I'm deploying a Rails app on Heroku (for now) via git, and would also like to have a public version for people to look at. Some files are sensitive and should only be committed and pushed in the "heroku" branch, but not the "public" branch. What is the best way to go about this?
(I do know about Heroku's Config variables, which is great as a temporary solution, but not fun if and when I need to switch hosts.)
The two branches don't need to be synced at all times - I'm okay with periodically merging the "master" branch into the "public" branch and pushing it to github separately.
I have tried various things:
separate .gitignore
files and an "ours" merge strategy - this didn't work at first, and after messing with it for a while I decided it was getting too complicated just so I could achieve a seemingly simple task
using a custom exclude
file, and adding the following to .git/config
... this simply did not work:
.git/config
[branch "public"] excludesfile = +info/exclude_from_public
What is the best way to have a private and public repository share the same code, but ignore sensitive files in the public repository?
You can assume that no code has been committed or pushed, i.e. this is a freshly initialized repository.
(This question has been asked before in various forms, but none of the answers were straight-forward or the answers seemed really hacky. I'm just here to ask this in a very simple manner, and hopefully receive a very simple response.)
If you want to ignore a file that you've committed in the past, you'll need to delete the file from your repository and then add a . gitignore rule for it. Using the --cached option with git rm means that the file will be deleted from your repository, but will remain in your working directory as an ignored file.
Excluding local files without creating a .Use your favorite text editor to open the file called . git/info/exclude within the root of your Git repository. Any rule you add here will not be checked in, and will only ignore files for your local repository.
Just mark your repository as private by going to your repository's Settings -> Danger Zone -> Change repository visibility.
I will second the submodule answer, but try to provide some clarification. First, git does not deal with files but with commits. There is no way to filter files or paths in a branch because a branch is really a pointer to a commit. When you exclude or ignore you are just keeping files from being added to your repository. none of the 'sensitive files' files are even in the repository, just in your working directory.
The submodule is just a reference to another repository stored in your repository, and a specific commit that that checked out repository is tracking. you can say update using
git submodule update --recursive sensitive-files
In order to simplify things, you can commit symlinks in the proper place pointing to the submodule path.
ln -sf sensitive-files/shadow passwd
Then add the symlink as you would any other file..
Remember the submodule is just a checked out git repository, you can easily restrict access to that actual repository and make the main one public.
Updated:
Sorry I missed the notification, if you are still working on this.
You can have multiple symlinks in your private repository referencing the private repository (submodule) which is checked out in a subdirectory.Each of the databases or whatever used by the Rails instance could be a symlink into that private subdirectory.
Also, you don' t need a remote pointing to the private repository, just an entry in the .gitmodules file which is maintained automatically by git submodule. You would still need to protect the private repository so that only your Heroku instance could access it. For that I would suggest installing gitosis on a server if you can or use some other private git hosting solution. Add the public ssh key matching your instances private key tothe list of allowed users. (I'm not familiar with how to do this in Heroku.)
When you push your changes to heroku it should recursive download all the submodules mentioned in the repository.
You could create a pre-commit hook in your local repo, in here you can write a script to check the currently checked out branch and delete the offending files if they are present before the commit is processed. This avoids the files ever being recorded in the Git history of the wrong branch.
#!/bin/bash current_branch="$(git branch | sed -e 's/^*//')" if [ $current_branch != "heroku" ]; then // Delete sensitive files before commit rm -f dir1/dir2/exclude_from_public rm -f dir1/dir2/exclude_from_public_also fi exit 0
Alternatively, the script could just check for the files and return exit code "1", notifying you that the commit cannot proceed because it contains sensitive files.
The caveat is that you will need to hand this script to anyone who is working on the "privileged" heroku branch, and always have it included in your own local repo.
Ideally you would have this check done server-side as well; but unfortunately GitHub only offers a Web variant of the post-receive hook, so unless you do you're own repo hosting this approach can only be performed locally.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With