Commit graph

5 commits

Author SHA1 Message Date
joerg
62d1ba2bac Remove @dirrm entries from PLISTs 2009-06-14 18:03:28 +00:00
epg
32bdfaa062 - Move _epoll.so to PLIST.Linux (fixes PR pkg/39553).
- Adjust py-OpenSSL dependency down to 0.6.
- Use egg.mk instead of extension.mk, drop PYDISTUTILSPKG, and add egg foo
  to PLIST.
2008-09-16 01:59:07 +00:00
epg
071f1b1120 Update from to 8.1.0; changes too numerous to list.
pkgsrc changes:
- Move more definitions to Makefile.common, drop some that had default values.

- Depend on py-OpenSSL and py-ZopeInterface.

- Add do-test target.

- Remove patch-aa and install all bin/ script with plain names, not with
  ${PYVERSSUFFIX} appended.  setup.py is now much, much simpler, and rewriting
  the patch would be difficult.  It doesn't matter anyway, as I tried really
  hard to install py-OpenSSL for both python24 and python25 and it just
  doesn't work.
2008-08-22 21:49:08 +00:00
recht
47b85d7ff9 update to 1.3.0.
patch provided by Michal Pasternak in PR pkg/25705

changes:

- Address objects for IPv4 and Unix addresses throughout twisted.internet.
- Improved connected UDP APIs.
- Refactored SSH client support.
- Initial implementation of Windows I/O Completion Ports event loop.
- Bug fixes and feature enhancements.
- Nevow support for Lore (so your Lore documents can use Nevow directives).
- This is the last release before Twisted begins splitting up.
2004-05-26 11:59:25 +00:00
recht
db212e4c5c initial import of Twisted 1.2.0
provided by Michal Pasternak via pkgsrc-wip

Twisted is a framework, written in Python, for writing networked applications.
It includes implementations of a number of commonly used network services such
as a web server, an IRC chat server, a mail server, a relational database
interface and an object broker. Developers can build applications using all of
these services as well as custom services that they write themselves. Twisted
also includes a user authentication system that controls access to services
and provides services with user context information to implement their own
security models.
2004-03-30 13:27:05 +00:00