Configuring VCS Post-Commit Hooks for TeamCity
TeamCity periodically polls remote repositories targeted by each active VCS root to detect new changes. If your installation has hundreds of VCS roots, this continuous polling can significantly load the server.
You can set up post-commit hooks to decrease this load and speed up detecting new changes. In this case, whenever a new commit is pushed to the remote repository, a VCS provider will instantly send TeamCity a request to check for recent changes.
Overview
Common Commit Hook Information
Commit hooks utilize TeamCity REST API to issue commands for the TeamCity server. The recommended approach for post-commit hooks is to issue a command to check for new commits pushed to a remote repository. To do this, a webhook should send the POST
request to the /app/rest/vcs-root-instances endpoint:
TeamCityServerURL
is the URL of your TeamCity server.vcsRootInstancesLocator
is the locator that points to specific VCS root instance(s) used by this build configuration.
Requests sent to the /app/rest/vcs-root-instances/commitHookNotification?locator
endpoint do not automatically trigger builds; they only force TeamCity to check for new changes. You can configure VCS triggers to start builds when these changes are detected.
If you want to explicitly queue new builds instead of checking for changes and letting TeamCity triggers initialize builds, send requests directly to the /app/rest/buildQueue
endpoint instead. See this documentation article for request examples: Start and Cancel Builds.
Instance Locator
The vcsRootInstancesLocator
is a filter expression that finds all VCS root instances whose build configurations need to check for repository changes. This expression should define a set of specific criteria to locate required root instances and filter out all the others. Otherwise, if your locator returns many unrelated instances, TeamCity will issue excessive checks for changes, increasing the server load (beyond the initial polling load in some cases).
You can look for a required VCS root instance by its name, unique ID, the name of a parent VCS root, project, or build configuration, and other fields. See this article for the complete list of dimensions you can specify in this locator: VcsRootInstanceLocator.
The most reliable locator is one that uses a repository URL (since it normally never changes). A VCS root instances locator does not include URL as an available dimension. Instead, you need to utilize a nested locator to check instance properties. Note that URL's colons and slashes should be escaped.
To view all VCS root instance properties and their values, request an instance using a path locator (endpoint/value
instead of endpoint?locator=value
) and the default "ID" dimension.
This request will return a payload similar to the following:
To get the internal instance ID:
Go to your build configuration and open the Settings tab.
Copy the ID property value.
Send the following request using any REST API testing tool, for instance, Postman.
/app/rest/vcs-root-instances?locator=buildType:<copied_value>You should receive a response similar to the following:
<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <vcs-root-instances count="1" href="/app/rest/vcs-root-instances?locator=buildType:GitLabMavenApp_Build"> <vcs-root-instance id="87" vcs-root-id="GitLabMavenApp_HttpsGitlabComUsernameReponameGitRefsHeadsMain" name="https://gitlab.com/username/reponame.git#refs/heads/main" href="/app/rest/vcs-root-instances/id:87"/> </vcs-root-instances>{ "count": 1, "href": "/app/rest/vcs-root-instances?locator=buildType:GitLabMavenApp_Build", "vcs-root-instance": [ { "id": "87", "vcs-root-id": "GitLabMavenApp_HttpsGitlabComUsernameReponameGitRefsHeadsMain", "name": "https://gitlab.com/username/reponame.git#refs/heads/main", "href": "/app/rest/vcs-root-instances/id:87" } ] }In the sample response above, the unique ID of the VCS root instance used by a build configuration is "87".
A locator can include multiple dimensions, which allows you to specify multiple filter conditions. For example:
This locator finds all instances of the specific VCS root. The count
dimension raises the maximum number of returned instances to the given value (the default limit is 100 entries).
For VCS roots without the *-references
parameter, you can use the following option with a better performance:
Authentication
For security reasons, TeamCity requires authentication for all REST API calls. Some VCS providers do not offer advanced webhook settings to specify a desired authentication method (basic auth, bearer token, and others) and allow you to enter only the request destination URL. In this case, add user credentials to a URL in one of the following formats:
username:password — the combination of regular credentials you use to log into TeamCity. Requires the enabled "Basic HTTP" module in Administration | Authentication.
username:PAT — the combination of a regular username and a personal access token. Requires the enabled "Token-Based Authentication" module in Administration | Authentication.
Requests should use the credentials of a user with the "View project and all parent projects" and "View build configuration settings" permissions for all the projects where the VCS root is defined.
In case of authentication issues, navigate to Administration | Diagnostics and choose the "debug-auth" preset in the Troubleshooting section. You can then inspect the TeamCity_Folder/logs/teamcity-auth.log
file to view the detailed problem information.
Repository Polling with Configured Hooks
Projects that have configured commit hooks still poll their remote repositories as a backup mechanism for cases when hooks stop working. However, with each successful hook communication, the polling interval automatically doubles. The maximum value to which TeamCity increases this interval is 4 hours, and the minimum interval is 15 minutes. Should scheduled polling reveal a change that did not trigger a commit hook, TeamCity will reset the polling interval to its default value.
To check the current polling interval and the commit hook status, navigate to Administration | <Your_Project> | <Your_Build_Configuration> | Vesrion Control Settings.
To set a custom value for the minimum polling interval, navigate to VCS root settings and scroll down to the Changes Checking section.
Set Up a Post-Commit Hook
This section explains how to set up hooks for VCS providers that allow seamless webhook implementation and do not require writing your own post-commit scripts.
GitHub and GitHub Enterprise
If your connection to GitHub or GitHub Enterprise is configured via GitHub Apps, you can set up a post-commit hook directly in the connection properties.
When configuring a GitHub App connection, follow TeamCity instructions to create a GitHub App webhook with the given URL.
Set up a webhook secret on the GitHub App configuration page and paste the same value to the TeamCity connection settings dialog.
Push a test commit to a GitHub repository to check TeamCity receives an update notification. You can check sent update notifications and TeamCity responses on the "GitHub App | Settings | Advanced" page.
The alternative approach is to utilize GitHub Checks Webhook triggers that leverage GitHub check run API to trigger new TeamCity builds on every commit. This trigger also acts as a replacement for the Commit Status Publisher build feature.
GitLab
Navigate to the required remote repository on your GitLab server.
Click Settings | Webhooks in the GitLab sidebar.
Click Add new webhook.
Specify the URL to which the webhook should send
POST
requests. Include username and password/PAT as described in the Authentication section. For example:http://valravn:querty@myteamcityfarm.build.gg/app/rest/vcs-root-instances/commitHookNotification?locator=87Tick Push events under the "Triggers" section.
Click Add webhook to save your new webhook.
Push a new commit to test the hook. You should be able to see your commit in the TeamCity build configuration's Pending Changes tab.
GitLab also allows you to set up the integration with JetBrains TeamCity on the Repository Settings | Integrations page. This integration sends requests to the /app/rest/buildQueue
endpoint, so instead of issuing "check for changes" requests, it explicitly queues new TeamCity builds when a new commit is pushed, or a new merge request is created.
To set up this integration, specify the TeamCity URL (without the /app/rest/...
postfix), build configuration ID, and TeamCity user credentials.
Bitbucket
You can utilize this approach in Bitbucket Cloud, Bitbucket Server, and Bitbucket Data Center.
Go to the remote repository that should send update notifications.
Navigate to the Webhooks page.
In the sidebar menu, click Repository settings | Webhooks.
In the sidebar menu, click the gear icon and choose Webhooks.
Click Create/Add Webhook.
Specify the webhook name and tick Push under the "Triggers" or "Events" section.
Specify the URL to which Bitbucket should send
POST
requests to trigger TeamCity update checkups. Include user credentials in the URL as described in the Authentication section. For example:https://valravn:querty@mybuildfarm.gg/app/rest/vcs-root-instances/commitHookNotification?locator=id:34Click Save or Create to save your new webhook.
Push a sample commit to verify that your webhook successfully delivers requests.
Azure DevOps Server
The latest Azure DevOps Server (formerly Team Foundation Server) and Azure DevOps Services provide service hooks for code-commit events. To create a hook, perform the following steps:
Open the admin page for a team project in web access.
Create a subscription by running the wizard.
Select the "Web Hooks" service to integrate with.
Select the "Code checked in" event and specify a filter.
Fill in the TeamCity username, password, and server URL in the format:
"$SERVER/app/rest/vcs-root-instances/commitHookNotification?locator=$LOCATOR"The
$LOCATOR
value depends on the TFS repository type.vcsRoot:(type:tfs,count:99999),property:(name:tfs-url,value:<TFS server url>,matchType:equals,ignoreCase:true),property:(name:tfs-root,value:<TFS project>,matchType:contains,ignoreCase:true),count:99999where
<TFS server url>
must be replaced with the value specified in the Azure DevOps VCS root URL and path properties. For example:http://teamcity/app/rest/vcs-root-instances/commitHookNotification?locator=vcsRoot:(type:tfs,count:99999),property:(name:tfs-url,value:http%3A%2F%2Ftfs%3Aport%2Ftfs%2Fcollection,matchType:equals,ignoreCase:true),property:(name:tfs-root,value:Project,matchType:contains,ignoreCase:true),count:99999vcsRoot:(type:jetbrains.git,count:99999),property:(name:url,value:<VCS root repository URL>,matchType:equals,ignoreCase:true),count:99999where
<VCS root repository URL>
must be replaced with the repository URL specified in the corresponding TeamCity VCS root and the value should be URL-escaped. Example:http://teamcity/app/rest/vcs-root-instances/commitHookNotification?locator=vcsRoot:(type:jetbrains.git,count:99999),property:(name:url,value:https%3A%2F%2Faccount.visualstudio.com%2FDefaultCollection%2FProject%2F_git%2FRepository,matchType:equals,ignoreCase:true),count:99999Click Finish to create the service hook.
Manual Setup
If a repository is hosted within an environment that does not expose ready-to-use webhook setup tools, you may need to implement them manually. The process commonly involves the following steps:
Create a script that sends REST API requests to the required TeamCity endpoint.
Save this script on your VCS server.
Edit VCS server settings to execute this script whenever a new change is pushed.
Generic Post-Commit Hook
Save the script below on a VCS server as teamcity-trigger.sh
(you will need a personal access token):
For Perforce, you can use this dedicated script.
Set the variables according to your TeamCity server. The user must have the "View build configuration settings" permission for projects where the VCS root is defined. This permission is included in the Project Developer role by default.
Git Server
Locate the Git repository root on the target VCS server. It should contain the
.git/hooks
directory with some templates.Create the
.git/hooks/post-receive
file with a line:/path/to/teamcity-trigger.sh 'vcsRoot:(type:jetbrains.git,count:99999),property:(name:url,value:<VCS root repository URL>,matchType:equals,ignoreCase:true),count:99999'where
<VCS root repository URL>
must be replaced with the repository URL specified in the corresponding TeamCity VCS root and the value should be URL-escaped.Make sure that both
teamcity-trigger.sh
andhooks/post-receive
scripts can be read and executed by Git user(s). You may need to execute the following command:chmod 755 /path/to/teamcity-trigger.sh /path/to/git_root/.git/hooks/post-receive
Mercurial Server
Locate the Mercurial repository root on the target VCS server.
Create or edit the
.hg/hgrc config
and add the following snippet:[hooks] changegroup = /path/to/teamcity-trigger.sh 'vcsRoot:(type:mercurial,count:99999),property:(name:repositoryPath,value:<VCS root repository url>,matchType:equals,ignoreCase:true),count:99999'where
<VCS root repository URL>
must be replaced with the repository URL specified in the corresponding TeamCity VCS root and the value should be URL-escaped.Make sure that
teamcity-trigger.sh
is executable. You may need to execute the following command:chmod 755 /path/to/teamcity-trigger.sh
Subversion Server
Locate the Subversion repository root containing the
db
,hooks
,locks
, and other directories. We need thehooks
directory.Create the
hooks/post-commit
file with a line:/path/to/teamcity-trigger.sh 'vcsRoot:(type:svn,count:99999),property:(name:url,value:<VCS root repository url>,matchType:equals,ignoreCase:true),count:99999'where
<VCS root repository URL>
must be replaced with the repository URL specified in the corresponding TeamCity VCS root and the value should be URL-escaped.Make sure that both
teamcity-trigger.sh
andhooks/post-commit
script can be read and executed by the process of the Subversion server. You may need to execute the following command:chmod 755 /path/to/teamcity-trigger.sh /path/to/svn_repository_root/hooks/post-commit
Perforce Server
This section explains how to set up the dedicated Perforce script. Note that utilizing the generic script is also possible, but this is the outdated approach that is no longer recommended.
The dedicated post-commit script on installed on your Perforce server automatically detects Perforce VCS roots in TeamCity and triggers the respective builds. To be able to use the script, you need to generate an access token first. The TeamCity user assigned to this token must have the "Run build" permission for projects where Perforce VCS roots are defined. This permission is included in the Project Developer role by default.
It is also recommended configuring a Perforce Administrator Access connection in the project settings. TeamCity will use it to ensure that all changed files in the Perforce changelist are collected. If such a connection is not configured explicitly, TeamCity will try to connect to Perforce using settings of one of the project's VCS roots.
Save this script on your Perforce server as
teamcity-hook.sh
:#!/bin/sh # How to use this script: # 1. Save the script on the Perforce server under the name /path/teamcity-hook.sh. # 2. Run chmod +x /path/teamcity-hook.sh. # 3. Set up a change-commit trigger by adding the following line when editing the specification with the `p4 triggers` command: # check-for-changes-teamcity change-commit //depot/... "/path/teamcity-hook.sh %\change%" # 4. Update the variables below. # # Update the following variables: # TeamCity server root URL: TEAMCITY_SERVER=http://localhost:8111/bs # Access token of a user on TeamCity server which can run builds in all relevant configurations (Developer role) TC_ACCESS_TOKEN="<token_value>" # This P4PORT value will be used to find relevant VCS roots, it should be equal to the P4Port setting in the VCS root: P4PORT="localhost:1666" CHANGE=$1 # The following is one line: (sleep 10; curl -H "Authorization: Bearer $TC_ACCESS_TOKEN" -d "p4port=$P4PORT&changelistId=$CHANGE" "$TEAMCITY_SERVER/app/perforce/commitHook" -o /dev/null) >/dev/null 2>&1 <&1 & exit 0Run
chmod +x /path/teamcity-hook.sh
.Edit the Perforce specification with the
p4 triggers
command and set up a change-commit trigger by adding the following line:check-for-changes-teamcity change-commit //depot/... "/path/teamcity-hook.sh %\change%"where
//depot/...
is the depot which is used in TeamCity builds. If there are multiple depots, you can replace this path with//...
.Update the variables from the script with your TeamCity settings.
Edit Perforce Specification with Generic Script
Set up a change-commit
trigger by adding one or several lines when editing the specification. The text below must be placed in one line, one line per trigger.
where <VCS Root locator>
can be one of the following:
for Stream-based VCS roots:
vcsRoot:(type:perforce,count:99999),property:(name:stream,value://streamdepot/streamname,matchType:equals,ignoreCase:true),count:99999for Client-based VCS roots:
vcsRoot:(type:perforce,count:99999),property:(name:client,value:<client name>,matchType:equals,ignoreCase:true),count:99999for Client-mapping VCS roots:
vcsRoot:(type:perforce,count:99999),property:(name:client-mapping,value:<unique client mapping>,matchType:equals,ignoreCase:true),count:99999where
<unique client mapping>
should match the Perforce depot path in the TeamCity VCS root after all parameters' resolution. For the rulecheck-for-changes-teamcity change-commit //depot/project1/...
it would be//depot/project1/
.Each
check-for-changes-teamcity
rule line describes an association between the path with the commit (//depot/project1
) and a set of VCS roots which should be checked for changes.
Troubleshooting
It is recommended to try executing the following command from the command line before configuring the actual hook:
If the commit hook matches the VCS root on the server correctly, you should see the output similar to this:
If the commit hook has not found any VCS roots, it will report an error:
Possible reasons for this output:
the specified locator is incorrect, it does not match any VCS root on the server
the specified user does not have enough permission for at least one of the matched VCS roots.
To check what roots are actually matched, use the request (see also details):