SlackBuilds Repository

15.0 > Accessibility > ydotool (0.1.9)

ydotool (send fake keyboard/mouse events to the kernel)

ydotool is an automation tool, similar to xdotool, but it doesn't
require X. It can be used to send input to console or wayland
applications, as well as X.

ydotool works differently from xdotool. xdotool sends X events
directly to X server, while ydotool uses the uinput framework of Linux
kernel to emulate an input device.

To use ydotool, the user must have read/write access to /dev/uinput.
On Slackware, this means ydotool would need root access. This
SlackBuild installs ydotool setuid root, but only users in the
'console' group can run it. Since 'console' users can already use the
real keyboard and mouse, it doesn't seem like a huge security risk to
let them send fake events. If this bothers you, run the script with
SETUID=no in the environment to disable it.

This requires: libevdevplus, libuinputplus

Maintained by: B. Watson
Keywords:
ChangeLog: ydotool

Homepage:
https://github.com/ReimuNotMoe/ydotool

Source Downloads:
ydotool-0.1.9.tar.gz (5b1de1443bd62c1bd60219d8972e5fb6)

Download SlackBuild:
ydotool.tar.gz
ydotool.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Validated for Slackware 15.0

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2022 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds