Git
TeamCity supports Git out of the box. Git source control with Azure DevOps Services is supported (see authentication notes below).
This page contains description of the Git-specific fields of the VCS root settings.
For common VCS root properties, see this section.
Important notes:
Remote Run and Pre-Tested Commit are supported in the IntelliJ IDEA and Eclipse plugins; with the Visual Studio Addin use the Branch Remote Run Trigger.
Initial Git checkout may take significant time (sometimes hours), depending on the size of your project history, because the whole project history is downloaded during the initial checkout.
General Settings
Option | Description |
---|---|
Fetch URL | The URL of the remote Git repository used for fetching data from the repository. |
Push URL | The URL of the target remote Git repository used for pushing annotated tags created via VCS labeling build feature to the remote repository. If blank, the fetch URL is used. |
Default branch | Configures default branch. Parameter references are supported here. Default value is |
Branch specification | Lists the patterns for branch names, required for feature branches support. The matched branches are monitored for changes in addition to the default branch. The syntax is similar to checkout rules: |
Use tags as branches | Allows monitoring / checking out git tags as branches making branch specification match tag names as well as branches (for example, |
Username style | Defines a way TeamCity reports username for a VCS change. Changing the username style will affect only newly collected changes. Old changes will continue to be stored with the style that was active at the time of collecting changes. |
Submodules | Select whether you want to ignore the submodules, or treat them as a part of the source tree. Submodule repositories should either not require authentication or use the same protocol and accept the same authentication as configured in the VCS root. |
Username for tags/merge | A custom username used for labeling. |
Branch Matching Rules
If the branch matches a line without patterns, the line is used.
If the branch matches several lines with patterns, the best matching line is used.
If there are several lines with equal matching, the one below takes precedence.
Everything that is matched by the wildcard will be shown as a branch name in the TeamCity interface. For example,+:refs/heads/*
will matchrefs/heads/feature1
branch, but in the TeamCity interface you'll see onlyfeature1
as a branch name.
The short name of the branch is determined as follows:if the line contains no brackets, then full line is used, if there are no patterns or part of line starting with the first pattern-matched character to the last pattern-matched character.
if the line contains brackets, then part of the line within brackets is used. When branches are specified here, and if your build configuration has a VCS trigger and a change is found in some branch, TeamCity will trigger a build in this branch.
Supported Git Protocols
The following protocols are supported for Git repository URL:
ssh: (for example,
ssh://git.somwhere.org/repos/test.git
,ssh://git@git.somwhereElse.org/repos/test.git
, SCP-like syntax:git@git.somwhere.org:repos/test.git
)
Git: (for example,
git://git.kernel.org/pub/scm/git/git.git
)HTTP: (for example,
http://git.somewhere.org/projects/test.git
)file: (for example,
file:///c:/projects/myproject/.git
)
Authentication Settings
Authentication Method | Description |
---|---|
Anonymous | Select this option to clone a repository with anonymous read access. |
Password | Specify a valid username (if there is no username in the clone URL; the username specified here overrides the username from the URL) and a password to be used to clone the repository. You can use a personal access token instead of a password to authenticate in GitHub, Azure DevOps Services, GitLab, and Bitbucket. |
Private Key | Valid only for SSH protocol. A private key must be in the OpenSSH format. Select one of the options from the Private Key list and specify a valid username (if there is no username in the clone URL; the username specified here overrides the username from the URL).
|
For all available options to connect to GitHub, see the comment.
Authenticating to Azure DevOps Services
If you use Git source control with Azure DevOps Services, the following options are available to you:
Personal Access Tokens
To use access tokens, you need to create a personal access token in your Azure DevOps account, where you have to set some Code access scope in your repositories and use it when configuring a VCS root.
Option | Description |
---|---|
Username | Leave blank for TFVC, any value for Git, for example, username |
Password | Enter your personal access token created earlier |
Required Access Scope
TFS subsystem | Scopes |
---|---|
TFVC | All scopes |
Git | Code (read) / Code (read and write) for versioned settings |
Work Items | Work items (read) |
Commit Status | Code (status) |
Alternate Authentication Credentials
To use the login/password pair authentication, you have to enable alternate credentials in your Azure DevOps account, where you can set a secondary username and password to use when configuring a VCS root.
Server Settings
These are the settings used in case of the server-side checkout.
Option | Description |
---|---|
Convert line-endings to CRLF | Convert line-endings of all text files to CRLF (works as setting |
Agent Settings
These are the settings used in case of the agent-side checkout.
Note that the agent-side checkout has limited support for SSH. The only supported authentication methods are "Default Private Key" and "Uploaded Private Key".
If you plan to use the agent-side checkout, you need to have Git 1.6.4+ installed on the agents.
Option | Description |
---|---|
Path to Git | Provide the path to a Git executable to be used on the agent. When set to |
Checkout policy | This setting defines how TeamCity performs a checkout to a build agent.
|
Clean Policy/Clean Files Policy | Specify here when the If a build configuration depends on multiple VCS roots, we suggest that you configure separate agent checkout directories for each of these roots, using VCS checkout rules. This way, |
Git executable on the agent
TeamCity needs Git command line client version 1.6.4+ on the agent in order to use the agent-side checkout.
The recommended approach is to ensure that the git client is available in PATH
of the TeamCity agent and leave the "Path to git" setting in the VCS root blank.
If you only have the git command line on some machines, set "Path to git" setting in the VCS root to the %env.TEAMCITY_GIT_PATH%
value.
Instead of adding Git to the agent's PATH, you can set the TEAMCITY_GIT_PATH
environment variable (or env.TEAMCITY_GIT_PATH
property in the agent's buildAgent.properties
file) to the full path to the git executable.
If TEAMCITY_GIT_PATH
is not defined, the Git agent plugin tries to detect the installed git on the launch of the agent. It first tries to run git from the following locations:
- for Windows — it tries to run
git.exe
at:C:\Program Files\Git\bin
C:\Program Files (x86)\Git\bin
C:\cygwin\bin
- for *nix — it tries to run
git
at:/usr/local/bin
/usr/bin
/opt/local/bin
/opt/bin
If Git is not found in any of these locations, it tries to run the git accessible via the PATH
environment variable.
If a compatible git (1.6.4+) is found, it is reported in the TEAMCITY_GIT_PATH
environment variable. This variable can be used in the Path to git field in the VCS root settings. As a result, the configuration with such a VCS root will run only on the agents where Git was detected or specified in the agent properties.
Git mirrors on cloud agents
By default, TeamCity creates a mirror, that is a copy, of your Git repository under the agent's system/git
directory. To save time and disk space on fetching source files, TeamCity points to this mirror via the Git alternate mechanism when updating the checkout directory for a build.
Comparing to self-hosted TeamCity agents, cloud agents require extra steps to add a Git mirror:
When preparing a cloud image, clone the repository under the agent image's
system/git
directory. If necessary, you can store multiple*.git
directories side by side.Create a
map
file under thesystem/git
directory and describe the mapping between the original repository and its mirror. For example,ssh://git@<host>/<git_folder>.git = <git_folder>.git
When starting a build, a cloud agent will check the mirrors specified in the map
file and fetch the difference between the required origin and its mirror. The origin URL in the map
file must match the URL set in the VCS root.
This way, builds will run significantly faster, with no need to check out the whole remote repository every time the new cloud agent starts.
Configuring Git Garbage Collection on Server
TeamCity server maintains a local clone for every Git repository used in the VCS roots configured on the server. Since the server performs fetch in those clones many times a day, the clone needs regular optimization to maintain predictable performance. If the Git garbage collection for the clone was not run for a long time, the process of collecting changes may slow down or start to report memory-related errors. TeamCity can automatically run git gc periodically when native Git client can be found on the server. Inability to run Git GC results in a related health report.
To fix the warning / meet automatic git gc requirements, perform the following:
Install a native Git client manually on the TeamCity server.
- Specify the path to the Git executable:
Add the directory with the executable to the
PATH
environment variable and restart the server, orSet the full path to the executable in the
teamcity.server.git.executable.path
internal property without the server restart. On Windows, remember to use double backslashes in the path.
When TeamCity runs Git garbage collection, the details are logged into the teamcity-cleanup.log
. If git garbage collection fails, a corresponding warning is displayed.
TeamCity executes Git garbage collection until the total time doesn't exceed 5 hours quota; the quota can be changed using the teamcity.server.git.gc.quota.minutes
internal property.
Git garbage collection is executed every night at 2 a.m., this can be changed by specifying the internal property with a cron expression like this: teamcity.git.cleanupCron=0 0 2 * * ?
. If the git gc
process works slowly and cannot be completed in the allotted time, check the git-repack
configuration in the default Git configuration files (for example, you can increase --window-memory
to improve the git gc
performance).
If the local Git clones need some kind of manual maintenance, you can find them under the <TeamCity Data Directory>/system/caches/git
directory. The map
file in the directory contains mapping between the repository URL and the subdirectory storing the bare clone of the repository.
Git LFS
TeamCity supports Git LFS for agent-side checkout. To use it, install git 1.8.+ and Git LFS on the build agent machine. Git LFS should be enabled using the git lfs install
command (on Windows, an elevated command prompt may be needed). More information is available in the Git LFS documentation.
For LFS, you need to use the same credentials as used for the Git VCS root itself.
We recommend using Git LFS version 2.12.1 or later as earlier versions come with a vulnerability exploit.
Internal Properties
For Git VCS, it is possible to configure the following internal properties:
Property | Default | Description |
---|---|---|
teamcity.git.idle.timeout.seconds | 1800 | The idle timeout for communication with the remote repository. If no data were sent or received during this timeout, the plugin throws a timeout error to prevent hanging of the process forever. |
teamcity.git.fetch.timeout | 1800 | (deprecated) Override of |
teamcity.git.fetch.separate.process | true | Defines whether TeamCity runs |
teamcity.git.fetch.process.max.memory | This property provides the explicit Ensure the server machine has enough memory as the memory configured will be used in addition to the main server process and there can be several child processes doing | |
teamcity.git.fetch.process.max.memory.limit | By default, TeamCity starts nested Java processes for This property specifies the maximum possible | |
teamcity.git.monitoring.expiration.timeout.hours | 24 | |
teamcity.server.git.gc.enabled | false | Whether TeamCity should run |
teamcity.server.git.executable.path | git | The path to the native git executable on the server. On Windows, remember to use double backslashes in the path. |
teamcity.server.git.gc.quota.minutes | 60 | Maximum amount of time to run |
teamcity.git.cleanupCron | 0 0 2 * * ? * | Cron expression for the time of a clean-up in git-plugin, by default — daily at 2AM. |
teamcity.git.stream.file.threshold.mb | 128 | Threshold in megabytes after which JGit uses streams to inflate objects. Increase it if you have large binary files in the repository and see symptoms described in TW-14947 |
teamcity.git.buildPatchInSeparateProcess | true | Git-plugin builds patches in a separate process, set it to false to build patch in the server process. To build patch, git-plugin has to read repository files into memory. To not run out of memory git-plugin reads only objects of size smaller than the threshold, for larger objects streams are used and they can be slow (TW-14947). With patch building in a separate process all objects are read into memory. Patch process uses the memory settings of the separate fetch process. |
teamcity.git.mirror.expiration.timeout.days | 7 | The number of days after which an unused clone of the repository will be removed from the server machine. The repository is considered unused if there were no TeamCity operations on this repository, like checking for changes or getting the current version. These operations are quite frequent, so 7 days is a reasonably high value. |
teamcity.git.commit.debug.info | false | Defines whether to log additional debug info on each found commit. |
teamcity.git.repackIdleTimeoutSeconds | 1800 | Defines the idle timeout of |
teamcity.git.sshProxyType | Type of SSH proxy, supported values: | |
teamcity.git.sshProxyHost | SSH proxy host | |
teamcity.git.sshProxyPort | SSH proxy port | |
teamcity.git.connectionRetryAttempts | 3 | Number of attempts to establish connection to the remote host for testing connection and getting a current repository state before admitting a failure |
teamcity.git.connectionRetryIntervalSeconds | 4 | Interval in seconds between connection attempts |
Build parameters for Git:
Property | Default | Description | |
---|---|---|---|
teamcity.git.use.native.ssh | false | When checkout on agent: whether TeamCity should use native SSH implementation. | |
teamcity.git.idle.timeout.seconds | 3600 | The idle timeout for the |
Limitations
The Git plugin uses git sparse-checkout
to check out Git files on an agent. The plugin is able to perform only simple file mapping operations which limits the set of supported VCS checkout rules for Git.
The following rules are supported:
If you specify multiple checkout rules for one root, make sure their checkout directories (the right part of the rule) have a common parent directory. For example:
Note that rules should not remap files. That is, the following rule is not supported: +:dirA/dirA1 => dirA/dirA2
.
Known Issues
java.lang.OutOfMemoryError
while fetching from a repository in caseteamcity.git.fetch.process.max.memory
property is specified. Since TeamCity 2019.2, the recommended approach is to disable this property thus delegating the automatic memory management to TeamCity.TeamCity running as a Windows service cannot access a network mapped drives, so you cannot work with git repositories located on such drives. To make this work, run TeamCity using
teamcity-server.bat
.Inflation using streams in JGit prevents
OutOfMemoryError
, but might get time-consuming (see the TW-14947 issue related to the problem). If you notice a similar behavior, try to increaseteamcity.git.stream.file.threshold.mb
. Additionally, it is recommended to increase the overall amount of memory dedicated for TeamCity to preventOutOfMemoryError
.