Crates.io | hid-replay |
lib.rs | hid-replay |
version | 0.2.0 |
source | src |
created_at | 2024-05-20 06:53:07.464062 |
updated_at | 2024-07-26 05:30:22.639997 |
description | HID device emulation utility |
homepage | https://github.com/hidutils |
repository | https://github.com/hidutils/hid-replay |
max_upload_size | |
id | 1245480 |
size | 34,089 |
HID replay is a utility to create virtual HID devices via the uhid kernel module. Typically the input is a recording created by hid-recorder.
This is a Rust reimplementation of hid-replay from hid-tools.
hid-replay
needs access to the /dev/uhid
device and typically needs
to run as root.
The easiest is to install with cargo as root:
$ sudo cargo install hid-replay
$ sudo hid-replay path/to/recording
Alternatively leave out the sudo
which installs installs in $CARGO_HOME
(usually $HOME/.cargo
) and run with pkexec
instead.
$ cargo install hid-replay
$ pkexec hid-replay path/to/recording
pkexec
will ask for your user's password.
Alternatively you can install hid-replay so you can access it via sudo:
This is the default cargo
installation but requires that you add the
path manually when running hid-replay:
$ cargo install hid-replay
$ sudo $HOME/.cargo/bin/hid-replay path/to/recording
Install hid-replay in /usr/local/
which is typically part of the
default $PATH
.
$ sudo CARGO_INSTALL_ROOT=/usr/local cargo install hid-replay
$ sudo hid-replay path/to/recording
This is the least safe option as once read access is granted, any process can create virtual HID devices. This allows for malicious interference with your running session.
$ cargo install hid-replay
$ sudo chmod o+r /dev/uhid
$ hid-replay path/to/recording
It is recommended to remove these permissions once need for replaying is over:
$ sudo chmod o-r /dev/uhid