]> git.ipfire.org Git - thirdparty/git.git/blame - Documentation/git-receive-pack.txt
Merge branch 'bw/format-patch-o-create-leading-dirs'
[thirdparty/git.git] / Documentation / git-receive-pack.txt
CommitLineData
2a245013
JH
1git-receive-pack(1)
2===================
2a245013
JH
3
4NAME
5----
c3f0baac 6git-receive-pack - Receive what is pushed into the repository
2a245013
JH
7
8
9SYNOPSIS
10--------
7791a1d9 11[verse]
5a277f3f 12'git-receive-pack' <directory>
2a245013
JH
13
14DESCRIPTION
15-----------
0b444cdb 16Invoked by 'git send-pack' and updates the repository with the
2a245013
JH
17information fed from the remote end.
18
19This command is usually not invoked directly by the end user.
0b444cdb 20The UI for the protocol is on the 'git send-pack' side, and the
2a245013 21program pair is meant to be used to push updates to remote
483bc4f0 22repository. For pull operations, see linkgit:git-fetch-pack[1].
2a245013 23
a75d7b54 24The command allows for creation and fast-forwarding of sha1 refs
b1bf95bb 25(heads/tags) on the remote end (strictly speaking, it is the
ba020ef5 26local end 'git-receive-pack' runs, but to the user who is sitting at
b1bf95bb
JW
27the send-pack end, it is updating the remote. Confused?)
28
05ef58ec
SP
29There are other real-world examples of using update and
30post-update hooks found in the Documentation/howto directory.
b1bf95bb 31
ba020ef5 32'git-receive-pack' honours the receive.denyNonFastForwards config
05ef58ec
SP
33option, which tells it if updates to a ref should be denied if they
34are not fast-forwards.
35
c08db5a2
JK
36A number of other receive.* config options are available to tweak
37its behavior, see linkgit:git-config[1].
38
05ef58ec
SP
39OPTIONS
40-------
41<directory>::
42 The repository to sync into.
43
76a8788c 44PRE-RECEIVE HOOK
05ef58ec
SP
45----------------
46Before any ref is updated, if $GIT_DIR/hooks/pre-receive file exists
f43cd49f
SP
47and is executable, it will be invoked once with no parameters. The
48standard input of the hook will be one line per ref to be updated:
05ef58ec 49
f43cd49f 50 sha1-old SP sha1-new SP refname LF
05ef58ec 51
f43cd49f
SP
52The refname value is relative to $GIT_DIR; e.g. for the master
53head this is "refs/heads/master". The two sha1 values before
05ef58ec 54each refname are the object names for the refname before and after
967506bb
JK
55the update. Refs to be created will have sha1-old equal to 0\{40},
56while refs to be deleted will have sha1-new equal to 0\{40}, otherwise
05ef58ec
SP
57sha1-old and sha1-new should be valid objects in the repository.
58
a85b377d
JH
59When accepting a signed push (see linkgit:git-push[1]), the signed
60push certificate is stored in a blob and an environment variable
61`GIT_PUSH_CERT` can be consulted for its object name. See the
d05b9618
JH
62description of `post-receive` hook for an example. In addition, the
63certificate is verified using GPG and the result is exported with
64the following environment variables:
65
66`GIT_PUSH_CERT_SIGNER`::
67 The name and the e-mail address of the owner of the key that
68 signed the push certificate.
69
70`GIT_PUSH_CERT_KEY`::
71 The GPG key ID of the key that signed the push certificate.
72
73`GIT_PUSH_CERT_STATUS`::
74 The status of GPG verification of the push certificate,
75 using the same mnemonic as used in `%G?` format of `git log`
76 family of commands (see linkgit:git-log[1]).
a85b377d 77
b89363e4
JH
78`GIT_PUSH_CERT_NONCE`::
79 The nonce string the process asked the signer to include
80 in the push certificate. If this does not match the value
81 recorded on the "nonce" header in the push certificate, it
82 may indicate that the certificate is a valid one that is
83 being replayed from a separate "git push" session.
84
85`GIT_PUSH_CERT_NONCE_STATUS`::
86`UNSOLICITED`;;
87 "git push --signed" sent a nonce when we did not ask it to
88 send one.
89`MISSING`;;
90 "git push --signed" did not send any nonce header.
91`BAD`;;
92 "git push --signed" sent a bogus nonce.
93`OK`;;
94 "git push --signed" sent the nonce we asked it to send.
5732373d
JH
95`SLOP`;;
96 "git push --signed" sent a nonce different from what we
97 asked it to send now, but in a previous session. See
98 `GIT_PUSH_CERT_NONCE_SLOP` environment variable.
99
100`GIT_PUSH_CERT_NONCE_SLOP`::
101 "git push --signed" sent a nonce different from what we
102 asked it to send now, but in a different session whose
103 starting time is different by this many seconds from the
104 current session. Only meaningful when
105 `GIT_PUSH_CERT_NONCE_STATUS` says `SLOP`.
da0005b8 106 Also read about `receive.certNonceSlop` variable in
5732373d 107 linkgit:git-config[1].
b89363e4 108
05ef58ec
SP
109This hook is called before any refname is updated and before any
110fast-forward checks are performed.
111
112If the pre-receive hook exits with a non-zero exit status no updates
113will be performed, and the update, post-receive and post-update
114hooks will not be invoked either. This can be useful to quickly
115bail out if the update is not to be supported.
b1bf95bb 116
eaeed077
JK
117See the notes on the quarantine environment below.
118
76a8788c 119UPDATE HOOK
05ef58ec
SP
120-----------
121Before each ref is updated, if $GIT_DIR/hooks/update file exists
122and is executable, it is invoked once per ref, with three parameters:
b1bf95bb 123
05ef58ec 124 $GIT_DIR/hooks/update refname sha1-old sha1-new
b1bf95bb 125
05ef58ec
SP
126The refname parameter is relative to $GIT_DIR; e.g. for the master
127head this is "refs/heads/master". The two sha1 arguments are
128the object names for the refname before and after the update.
129Note that the hook is called before the refname is updated,
967506bb 130so either sha1-old is 0\{40} (meaning there is no such ref yet),
05ef58ec
SP
131or it should match what is recorded in refname.
132
133The hook should exit with non-zero status if it wants to disallow
134updating the named ref. Otherwise it should exit with zero.
135
136Successful execution (a zero exit status) of this hook does not
02783075 137ensure the ref will actually be updated, it is only a prerequisite.
05ef58ec
SP
138As such it is not a good idea to send notices (e.g. email) from
139this hook. Consider using the post-receive hook instead.
140
76a8788c 141POST-RECEIVE HOOK
05ef58ec
SP
142-----------------
143After all refs were updated (or attempted to be updated), if any
144ref update was successful, and if $GIT_DIR/hooks/post-receive
04c8ce9c 145file exists and is executable, it will be invoked once with no
f43cd49f
SP
146parameters. The standard input of the hook will be one line
147for each successfully updated ref:
05ef58ec 148
f43cd49f 149 sha1-old SP sha1-new SP refname LF
05ef58ec 150
f43cd49f
SP
151The refname value is relative to $GIT_DIR; e.g. for the master
152head this is "refs/heads/master". The two sha1 values before
05ef58ec
SP
153each refname are the object names for the refname before and after
154the update. Refs that were created will have sha1-old equal to
967506bb
JK
1550\{40}, while refs that were deleted will have sha1-new equal to
1560\{40}, otherwise sha1-old and sha1-new should be valid objects in
05ef58ec
SP
157the repository.
158
d05b9618 159The `GIT_PUSH_CERT*` environment variables can be inspected, just as
a85b377d
JH
160in `pre-receive` hook, after accepting a signed push.
161
05ef58ec
SP
162Using this hook, it is easy to generate mails describing the updates
163to the repository. This example script sends one mail message per
a85b377d 164ref listing the commits pushed to the repository, and logs the push
d05b9618 165certificates of signed pushes with good signatures to a logger
a85b377d 166service:
b1bf95bb 167
38cadf9e
168----
169#!/bin/sh
170# mail out commit update information.
171while read oval nval ref
172do
173 if expr "$oval" : '0*$' >/dev/null
a85b377d 174 then
38cadf9e
175 echo "Created a new ref, with the following commits:"
176 git rev-list --pretty "$nval"
177 else
178 echo "New commits:"
179 git rev-list --pretty "$nval" "^$oval"
180 fi |
181 mail -s "Changes to ref $ref" commit-list@mydomain
182done
183# log signed push certificate, if any
184if test -n "${GIT_PUSH_CERT-}" && test ${GIT_PUSH_CERT_STATUS} = G
185then
186 (
187 echo expected nonce is ${GIT_PUSH_NONCE}
188 git cat-file blob ${GIT_PUSH_CERT}
189 ) | mail -s "push certificate from $GIT_PUSH_CERT_SIGNER" push-log@mydomain
190fi
191exit 0
192----
2a245013 193
05ef58ec
SP
194The exit code from this hook invocation is ignored, however a
195non-zero exit code will generate an error message.
19614330 196
05ef58ec
SP
197Note that it is possible for refname to not have sha1-new when this
198hook runs. This can easily occur if another user modifies the ref
ba020ef5 199after it was updated by 'git-receive-pack', but before the hook was able
05ef58ec
SP
200to evaluate it. It is recommended that hooks rely on sha1-new
201rather than the current value of refname.
19614330 202
76a8788c 203POST-UPDATE HOOK
05ef58ec
SP
204----------------
205After all other processing, if at least one ref was updated, and
206if $GIT_DIR/hooks/post-update file exists and is executable, then
04c8ce9c 207post-update will be called with the list of refs that have been updated.
05ef58ec 208This can be used to implement any repository wide cleanup tasks.
eb0362a4 209
05ef58ec 210The exit code from this hook invocation is ignored; the only thing
ba020ef5 211left for 'git-receive-pack' to do at that point is to exit itself
05ef58ec 212anyway.
eb0362a4 213
483bc4f0 214This hook can be used, for example, to run `git update-server-info`
05ef58ec
SP
215if the repository is packed and is served via a dumb transport.
216
38cadf9e
217----
218#!/bin/sh
219exec git update-server-info
220----
2a245013 221
6d35cc76 222
76a8788c 223QUARANTINE ENVIRONMENT
eaeed077
JK
224----------------------
225
226When `receive-pack` takes in objects, they are placed into a temporary
227"quarantine" directory within the `$GIT_DIR/objects` directory and
228migrated into the main object store only after the `pre-receive` hook
229has completed. If the push fails before then, the temporary directory is
230removed entirely.
231
232This has a few user-visible effects and caveats:
233
234 1. Pushes which fail due to problems with the incoming pack, missing
235 objects, or due to the `pre-receive` hook will not leave any
236 on-disk data. This is usually helpful to prevent repeated failed
237 pushes from filling up your disk, but can make debugging more
238 challenging.
239
240 2. Any objects created by the `pre-receive` hook will be created in
241 the quarantine directory (and migrated only if it succeeds).
242
243 3. The `pre-receive` hook MUST NOT update any refs to point to
244 quarantined objects. Other programs accessing the repository will
245 not be able to see the objects (and if the pre-receive hook fails,
d8f4481c
JK
246 those refs would become corrupted). For safety, any ref updates
247 from within `pre-receive` are automatically rejected.
eaeed077
JK
248
249
6d35cc76
JH
250SEE ALSO
251--------
d49483f0 252linkgit:git-send-pack[1], linkgit:gitnamespaces[7]
6d35cc76 253
2a245013
JH
254GIT
255---
9e1f0a85 256Part of the linkgit:git[1] suite