How to Install and Uninstall python312-magic-wormhole Package on openSuSE Tumbleweed
Last updated: November 16,2024
1. Install "python312-magic-wormhole" package
Learn how to install python312-magic-wormhole on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
python312-magic-wormhole
Copied
2. Uninstall "python312-magic-wormhole" package
Please follow the step by step instructions below to uninstall python312-magic-wormhole on openSuSE Tumbleweed:
$
sudo zypper remove
python312-magic-wormhole
Copied
3. Information about the python312-magic-wormhole package on openSuSE Tumbleweed
Information for package python312-magic-wormhole:
-------------------------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : python312-magic-wormhole
Version : 0.13.0-2.1
Arch : noarch
Vendor : openSUSE
Installed Size : 2.3 MiB
Installed : No
Status : not installed
Source package : python-magic-wormhole-0.13.0-2.1.src
Upstream URL : https://github.com/warner/magic-wormhole
Summary : Tool for transferring files through a secure channel
Description :
This package provides a library and a command-line tool named wormhole,
which makes it possible to get arbitrary-sized files and directories from
one computer to another. The two endpoints are identified by using identical
"wormhole codes": in general, the sending machine generates and displays
the code, which must then be typed into the receiving machine.
-------------------------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : python312-magic-wormhole
Version : 0.13.0-2.1
Arch : noarch
Vendor : openSUSE
Installed Size : 2.3 MiB
Installed : No
Status : not installed
Source package : python-magic-wormhole-0.13.0-2.1.src
Upstream URL : https://github.com/warner/magic-wormhole
Summary : Tool for transferring files through a secure channel
Description :
This package provides a library and a command-line tool named wormhole,
which makes it possible to get arbitrary-sized files and directories from
one computer to another. The two endpoints are identified by using identical
"wormhole codes": in general, the sending machine generates and displays
the code, which must then be typed into the receiving machine.