Date: Mon, 09 Sep 2019 14:59:41 +0000 From: bugzilla-noreply@freebsd.org To: python@FreeBSD.org Subject: [Bug 233999] [NEW PORT] security/py-exscript: Automating Telnet and SSH Message-ID: <bug-233999-21822-9g4h3Yv7lJ@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-233999-21822@https.bugs.freebsd.org/bugzilla/> References: <bug-233999-21822@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233999 --- Comment #6 from commit-hook@freebsd.org --- A commit references this bug: Author: kai Date: Mon Sep 9 14:58:49 UTC 2019 New revision: 511633 URL: https://svnweb.freebsd.org/changeset/ports/511633 Log: [NEW PORT]: security/py-exscript Exscript is a Python module and a template processor for automating netwo= rk connections over protocols such as Telnet or SSH. We attempt to create the best possible set of tools for working with Telnet and SSH. WWW: https://github.com/knipknap/exscript PR: 233999 Submitted by: rozhuk.im@gmail.com (initial version), jhay Reviewed by: koobs Changes: head/security/Makefile head/security/py-exscript/ head/security/py-exscript/Makefile head/security/py-exscript/distinfo head/security/py-exscript/pkg-descr --=20 You are receiving this mail because: You are on the CC list for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-233999-21822-9g4h3Yv7lJ>