devel/p5-Test-POE-Server-TCP - The NetBSD Packages Collection

POE Component providing TCP server services for tests

Test::POE::Server::TCP is a POE component that provides a TCP server
framework for inclusion in client component test cases, instead of
having to roll your own.

Once registered with the component, a session will receive events
related to client connects, disconnects, input and flushed output. Each
of these events will refer to a unique client ID which may be used in
communication with the component when sending data to the client or
disconnecting a client connection.

Build dependencies

pkgtools/mktools pkgtools/cwrappers

Runtime dependencies

devel/p5-POE lang/perl5 lang/perl5

Binary packages

OSArchitectureVersion
NetBSD 10.0aarch64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0aarch64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0aarch64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0aarch64ebp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0aarch64ebp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0alphap5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0alphap5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0earmv4p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0earmv4p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0earmv6hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0earmv6hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0earmv6hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0earmv7hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0earmv7hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0earmv7hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0i386p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0i386p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0i386p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0i386p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0m68kp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0powerpcp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0powerpcp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0powerpcp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0sh3elp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0sparc64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0sparc64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0x86_64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0x86_64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0x86_64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 10.0x86_64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0aarch64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0aarch64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0aarch64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0alphap5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0alphap5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0earmv4p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0earmv6hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0earmv6hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0earmv6hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0earmv7hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0earmv7hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0earmv7hfp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0i386p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0i386p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0i386p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0i386p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0powerpcp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0powerpcp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0powerpcp5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0x86_64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0x86_64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0x86_64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.0x86_64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.3x86_64p5-Test-POE-Server-TCP-1.20nb7.tgz
NetBSD 9.3x86_64p5-Test-POE-Server-TCP-1.20nb7.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.