Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

How to delete Github's wiki homepage?

Tags:

Today I put my password to Github's wiki Home page. Then, I know it's a mistake.

How to remove this page? (I can remove child page, but I don't know how to delete wiki Home page)

like image 234
Do Nhu Vy Avatar asked Aug 27 '16 01:08

Do Nhu Vy


People also ask

How do I delete a wiki site?

clicking the Delete button above or below the list. To delete a Wiki Page, navigate into the Wiki, and click the contextual arrow for any page. Not every Page will have a Delete command: The first Page added to a Wiki is designated as the home page, and it cannot be deleted.

How do I delete a Gitlab Wiki page?

gitlab docYou can find the Delete button only when editing a page. Click on it and confirm you want the page to be deleted.


2 Answers

I faced the same issue.

I was not able to Delete Wiki's "Home" page as Delete Button was not appearing for "Home" page when I go in Edit Mode.

To Delete the Wiki's "Home" page, do the following Steps:

  1. Rename "Home" to anything else. It seems that GitHub considers "Home" to be the default page and hence the "Delete" button disappears.
  2. Click on "Edit Page". Or Navigate to Edit Mode
  3. And now you can see the "Delete" button.
  4. Delete the page and you are Done.
like image 119
Ankit Prajapati Avatar answered Oct 04 '22 15:10

Ankit Prajapati


The wiki is simply a separate git repository, so you can check it out and remove files the same way you would with anything else. Simply apply .wiki to the name (so if your repository is named my_repo, clone my_repo.wiki.git instead of my_repo.git) and clone to do this.

However, that said, you should definitely change your password anyway; it is compromised.

Github provides instructions to permanently purge a repository of a file here but it is my opinion that it's not worth bothering, given that the password should never be used again now that you have exposed it. You simply cannot know who has already pulled down the information and seen it (and numerous bad actors run scripts regularly on Github specifically to harvest credentials mistakenly committed).

like image 30
Casey Avatar answered Oct 04 '22 15:10

Casey