Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 09 Sep 2019 14:59:41 +0000
From:      bugzilla-noreply@freebsd.org
To:        python@FreeBSD.org
Subject:   [Bug 233999] [NEW PORT] security/py-exscript: Automating Telnet and SSH
Message-ID:  <bug-233999-21822-9g4h3Yv7lJ@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-233999-21822@https.bugs.freebsd.org/bugzilla/>
References:  <bug-233999-21822@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233999

--- Comment #6 from commit-hook@freebsd.org ---
A commit references this bug:

Author: kai
Date: Mon Sep  9 14:58:49 UTC 2019
New revision: 511633
URL: https://svnweb.freebsd.org/changeset/ports/511633

Log:
  [NEW PORT]: security/py-exscript

  Exscript is a Python module and a template processor for automating netwo=
rk
  connections over protocols such as Telnet or SSH.
  We attempt to create the best possible set of tools for working with
  Telnet and SSH.

  WWW: https://github.com/knipknap/exscript

  PR:           233999
  Submitted by: rozhuk.im@gmail.com (initial version), jhay
  Reviewed by:  koobs

Changes:
  head/security/Makefile
  head/security/py-exscript/
  head/security/py-exscript/Makefile
  head/security/py-exscript/distinfo
  head/security/py-exscript/pkg-descr

--=20
You are receiving this mail because:
You are on the CC list for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-233999-21822-9g4h3Yv7lJ>