Binary package “git-secrets” in ubuntu noble
Prevents accidental commits of credentials
git-secrets scans commits, commit messages, and --no-ff merges
to prevent adding secrets into your git repositories. If a commit,
commit message, or any commit in a --no-ff merge history matches
one of your configured prohibited regular expression patterns,
then the commit is rejected.
Source package
Published versions
- git-secrets 1.3.0-6 in amd64 (Release)
- git-secrets 1.3.0-7 in amd64 (Proposed)
- git-secrets 1.3.0-7 in amd64 (Release)
- git-secrets 1.3.0-6 in arm64 (Release)
- git-secrets 1.3.0-7 in arm64 (Proposed)
- git-secrets 1.3.0-7 in arm64 (Release)
- git-secrets 1.3.0-6 in armhf (Release)
- git-secrets 1.3.0-7 in armhf (Proposed)
- git-secrets 1.3.0-7 in armhf (Release)
- git-secrets 1.3.0-6 in i386 (Release)
- git-secrets 1.3.0-7 in i386 (Proposed)
- git-secrets 1.3.0-7 in i386 (Release)
- git-secrets 1.3.0-6 in ppc64el (Release)
- git-secrets 1.3.0-7 in ppc64el (Proposed)
- git-secrets 1.3.0-7 in ppc64el (Release)
- git-secrets 1.3.0-6 in riscv64 (Release)
- git-secrets 1.3.0-7 in riscv64 (Proposed)
- git-secrets 1.3.0-7 in riscv64 (Release)
- git-secrets 1.3.0-6 in s390x (Release)
- git-secrets 1.3.0-7 in s390x (Proposed)
- git-secrets 1.3.0-7 in s390x (Release)