#!/usr/bin/python3 # -*- coding: utf-8 -*- # key-mapper - GUI for device specific keyboard mappings # Copyright (C) 2020 sezanzeb # # This file is part of key-mapper. # # key-mapper is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # key-mapper is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with key-mapper. If not, see . """Device and evdev stuff that is independent from the display server.""" # By using processes instead of threads, the mappings are # automatically copied, so that they can be worked with in the ui # without breaking the device. And it's possible to terminate processes. import multiprocessing import asyncio import evdev from keymapper.logger import logger from keymapper.getdevices import get_devices from keymapper.state import custom_mapping, system_mapping DEV_NAME = 'key-mapper' DEVICE_CREATED = 1 class KeycodeInjector: """Keeps injecting keycodes in the background based on the mapping.""" def __init__(self, device): """Start injecting keycodes based on custom_mapping.""" self.device = device self.virtual_devices = [] self.processes = [] paths = get_devices()[self.device]['paths'] logger.info( 'Starting injecting the mapping for %s on %s', self.device, ', '.join(paths) ) # Watch over each one of the potentially multiple devices per hardware for path in paths: pipe = multiprocessing.Pipe() worker = multiprocessing.Process( target=self._start_injecting_worker, args=(path, pipe[1]) ) worker.start() # wait for the process to notify creation of the new injection # device, to keep the logs in order. pipe[0].recv() self.processes.append(worker) def stop_injecting(self): """Stop injecting keycodes.""" logger.info('Stopping injecting keycodes') for i, process in enumerate(self.processes): if process is None: continue if process.is_alive(): process.terminate() self.processes[i] = None def _start_injecting_worker(self, path, pipe): """Inject keycodes for one of the virtual devices.""" loop = asyncio.new_event_loop() asyncio.set_event_loop(loop) device = evdev.InputDevice(path) try: # grab to avoid e.g. the disabled keycode of 10 to confuse X, # especially when one of the buttons of your mouse also uses 10. # This also avoids having to load an empty xkb symbols file # to prevent writing any unwanted keys. device.grab() except IOError: logger.error('Cannot grab %s', path) # copy the capabilities because the keymapper_device is going # to act like the device. capabilities = device.capabilities(absinfo=False) # However, make sure that it supports all keycodes, not just some # random ones. That's why I avoid from_device for this capabilities[evdev.ecodes.EV_KEY] = evdev.ecodes.keys.keys() # just like what python-evdev does in from_device if evdev.ecodes.EV_SYN in capabilities: del capabilities[evdev.ecodes.EV_SYN] if evdev.ecodes.EV_FF in capabilities: del capabilities[evdev.ecodes.EV_FF] keymapper_device = evdev.UInput( name=f'key-mapper {device.name}', events=capabilities ) pipe.send(DEVICE_CREATED) logger.debug( 'Started injecting into %s, fd %s', device.path, keymapper_device.fd ) for event in device.read_loop(): if event.type != evdev.ecodes.EV_KEY: logger.spam( 'got type:%s code:%s value:%s, forward', event.type, event.code, event.value ) keymapper_device.write(event.type, event.code, event.value) keymapper_device.syn() continue if event.value == 2: # linux does them itself, no need to trigger them continue # this happens to report key codes that are 8 lower # than the ones reported by xev and that X expects input_keycode = event.code + 8 character = custom_mapping.get_character(input_keycode) if character is None: # unknown keycode, forward it target_keycode = input_keycode else: target_keycode = system_mapping.get_keycode(character) if target_keycode is None: logger.error( 'Cannot find character %s in the internal mapping', character ) continue logger.spam( 'got code:%s value:%s, maps to code:%s char:%s', event.code + 8, event.value, target_keycode, character ) keymapper_device.write( evdev.ecodes.EV_KEY, target_keycode - 8, event.value ) keymapper_device.syn()