| Index: third_party/pexpect/doc/api/pxssh.rst
 | 
| diff --git a/third_party/pexpect/doc/api/pxssh.rst b/third_party/pexpect/doc/api/pxssh.rst
 | 
| new file mode 100644
 | 
| index 0000000000000000000000000000000000000000..b947f4b5ace580dd4dd9c888cb1cba85ce5773fa
 | 
| --- /dev/null
 | 
| +++ b/third_party/pexpect/doc/api/pxssh.rst
 | 
| @@ -0,0 +1,34 @@
 | 
| +pxssh - control an SSH session
 | 
| +==============================
 | 
| +
 | 
| +.. automodule:: pexpect.pxssh
 | 
| +
 | 
| +.. autoclass:: ExceptionPxssh
 | 
| +
 | 
| +pxssh class
 | 
| +-----------
 | 
| +
 | 
| +.. autoclass:: pxssh
 | 
| +
 | 
| +   .. automethod:: __init__
 | 
| +
 | 
| +   .. attribute:: PROMPT
 | 
| +
 | 
| +      The regex pattern to search for to find the prompt. If you call :meth:`login`
 | 
| +      with ``auto_prompt_reset=False``, you must set this attribute manually.
 | 
| +
 | 
| +   .. attribute:: force_password
 | 
| +
 | 
| +      If this is set to True, public key authentication is disabled, forcing the
 | 
| +      server to ask for a password. Note that the sysadmin can disable password
 | 
| +      logins, in which case this won't work.
 | 
| +
 | 
| +   .. attribute:: options
 | 
| +
 | 
| +      The dictionary of user specified SSH options, eg, ``options = dict(StrictHostKeyChecking="no", UserKnownHostsFile="/dev/null")``
 | 
| +
 | 
| +   .. automethod:: login
 | 
| +   .. automethod:: logout
 | 
| +   .. automethod:: prompt
 | 
| +   .. automethod:: sync_original_prompt
 | 
| +   .. automethod:: set_unique_prompt
 | 
| 
 |