[![Build Status](https://github.com/pqrs-org/Karabiner-DriverKit-VirtualHIDDevice/workflows/CI/badge.svg)](https://github.com/pqrs-org/Karabiner-DriverKit-VirtualHIDDevice/actions) [![License](https://img.shields.io/badge/license-Public%20Domain-blue.svg)](https://github.com/pqrs-org/Karabiner-DriverKit-VirtualHIDDevice/blob/main/LICENSE.md) # Karabiner-DriverKit-VirtualHIDDevice This project implements a virtual keyboard and virtual mouse using DriverKit on macOS. These virtual devices are recognized by macOS as same as physical hardware, allowing you to control macOS with keystrokes and mouse inputs from the virtual devices. The client for controlling the virtual devices is provided as a header-only C++ library. By integrating this library, your software can control the virtual devices. **Note:** The ability to send keystrokes and mouse inputs means having full control over macOS. Therefore, to prevent malicious software from manipulating the virtual devices, the virtual devices will only accept commands from processes running with root privileges. This means that the software incorporating the client library must be run with root privileges. ## Supported systems - macOS 14 Sonoma - Both Intel-based Macs and Apple Silicon Macs - macOS 13 Ventura - Both Intel-based Macs and Apple Silicon Macs ## Screenshots - macOS Settings (macOS detects the virtual keyboard)

System Preferences

--- ## Usage 1. Open `dist/Karabiner-DriverKit-VirtualHIDDevice-x.x.x.pkg`. 2. Install files via installer. 3. Execute the following command in Terminal. ```shell /Applications/.Karabiner-VirtualHIDDevice-Manager.app/Contents/MacOS/Karabiner-VirtualHIDDevice-Manager activate ``` 4. Run Karabiner-VirtualHIDDevice-Daemon: ```shell sudo '/Library/Application Support/org.pqrs/Karabiner-DriverKit-VirtualHIDDevice/Applications/Karabiner-VirtualHIDDevice-Daemon.app/Contents/MacOS/Karabiner-VirtualHIDDevice-Daemon' ``` 5. Run a client program to test the driver extension. ```shell git clone --depth 1 https://github.com/pqrs-org/Karabiner-DriverKit-VirtualHIDDevice.git cd Karabiner-DriverKit-VirtualHIDDevice/examples/virtual-hid-device-service-client brew install xcodegen make make run ``` ## Uninstallation 1. Run uninstaller in Terminal. ```shell bash '/Library/Application Support/org.pqrs/Karabiner-DriverKit-VirtualHIDDevice/scripts/uninstall/deactivate_driver.sh' sudo bash '/Library/Application Support/org.pqrs/Karabiner-DriverKit-VirtualHIDDevice/scripts/uninstall/remove_files.sh' ``` ### Installed files - `/Applications/.Karabiner-VirtualHIDDevice-Manager.app` - `/Library/Application Support/org.pqrs/Karabiner-DriverKit-VirtualHIDDevice` - `/Library/Application Support/org.pqrs/tmp` - `/var/log/karabiner` --- ## How to build a package from source code To run DriverKit drivers, simply building from the code is not sufficient; proper signing is also necessary. In particular, a general developer account lacks the necessary permissions for DriverKit signing, so you need to apply to Apple for higher privileges. The primary focus of this document is on signing. ### System requirements - macOS 14+ - Xcode 15+ - Command Line Tools for Xcode - [XcodeGen](https://github.com/yonaskolb/XcodeGen) ### Obtain DriverKit entitlements To create an App ID that supports the `com.apple.developer.driverkit` entitlement required for distributing DriverKit drivers, you need to apply to Apple with your developer account to obtain the necessary permissions. Specifically, follow the instructions on [Requesting Entitlements for DriverKit Development](https://developer.apple.com/documentation/driverkit/requesting_entitlements_for_driverkit_development) Note: This process may take some time to be completed on Apple's side. ### Create App IDs Create the following App IDs on the [Apple Developer](https://developer.apple.com/account/resources/identifiers/list) site.
Bundle ID Capabilities App Services Additional Capabilities
org.pqrs.Karabiner-DriverKit-VirtualHIDDevice --- --- com.apple.developer.driverkit
com.apple.developer.driverkit.family.hid.device
com.apple.developer.driverkit.family.hid.eventservice
com.apple.developer.driverkit.transport.hid
com.apple.developer.hid.virtual.device
org.pqrs.Karabiner-VirtualHIDDevice-Daemon --- --- ---
org.pqrs.Karabiner-VirtualHIDDevice-Manager System Extension
--- ---
Additional Capabilities
### Grant permission for com.apple.developer.driverkit.userclient-access from Apple The entitlement of `com.apple.developer.driverkit.userclient-access` must be applied for from Apple, and unless individually authorized, it cannot be granted to your application. You can apply through the request form: ### Create a profile corresponding to the App IDs on the Apple Developer site | Profile | App ID | Entitlements | | ------------ | --------------------------------------------- | ------------------------------------------------------------------- | | Developer ID | org.pqrs.Karabiner-DriverKit-VirtualHIDDevice | DriverKit and System Extension Template for XXXXXXXX (Developer ID) | | Developer ID | org.pqrs.Karabiner-VirtualHIDDevice-Daemon | DriverKit and System Extension Template for XXXXXXXX (Developer ID) | | Developer ID | org.pqrs.Karabiner-VirtualHIDDevice-Manager | Default | Please ensure that `com.apple.developer.driverkit.userclient-access` appears under Extended Entitlements when you select `DriverKit and System Extension Template` in Entitlements.
entitlements

### Replace the `*.provisionprofile` files in the repository with your own provision profile files - src/Daemon/Developer_ID_KarabinerVirtualHIDDeviceDaemon.provisionprofile - src/DriverKit/Developer_ID_KarabinerDriverKitVirtualHIDDevice.provisionprofile - src/Manager/Developer_ID_KarabinerVirtualHIDDeviceManager.provisionprofile ### Replace team identifier, domain and embedded.provisionprofile Search `G43BCU2T37` and replace them with your team identifier. ```shell git grep G43BCU2T37 src/ ``` ### Open Terminal.app to create a package The rest of the operations will be performed in the terminal. ### Set environment variables for signing Set the following environment variables for application signing and package signing.​ - `PQRS_ORG_CODE_SIGN_IDENTITY` - `PQRS_ORG_INSTALLER_CODE_SIGN_IDENTITY` You can determine the values using the following methods: Find the value for `PQRS_ORG_CODE_SIGN_IDENTITY`: ```shell security find-identity -p codesigning -v | grep 'Developer ID Application' ``` ```text 2) BD3B995B69EBA8FC153B167F063079D19CCC2834 "Developer ID Application: Fumihiko Takayama (G43BCU2T37)" ``` Then, set `PQRS_ORG_CODE_SIGN_IDENTITY` ```shell export PQRS_ORG_CODE_SIGN_IDENTITY=BD3B995B69EBA8FC153B167F063079D19CCC2834 ``` Find the value for `PQRS_ORG_INSTALLER_CODE_SIGN_IDENTITY`: ```shell security find-identity -p basic -v | grep 'Developer ID Installer' ``` ```text 1) C3107C61DB3605DA2D4549054B225DAFB1D6FA2D "Developer ID Installer: Fumihiko Takayama (G43BCU2T37)" ``` Then, set `PQRS_ORG_INSTALLER_CODE_SIGN_IDENTITY` ```shell export PQRS_ORG_INSTALLER_CODE_SIGN_IDENTITY=C3107C61DB3605DA2D4549054B225DAFB1D6FA2D ``` ### Build a package ```shell make package ``` `dist/Karabiner-DriverKit-VirtualHIDDevice-X.X.X.pkg` will be generated. ### Notarize the package Create App-Specific Passwords on . - name: `pqrs.org notarization` Execute `store-credentials` ```shell xcrun notarytool store-credentials --apple-id tekezo@pqrs.org --team-id G43BCU2T37 Profile name: > pqrs.org notarization App-specific password for tekezo@pqrs.org: > The password you created earlier ``` Then, notarize the package: ```shell make notarize ``` --- ## More detailed information ### Components Karabiner-DriverKit-VirtualHIDDevice consists the following components. - Extension Manager (including DriverKit driver) - `/Applications/.Karabiner-VirtualHIDDevice-Manager.app` - It provides a command line interface to activate or deactivate DriverKit driver. - Karabiner-VirtualHIDDevice-Daemon - `/Library/Application Support/org.pqrs/Karabiner-DriverKit-VirtualHIDDevice/Applications/Karabiner-VirtualHIDDevice-Daemon.app` - It mediates between the client app and the driver. - It allows apps to communicate with the virtual device even if the app is not signed with pqrs.org's code signing identity. (The client app must be running with root privileges.) - Client apps - Client apps are not included in the distributed package. - For example, you can build the client app from `examples/virtual-hid-device-service-client` in this repository. - Client apps can send input events by communicating with Karabiner-VirtualHIDDevice-Daemon via UNIX domain socket. (`/Library/Application Support/org.pqrs/tmp/rootonly/vhidd_server/*.sock`) ![components.svg](./docs/plantuml/output/components.svg) ### Versions Version is defined in `version.json`. - `package_version`: - Karabiner-DriverKit-VirtualHIDDevice package version. - Increment this when any components are updated. - `driver_version`: - DriverKit driver internal version. - Increment this when the driver source code is updated. - `client_protocol_version`: - The version for communication between Karabiner-VirtualHIDDevice-Daemon and the DriverKit driver. - Increment this when the communication specifications are changed. ### Run Karabiner-VirtualHIDDevice-Daemon via launchd Karabiner-VirtualHIDDevice-Daemon requires high responsiveness, so it is recommended to run it via launchd with the `ProcessType: Interactive` specified. There is an example application for registration with launchd in `examples/SMAppServiceExample`, which you can refer to for registering with launchd. ### Extra documents - [How to be close to DriverKit](DEVELOPMENT.md) - [Extracts from xnu](XNU.md)