2 This file is part of PulseAudio.
4 Copyright 2004-2006 Lennart Poettering
5 Copyright 2006 Pierre Ossman <ossman@cendio.se> for Cendio AB
7 PulseAudio is free software; you can redistribute it and/or modify
8 it under the terms of the GNU Lesser General Public License as published
9 by the Free Software Foundation; either version 2 of the License,
10 or (at your option) any later version.
12 PulseAudio is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 General Public License for more details.
17 You should have received a copy of the GNU Lesser General Public License
18 along with PulseAudio; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
34 #include <pulse/xmalloc.h>
36 #include <pulsecore/module.h>
37 #include <pulsecore/sink.h>
38 #include <pulsecore/source.h>
39 #include <pulsecore/client.h>
40 #include <pulsecore/sink-input.h>
41 #include <pulsecore/source-output.h>
42 #include <pulsecore/tokenizer.h>
43 #include <pulsecore/strbuf.h>
44 #include <pulsecore/namereg.h>
45 #include <pulsecore/cli-text.h>
46 #include <pulsecore/core-scache.h>
47 #include <pulsecore/sample-util.h>
48 #include <pulsecore/sound-file.h>
49 #include <pulsecore/play-memchunk.h>
50 #include <pulsecore/sound-file-stream.h>
51 #include <pulsecore/shared.h>
52 #include <pulsecore/core-util.h>
53 #include <pulsecore/core-error.h>
54 #include <pulsecore/modinfo.h>
56 #include "cli-command.h"
60 int (*proc
) (pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
65 #define META_INCLUDE ".include"
66 #define META_FAIL ".fail"
67 #define META_NOFAIL ".nofail"
68 #define META_IFEXISTS ".ifexists"
69 #define META_ELSE ".else"
70 #define META_ENDIF ".endif"
78 /* Prototypes for all available commands */
79 static int pa_cli_command_exit(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
80 static int pa_cli_command_help(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
81 static int pa_cli_command_modules(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
82 static int pa_cli_command_clients(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
83 static int pa_cli_command_cards(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
84 static int pa_cli_command_sinks(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
85 static int pa_cli_command_sources(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
86 static int pa_cli_command_sink_inputs(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
87 static int pa_cli_command_source_outputs(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
88 static int pa_cli_command_stat(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
89 static int pa_cli_command_info(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
90 static int pa_cli_command_load(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
91 static int pa_cli_command_unload(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
92 static int pa_cli_command_describe(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
93 static int pa_cli_command_sink_volume(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
94 static int pa_cli_command_sink_input_volume(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
95 static int pa_cli_command_source_volume(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
96 static int pa_cli_command_sink_mute(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
97 static int pa_cli_command_source_mute(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
98 static int pa_cli_command_sink_input_mute(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
99 static int pa_cli_command_sink_default(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
100 static int pa_cli_command_source_default(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
101 static int pa_cli_command_kill_client(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
102 static int pa_cli_command_kill_sink_input(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
103 static int pa_cli_command_kill_source_output(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
104 static int pa_cli_command_scache_play(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
105 static int pa_cli_command_scache_remove(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
106 static int pa_cli_command_scache_list(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
107 static int pa_cli_command_scache_load(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
108 static int pa_cli_command_scache_load_dir(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
109 static int pa_cli_command_play_file(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
110 static int pa_cli_command_dump(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
111 static int pa_cli_command_list_shared_props(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
112 static int pa_cli_command_move_sink_input(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
113 static int pa_cli_command_move_source_output(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
114 static int pa_cli_command_vacuum(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
115 static int pa_cli_command_suspend_sink(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
116 static int pa_cli_command_suspend_source(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
117 static int pa_cli_command_suspend(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
118 static int pa_cli_command_log_level(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
119 static int pa_cli_command_log_meta(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
120 static int pa_cli_command_log_time(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
121 static int pa_cli_command_log_backtrace(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
122 static int pa_cli_command_update_sink_proplist(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
123 static int pa_cli_command_update_source_proplist(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
124 static int pa_cli_command_update_sink_input_proplist(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
125 static int pa_cli_command_update_source_output_proplist(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
);
127 /* A method table for all available commands */
129 static const struct command commands
[] = {
130 { "exit", pa_cli_command_exit
, "Terminate the daemon", 1 },
131 { "help", pa_cli_command_help
, "Show this help", 1 },
132 { "list-modules", pa_cli_command_modules
, "List loaded modules", 1 },
133 { "list-sinks", pa_cli_command_sinks
, "List loaded sinks", 1 },
134 { "list-sources", pa_cli_command_sources
, "List loaded sources", 1 },
135 { "list-clients", pa_cli_command_clients
, "List loaded clients", 1 },
136 { "list-sink-inputs", pa_cli_command_sink_inputs
, "List sink inputs", 1 },
137 { "list-source-outputs", pa_cli_command_source_outputs
, "List source outputs", 1 },
138 { "list-cards", pa_cli_command_cards
, "List cards", 1 },
139 { "stat", pa_cli_command_stat
, "Show memory block statistics", 1 },
140 { "info", pa_cli_command_info
, "Show comprehensive status", 1 },
141 { "ls", pa_cli_command_info
, NULL
, 1 },
142 { "list", pa_cli_command_info
, NULL
, 1 },
143 { "load-module", pa_cli_command_load
, "Load a module (args: name, arguments)", 3},
144 { "unload-module", pa_cli_command_unload
, "Unload a module (args: index)", 2},
145 { "describe-module", pa_cli_command_describe
, "Describe a module (arg: name)", 2},
146 { "set-sink-volume", pa_cli_command_sink_volume
, "Set the volume of a sink (args: index|name, volume)", 3},
147 { "set-sink-input-volume", pa_cli_command_sink_input_volume
, "Set the volume of a sink input (args: index, volume)", 3},
148 { "set-source-volume", pa_cli_command_source_volume
, "Set the volume of a source (args: index|name, volume)", 3},
149 { "set-sink-mute", pa_cli_command_sink_mute
, "Set the mute switch of a sink (args: index|name, bool)", 3},
150 { "set-sink-input-mute", pa_cli_command_sink_input_mute
, "Set the mute switch of a sink input (args: index, bool)", 3},
151 { "set-source-mute", pa_cli_command_source_mute
, "Set the mute switch of a source (args: index|name, bool)", 3},
152 { "update-sink-proplist", pa_cli_command_update_sink_proplist
, "Update the properties of a sink (args: index|name, properties)", 3},
153 { "update-source-proplist", pa_cli_command_update_source_proplist
, "Update the properties of a source (args: index|name, properties)", 3},
154 { "update-sink-input-proplist", pa_cli_command_update_sink_input_proplist
, "Update the properties of a sink input (args: index, properties)", 3},
155 { "update-source-output-proplist", pa_cli_command_update_source_output_proplist
, "Update the properties of a source_output (args: index, properties)", 3},
156 { "set-default-sink", pa_cli_command_sink_default
, "Set the default sink (args: index|name)", 2},
157 { "set-default-source", pa_cli_command_source_default
, "Set the default source (args: index|name)", 2},
158 { "kill-client", pa_cli_command_kill_client
, "Kill a client (args: index)", 2},
159 { "kill-sink-input", pa_cli_command_kill_sink_input
, "Kill a sink input (args: index)", 2},
160 { "kill-source-output", pa_cli_command_kill_source_output
, "Kill a source output (args: index)", 2},
161 { "list-samples", pa_cli_command_scache_list
, "List all entries in the sample cache", 1},
162 { "play-sample", pa_cli_command_scache_play
, "Play a sample from the sample cache (args: name, sink|index)", 3},
163 { "remove-sample", pa_cli_command_scache_remove
, "Remove a sample from the sample cache (args: name)", 2},
164 { "load-sample", pa_cli_command_scache_load
, "Load a sound file into the sample cache (args: name, filename)", 3},
165 { "load-sample-lazy", pa_cli_command_scache_load
, "Lazily load a sound file into the sample cache (args: name, filename)", 3},
166 { "load-sample-dir-lazy", pa_cli_command_scache_load_dir
, "Lazily load all files in a directory into the sample cache (args: pathname)", 2},
167 { "play-file", pa_cli_command_play_file
, "Play a sound file (args: filename, sink|index)", 3},
168 { "dump", pa_cli_command_dump
, "Dump daemon configuration", 1},
169 { "shared", pa_cli_command_list_shared_props
, NULL
, 1},
170 { "move-sink-input", pa_cli_command_move_sink_input
, "Move sink input to another sink (args: index, sink)", 3},
171 { "move-source-output", pa_cli_command_move_source_output
, "Move source output to another source (args: index, source)", 3},
172 { "vacuum", pa_cli_command_vacuum
, NULL
, 1},
173 { "suspend-sink", pa_cli_command_suspend_sink
, "Suspend sink (args: index|name, bool)", 3},
174 { "suspend-source", pa_cli_command_suspend_source
, "Suspend source (args: index|name, bool)", 3},
175 { "suspend", pa_cli_command_suspend
, "Suspend all sinks and all sources (args: bool)", 2},
176 { "set-log-level", pa_cli_command_log_level
, "Change the log level (args: numeric level)", 2},
177 { "set-log-meta", pa_cli_command_log_meta
, "Show source code location in log messages (args: bool)", 2},
178 { "set-log-time", pa_cli_command_log_time
, "Show timestamps in log messages (args: bool)", 2},
179 { "set-log-backtrace", pa_cli_command_log_backtrace
, "Show bakctrace in log messages (args: frames)", 2},
180 { NULL
, NULL
, NULL
, 0 }
183 static const char whitespace
[] = " \t\n\r";
184 static const char linebreak
[] = "\n\r";
186 static uint32_t parse_index(const char *n
) {
189 if (pa_atou(n
, &idx
) < 0)
190 return (uint32_t) PA_IDXSET_INVALID
;
195 static int pa_cli_command_exit(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
196 pa_core_assert_ref(c
);
201 if (pa_core_exit(c
, FALSE
, 0) < 0)
202 pa_strbuf_puts(buf
, "Not allowed to terminate daemon.\n");
207 static int pa_cli_command_help(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
208 const struct command
*command
;
210 pa_core_assert_ref(c
);
215 pa_strbuf_puts(buf
, "Available commands:\n");
217 for (command
= commands
; command
->name
; command
++)
219 pa_strbuf_printf(buf
, " %-25s %s\n", command
->name
, command
->help
);
223 static int pa_cli_command_modules(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
226 pa_core_assert_ref(c
);
231 pa_assert_se(s
= pa_module_list_to_string(c
));
232 pa_strbuf_puts(buf
, s
);
237 static int pa_cli_command_clients(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
240 pa_core_assert_ref(c
);
245 pa_assert_se(s
= pa_client_list_to_string(c
));
246 pa_strbuf_puts(buf
, s
);
251 static int pa_cli_command_cards(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
254 pa_core_assert_ref(c
);
259 pa_assert_se(s
= pa_card_list_to_string(c
));
260 pa_strbuf_puts(buf
, s
);
265 static int pa_cli_command_sinks(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
268 pa_core_assert_ref(c
);
273 pa_assert_se(s
= pa_sink_list_to_string(c
));
274 pa_strbuf_puts(buf
, s
);
279 static int pa_cli_command_sources(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
282 pa_core_assert_ref(c
);
287 pa_assert_se(s
= pa_source_list_to_string(c
));
288 pa_strbuf_puts(buf
, s
);
293 static int pa_cli_command_sink_inputs(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
296 pa_core_assert_ref(c
);
301 pa_assert_se(s
= pa_sink_input_list_to_string(c
));
302 pa_strbuf_puts(buf
, s
);
307 static int pa_cli_command_source_outputs(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
310 pa_core_assert_ref(c
);
315 pa_assert_se(s
= pa_source_output_list_to_string(c
));
316 pa_strbuf_puts(buf
, s
);
321 static int pa_cli_command_stat(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
323 const pa_mempool_stat
*stat
;
325 const char *def_sink
, *def_source
;
327 static const char* const type_table
[PA_MEMBLOCK_TYPE_MAX
] = {
328 [PA_MEMBLOCK_POOL
] = "POOL",
329 [PA_MEMBLOCK_POOL_EXTERNAL
] = "POOL_EXTERNAL",
330 [PA_MEMBLOCK_APPENDED
] = "APPENDED",
331 [PA_MEMBLOCK_USER
] = "USER",
332 [PA_MEMBLOCK_FIXED
] = "FIXED",
333 [PA_MEMBLOCK_IMPORTED
] = "IMPORTED",
336 pa_core_assert_ref(c
);
341 stat
= pa_mempool_get_stat(c
->mempool
);
343 pa_strbuf_printf(buf
, "Memory blocks currently allocated: %u, size: %s.\n",
344 (unsigned) pa_atomic_load(&stat
->n_allocated
),
345 pa_bytes_snprint(s
, sizeof(s
), (unsigned) pa_atomic_load(&stat
->allocated_size
)));
347 pa_strbuf_printf(buf
, "Memory blocks allocated during the whole lifetime: %u, size: %s.\n",
348 (unsigned) pa_atomic_load(&stat
->n_accumulated
),
349 pa_bytes_snprint(s
, sizeof(s
), (unsigned) pa_atomic_load(&stat
->accumulated_size
)));
351 pa_strbuf_printf(buf
, "Memory blocks imported from other processes: %u, size: %s.\n",
352 (unsigned) pa_atomic_load(&stat
->n_imported
),
353 pa_bytes_snprint(s
, sizeof(s
), (unsigned) pa_atomic_load(&stat
->imported_size
)));
355 pa_strbuf_printf(buf
, "Memory blocks exported to other processes: %u, size: %s.\n",
356 (unsigned) pa_atomic_load(&stat
->n_exported
),
357 pa_bytes_snprint(s
, sizeof(s
), (unsigned) pa_atomic_load(&stat
->exported_size
)));
359 pa_strbuf_printf(buf
, "Total sample cache size: %s.\n",
360 pa_bytes_snprint(s
, sizeof(s
), (unsigned) pa_scache_total_size(c
)));
362 pa_strbuf_printf(buf
, "Default sample spec: %s\n",
363 pa_sample_spec_snprint(s
, sizeof(s
), &c
->default_sample_spec
));
365 def_sink
= pa_namereg_get_default_sink_name(c
);
366 def_source
= pa_namereg_get_default_source_name(c
);
367 pa_strbuf_printf(buf
, "Default sink name: %s\n"
368 "Default source name: %s\n",
369 def_sink
? def_sink
: "none",
370 def_source
? def_source
: "none");
372 for (k
= 0; k
< PA_MEMBLOCK_TYPE_MAX
; k
++)
373 pa_strbuf_printf(buf
,
374 "Memory blocks of type %s: %u allocated/%u accumulated.\n",
376 (unsigned) pa_atomic_load(&stat
->n_allocated_by_type
[k
]),
377 (unsigned) pa_atomic_load(&stat
->n_accumulated_by_type
[k
]));
382 static int pa_cli_command_info(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
383 pa_core_assert_ref(c
);
388 pa_cli_command_stat(c
, t
, buf
, fail
);
389 pa_cli_command_modules(c
, t
, buf
, fail
);
390 pa_cli_command_sinks(c
, t
, buf
, fail
);
391 pa_cli_command_sources(c
, t
, buf
, fail
);
392 pa_cli_command_clients(c
, t
, buf
, fail
);
393 pa_cli_command_cards(c
, t
, buf
, fail
);
394 pa_cli_command_sink_inputs(c
, t
, buf
, fail
);
395 pa_cli_command_source_outputs(c
, t
, buf
, fail
);
396 pa_cli_command_scache_list(c
, t
, buf
, fail
);
400 static int pa_cli_command_load(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
404 pa_core_assert_ref(c
);
409 if (!(name
= pa_tokenizer_get(t
, 1))) {
410 pa_strbuf_puts(buf
, "You need to specify the module name and optionally arguments.\n");
414 if (!(m
= pa_module_load(c
, name
, pa_tokenizer_get(t
, 2)))) {
415 pa_strbuf_puts(buf
, "Module load failed.\n");
422 static int pa_cli_command_unload(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
428 pa_core_assert_ref(c
);
433 if (!(i
= pa_tokenizer_get(t
, 1))) {
434 pa_strbuf_puts(buf
, "You need to specify the module index.\n");
438 idx
= (uint32_t) strtoul(i
, &e
, 10);
439 if (*e
|| !(m
= pa_idxset_get_by_index(c
->modules
, idx
))) {
440 pa_strbuf_puts(buf
, "Invalid module index.\n");
444 pa_module_unload_request(m
, FALSE
);
448 static int pa_cli_command_describe(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
452 pa_core_assert_ref(c
);
457 if (!(name
= pa_tokenizer_get(t
, 1))) {
458 pa_strbuf_puts(buf
, "You need to specify the module name.\n");
462 if ((i
= pa_modinfo_get_by_name(name
))) {
464 pa_strbuf_printf(buf
, "Name: %s\n", name
);
466 if (!i
->description
&& !i
->version
&& !i
->author
&& !i
->usage
)
467 pa_strbuf_printf(buf
, "No module information available\n");
470 pa_strbuf_printf(buf
, "Version: %s\n", i
->version
);
472 pa_strbuf_printf(buf
, "Description: %s\n", i
->description
);
474 pa_strbuf_printf(buf
, "Author: %s\n", i
->author
);
476 pa_strbuf_printf(buf
, "Usage: %s\n", i
->usage
);
477 pa_strbuf_printf(buf
, "Load Once: %s\n", pa_yes_no(i
->load_once
));
482 pa_strbuf_puts(buf
, "Failed to open module.\n");
487 static int pa_cli_command_sink_volume(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
493 pa_core_assert_ref(c
);
498 if (!(n
= pa_tokenizer_get(t
, 1))) {
499 pa_strbuf_puts(buf
, "You need to specify a sink either by its name or its index.\n");
503 if (!(v
= pa_tokenizer_get(t
, 2))) {
504 pa_strbuf_puts(buf
, "You need to specify a volume >= 0. (0 is muted, 0x10000 is normal volume)\n");
508 if (pa_atou(v
, &volume
) < 0) {
509 pa_strbuf_puts(buf
, "Failed to parse volume.\n");
513 if (!(sink
= pa_namereg_get(c
, n
, PA_NAMEREG_SINK
))) {
514 pa_strbuf_puts(buf
, "No sink found by this name or index.\n");
518 pa_cvolume_set(&cvolume
, sink
->sample_spec
.channels
, volume
);
519 pa_sink_set_volume(sink
, &cvolume
);
523 static int pa_cli_command_sink_input_volume(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
530 pa_core_assert_ref(c
);
535 if (!(n
= pa_tokenizer_get(t
, 1))) {
536 pa_strbuf_puts(buf
, "You need to specify a sink input by its index.\n");
540 if ((idx
= parse_index(n
)) == PA_IDXSET_INVALID
) {
541 pa_strbuf_puts(buf
, "Failed to parse index.\n");
545 if (!(v
= pa_tokenizer_get(t
, 2))) {
546 pa_strbuf_puts(buf
, "You need to specify a volume >= 0. (0 is muted, 0x10000 is normal volume)\n");
550 if (pa_atou(v
, &volume
) < 0) {
551 pa_strbuf_puts(buf
, "Failed to parse volume.\n");
555 if (!(si
= pa_idxset_get_by_index(c
->sink_inputs
, (uint32_t) idx
))) {
556 pa_strbuf_puts(buf
, "No sink input found with this index.\n");
560 pa_cvolume_set(&cvolume
, si
->sample_spec
.channels
, volume
);
561 pa_sink_input_set_volume(si
, &cvolume
);
565 static int pa_cli_command_source_volume(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
571 pa_core_assert_ref(c
);
576 if (!(n
= pa_tokenizer_get(t
, 1))) {
577 pa_strbuf_puts(buf
, "You need to specify a source either by its name or its index.\n");
581 if (!(v
= pa_tokenizer_get(t
, 2))) {
582 pa_strbuf_puts(buf
, "You need to specify a volume >= 0. (0 is muted, 0x10000 is normal volume)\n");
586 if (pa_atou(v
, &volume
) < 0) {
587 pa_strbuf_puts(buf
, "Failed to parse volume.\n");
591 if (!(source
= pa_namereg_get(c
, n
, PA_NAMEREG_SOURCE
))) {
592 pa_strbuf_puts(buf
, "No source found by this name or index.\n");
596 pa_cvolume_set(&cvolume
, source
->sample_spec
.channels
, volume
);
597 pa_source_set_volume(source
, &cvolume
);
601 static int pa_cli_command_sink_mute(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
606 pa_core_assert_ref(c
);
611 if (!(n
= pa_tokenizer_get(t
, 1))) {
612 pa_strbuf_puts(buf
, "You need to specify a sink either by its name or its index.\n");
616 if (!(m
= pa_tokenizer_get(t
, 2))) {
617 pa_strbuf_puts(buf
, "You need to specify a mute switch setting (0/1).\n");
621 if ((mute
= pa_parse_boolean(m
)) < 0) {
622 pa_strbuf_puts(buf
, "Failed to parse mute switch.\n");
626 if (!(sink
= pa_namereg_get(c
, n
, PA_NAMEREG_SINK
))) {
627 pa_strbuf_puts(buf
, "No sink found by this name or index.\n");
631 pa_sink_set_mute(sink
, mute
);
635 static int pa_cli_command_source_mute(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
640 pa_core_assert_ref(c
);
645 if (!(n
= pa_tokenizer_get(t
, 1))) {
646 pa_strbuf_puts(buf
, "You need to specify a source either by its name or its index.\n");
650 if (!(m
= pa_tokenizer_get(t
, 2))) {
651 pa_strbuf_puts(buf
, "You need to specify a mute switch setting (0/1).\n");
655 if ((mute
= pa_parse_boolean(m
)) < 0) {
656 pa_strbuf_puts(buf
, "Failed to parse mute switch.\n");
660 if (!(source
= pa_namereg_get(c
, n
, PA_NAMEREG_SOURCE
))) {
661 pa_strbuf_puts(buf
, "No sink found by this name or index.\n");
665 pa_source_set_mute(source
, mute
);
669 static int pa_cli_command_update_sink_proplist(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
674 pa_core_assert_ref(c
);
679 if (!(n
= pa_tokenizer_get(t
, 1))) {
680 pa_strbuf_puts(buf
, "You need to specify a sink either by its name or its index.\n");
684 if (!(s
= pa_tokenizer_get(t
, 2))) {
685 pa_strbuf_puts(buf
, "You need to specify a \"key=value\" argument.\n");
689 if (!(sink
= pa_namereg_get(c
, n
, PA_NAMEREG_SINK
))) {
690 pa_strbuf_puts(buf
, "No sink found by this name or index.\n");
694 p
= pa_proplist_from_string(s
);
696 pa_sink_update_proplist(sink
, PA_UPDATE_REPLACE
, p
);
703 static int pa_cli_command_update_source_proplist(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
708 pa_core_assert_ref(c
);
713 if (!(n
= pa_tokenizer_get(t
, 1))) {
714 pa_strbuf_puts(buf
, "You need to specify a source either by its name or its index.\n");
718 if (!(s
= pa_tokenizer_get(t
, 2))) {
719 pa_strbuf_puts(buf
, "You need to specify a \"key=value\" argument.\n");
723 if (!(source
= pa_namereg_get(c
, n
, PA_NAMEREG_SOURCE
))) {
724 pa_strbuf_puts(buf
, "No source found by this name or index.\n");
728 p
= pa_proplist_from_string(s
);
730 pa_source_update_proplist(source
, PA_UPDATE_REPLACE
, p
);
737 static int pa_cli_command_update_sink_input_proplist(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
743 pa_core_assert_ref(c
);
748 if (!(n
= pa_tokenizer_get(t
, 1))) {
749 pa_strbuf_puts(buf
, "You need to specify a sink input either by index.\n");
753 if ((idx
= parse_index(n
)) == PA_IDXSET_INVALID
) {
754 pa_strbuf_puts(buf
, "Failed to parse index.\n");
758 if (!(s
= pa_tokenizer_get(t
, 2))) {
759 pa_strbuf_puts(buf
, "You need to specify a \"key=value\" argument.\n");
763 if (!(si
= pa_idxset_get_by_index(c
->sink_inputs
, (uint32_t) idx
))) {
764 pa_strbuf_puts(buf
, "No sink input found with this index.\n");
768 p
= pa_proplist_from_string(s
);
770 pa_sink_input_update_proplist(si
, PA_UPDATE_REPLACE
, p
);
777 static int pa_cli_command_update_source_output_proplist(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
779 pa_source_output
*so
;
783 pa_core_assert_ref(c
);
788 if (!(n
= pa_tokenizer_get(t
, 1))) {
789 pa_strbuf_puts(buf
, "You need to specify a source output by its index.\n");
793 if ((idx
= parse_index(n
)) == PA_IDXSET_INVALID
) {
794 pa_strbuf_puts(buf
, "Failed to parse index.\n");
798 if (!(s
= pa_tokenizer_get(t
, 2))) {
799 pa_strbuf_puts(buf
, "You need to specify a \"key=value\" argument.\n");
803 if (!(so
= pa_idxset_get_by_index(c
->source_outputs
, (uint32_t) idx
))) {
804 pa_strbuf_puts(buf
, "No source output found with this index.\n");
808 p
= pa_proplist_from_string(s
);
810 pa_source_output_update_proplist(so
, PA_UPDATE_REPLACE
, p
);
817 static int pa_cli_command_sink_input_mute(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
823 pa_core_assert_ref(c
);
828 if (!(n
= pa_tokenizer_get(t
, 1))) {
829 pa_strbuf_puts(buf
, "You need to specify a sink input by its index.\n");
833 if ((idx
= parse_index(n
)) == PA_IDXSET_INVALID
) {
834 pa_strbuf_puts(buf
, "Failed to parse index.\n");
838 if (!(v
= pa_tokenizer_get(t
, 2))) {
839 pa_strbuf_puts(buf
, "You need to specify a mute switch setting (0/1).\n");
843 if ((mute
= pa_parse_boolean(v
)) < 0) {
844 pa_strbuf_puts(buf
, "Failed to parse mute switch.\n");
848 if (!(si
= pa_idxset_get_by_index(c
->sink_inputs
, (uint32_t) idx
))) {
849 pa_strbuf_puts(buf
, "No sink input found with this index.\n");
853 pa_sink_input_set_mute(si
, mute
);
857 static int pa_cli_command_sink_default(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
860 pa_core_assert_ref(c
);
865 if (!(n
= pa_tokenizer_get(t
, 1))) {
866 pa_strbuf_puts(buf
, "You need to specify a sink either by its name or its index.\n");
870 pa_namereg_set_default(c
, n
, PA_NAMEREG_SINK
);
874 static int pa_cli_command_source_default(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
877 pa_core_assert_ref(c
);
882 if (!(n
= pa_tokenizer_get(t
, 1))) {
883 pa_strbuf_puts(buf
, "You need to specify a source either by its name or its index.\n");
887 pa_namereg_set_default(c
, n
, PA_NAMEREG_SOURCE
);
891 static int pa_cli_command_kill_client(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
896 pa_core_assert_ref(c
);
901 if (!(n
= pa_tokenizer_get(t
, 1))) {
902 pa_strbuf_puts(buf
, "You need to specify a client by its index.\n");
906 if ((idx
= parse_index(n
)) == PA_IDXSET_INVALID
) {
907 pa_strbuf_puts(buf
, "Failed to parse index.\n");
911 if (!(client
= pa_idxset_get_by_index(c
->clients
, idx
))) {
912 pa_strbuf_puts(buf
, "No client found by this index.\n");
916 pa_client_kill(client
);
920 static int pa_cli_command_kill_sink_input(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
922 pa_sink_input
*sink_input
;
925 pa_core_assert_ref(c
);
930 if (!(n
= pa_tokenizer_get(t
, 1))) {
931 pa_strbuf_puts(buf
, "You need to specify a sink input by its index.\n");
935 if ((idx
= parse_index(n
)) == PA_IDXSET_INVALID
) {
936 pa_strbuf_puts(buf
, "Failed to parse index.\n");
940 if (!(sink_input
= pa_idxset_get_by_index(c
->sink_inputs
, idx
))) {
941 pa_strbuf_puts(buf
, "No sink input found by this index.\n");
945 pa_sink_input_kill(sink_input
);
949 static int pa_cli_command_kill_source_output(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
951 pa_source_output
*source_output
;
954 pa_core_assert_ref(c
);
959 if (!(n
= pa_tokenizer_get(t
, 1))) {
960 pa_strbuf_puts(buf
, "You need to specify a source output by its index.\n");
964 if ((idx
= parse_index(n
)) == PA_IDXSET_INVALID
) {
965 pa_strbuf_puts(buf
, "Failed to parse index.\n");
969 if (!(source_output
= pa_idxset_get_by_index(c
->source_outputs
, idx
))) {
970 pa_strbuf_puts(buf
, "No source output found by this index.\n");
974 pa_source_output_kill(source_output
);
978 static int pa_cli_command_scache_list(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
981 pa_core_assert_ref(c
);
986 pa_assert_se(s
= pa_scache_list_to_string(c
));
987 pa_strbuf_puts(buf
, s
);
993 static int pa_cli_command_scache_play(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
994 const char *n
, *sink_name
;
998 pa_core_assert_ref(c
);
1003 if (!(n
= pa_tokenizer_get(t
, 1)) || !(sink_name
= pa_tokenizer_get(t
, 2))) {
1004 pa_strbuf_puts(buf
, "You need to specify a sample name and a sink name.\n");
1008 if (!(sink
= pa_namereg_get(c
, sink_name
, PA_NAMEREG_SINK
))) {
1009 pa_strbuf_puts(buf
, "No sink by that name.\n");
1013 if (pa_scache_play_item(c
, n
, sink
, PA_VOLUME_NORM
, NULL
, &idx
) < 0) {
1014 pa_strbuf_puts(buf
, "Failed to play sample.\n");
1018 pa_strbuf_printf(buf
, "Playing on sink input #%i\n", idx
);
1023 static int pa_cli_command_scache_remove(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1026 pa_core_assert_ref(c
);
1031 if (!(n
= pa_tokenizer_get(t
, 1))) {
1032 pa_strbuf_puts(buf
, "You need to specify a sample name.\n");
1036 if (pa_scache_remove_item(c
, n
) < 0) {
1037 pa_strbuf_puts(buf
, "Failed to remove sample.\n");
1044 static int pa_cli_command_scache_load(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1045 const char *fname
, *n
;
1048 pa_core_assert_ref(c
);
1053 if (!(fname
= pa_tokenizer_get(t
, 2)) || !(n
= pa_tokenizer_get(t
, 1))) {
1054 pa_strbuf_puts(buf
, "You need to specify a file name and a sample name.\n");
1058 if (strstr(pa_tokenizer_get(t
, 0), "lazy"))
1059 r
= pa_scache_add_file_lazy(c
, n
, fname
, NULL
);
1061 r
= pa_scache_add_file(c
, n
, fname
, NULL
);
1064 pa_strbuf_puts(buf
, "Failed to load sound file.\n");
1069 static int pa_cli_command_scache_load_dir(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1072 pa_core_assert_ref(c
);
1077 if (!(pname
= pa_tokenizer_get(t
, 1))) {
1078 pa_strbuf_puts(buf
, "You need to specify a path name.\n");
1082 if (pa_scache_add_directory_lazy(c
, pname
) < 0) {
1083 pa_strbuf_puts(buf
, "Failed to load directory.\n");
1090 static int pa_cli_command_play_file(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1091 const char *fname
, *sink_name
;
1094 pa_core_assert_ref(c
);
1099 if (!(fname
= pa_tokenizer_get(t
, 1)) || !(sink_name
= pa_tokenizer_get(t
, 2))) {
1100 pa_strbuf_puts(buf
, "You need to specify a file name and a sink name.\n");
1104 if (!(sink
= pa_namereg_get(c
, sink_name
, PA_NAMEREG_SINK
))) {
1105 pa_strbuf_puts(buf
, "No sink by that name.\n");
1110 return pa_play_file(sink
, fname
, NULL
);
1113 static int pa_cli_command_list_shared_props(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1114 pa_core_assert_ref(c
);
1119 pa_shared_dump(c
, buf
);
1123 static int pa_cli_command_vacuum(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1124 pa_core_assert_ref(c
);
1129 pa_mempool_vacuum(c
->mempool
);
1134 static int pa_cli_command_move_sink_input(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1140 pa_core_assert_ref(c
);
1145 if (!(n
= pa_tokenizer_get(t
, 1))) {
1146 pa_strbuf_puts(buf
, "You need to specify a sink input by its index.\n");
1150 if ((idx
= parse_index(n
)) == PA_IDXSET_INVALID
) {
1151 pa_strbuf_puts(buf
, "Failed to parse index.\n");
1155 if (!(k
= pa_tokenizer_get(t
, 2))) {
1156 pa_strbuf_puts(buf
, "You need to specify a sink.\n");
1160 if (!(si
= pa_idxset_get_by_index(c
->sink_inputs
, (uint32_t) idx
))) {
1161 pa_strbuf_puts(buf
, "No sink input found with this index.\n");
1165 if (!(sink
= pa_namereg_get(c
, k
, PA_NAMEREG_SINK
))) {
1166 pa_strbuf_puts(buf
, "No sink found by this name or index.\n");
1170 if (pa_sink_input_move_to(si
, sink
) < 0) {
1171 pa_strbuf_puts(buf
, "Moved failed.\n");
1177 static int pa_cli_command_move_source_output(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1179 pa_source_output
*so
;
1183 pa_core_assert_ref(c
);
1188 if (!(n
= pa_tokenizer_get(t
, 1))) {
1189 pa_strbuf_puts(buf
, "You need to specify a source output by its index.\n");
1193 if ((idx
= parse_index(n
)) == PA_IDXSET_INVALID
) {
1194 pa_strbuf_puts(buf
, "Failed to parse index.\n");
1198 if (!(k
= pa_tokenizer_get(t
, 2))) {
1199 pa_strbuf_puts(buf
, "You need to specify a source.\n");
1203 if (!(so
= pa_idxset_get_by_index(c
->source_outputs
, (uint32_t) idx
))) {
1204 pa_strbuf_puts(buf
, "No source output found with this index.\n");
1208 if (!(source
= pa_namereg_get(c
, k
, PA_NAMEREG_SOURCE
))) {
1209 pa_strbuf_puts(buf
, "No source found by this name or index.\n");
1213 if (pa_source_output_move_to(so
, source
) < 0) {
1214 pa_strbuf_puts(buf
, "Moved failed.\n");
1220 static int pa_cli_command_suspend_sink(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1225 pa_core_assert_ref(c
);
1230 if (!(n
= pa_tokenizer_get(t
, 1))) {
1231 pa_strbuf_puts(buf
, "You need to specify a sink either by its name or its index.\n");
1235 if (!(m
= pa_tokenizer_get(t
, 2))) {
1236 pa_strbuf_puts(buf
, "You need to specify a suspend switch setting (0/1).\n");
1240 if ((suspend
= pa_parse_boolean(m
)) < 0) {
1241 pa_strbuf_puts(buf
, "Failed to parse suspend switch.\n");
1245 if (!(sink
= pa_namereg_get(c
, n
, PA_NAMEREG_SINK
))) {
1246 pa_strbuf_puts(buf
, "No sink found by this name or index.\n");
1250 pa_sink_suspend(sink
, suspend
);
1254 static int pa_cli_command_suspend_source(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1259 pa_core_assert_ref(c
);
1264 if (!(n
= pa_tokenizer_get(t
, 1))) {
1265 pa_strbuf_puts(buf
, "You need to specify a source either by its name or its index.\n");
1269 if (!(m
= pa_tokenizer_get(t
, 2))) {
1270 pa_strbuf_puts(buf
, "You need to specify a suspend switch setting (0/1).\n");
1274 if ((suspend
= pa_parse_boolean(m
)) < 0) {
1275 pa_strbuf_puts(buf
, "Failed to parse suspend switch.\n");
1279 if (!(source
= pa_namereg_get(c
, n
, PA_NAMEREG_SOURCE
))) {
1280 pa_strbuf_puts(buf
, "No source found by this name or index.\n");
1284 pa_source_suspend(source
, suspend
);
1288 static int pa_cli_command_suspend(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1293 pa_core_assert_ref(c
);
1298 if (!(m
= pa_tokenizer_get(t
, 1))) {
1299 pa_strbuf_puts(buf
, "You need to specify a suspend switch setting (0/1).\n");
1303 if ((suspend
= pa_parse_boolean(m
)) < 0) {
1304 pa_strbuf_puts(buf
, "Failed to parse suspend switch.\n");
1308 ret
= - (pa_sink_suspend_all(c
, suspend
) < 0);
1309 if (pa_source_suspend_all(c
, suspend
) < 0)
1313 pa_strbuf_puts(buf
, "Failed to resume/suspend all sinks/sources.\n");
1318 static int pa_cli_command_log_level(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1322 pa_core_assert_ref(c
);
1327 if (!(m
= pa_tokenizer_get(t
, 1))) {
1328 pa_strbuf_puts(buf
, "You need to specify a log level (0..4).\n");
1332 if (pa_atou(m
, &level
) < 0 || level
>= PA_LOG_LEVEL_MAX
) {
1333 pa_strbuf_puts(buf
, "Failed to parse log level.\n");
1337 pa_log_set_maximal_level(level
);
1342 static int pa_cli_command_log_meta(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1346 pa_core_assert_ref(c
);
1351 if (!(m
= pa_tokenizer_get(t
, 1))) {
1352 pa_strbuf_puts(buf
, "You need to specify a boolean.\n");
1356 if ((b
= pa_parse_boolean(m
)) < 0) {
1357 pa_strbuf_puts(buf
, "Failed to parse log meta switch.\n");
1361 pa_log_set_show_meta(b
);
1366 static int pa_cli_command_log_time(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1370 pa_core_assert_ref(c
);
1375 if (!(m
= pa_tokenizer_get(t
, 1))) {
1376 pa_strbuf_puts(buf
, "You need to specify a boolean.\n");
1380 if ((b
= pa_parse_boolean(m
)) < 0) {
1381 pa_strbuf_puts(buf
, "Failed to parse log meta switch.\n");
1385 pa_log_set_show_time(b
);
1390 static int pa_cli_command_log_backtrace(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1394 pa_core_assert_ref(c
);
1399 if (!(m
= pa_tokenizer_get(t
, 1))) {
1400 pa_strbuf_puts(buf
, "You need to specify a backtrace level.\n");
1404 if (pa_atou(m
, &nframes
) < 0 || nframes
>= 1000) {
1405 pa_strbuf_puts(buf
, "Failed to parse backtrace level.\n");
1409 pa_log_set_show_backtrace(nframes
);
1414 static int pa_cli_command_dump(pa_core
*c
, pa_tokenizer
*t
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1424 pa_core_assert_ref(c
);
1432 pa_strbuf_printf(buf
, "### Configuration dump generated at %s\n", ctime_r(&now
, txt
));
1434 pa_strbuf_printf(buf
, "### Configuration dump generated at %s\n", ctime(&now
));
1437 for (m
= pa_idxset_first(c
->modules
, &idx
); m
; m
= pa_idxset_next(c
->modules
, &idx
)) {
1439 pa_strbuf_printf(buf
, "load-module %s", m
->name
);
1442 pa_strbuf_printf(buf
, " %s", m
->argument
);
1444 pa_strbuf_puts(buf
, "\n");
1449 for (sink
= pa_idxset_first(c
->sinks
, &idx
); sink
; sink
= pa_idxset_next(c
->sinks
, &idx
)) {
1452 pa_strbuf_puts(buf
, "\n");
1456 pa_strbuf_printf(buf
, "set-sink-volume %s 0x%03x\n", sink
->name
, pa_cvolume_avg(pa_sink_get_volume(sink
, FALSE
)));
1457 pa_strbuf_printf(buf
, "set-sink-mute %s %s\n", sink
->name
, pa_yes_no(pa_sink_get_mute(sink
, FALSE
)));
1458 pa_strbuf_printf(buf
, "suspend-sink %s %s\n", sink
->name
, pa_yes_no(pa_sink_get_state(sink
) == PA_SINK_SUSPENDED
));
1461 for (source
= pa_idxset_first(c
->sources
, &idx
); source
; source
= pa_idxset_next(c
->sources
, &idx
)) {
1464 pa_strbuf_puts(buf
, "\n");
1468 pa_strbuf_printf(buf
, "set-source-volume %s 0x%03x\n", source
->name
, pa_cvolume_avg(pa_source_get_volume(source
, FALSE
)));
1469 pa_strbuf_printf(buf
, "set-source-mute %s %s\n", source
->name
, pa_yes_no(pa_source_get_mute(source
, FALSE
)));
1470 pa_strbuf_printf(buf
, "suspend-source %s %s\n", source
->name
, pa_yes_no(pa_source_get_state(source
) == PA_SOURCE_SUSPENDED
));
1476 if ((p
= pa_namereg_get_default_sink_name(c
))) {
1478 pa_strbuf_puts(buf
, "\n");
1481 pa_strbuf_printf(buf
, "set-default-sink %s\n", p
);
1484 if ((p
= pa_namereg_get_default_source_name(c
))) {
1486 pa_strbuf_puts(buf
, "\n");
1489 pa_strbuf_printf(buf
, "set-default-source %s\n", p
);
1492 pa_strbuf_puts(buf
, "\n### EOF\n");
1497 int pa_cli_command_execute_line_stateful(pa_core
*c
, const char *s
, pa_strbuf
*buf
, pa_bool_t
*fail
, int *ifstate
) {
1504 cs
= s
+strspn(s
, whitespace
);
1506 if (*cs
== '#' || !*cs
)
1508 else if (*cs
== '.') {
1509 if (!strcmp(cs
, META_ELSE
)) {
1510 if (!ifstate
|| *ifstate
== IFSTATE_NONE
) {
1511 pa_strbuf_printf(buf
, "Meta command %s is not valid in this context\n", cs
);
1513 } else if (*ifstate
== IFSTATE_TRUE
)
1514 *ifstate
= IFSTATE_FALSE
;
1516 *ifstate
= IFSTATE_TRUE
;
1518 } else if (!strcmp(cs
, META_ENDIF
)) {
1519 if (!ifstate
|| *ifstate
== IFSTATE_NONE
) {
1520 pa_strbuf_printf(buf
, "Meta command %s is not valid in this context\n", cs
);
1523 *ifstate
= IFSTATE_NONE
;
1526 if (ifstate
&& *ifstate
== IFSTATE_FALSE
)
1528 if (!strcmp(cs
, META_FAIL
))
1530 else if (!strcmp(cs
, META_NOFAIL
))
1534 l
= strcspn(cs
, whitespace
);
1536 if (l
== sizeof(META_INCLUDE
)-1 && !strncmp(cs
, META_INCLUDE
, l
)) {
1537 const char *filename
= cs
+l
+strspn(cs
+l
, whitespace
);
1538 if (pa_cli_command_execute_file(c
, filename
, buf
, fail
) < 0)
1541 } else if (l
== sizeof(META_IFEXISTS
)-1 && !strncmp(cs
, META_IFEXISTS
, l
)) {
1543 pa_strbuf_printf(buf
, "Meta command %s is not valid in this context\n", cs
);
1545 } else if (*ifstate
!= IFSTATE_NONE
) {
1546 pa_strbuf_printf(buf
, "Nested %s commands not supported\n", cs
);
1549 const char *filename
= cs
+l
+strspn(cs
+l
, whitespace
);
1551 /* Search DL_SEARCH_PATH unless the filename is absolute */
1552 if (filename
[0] == PA_PATH_SEP_CHAR
) {
1554 *ifstate
= access(filename
, F_OK
) == 0 ? IFSTATE_TRUE
: IFSTATE_FALSE
;
1555 pa_log_debug("Checking for existance of '%s': %s", filename
, *ifstate
== IFSTATE_TRUE
? "success" : "failure");
1558 const char *paths
, *state
= NULL
;
1561 if (!(paths
= lt_dlgetsearchpath()))
1564 while ((p
= pa_split(paths
, ":", &state
))) {
1567 pathname
= pa_sprintf_malloc("%s" PA_PATH_SEP
"%s", p
, filename
);
1570 *ifstate
= access(pathname
, F_OK
) == 0 ? IFSTATE_TRUE
: IFSTATE_FALSE
;
1571 pa_log_debug("Checking for existance of '%s': %s", pathname
, *ifstate
== IFSTATE_TRUE
? "success" : "failure");
1575 if (*ifstate
== IFSTATE_TRUE
)
1582 pa_strbuf_printf(buf
, "Invalid meta command: %s\n", cs
);
1583 if (*fail
) return -1;
1587 const struct command
*command
;
1591 if (ifstate
&& *ifstate
== IFSTATE_FALSE
)
1594 l
= strcspn(cs
, whitespace
);
1596 for (command
= commands
; command
->name
; command
++)
1597 if (strlen(command
->name
) == l
&& !strncmp(cs
, command
->name
, l
)) {
1599 pa_tokenizer
*t
= pa_tokenizer_new(cs
, command
->args
);
1601 ret
= command
->proc(c
, t
, buf
, fail
);
1602 pa_tokenizer_free(t
);
1605 if (ret
< 0 && *fail
)
1612 pa_strbuf_printf(buf
, "Unknown command: %s\n", cs
);
1621 int pa_cli_command_execute_line(pa_core
*c
, const char *s
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1622 return pa_cli_command_execute_line_stateful(c
, s
, buf
, fail
, NULL
);
1625 int pa_cli_command_execute_file_stream(pa_core
*c
, FILE *f
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1627 int ifstate
= IFSTATE_NONE
;
1629 pa_bool_t _fail
= TRUE
;
1638 while (fgets(line
, sizeof(line
), f
)) {
1641 if (pa_cli_command_execute_line_stateful(c
, line
, buf
, fail
, &ifstate
) < 0 && *fail
)
1652 int pa_cli_command_execute_file(pa_core
*c
, const char *fn
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1655 pa_bool_t _fail
= TRUE
;
1664 if (!(f
= fopen(fn
, "r"))) {
1665 pa_strbuf_printf(buf
, "open('%s') failed: %s\n", fn
, pa_cstrerror(errno
));
1671 ret
= pa_cli_command_execute_file_stream(c
, f
, buf
, fail
);
1682 int pa_cli_command_execute(pa_core
*c
, const char *s
, pa_strbuf
*buf
, pa_bool_t
*fail
) {
1684 int ifstate
= IFSTATE_NONE
;
1685 pa_bool_t _fail
= TRUE
;
1696 size_t l
= strcspn(p
, linebreak
);
1697 char *line
= pa_xstrndup(p
, l
);
1699 if (pa_cli_command_execute_line_stateful(c
, line
, buf
, fail
, &ifstate
) < 0 && *fail
) {
1706 p
+= strspn(p
, linebreak
);