How to Install and Uninstall python310-magic-wormhole Package on openSuSE Tumbleweed
Last updated: November 23,2024
1. Install "python310-magic-wormhole" package
Please follow the guidance below to install python310-magic-wormhole on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
python310-magic-wormhole
Copied
2. Uninstall "python310-magic-wormhole" package
In this section, we are going to explain the necessary steps to uninstall python310-magic-wormhole on openSuSE Tumbleweed:
$
sudo zypper remove
python310-magic-wormhole
Copied
3. Information about the python310-magic-wormhole package on openSuSE Tumbleweed
Information for package python310-magic-wormhole:
-------------------------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : python310-magic-wormhole
Version : 0.13.0-2.1
Arch : noarch
Vendor : openSUSE
Installed Size : 1.6 MiB
Installed : No
Status : not installed
Source package : python-magic-wormhole-0.13.0-2.1.src
Upstream URL : https://github.com/warner/magic-wormhole
Summary : Tool for transferring files through a secure channel
Description :
This package provides a library and a command-line tool named wormhole,
which makes it possible to get arbitrary-sized files and directories from
one computer to another. The two endpoints are identified by using identical
"wormhole codes": in general, the sending machine generates and displays
the code, which must then be typed into the receiving machine.
-------------------------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : python310-magic-wormhole
Version : 0.13.0-2.1
Arch : noarch
Vendor : openSUSE
Installed Size : 1.6 MiB
Installed : No
Status : not installed
Source package : python-magic-wormhole-0.13.0-2.1.src
Upstream URL : https://github.com/warner/magic-wormhole
Summary : Tool for transferring files through a secure channel
Description :
This package provides a library and a command-line tool named wormhole,
which makes it possible to get arbitrary-sized files and directories from
one computer to another. The two endpoints are identified by using identical
"wormhole codes": in general, the sending machine generates and displays
the code, which must then be typed into the receiving machine.