How to Install and Uninstall git-secrets Package on Ubuntu 20.10 (Groovy Gorilla)
Last updated: November 21,2024
1. Install "git-secrets" package
In this section, we are going to explain the necessary steps to install git-secrets on Ubuntu 20.10 (Groovy Gorilla)
$
sudo apt update
Copied
$
sudo apt install
git-secrets
Copied
2. Uninstall "git-secrets" package
This guide let you learn how to uninstall git-secrets on Ubuntu 20.10 (Groovy Gorilla):
$
sudo apt remove
git-secrets
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the git-secrets package on Ubuntu 20.10 (Groovy Gorilla)
Package: git-secrets
Architecture: all
Version: 1.3.0-3
Multi-Arch: foreign
Priority: optional
Section: universe/vcs
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Francois Marier
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 40
Filename: pool/universe/g/git-secrets/git-secrets_1.3.0-3_all.deb
Size: 19516
MD5sum: adb83a2c5359d054ace3dc5a109ad908
SHA1: f8198261ac5329f7fd0493552e94d36e48ca5fa3
SHA256: 4c66e8786bafebda4ce21077d4e788200f10c9b46e56f32b5787e6324a98e97b
SHA512: 005da2e4f94262f69f1d5734e758a5a721ba42a839636b00885aee2eb899b64eef12785653cef5764671ae7abfebebe2523861e3738bc7ad638801ef6270a624
Homepage: https://github.com/awslabs/git-secrets
Description-en: Prevents accidental commits of credentials
git-secrets scans commits, commit messages, and --no-ff merges
to prevent adding secrets into your git repositories. If a commit,
commit message, or any commit in a --no-ff merge history matches
one of your configured prohibited regular expression patterns,
then the commit is rejected.
Description-md5: 05d772e323e9636935eca58c196c53fb
Architecture: all
Version: 1.3.0-3
Multi-Arch: foreign
Priority: optional
Section: universe/vcs
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Francois Marier
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 40
Filename: pool/universe/g/git-secrets/git-secrets_1.3.0-3_all.deb
Size: 19516
MD5sum: adb83a2c5359d054ace3dc5a109ad908
SHA1: f8198261ac5329f7fd0493552e94d36e48ca5fa3
SHA256: 4c66e8786bafebda4ce21077d4e788200f10c9b46e56f32b5787e6324a98e97b
SHA512: 005da2e4f94262f69f1d5734e758a5a721ba42a839636b00885aee2eb899b64eef12785653cef5764671ae7abfebebe2523861e3738bc7ad638801ef6270a624
Homepage: https://github.com/awslabs/git-secrets
Description-en: Prevents accidental commits of credentials
git-secrets scans commits, commit messages, and --no-ff merges
to prevent adding secrets into your git repositories. If a commit,
commit message, or any commit in a --no-ff merge history matches
one of your configured prohibited regular expression patterns,
then the commit is rejected.
Description-md5: 05d772e323e9636935eca58c196c53fb