Prevents you from committing secrets and credentials into git repositories
https://github.com/awslabs/git-secrets
git-secrets scans commits, commit messages, and --no-ff merges to prevent
adding secrets into your git repositories. If a commit, commit message, or any
commit in a --no-ff merge history matches one of your configured prohibited
regular expression patterns, then the commit is rejected.
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:darix:playground/git-secrets && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_service | 0000000557 557 Bytes | |
_service:obs_scm:_servicedata | 0000000236 236 Bytes | |
_service:obs_scm:git-secrets-1.2.1+git37.c11c229.o |
0000106507 104 KB | |
_service:obs_scm:git-secrets.obsinfo | 0000000115 115 Bytes | |
_servicedata | 0000000236 236 Bytes | |
git-secrets.changes | 0000000154 154 Bytes | |
git-secrets.spec | 0000001729 1.69 KB |
Latest Revision
Marcus Rueckert (darix)
committed
(revision 1)
- initial package
Comments 0