Welcome to ftp.nluug.nl Current directory: /pub/os/Linux/distr/salix/sbo/15.0/accessibility/ydotool/ |
|
Contents of README:ydotool (send fake keyboard/mouse events to the kernel) ydotool is an automation tool, similar to xdotool, but it doesn't require X. It can be used to send input to console or wayland applications, as well as X. ydotool works differently from xdotool. xdotool sends X events directly to X server, while ydotool uses the uinput framework of Linux kernel to emulate an input device. To use ydotool, the user must have read/write access to /dev/uinput. On Slackware, this means ydotool would need root access. This SlackBuild installs ydotool setuid root, but only users in the 'console' group can run it. Since 'console' users can already use the real keyboard and mouse, it doesn't seem like a huge security risk to let them send fake events. If this bothers you, run the script with SETUID=no in the environment to disable it. ydotool also requires its daemon (ydotoold) to be running. It can be started manually, or you could start it from /etc/rc.d/rc.local with code like this: if [ -x /usr/sbin/ydotoold ]; then /usr/sbin/ydotoold &> /var/log/ydotoold/log & fi |
Name Last modified Size
Parent Directory - README 15-Jul-2023 12:33 1.0K project_version.diff 11-Mar-2022 06:34 791 slack-desc 11-Mar-2022 06:34 968 ydotool.1 15-Jul-2023 12:33 4.9K ydotool.SlackBuild 15-Jul-2023 12:33 3.4K ydotool.info 15-Jul-2023 12:33 311 ydotoold.8 15-Jul-2023 12:33 1.0K
NLUUG - Open Systems. Open Standards
Become a member
and get discounts on conferences and more, see the NLUUG website!