I have a private repo on Github that houses 3 submodules, all 3 of which are also private.
I have generated 4 SSH keys on my EC2 server and applied them as Github deploy keys to all 4 private repositories.
I am able to clone the primary repository as it recognizes the SSH key. When I run "git submodule update" it fails on the private repos with the following error:
ERROR: Repository not found. fatal: The remote end hung up unexpectedly
If I manually check out those private repos it works, but not when using the git submodule command. Any idea? Is this not fully supported?
Also, git submodules can also be used for both private and public repos.
In most cases, Git submodules are used when your project becomes more complex, and while your project depends on the main Git repository, you might want to keep their change history separate. Using the above as an example, the Room repository depends on the House repository, but they operate separately.
Privacy and data sharingPrivate repository data is scanned by machine and never read by GitHub staff. Human eyes will never see the contents of your private repositories, except as described in our Terms of Service. Your individual personal or repository data will not be shared with third parties.
Public repositories are accessible to everyone on the internet. Private repositories are only accessible to you, people you explicitly share access with, and, for organization repositories, certain organization members.
github's authentication is a bit odd. They don't use usernames; they just infer based on the public key you presented which user you are. Since you generated four deploy keys, it's anyone's guess which one will be used by your server when it connects to github - github will accept any of them, then reject any access to repositories that don't have that key registered.
As such, the simplest solution is to just use a single deploy key for all of the repositories.
If you can't, however, you can hack around this using ssh host aliases. Add to your server's ~/.ssh/config
stanzas like the following:
Host repo-foo
HostName ssh.github.com
Port 443
User git
IdentityFile /path/to/my-ssh-key-file-for-foo
IdentitiesOnly yes
Host repo-bar
HostName ssh.github.com
Port 443
User git
IdentityFile /path/to/my-ssh-key-file-for-bar
IdentitiesOnly yes
Then point your submodules at repo-bar:username/bar.git
and repo-foo:username/foo.git
rather than using the [email protected]:...
form.
This will effectively cause git and ssh to treat each repository as living on a different server, and pass in an explicit identity file, so there is no confusion over what key to use.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With