(sink_input);
958 return 0;
959 }
960
961 static int pa_cli_command_kill_source_output(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
962 const char *n;
963 pa_source_output *source_output;
964 uint32_t idx;
965
966 pa_core_assert_ref(c);
967 pa_assert(t);
968 pa_assert(buf);
969 pa_assert(fail);
970
971 if (!(n = pa_tokenizer_get(t, 1))) {
972 pa_strbuf_puts(buf, "You need to specify a source output by its index.\n");
973 return -1;
974 }
975
976 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
977 pa_strbuf_puts(buf, "Failed to parse index.\n");
978 return -1;
979 }
980
981 if (!(source_output = pa_idxset_get_by_index(c->source_outputs, idx))) {
982 pa_strbuf_puts(buf, "No source output found by this index.\n");
983 return -1;
984 }
985
986 pa_source_output_kill(source_output);
987 return 0;
988 }
989
990 static int pa_cli_command_scache_list(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
991 char *s;
992
993 pa_core_assert_ref(c);
994 pa_assert(t);
995 pa_assert(buf);
996 pa_assert(fail);
997
998 pa_assert_se(s = pa_scache_list_to_string(c));
999 pa_strbuf_puts(buf, s);
1000 pa_xfree(s);
1001
1002 return 0;
1003 }
1004
1005 static int pa_cli_command_scache_play(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1006 const char *n, *sink_name;
1007 pa_sink *sink;
1008 uint32_t idx;
1009
1010 pa_core_assert_ref(c);
1011 pa_assert(t);
1012 pa_assert(buf);
1013 pa_assert(fail);
1014
1015 if (!(n = pa_tokenizer_get(t, 1)) || !(sink_name = pa_tokenizer_get(t, 2))) {
1016 pa_strbuf_puts(buf, "You need to specify a sample name and a sink name.\n");
1017 return -1;
1018 }
1019
1020 if (!(sink = pa_namereg_get(c, sink_name, PA_NAMEREG_SINK))) {
1021 pa_strbuf_puts(buf, "No sink by that name.\n");
1022 return -1;
1023 }
1024
1025 if (pa_scache_play_item(c, n, sink, PA_VOLUME_NORM, NULL, &idx) < 0) {
1026 pa_strbuf_puts(buf, "Failed to play sample.\n");
1027 return -1;
1028 }
1029
1030 pa_strbuf_printf(buf, "Playing on sink input #%i\n", idx);
1031
1032 return 0;
1033 }
1034
1035 static int pa_cli_command_scache_remove(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1036 const char *n;
1037
1038 pa_core_assert_ref(c);
1039 pa_assert(t);
1040 pa_assert(buf);
1041 pa_assert(fail);
1042
1043 if (!(n = pa_tokenizer_get(t, 1))) {
1044 pa_strbuf_puts(buf, "You need to specify a sample name.\n");
1045 return -1;
1046 }
1047
1048 if (pa_scache_remove_item(c, n) < 0) {
1049 pa_strbuf_puts(buf, "Failed to remove sample.\n");
1050 return -1;
1051 }
1052
1053 return 0;
1054 }
1055
1056 static int pa_cli_command_scache_load(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1057 const char *fname, *n;
1058 int r;
1059
1060 pa_core_assert_ref(c);
1061 pa_assert(t);
1062 pa_assert(buf);
1063 pa_assert(fail);
1064
1065 if (!(fname = pa_tokenizer_get(t, 2)) || !(n = pa_tokenizer_get(t, 1))) {
1066 pa_strbuf_puts(buf, "You need to specify a file name and a sample name.\n");
1067 return -1;
1068 }
1069
1070 if (strstr(pa_tokenizer_get(t, 0), "lazy"))
1071 r = pa_scache_add_file_lazy(c, n, fname, NULL);
1072 else
1073 r = pa_scache_add_file(c, n, fname, NULL);
1074
1075 if (r < 0)
1076 pa_strbuf_puts(buf, "Failed to load sound file.\n");
1077
1078 return 0;
1079 }
1080
1081 static int pa_cli_command_scache_load_dir(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1082 const char *pname;
1083
1084 pa_core_assert_ref(c);
1085 pa_assert(t);
1086 pa_assert(buf);
1087 pa_assert(fail);
1088
1089 if (!(pname = pa_tokenizer_get(t, 1))) {
1090 pa_strbuf_puts(buf, "You need to specify a path name.\n");
1091 return -1;
1092 }
1093
1094 if (pa_scache_add_directory_lazy(c, pname) < 0) {
1095 pa_strbuf_puts(buf, "Failed to load directory.\n");
1096 return -1;
1097 }
1098
1099 return 0;
1100 }
1101
1102 static int pa_cli_command_play_file(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1103 const char *fname, *sink_name;
1104 pa_sink *sink;
1105
1106 pa_core_assert_ref(c);
1107 pa_assert(t);
1108 pa_assert(buf);
1109 pa_assert(fail);
1110
1111 if (!(fname = pa_tokenizer_get(t, 1)) || !(sink_name = pa_tokenizer_get(t, 2))) {
1112 pa_strbuf_puts(buf, "You need to specify a file name and a sink name.\n");
1113 return -1;
1114 }
1115
1116 if (!(sink = pa_namereg_get(c, sink_name, PA_NAMEREG_SINK))) {
1117 pa_strbuf_puts(buf, "No sink by that name.\n");
1118 return -1;
1119 }
1120
1121
1122 return pa_play_file(sink, fname, NULL);
1123 }
1124
1125 static int pa_cli_command_list_shared_props(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1126 pa_core_assert_ref(c);
1127 pa_assert(t);
1128 pa_assert(buf);
1129 pa_assert(fail);
1130
1131 pa_shared_dump(c, buf);
1132 return 0;
1133 }
1134
1135 static int pa_cli_command_vacuum(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1136 pa_core_assert_ref(c);
1137 pa_assert(t);
1138 pa_assert(buf);
1139 pa_assert(fail);
1140
1141 pa_mempool_vacuum(c->mempool);
1142
1143 return 0;
1144 }
1145
1146 static int pa_cli_command_move_sink_input(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1147 const char *n, *k;
1148 pa_sink_input *si;
1149 pa_sink *sink;
1150 uint32_t idx;
1151
1152 pa_core_assert_ref(c);
1153 pa_assert(t);
1154 pa_assert(buf);
1155 pa_assert(fail);
1156
1157 if (!(n = pa_tokenizer_get(t, 1))) {
1158 pa_strbuf_puts(buf, "You need to specify a sink input by its index.\n");
1159 return -1;
1160 }
1161
1162 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
1163 pa_strbuf_puts(buf, "Failed to parse index.\n");
1164 return -1;
1165 }
1166
1167 if (!(k = pa_tokenizer_get(t, 2))) {
1168 pa_strbuf_puts(buf, "You need to specify a sink.\n");
1169 return -1;
1170 }
1171
1172 if (!(si = pa_idxset_get_by_index(c->sink_inputs, (uint32_t) idx))) {
1173 pa_strbuf_puts(buf, "No sink input found with this index.\n");
1174 return -1;
1175 }
1176
1177 if (!(sink = pa_namereg_get(c, k, PA_NAMEREG_SINK))) {
1178 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
1179 return -1;
1180 }
1181
1182 if (pa_sink_input_move_to(si, sink, TRUE) < 0) {
1183 pa_strbuf_puts(buf, "Moved failed.\n");
1184 return -1;
1185 }
1186 return 0;
1187 }
1188
1189 static int pa_cli_command_move_source_output(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1190 const char *n, *k;
1191 pa_source_output *so;
1192 pa_source *source;
1193 uint32_t idx;
1194
1195 pa_core_assert_ref(c);
1196 pa_assert(t);
1197 pa_assert(buf);
1198 pa_assert(fail);
1199
1200 if (!(n = pa_tokenizer_get(t, 1))) {
1201 pa_strbuf_puts(buf, "You need to specify a source output by its index.\n");
1202 return -1;
1203 }
1204
1205 if ((idx = parse_index(n)) == PA_IDXSET_INVALID) {
1206 pa_strbuf_puts(buf, "Failed to parse index.\n");
1207 return -1;
1208 }
1209
1210 if (!(k = pa_tokenizer_get(t, 2))) {
1211 pa_strbuf_puts(buf, "You need to specify a source.\n");
1212 return -1;
1213 }
1214
1215 if (!(so = pa_idxset_get_by_index(c->source_outputs, (uint32_t) idx))) {
1216 pa_strbuf_puts(buf, "No source output found with this index.\n");
1217 return -1;
1218 }
1219
1220 if (!(source = pa_namereg_get(c, k, PA_NAMEREG_SOURCE))) {
1221 pa_strbuf_puts(buf, "No source found by this name or index.\n");
1222 return -1;
1223 }
1224
1225 if (pa_source_output_move_to(so, source, TRUE) < 0) {
1226 pa_strbuf_puts(buf, "Moved failed.\n");
1227 return -1;
1228 }
1229 return 0;
1230 }
1231
1232 static int pa_cli_command_suspend_sink(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1233 const char *n, *m;
1234 pa_sink *sink;
1235 int suspend;
1236
1237 pa_core_assert_ref(c);
1238 pa_assert(t);
1239 pa_assert(buf);
1240 pa_assert(fail);
1241
1242 if (!(n = pa_tokenizer_get(t, 1))) {
1243 pa_strbuf_puts(buf, "You need to specify a sink either by its name or its index.\n");
1244 return -1;
1245 }
1246
1247 if (!(m = pa_tokenizer_get(t, 2))) {
1248 pa_strbuf_puts(buf, "You need to specify a suspend switch setting (0/1).\n");
1249 return -1;
1250 }
1251
1252 if ((suspend = pa_parse_boolean(m)) < 0) {
1253 pa_strbuf_puts(buf, "Failed to parse suspend switch.\n");
1254 return -1;
1255 }
1256
1257 if (!(sink = pa_namereg_get(c, n, PA_NAMEREG_SINK))) {
1258 pa_strbuf_puts(buf, "No sink found by this name or index.\n");
1259 return -1;
1260 }
1261
1262 pa_sink_suspend(sink, suspend);
1263 return 0;
1264 }
1265
1266 static int pa_cli_command_suspend_source(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1267 const char *n, *m;
1268 pa_source *source;
1269 int suspend;
1270
1271 pa_core_assert_ref(c);
1272 pa_assert(t);
1273 pa_assert(buf);
1274 pa_assert(fail);
1275
1276 if (!(n = pa_tokenizer_get(t, 1))) {
1277 pa_strbuf_puts(buf, "You need to specify a source either by its name or its index.\n");
1278 return -1;
1279 }
1280
1281 if (!(m = pa_tokenizer_get(t, 2))) {
1282 pa_strbuf_puts(buf, "You need to specify a suspend switch setting (0/1).\n");
1283 return -1;
1284 }
1285
1286 if ((suspend = pa_parse_boolean(m)) < 0) {
1287 pa_strbuf_puts(buf, "Failed to parse suspend switch.\n");
1288 return -1;
1289 }
1290
1291 if (!(source = pa_namereg_get(c, n, PA_NAMEREG_SOURCE))) {
1292 pa_strbuf_puts(buf, "No source found by this name or index.\n");
1293 return -1;
1294 }
1295
1296 pa_source_suspend(source, suspend);
1297 return 0;
1298 }
1299
1300 static int pa_cli_command_suspend(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1301 const char *m;
1302 int suspend;
1303 int ret;
1304
1305 pa_core_assert_ref(c);
1306 pa_assert(t);
1307 pa_assert(buf);
1308 pa_assert(fail);
1309
1310 if (!(m = pa_tokenizer_get(t, 1))) {
1311 pa_strbuf_puts(buf, "You need to specify a suspend switch setting (0/1).\n");
1312 return -1;
1313 }
1314
1315 if ((suspend = pa_parse_boolean(m)) < 0) {
1316 pa_strbuf_puts(buf, "Failed to parse suspend switch.\n");
1317 return -1;
1318 }
1319
1320 ret = - (pa_sink_suspend_all(c, suspend) < 0);
1321 if (pa_source_suspend_all(c, suspend) < 0)
1322 ret = -1;
1323
1324 if (ret < 0)
1325 pa_strbuf_puts(buf, "Failed to resume/suspend all sinks/sources.\n");
1326
1327 return 0;
1328 }
1329
1330 static int pa_cli_command_log_level(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1331 const char *m;
1332 uint32_t level;
1333
1334 pa_core_assert_ref(c);
1335 pa_assert(t);
1336 pa_assert(buf);
1337 pa_assert(fail);
1338
1339 if (!(m = pa_tokenizer_get(t, 1))) {
1340 pa_strbuf_puts(buf, "You need to specify a log level (0..4).\n");
1341 return -1;
1342 }
1343
1344 if (pa_atou(m, &level) < 0 || level >= PA_LOG_LEVEL_MAX) {
1345 pa_strbuf_puts(buf, "Failed to parse log level.\n");
1346 return -1;
1347 }
1348
1349 pa_log_set_maximal_level(level);
1350
1351 return 0;
1352 }
1353
1354 static int pa_cli_command_log_meta(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1355 const char *m;
1356 pa_bool_t b;
1357
1358 pa_core_assert_ref(c);
1359 pa_assert(t);
1360 pa_assert(buf);
1361 pa_assert(fail);
1362
1363 if (!(m = pa_tokenizer_get(t, 1))) {
1364 pa_strbuf_puts(buf, "You need to specify a boolean.\n");
1365 return -1;
1366 }
1367
1368 if ((b = pa_parse_boolean(m)) < 0) {
1369 pa_strbuf_puts(buf, "Failed to parse log meta switch.\n");
1370 return -1;
1371 }
1372
1373 pa_log_set_show_meta(b);
1374
1375 return 0;
1376 }
1377
1378 static int pa_cli_command_log_time(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1379 const char *m;
1380 pa_bool_t b;
1381
1382 pa_core_assert_ref(c);
1383 pa_assert(t);
1384 pa_assert(buf);
1385 pa_assert(fail);
1386
1387 if (!(m = pa_tokenizer_get(t, 1))) {
1388 pa_strbuf_puts(buf, "You need to specify a boolean.\n");
1389 return -1;
1390 }
1391
1392 if ((b = pa_parse_boolean(m)) < 0) {
1393 pa_strbuf_puts(buf, "Failed to parse log meta switch.\n");
1394 return -1;
1395 }
1396
1397 pa_log_set_show_time(b);
1398
1399 return 0;
1400 }
1401
1402 static int pa_cli_command_log_backtrace(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1403 const char *m;
1404 uint32_t nframes;
1405
1406 pa_core_assert_ref(c);
1407 pa_assert(t);
1408 pa_assert(buf);
1409 pa_assert(fail);
1410
1411 if (!(m = pa_tokenizer_get(t, 1))) {
1412 pa_strbuf_puts(buf, "You need to specify a backtrace level.\n");
1413 return -1;
1414 }
1415
1416 if (pa_atou(m, &nframes) < 0 || nframes >= 1000) {
1417 pa_strbuf_puts(buf, "Failed to parse backtrace level.\n");
1418 return -1;
1419 }
1420
1421 pa_log_set_show_backtrace(nframes);
1422
1423 return 0;
1424 }
1425
1426 static int pa_cli_command_card_profile(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1427 const char *n, *p;
1428 pa_card *card;
1429
1430 pa_core_assert_ref(c);
1431 pa_assert(t);
1432 pa_assert(buf);
1433 pa_assert(fail);
1434
1435 if (!(n = pa_tokenizer_get(t, 1))) {
1436 pa_strbuf_puts(buf, "You need to specify a card either by its name or its index.\n");
1437 return -1;
1438 }
1439
1440 if (!(p = pa_tokenizer_get(t, 2))) {
1441 pa_strbuf_puts(buf, "You need to specify a profile by its name.\n");
1442 return -1;
1443 }
1444
1445 if (!(card = pa_namereg_get(c, n, PA_NAMEREG_CARD))) {
1446 pa_strbuf_puts(buf, "No card found by this name or index.\n");
1447 return -1;
1448 }
1449
1450 if (pa_card_set_profile(card, p) < 0) {
1451 pa_strbuf_printf(buf, "Failed to set card profile to '%s'.\n", p);
1452 return -1;
1453 }
1454
1455 return 0;
1456 }
1457
1458 static int pa_cli_command_dump(pa_core *c, pa_tokenizer *t, pa_strbuf *buf, pa_bool_t *fail) {
1459 pa_module *m;
1460 pa_sink *sink;
1461 pa_source *source;
1462 pa_card *card;
1463 int nl;
1464 uint32_t idx;
1465 char txt[256];
1466 time_t now;
1467
1468 pa_core_assert_ref(c);
1469 pa_assert(t);
1470 pa_assert(buf);
1471 pa_assert(fail);
1472
1473 time(&now);
1474
1475 #ifdef HAVE_CTIME_R
1476 pa_strbuf_printf(buf, "### Configuration dump generated at %s\n", ctime_r(&now, txt));
1477 #else
1478 pa_strbuf_printf(buf, "### Configuration dump generated at %s\n", ctime(&now));
1479 #endif
1480
1481 for (m = pa_idxset_first(c->modules, &idx); m; m = pa_idxset_next(c->modules, &idx)) {
1482
1483 pa_strbuf_printf(buf, "load-module %s", m->name);
1484
1485 if (m->argument)
1486 pa_strbuf_printf(buf, " %s", m->argument);
1487
1488 pa_strbuf_puts(buf, "\n");
1489 }
1490
1491 nl = 0;
1492
1493 for (sink = pa_idxset_first(c->sinks, &idx); sink; sink = pa_idxset_next(c->sinks, &idx)) {
1494
1495 if (!nl) {
1496 pa_strbuf_puts(buf, "\n");
1497 nl = 1;
1498 }
1499
1500 pa_strbuf_printf(buf, "set-sink-volume %s 0x%03x\n", sink->name, pa_cvolume_avg(pa_sink_get_volume(sink, FALSE)));
1501 pa_strbuf_printf(buf, "set-sink-mute %s %s\n", sink->name, pa_yes_no(pa_sink_get_mute(sink, FALSE)));
1502 pa_strbuf_printf(buf, "suspend-sink %s %s\n", sink->name, pa_yes_no(pa_sink_get_state(sink) == PA_SINK_SUSPENDED));
1503 }
1504
1505 for (source = pa_idxset_first(c->sources, &idx); source; source = pa_idxset_next(c->sources, &idx)) {
1506
1507 if (!nl) {
1508 pa_strbuf_puts(buf, "\n");
1509 nl = 1;
1510 }
1511
1512 pa_strbuf_printf(buf, "set-source-volume %s 0x%03x\n", source->name, pa_cvolume_avg(pa_source_get_volume(source, FALSE)));
1513 pa_strbuf_printf(buf, "set-source-mute %s %s\n", source->name, pa_yes_no(pa_source_get_mute(source, FALSE)));
1514 pa_strbuf_printf(buf, "suspend-source %s %s\n", source->name, pa_yes_no(pa_source_get_state(source) == PA_SOURCE_SUSPENDED));
1515 }
1516
1517 for (card = pa_idxset_first(c->cards, &idx); card; card = pa_idxset_next(c->cards, &idx)) {
1518
1519 if (!nl) {
1520 pa_strbuf_puts(buf, "\n");
1521 nl = 1;
1522 }
1523
1524 if (card->active_profile)
1525 pa_strbuf_printf(buf, "set-card-profile %s %s\n", card->name, card->active_profile->name);
1526 }
1527
1528 nl = 0;
1529
1530 if ((sink = pa_namereg_get_default_sink(c))) {
1531 if (!nl) {
1532 pa_strbuf_puts(buf, "\n");
1533 nl = 1;
1534 }
1535 pa_strbuf_printf(buf, "set-default-sink %s\n", sink->name);
1536 }
1537
1538 if ((source = pa_namereg_get_default_source(c))) {
1539 if (!nl) {
1540 pa_strbuf_puts(buf, "\n");
1541 nl = 1;
1542 }
1543 pa_strbuf_printf(buf, "set-default-source %s\n", source->name);
1544 }
1545
1546 pa_strbuf_puts(buf, "\n### EOF\n");
1547
1548 return 0;
1549 }
1550
1551 int pa_cli_command_execute_line_stateful(pa_core *c, const char *s, pa_strbuf *buf, pa_bool_t *fail, int *ifstate) {
1552 const char *cs;
1553
1554 pa_assert(c);
1555 pa_assert(s);
1556 pa_assert(buf);
1557
1558 cs = s+strspn(s, whitespace);
1559
1560 if (*cs == '#' || !*cs)
1561 return 0;
1562 else if (*cs == '.') {
1563 if (!strcmp(cs, META_ELSE)) {
1564 if (!ifstate || *ifstate == IFSTATE_NONE) {
1565 pa_strbuf_printf(buf, "Meta command %s is not valid in this context\n", cs);
1566 return -1;
1567 } else if (*ifstate == IFSTATE_TRUE)
1568 *ifstate = IFSTATE_FALSE;
1569 else
1570 *ifstate = IFSTATE_TRUE;
1571 return 0;
1572 } else if (!strcmp(cs, META_ENDIF)) {
1573 if (!ifstate || *ifstate == IFSTATE_NONE) {
1574 pa_strbuf_printf(buf, "Meta command %s is not valid in this context\n", cs);
1575 return -1;
1576 } else
1577 *ifstate = IFSTATE_NONE;
1578 return 0;
1579 }
1580 if (ifstate && *ifstate == IFSTATE_FALSE)
1581 return 0;
1582 if (!strcmp(cs, META_FAIL))
1583 *fail = TRUE;
1584 else if (!strcmp(cs, META_NOFAIL))
1585 *fail = FALSE;
1586 else {
1587 size_t l;
1588 l = strcspn(cs, whitespace);
1589
1590 if (l == sizeof(META_INCLUDE)-1 && !strncmp(cs, META_INCLUDE, l)) {
1591 const char *filename = cs+l+strspn(cs+l, whitespace);
1592 if (pa_cli_command_execute_file(c, filename, buf, fail) < 0)
1593 if (*fail)
1594 return -1;
1595 } else if (l == sizeof(META_IFEXISTS)-1 && !strncmp(cs, META_IFEXISTS, l)) {
1596 if (!ifstate) {
1597 pa_strbuf_printf(buf, "Meta command %s is not valid in this context\n", cs);
1598 return -1;
1599 } else if (*ifstate != IFSTATE_NONE) {
1600 pa_strbuf_printf(buf, "Nested %s commands not supported\n", cs);
1601 return -1;
1602 } else {
1603 const char *filename = cs+l+strspn(cs+l, whitespace);
1604
1605 /* Search DL_SEARCH_PATH unless the filename is absolute */
1606 if (filename[0] == PA_PATH_SEP_CHAR) {
1607
1608 *ifstate = access(filename, F_OK) == 0 ? IFSTATE_TRUE : IFSTATE_FALSE;
1609 pa_log_debug("Checking for existance of '%s': %s", filename, *ifstate == IFSTATE_TRUE ? "success" : "failure");
1610
1611 } else {
1612 const char *paths, *state = NULL;
1613 char *p;
1614
1615 if (!(paths = lt_dlgetsearchpath()))
1616 return -1;
1617
1618 while ((p = pa_split(paths, ":", &state))) {
1619 char *pathname;
1620
1621 pathname = pa_sprintf_malloc("%s" PA_PATH_SEP "%s", p, filename);
1622 pa_xfree(p);
1623
1624 *ifstate = access(pathname, F_OK) == 0 ? IFSTATE_TRUE : IFSTATE_FALSE;
1625 pa_log_debug("Checking for existance of '%s': %s", pathname, *ifstate == IFSTATE_TRUE ? "success" : "failure");
1626
1627 pa_xfree(pathname);
1628
1629 if (*ifstate == IFSTATE_TRUE)
1630 break;
1631 }
1632 }
1633
1634 }
1635 } else {
1636 pa_strbuf_printf(buf, "Invalid meta command: %s\n", cs);
1637 if (*fail) return -1;
1638 }
1639 }
1640 } else {
1641 const struct command*command;
1642 int unknown = 1;
1643 size_t l;
1644
1645 if (ifstate && *ifstate == IFSTATE_FALSE)
1646 return 0;
1647
1648 l = strcspn(cs, whitespace);
1649
1650 for (command = commands; command->name; command++)
1651 if (strlen(command->name) == l && !strncmp(cs, command->name, l)) {
1652 int ret;
1653 pa_tokenizer *t = pa_tokenizer_new(cs, command->args);
1654 pa_assert(t);
1655 ret = command->proc(c, t, buf, fail);
1656 pa_tokenizer_free(t);
1657 unknown = 0;
1658
1659 if (ret < 0 && *fail)
1660 return -1;
1661
1662 break;
1663 }
1664
1665 if (unknown) {
1666 pa_strbuf_printf(buf, "Unknown command: %s\n", cs);
1667 if (*fail)
1668 return -1;
1669 }
1670 }
1671
1672 return 0;
1673 }
1674
1675 int pa_cli_command_execute_line(pa_core *c, const char *s, pa_strbuf *buf, pa_bool_t *fail) {
1676 return pa_cli_command_execute_line_stateful(c, s, buf, fail, NULL);
1677 }
1678
1679 int pa_cli_command_execute_file_stream(pa_core *c, FILE *f, pa_strbuf *buf, pa_bool_t *fail) {
1680 char line[1024];
1681 int ifstate = IFSTATE_NONE;
1682 int ret = -1;
1683 pa_bool_t _fail = TRUE;
1684
1685 pa_assert(c);
1686 pa_assert(f);
1687 pa_assert(buf);
1688
1689 if (!fail)
1690 fail = &_fail;
1691
1692 while (fgets(line, sizeof(line), f)) {
1693 pa_strip_nl(line);
1694
1695 if (pa_cli_command_execute_line_stateful(c, line, buf, fail, &ifstate) < 0 && *fail)
1696 goto fail;
1697 }
1698
1699 ret = 0;
1700
1701 fail:
1702
1703 return ret;
1704 }
1705
1706 int pa_cli_command_execute_file(pa_core *c, const char *fn, pa_strbuf *buf, pa_bool_t *fail) {
1707 FILE *f = NULL;
1708 int ret = -1;
1709 pa_bool_t _fail = TRUE;
1710
1711 pa_assert(c);
1712 pa_assert(fn);
1713 pa_assert(buf);
1714
1715 if (!fail)
1716 fail = &_fail;
1717
1718 if (!(f = fopen(fn, "r"))) {
1719 pa_strbuf_printf(buf, "open('%s') failed: %s\n", fn, pa_cstrerror(errno));
1720 if (!*fail)
1721 ret = 0;
1722 goto fail;
1723 }
1724
1725 ret = pa_cli_command_execute_file_stream(c, f, buf, fail);
1726
1727 ret = 0;
1728
1729 fail:
1730 if (f)
1731 fclose(f);
1732
1733 return ret;
1734 }
1735
1736 int pa_cli_command_execute(pa_core *c, const char *s, pa_strbuf *buf, pa_bool_t *fail) {
1737 const char *p;
1738 int ifstate = IFSTATE_NONE;
1739 pa_bool_t _fail = TRUE;
1740
1741 pa_assert(c);
1742 pa_assert(s);
1743 pa_assert(buf);
1744
1745 if (!fail)
1746 fail = &_fail;
1747
1748 p = s;
1749 while (*p) {
1750 size_t l = strcspn(p, linebreak);
1751 char *line = pa_xstrndup(p, l);
1752
1753 if (pa_cli_command_execute_line_stateful(c, line, buf, fail, &ifstate) < 0 && *fail) {
1754 pa_xfree(line);
1755 return -1;
1756 }
1757 pa_xfree(line);
1758
1759 p += l;
1760 p += strspn(p, linebreak);
1761 }
1762
1763 return 0;
1764 }