slackbuilds/accessibility/ydotool
B. Watson f9ba8fd3f3
accessibility/ydotool: Fix makepkg command.
Signed-off-by: B. Watson <urchlay@slackware.uk>

Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
2023-02-18 10:06:52 +07:00
..
README accessibility/ydotool: Added (fake key/mouse events, no X). 2022-02-06 11:42:46 +07:00
project_version.diff accessibility/ydotool: Added (fake key/mouse events, no X). 2022-02-06 11:42:46 +07:00
slack-desc accessibility/ydotool: Added (fake key/mouse events, no X). 2022-02-06 11:42:46 +07:00
ydotool.1 accessibility/ydotool: Added (fake key/mouse events, no X). 2022-02-06 11:42:46 +07:00
ydotool.SlackBuild accessibility/ydotool: Fix makepkg command. 2023-02-18 10:06:52 +07:00
ydotool.info accessibility/ydotool: Update email address. 2022-06-09 11:41:34 -04:00
ydotoold.8 accessibility/ydotool: Added (fake key/mouse events, no X). 2022-02-06 11:42:46 +07:00

README

ydotool (send fake keyboard/mouse events to the kernel)

ydotool is an automation tool, similar to xdotool, but it doesn't
require X. It can be used to send input to console or wayland
applications, as well as X.

ydotool works differently from xdotool. xdotool sends X events
directly to X server, while ydotool uses the uinput framework of Linux
kernel to emulate an input device.

To use ydotool, the user must have read/write access to /dev/uinput.
On Slackware, this means ydotool would need root access. This
SlackBuild installs ydotool setuid root, but only users in the
'console' group can run it. Since 'console' users can already use the
real keyboard and mouse, it doesn't seem like a huge security risk to
let them send fake events. If this bothers you, run the script with
SETUID=no in the environment to disable it.