Open source on
GitHub.
Made with
by Matthew Hudson
Git Hooks are a built-in feature of Git that allow developers to automate tasks and enforce policies throughout the Git workflow. By writing custom scripts that Git can execute at key points in the development process, Git Hooks enable developers to streamline their workflow, ensure code quality, and enforce project-specific policies. In this guide, we will explore Git Hooks and show you how to use them effectively.
Git Hooks are scripts that Git can execute automatically when certain events occur, such as before or after a commit, push, or merge. There are several types of Git Hooks, each with a specific purpose. Pre-commit hooks, for example, can be used to enforce code formatting or run tests before a commit is made. Pre-push hooks can be used to prevent pushes to certain branches or run additional tests before pushing. Post-merge hooks can be used to perform actions after a merge is completed, such as updating dependencies or generating documentation.
These hook scripts are only limited by a developer's imagination. Some example hook scripts include:
To use Git Hooks, you simply need to create executable scripts in the .git/hooks directory of your Git
repository. The scripts should be named after the Git Hook event they correspond to (e.g., pre-commit,
pre-push, post-merge) and have the appropriate permissions (chmod +x). Once the scripts are in place, Git will automatically execute them at the corresponding events.
By default, Git hooks reside in the .git/hooks directory of your repository. However, this directory is not tracked by Git and is not committed to the repository. To share hooks across a team, you can use the core.hooksPath configuration (introduced in Git 2.9).
.githooks).git config core.hooksPath .githooksMany of the projects listed below can automate this process for you.
Here's a full list of hooks you can attach scripts to:
| Hook | Description |
|---|---|
| applypatch-msg | Validates the commit message file for patches from git am. |
| pre-applypatch | Runs after a patch is applied but before a commit is made. |
| post-applypatch | Runs after a patch is applied and a commit is made. |
| pre-commit | Runs before a commit is created. Used for linting, testing, and formatting checks. |
| pre-merge-commit | Runs after a merge is successful but before a merge commit is created. |
| prepare-commit-msg | Runs after the default commit message is created but before the editor is started. |
| commit-msg | Validates the commit message after it has been edited. Useful for enforcing message standards. |
| post-commit | Runs after a commit is made. Useful for notifications or logging. |
| pre-rebase | Runs before a rebase starts. Can be used to prevent rebasing of protected branches. |
| post-checkout | Runs after a git checkout or git switch. Useful for setting up the environment. |
| post-merge | Runs after a successful git merge or git pull. |
| pre-receive | Runs on the server before references are updated. Can be used to enforce push policies. |
| update | Runs on the server once for each ref being updated. |
| post-receive | Runs on the server after all references have been updated. |
| post-update | Runs on the server after refs are updated, often used for git update-server-info. |
| pre-auto-gc | Runs before an automatic garbage collection. |
| post-rewrite | Runs after commands that rewrite commits (e.g., amend, rebase). |
| pre-push | Runs before a git push starts. Can be used to prevent pushing to certain remotes. |
When writing Git Hooks, it's important to keep a few things in mind:
Git Hooks are a powerful tool for automating tasks and enforcing policies in Git. By writing custom scripts that Git can execute at key points in the development process, developers can streamline their workflow and ensure code quality. With the tips and techniques outlined in this guide, you'll be able to use Git Hooks effectively in your own projects.
If you have a Git Hook you love, or a resource you've written for the community - please create a pull request here.