int pa__init(pa_module*m) { pa_iochannel *io; pa_modargs *ma; int32_t fd = -1; int r = -1; pa_native_options *options = NULL; pa_assert(m); if (!(ma = pa_modargs_new(m->argument, valid_modargs))) { pa_log("Failed to parse module arguments."); goto finish; } if (pa_modargs_get_value_s32(ma, "fd", &fd) < 0 || fd < 0) { pa_log("Invalid file descriptor."); goto finish; } m->userdata = pa_native_protocol_get(m->core); io = pa_iochannel_new(m->core->mainloop, fd, fd); options = pa_native_options_new(); options->module = m; options->auth_anonymous = true; pa_native_protocol_connect(m->userdata, io, options); r = 0; finish: if (ma) pa_modargs_free(ma); if (options) pa_native_options_unref(options); return r; }
int pa__init(pa_module*m) { pa_modargs *ma = NULL; struct userdata *u = NULL; #if defined(USE_TCP_SOCKETS) uint32_t port = IPV4_PORT; pa_bool_t port_fallback = TRUE; const char *listen_on; #else int r; #endif #if defined(USE_PROTOCOL_NATIVE) || defined(USE_PROTOCOL_HTTP) char t[256]; #endif pa_assert(m); if (!(ma = pa_modargs_new(m->argument, valid_modargs))) { pa_log("Failed to parse module arguments"); goto fail; } m->userdata = u = pa_xnew0(struct userdata, 1); u->module = m; #if defined(USE_PROTOCOL_SIMPLE) u->simple_protocol = pa_simple_protocol_get(m->core); u->simple_options = pa_simple_options_new(); if (pa_simple_options_parse(u->simple_options, m->core, ma) < 0) goto fail; u->simple_options->module = m; #elif defined(USE_PROTOCOL_CLI) u->cli_protocol = pa_cli_protocol_get(m->core); #elif defined(USE_PROTOCOL_HTTP) u->http_protocol = pa_http_protocol_get(m->core); #elif defined(USE_PROTOCOL_NATIVE) u->native_protocol = pa_native_protocol_get(m->core); u->native_options = pa_native_options_new(); if (pa_native_options_parse(u->native_options, m->core, ma) < 0) goto fail; u->native_options->module = m; #else u->esound_protocol = pa_esound_protocol_get(m->core); u->esound_options = pa_esound_options_new(); if (pa_esound_options_parse(u->esound_options, m->core, ma) < 0) goto fail; u->esound_options->module = m; #endif #if defined(USE_TCP_SOCKETS) if (pa_in_system_mode() || pa_modargs_get_value(ma, "port", NULL)) port_fallback = FALSE; if (pa_modargs_get_value_u32(ma, "port", &port) < 0 || port < 1 || port > 0xFFFF) { pa_log("port= expects a numerical argument between 1 and 65535."); goto fail; } listen_on = pa_modargs_get_value(ma, "listen", NULL); if (listen_on) { # ifdef HAVE_IPV6 u->socket_server_ipv6 = pa_socket_server_new_ipv6_string(m->core->mainloop, listen_on, (uint16_t) port, port_fallback, TCPWRAP_SERVICE); # endif u->socket_server_ipv4 = pa_socket_server_new_ipv4_string(m->core->mainloop, listen_on, (uint16_t) port, port_fallback, TCPWRAP_SERVICE); } else { # ifdef HAVE_IPV6 u->socket_server_ipv6 = pa_socket_server_new_ipv6_any(m->core->mainloop, (uint16_t) port, port_fallback, TCPWRAP_SERVICE); # endif u->socket_server_ipv4 = pa_socket_server_new_ipv4_any(m->core->mainloop, (uint16_t) port, port_fallback, TCPWRAP_SERVICE); } # ifdef HAVE_IPV6 if (!u->socket_server_ipv4 && !u->socket_server_ipv6) # else if (!u->socket_server_ipv4) # endif goto fail; if (u->socket_server_ipv4) pa_socket_server_set_callback(u->socket_server_ipv4, socket_server_on_connection_cb, u); # ifdef HAVE_IPV6 if (u->socket_server_ipv6) pa_socket_server_set_callback(u->socket_server_ipv6, socket_server_on_connection_cb, u); # endif #else # if defined(USE_PROTOCOL_ESOUND) # if defined(USE_PER_USER_ESOUND_SOCKET) u->socket_path = pa_sprintf_malloc("/tmp/.esd-%lu/socket", (unsigned long) getuid()); # else u->socket_path = pa_xstrdup("/tmp/.esd/socket"); # endif /* This socket doesn't reside in our own runtime dir but in * /tmp/.esd/, hence we have to create the dir first */ if (pa_make_secure_parent_dir(u->socket_path, pa_in_system_mode() ? 0755U : 0700U, (uid_t)-1, (gid_t)-1) < 0) { pa_log("Failed to create socket directory '%s': %s\n", u->socket_path, pa_cstrerror(errno)); goto fail; } # else if (!(u->socket_path = pa_runtime_path(pa_modargs_get_value(ma, "socket", UNIX_SOCKET)))) { pa_log("Failed to generate socket path."); goto fail; } # endif if ((r = pa_unix_socket_remove_stale(u->socket_path)) < 0) { pa_log("Failed to remove stale UNIX socket '%s': %s", u->socket_path, pa_cstrerror(errno)); goto fail; } else if (r > 0) pa_log_info("Removed stale UNIX socket '%s'.", u->socket_path); if (!(u->socket_server_unix = pa_socket_server_new_unix(m->core->mainloop, u->socket_path))) goto fail; pa_socket_server_set_callback(u->socket_server_unix, socket_server_on_connection_cb, u); #endif #if defined(USE_PROTOCOL_NATIVE) # if defined(USE_TCP_SOCKETS) if (u->socket_server_ipv4) if (pa_socket_server_get_address(u->socket_server_ipv4, t, sizeof(t))) pa_native_protocol_add_server_string(u->native_protocol, t); # ifdef HAVE_IPV6 if (u->socket_server_ipv6) if (pa_socket_server_get_address(u->socket_server_ipv6, t, sizeof(t))) pa_native_protocol_add_server_string(u->native_protocol, t); # endif # else if (pa_socket_server_get_address(u->socket_server_unix, t, sizeof(t))) pa_native_protocol_add_server_string(u->native_protocol, t); # endif #endif #if defined(USE_PROTOCOL_HTTP) #if defined(USE_TCP_SOCKETS) if (u->socket_server_ipv4) if (pa_socket_server_get_address(u->socket_server_ipv4, t, sizeof(t))) pa_http_protocol_add_server_string(u->http_protocol, t); #ifdef HAVE_IPV6 if (u->socket_server_ipv6) if (pa_socket_server_get_address(u->socket_server_ipv6, t, sizeof(t))) pa_http_protocol_add_server_string(u->http_protocol, t); #endif /* HAVE_IPV6 */ #else /* USE_TCP_SOCKETS */ if (pa_socket_server_get_address(u->socket_server_unix, t, sizeof(t))) pa_http_protocol_add_server_string(u->http_protocol, t); #endif /* USE_TCP_SOCKETS */ #endif /* USE_PROTOCOL_HTTP */ if (ma) pa_modargs_free(ma); return 0; fail: if (ma) pa_modargs_free(ma); pa__done(m); return -1; }