Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Push to repository in a shared folder doesn't work (regression from 2.10.2) #979

Closed
1 task done
Radrik5 opened this issue Dec 2, 2016 · 24 comments
Closed
1 task done
Milestone

Comments

@Radrik5
Copy link

Radrik5 commented Dec 2, 2016

  • I was not able to find an open or closed issue matching what I'm seeing

Setup

  • Which version of Git for Windows are you using? Is it 32-bit or 64-bit?
$ git --version --build-options
git version 2.11.0.windows.1
sizeof-long: 4
machine: x86_64
  • Which version of Windows are you running? Vista, 7, 8, 10? Is it 32-bit or 64-bit?

Windows 7 64-bit.

$ cmd.exe /c ver

Microsoft Windows [Version 6.1.7601]
  • What options did you set as part of the installation? Or did you choose the
    defaults?
$ cat /etc/install-options.txt
Path Option: Cmd
SSH Option: OpenSSH
CRLF Option: CRLFAlways
Bash Terminal Option: MinTTY
Performance Tweaks FSCache: Enabled
Use Credential Manager: Enabled
Enable Symlinks: Disabled
Enable Builtin Difftool: Disabled
  • Any other interesting things about your environment that might be related
    to the issue you're seeing?

Remote repository is a shared folder.

Details

  • Which terminal/shell are you running Git from? e.g Bash/CMD/PowerShell/other

Git Bash.

$ git push 'file:////localhost/Projects/Master/client' master --force
  • What did you expect to occur after running these commands?

Successful push like in Git 2.10.2.

  • What actually happened instead?

Push failed:

$ git push 'file:////localhost/Projects/Master/client' master --force
Counting objects: 8062, done.
Delta compression using up to 4 threads.
Compressing objects: 100% (3822/3822), done.
Writing objects: 100% (8062/8062), 3.36 MiB | 6.19 MiB/s, done.
Total 8062 (delta 7060), reused 4986 (delta 4236)
remote: error: object directory /localhost/Projects/Master/client/.git/objects does not exist; check .git/objects/info/alternates.
remote: Resolving deltas:  30% (2164/7060), completed with 0 local objects.
remote: fatal: pack has 4896 unresolved deltas
error: unpack failed: index-pack abnormal exit
To file:////localhost/Projects/Master/client
 ! [remote rejected]       master -> master (unpacker error)
error: failed to push some refs to 'file:////localhost/Projects/Master/client'

But Git understands the URL:

$ git ls-remote 'file:////localhost/Projects/Master/client' | head
6b3dc4eba1328fcab65cfdab534374bf9e88eb31        HEAD
6b3dc4eba1328fcab65cfdab534374bf9e88eb31        refs/heads/master
44af27093bdcbc31c414722d6f6a3f50ba74412b        refs/remotes/origin/HEAD
460a9f05a790db537727e2b430df61e2592fe4e0        refs/remotes/origin/alex_inprogress_branch
...
  • If the problem was occurring with a specific repository, can you provide the
    URL to that repository to help us with testing?

You should be able to reproduce it with any repository. The only requirement is that the remote repository should not have objects (commits) you're going to push.

@dscho
Copy link
Member

dscho commented Dec 3, 2016

While I agree that this is a bug, it looks as if it is made unnecessarily hard for Git. Why not simply call

git push 'c:/Projects/Master/client' master --force

@Radrik5
Copy link
Author

Radrik5 commented Dec 3, 2016

I actially have a repo on a remote machine into which I cannot push with Git 2.11.0. I just verified that the problem exists even for a repo on localhost so that you could easily reproduce it.

@tboegi
Copy link

tboegi commented Dec 3, 2016

What does
git remote -v
say ?

@PhilipOakley
Copy link

I also note that the message (IIUC) is from the remote side

remote: error: object directory /localhost/Projects/Master/client/.git/objects does not exist; check .git/objects/info/alternates.

I appreciate that it is localhost, but there is a shift of reponsibility there that may be part of the cause. Maybe the 'remote' code is mis-processing the path, especially as it has gone via the file:// protocol with it's special processing - see 'git clone --local'. (notes are via the 'urls.txt' documentation file).

You could check that a direct path works properly (or not).

@Radrik5
Copy link
Author

Radrik5 commented Dec 4, 2016

Push through local paths works properly:

 $ git push '/f/Projects/Master/client' HEAD:test --force
Counting objects: 8062, done.
Delta compression using up to 4 threads.
Compressing objects: 100% (3822/3822), done.
Writing objects: 100% (8062/8062), 3.36 MiB | 0 bytes/s, done.
Total 8062 (delta 7060), reused 4986 (delta 4236)
remote: Resolving deltas: 100% (7060/7060), completed with 1185 local objects.
To F:/Projects/Master/client
 * [new branch]            HEAD -> test

 $ git push 'file:////localhost/Projects/Master/client' :test --force
To file:////localhost/Projects/Master/client
 - [deleted]               test

 $ git push 'file:///f/Projects/Master/client' HEAD:test --force
Counting objects: 8062, done.
Delta compression using up to 4 threads.
Compressing objects: 100% (3822/3822), done.
Writing objects: 100% (8062/8062), 3.36 MiB | 0 bytes/s, done.
Total 8062 (delta 7060), reused 4986 (delta 4236)
remote: Resolving deltas: 100% (7060/7060), completed with 1185 local objects.
To file:///f/Projects/Master/client
 * [new branch]            HEAD -> test

@Radrik5
Copy link
Author

Radrik5 commented Dec 4, 2016

Push into shared folder doesn't work even after successful push via local path (the remote repo has all the required objects because of previous push but the objects are not referenced at the moment).

$ git push 'file:////localhost/Projects/Master/client' HEAD:test --force
Counting objects: 8062, done.
Delta compression using up to 4 threads.
Compressing objects: 100% (3822/3822), done.
Writing objects: 100% (8062/8062), 3.36 MiB | 0 bytes/s, done.
Total 8062 (delta 7060), reused 4986 (delta 4236)
remote: error: object directory /localhost/Projects/Master/client/.git/objects does not exist; check .git/objects/info/alternates.
remote: Resolving deltas:  30% (2164/7060), completed with 0 local objects.
remote: fatal: pack has 4896 unresolved deltas
error: unpack failed: index-pack abnormal exit
To file:////localhost/Projects/Master/client
 ! [remote rejected]       HEAD -> test (unpacker error)
error: failed to push some refs to 'file:////localhost/Projects/Master/client'

@Radrik5
Copy link
Author

Radrik5 commented Dec 4, 2016

After downgrade to 2.10.2 push to the same shared folder works properly:

$ git --version --build-options
git version 2.10.2.windows.1
sizeof-long: 4
machine: x86_64

$ git push 'file:////localhost/Projects/Master/client' HEAD:test --force
Counting objects: 8062, done.
Delta compression using up to 4 threads.
Compressing objects: 100% (3613/3613), done.
Writing objects: 100% (8062/8062), 3.42 MiB | 6.08 MiB/s, done.
Total 8062 (delta 7061), reused 5198 (delta 4445)
remote: Resolving deltas: 100% (7061/7061), completed with 1184 local objects.
To file:////localhost/Projects/Master/client
 * [new branch]      HEAD -> test

@Radrik5
Copy link
Author

Radrik5 commented Dec 4, 2016

MCVE:

SharedFolder $ pwd
/c/SharedFolder

SharedFolder $ git init origin
Initialized empty Git repository in c:/SharedFolder/origin/.git/

SharedFolder $ cd origin/
origin $ echo 1 > test && git add test && git commit -m "Initial commit"
warning: LF will be replaced by CRLF in test.
The file will have its original line endings in your working directory.
[master (root-commit) c1d4693] Initial commit
 1 file changed, 1 insertion(+)
 create mode 100644 test

origin $ cd ..
SharedFolder $ cp -R origin/ clone

SharedFolder $ cd clone/
clone $ echo 2 > test && git add test && git commit -m "New commit"
warning: LF will be replaced by CRLF in test.
The file will have its original line endings in your working directory.
[master 76d9c7a] New commit
 1 file changed, 1 insertion(+), 1 deletion(-)

clone $ git push 'file:////localhost/SharedFolder/origin' HEAD:test
Counting objects: 3, done.
Writing objects: 100% (3/3), 241 bytes | 0 bytes/s, done.
Total 3 (delta 0), reused 0 (delta 0)
remote: error: object directory /localhost/SharedFolder/origin/.git/objects does not exist; check .git/objects/info/alternates.
remote: error: object directory /localhost/SharedFolder/origin/.git/objects does not exist; check .git/objects/info/alternates.
remote: error: refs/heads/master does not point to a valid object!
remote: fatal: bad object HEAD
error: object directory /localhost/SharedFolder/origin/.git/objects does not exist; check .git/objects/info/alternates.
error: refs/heads/master does not point to a valid object!
fatal: bad object HEAD
To file:////localhost/SharedFolder/origin
 ! [remote rejected] HEAD -> test (missing necessary objects)
error: failed to push some refs to 'file:////localhost/SharedFolder/origin'

@Radrik5
Copy link
Author

Radrik5 commented Dec 4, 2016

The same push with Git 2.10.2:

$ git push 'file:////localhost/SharedFolder/origin' HEAD:test
Counting objects: 3, done.
Writing objects: 100% (3/3), 241 bytes | 0 bytes/s, done.
Total 3 (delta 0), reused 0 (delta 0)
To file:////localhost/SharedFolder/origin
 * [new branch]      HEAD -> test

@PhilipOakley
Copy link

Have you tried using the TRACE environment variables to see what (e.g. parameters) is being passed at each stage of the process. https://git-scm.com/book/en/v2/Git-Internals-Environment-Variables

The variables that look suitable are:
GIT_TRACE=1 (or you can set it to an absolute path for a log file)
GIT_CURL_VERBOSE=1 (just in case it is using curl for local transactions)
GIT_TRACE_PACK_ACCESS and GIT_TRACE_PACKET just might be interesting (I'd be suprised but you never know)

I'm not sure how to make the 'remote' side be verbose for you as localhost.

for full verbosity try this suggestion http://stackoverflow.com/questions/6178401/how-can-i-debug-git-git-shell-related-problems#comment57144190_17344517

You've probably seen https://public-inbox.org/git/20161204080914.GB2415@tb-raspi/T/#ma86b5372d4c78fadbd4977d5b2d010adf39f3f86

@TickleThePanda
Copy link

I'm having the same issue here's the trace for it:

10:09 $ GIT_TRACE_SETUP=1 git push origin test
10:13:19.363797 trace.c:333             setup: git_dir: .git
10:13:19.364797 trace.c:334             setup: git_common_dir: .git
10:13:19.364797 trace.c:335             setup: worktree: C:/FBS/Apps
10:13:19.364797 trace.c:336             setup: cwd: C:/FBS/Apps
10:13:19.365797 trace.c:337             setup: prefix: (null)
10:13:20.309892 trace.c:333             setup: git_dir: .git
10:13:20.310892 trace.c:334             setup: git_common_dir: .git
10:13:20.310892 trace.c:335             setup: worktree: C:/FBS/Apps
10:13:20.310892 trace.c:336             setup: cwd: C:/FBS/Apps
10:13:20.310892 trace.c:337             setup: prefix: (null)
Counting objects: 2, done.
Delta compression using up to 8 threads.
Compressing objects: 100% (2/2), done.
Writing objects: 100% (2/2), 284 bytes | 0 bytes/s, done.
Total 2 (delta 1), reused 1 (delta 0)
remote: 10:13:20.592920 trace.c:333             setup: git_dir: .
remote: 10:13:20.595920 trace.c:334             setup: git_common_dir: .
remote: 10:13:20.595920 trace.c:335             setup: worktree: (null)
remote: 10:13:20.595920 trace.c:336             setup: cwd: //ISIS/shares/BIS/BISAppSettings
remote: 10:13:20.596920 trace.c:337             setup: prefix: (null)
remote: error: object directory /ISIS/shares/BIS/BISAppSettings/objects does not exist; check .git/objects/info/alternates.
remote: fatal: unresolved deltas left after unpacking
error: unpack failed: unpack-objects abnormal exit
remote: 10:13:20.817942 trace.c:333             setup: git_dir: .
remote: 10:13:20.818942 trace.c:334             setup: git_common_dir: .
remote: 10:13:20.818942 trace.c:335             setup: worktree: (null)
remote: 10:13:20.818942 trace.c:336             setup: cwd: //ISIS/shares/BIS/BISAppSettings
remote: 10:13:20.818942 trace.c:337             setup: prefix: (null)
To //ISIS/shares/BIS/BISAppSettings
 ! [remote rejected] test -> test (unpacker error)
error: failed to push some refs to '//ISIS/shares/BIS/BISAppSettings'
10:13 $ GIT_TRACE=1 git push origin test
10:13:40.446905 git.c:371               trace: built-in: git 'push' 'origin' 'test'
10:13:40.531914 run-command.c:350       trace: run_command: 'git-receive-pack '\''//ISIS/shares/BIS/BISAppSettings'\'''
10:13:40.597920 git.c:371               trace: built-in: git 'receive-pack' '//ISIS/shares/BIS/BISAppSettings'
10:13:41.026963 run-command.c:350       trace: run_command: 'pack-objects' '--all-progress-implied' '--revs' '--stdout' '--thin' '--delta-base-offset' '--progress'
10:13:41.084969 git.c:371               trace: built-in: git 'pack-objects' '--all-progress-implied' '--revs' '--stdout' '--thin' '--delta-base-offset' '--progress'
Counting objects: 2, done.
Delta compression using up to 8 threads.
Compressing objects: 100% (2/2), done.
Writing objects: 100% (2/2), 284 bytes | 0 bytes/s, done.
Total 2 (delta 1), reused 1 (delta 0)
10:13:41.223983 run-command.c:350       trace: run_command: 'unpack-objects' '--pack_header=2,2'
remote: 10:13:41.328993 git.c:371               trace: built-in: git 'unpack-objects' '--pack_header=2,2'
remote: error: object directory /ISIS/shares/BIS/BISAppSettings/objects does not exist; check .git/objects/info/alternates.
remote: fatal: unresolved deltas left after unpacking
10:13:41.422003 run-command.c:350       trace: run_command: 'gc' '--auto' '--quiet'
error: unpack failed: unpack-objects abnormal exit
remote: 10:13:41.635024 git.c:371               trace: built-in: git 'gc' '--auto' '--quiet'
To //ISIS/shares/BIS/BISAppSettings
 ! [remote rejected] test -> test (unpacker error)
error: failed to push some refs to '//ISIS/shares/BIS/BISAppSettings'
10:13 $ GIT_CURL_VERBOSE=1 git push origin test
Counting objects: 2, done.
Delta compression using up to 8 threads.
Compressing objects: 100% (2/2), done.
Writing objects: 100% (2/2), 284 bytes | 0 bytes/s, done.
Total 2 (delta 1), reused 1 (delta 0)
remote: error: object directory /ISIS/shares/BIS/BISAppSettings/objects does not exist; check .git/objects/info/alternates.
remote: fatal: unresolved deltas left after unpacking
error: unpack failed: unpack-objects abnormal exit
To //ISIS/shares/BIS/BISAppSettings
 ! [remote rejected] test -> test (unpacker error)
error: failed to push some refs to '//ISIS/shares/BIS/BISAppSettings'
10:14 $ GIT_TRACE_PACK_ACCESS=1 git push origin test
10:14:28.558716 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 3190
10:14:28.560716 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 40822
10:14:28.561716 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 534
10:14:28.561716 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 727
10:14:28.561716 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 28817
10:14:28.562716 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 16123
10:14:28.564716 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 3380
10:14:28.566717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 26355
10:14:28.567717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 10469
10:14:28.568717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 374
10:14:28.568717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 11208
10:14:28.568717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 12
10:14:28.569717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 187
10:14:28.569717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 915
10:14:28.569717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 1127
10:14:28.569717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 1491
10:14:28.569717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569801
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 561586
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 561695
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 562799
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 562857
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 564633
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 564798
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 565191
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 566131
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 566208
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 567782
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 567935
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 568765
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569169
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569217
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569360
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569436
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569582
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569684
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 915
10:14:28.570717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569801
Counting objects: 2, done.
Delta compression using up to 8 threads.
10:14:28.572717 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569801
Compressing objects: 100% (2/2), done.
Writing objects: 100% (2/2), 284 bytes | 0 bytes/s, done.
Total 2 (delta 1), reused 1 (delta 0)
remote: error: object directory /ISIS/shares/BIS/BISAppSettings/objects does not exist; check .git/objects/info/alternates.
remote: fatal: unresolved deltas left after unpacking
error: unpack failed: unpack-objects abnormal exit
To //ISIS/shares/BIS/BISAppSettings
 ! [remote rejected] test -> test (unpacker error)
error: failed to push some refs to '//ISIS/shares/BIS/BISAppSettings'
10:14 $ GIT_TRACE_PACKET=1 git push origin test
10:14:50.884948 pkt-line.c:80           packet: receive-pack> 61d0e5612d56a7b79de794c0ba45d9aaaac55135 refs/heads/1986_Change_Config_Files\0report-status delete-refs side-band-64k quiet atomic ofs-delta agent=git/2.11.0.windows.1
10:14:50.886948 pkt-line.c:80           packet:         push< 61d0e5612d56a7b79de794c0ba45d9aaaac55135 refs/heads/1986_Change_Config_Files\0report-status delete-refs side-band-64k quiet atomic ofs-delta agent=git/2.11.0.windows.1
10:14:50.914951 pkt-line.c:80           packet: receive-pack> 304322d06c46edc303ec49ff750d2db13faf95f3 refs/heads/733_new_auth_menu
10:14:50.914951 pkt-line.c:80           packet:         push< 304322d06c46edc303ec49ff750d2db13faf95f3 refs/heads/733_new_auth_menu
10:14:50.914951 pkt-line.c:80           packet: receive-pack> defe80fc9969716896ba2fbcb85607322d732bfd refs/heads/73_add_live_proposal_submissions_
10:14:50.914951 pkt-line.c:80           packet: receive-pack> 7dc3191ea5cf303c8e8843ff35ba7db19d274dcc refs/heads/74_add_live_proposal_saves_
10:14:50.914951 pkt-line.c:80           packet:         push< defe80fc9969716896ba2fbcb85607322d732bfd refs/heads/73_add_live_proposal_s10:14:50.914951 pkt-line.c:80           packet: receive-pack> 5c7efdc443ec199b8586fa0155b5a47ab578bdfd refs/heads/Add_queries_for_CLF_ISubmissions_
IS_Proposal
10:14:50.914951 pkt-line.c:80           packet:         push< 7dc3191ea5cf303c8e8843ff35ba7db19d274dcc refs/heads/74_add_live_proposal_s10:14:50.914951 pkt-line.c:80           packet: receive-pack> d0c54a74abb012c0b634afaf2f86015710f803f2 refs/heads/Dutch_Access_Query
aves_
10:14:50.914951 pkt-line.c:80           packet:         push< 5c7efdc443ec199b8586fa0155b5a47ab578bdfd refs/heads/Add_queries_for_CLF_ISIS_Proposal
10:14:50.914951 pkt-line.c:80           packet:         push< d0c54a74abb012c0b634afaf2f86015710f803f2 refs/heads/Dutch_Access_Query
10:14:50.922952 pkt-line.c:80           packet: receive-pack> 154fa0c9a394c8410b9f91bf73165b84ca037d73 refs/heads/VisitsBetweenDates_add_user_number_and_join_date_
10:14:50.923952 pkt-line.c:80           packet:         push< 154fa0c9a394c8410b9f91bf73165b84ca037d73 refs/heads/VisitsBetweenDates_add_user_number_and_join_date_
10:14:50.922952 pkt-line.c:80           packet: receive-pack> 19a8f03abfd514fb8b6a2c024d7d033067284f74 refs/heads/add_facility_awareness_links_
10:14:50.923952 pkt-line.c:80           packet:         push< 19a8f03abfd514fb8b6a2c024d7d033067284f74 refs/heads/add_facility_awareness_links_
10:14:50.935953 pkt-line.c:80           packet: receive-pack> 900f0dd190921cd4201e90b86a33589ad14ad8dc refs/heads/add_joined_date_PIsAndCoIsForYear_
10:14:50.935953 pkt-line.c:80           packet:         push< 900f0dd190921cd4201e90b86a33589ad14ad8dc refs/heads/add_joined_date_PIsAndCoIsForYear_
10:14:50.935953 pkt-line.c:80           packet: receive-pack> c3f8bd8294c4fa828cee908631f4ca5d37d6dfdf refs/heads/adding_visits_database_to_user_office_reporting
10:14:50.935953 pkt-line.c:80           packet:         push< c3f8bd8294c4fa828cee908631f4ca5d37d6dfdf refs/heads/adding_visits_database_to_user_office_reporting
10:14:50.942954 pkt-line.c:80           packet: receive-pack> 468fe0d3ee715d57d3b10cf8c469581bdefe01cf refs/heads/master
10:14:50.943954 pkt-line.c:80           packet:         push< 468fe0d3ee715d57d3b10cf8c469581bdefe01cf refs/heads/master
10:14:50.942954 pkt-line.c:80           packet: receive-pack> 76ad4254f1b75165da6785490b6885fefb511792 refs/heads/staff-details
10:14:50.942954 pkt-line.c:80           packet: receive-pack> 62854009a0821e8ee13cc3a2f2c0689e5253acb0 refs/heads/test_push_weirdness
10:14:50.942954 pkt-line.c:80           packet: receive-pack> 55505252f1c65ad0825db4cbda310f792f1d05d6 refs/heads/txt_to_sql_extension
10:14:50.943954 pkt-line.c:80           packet:         push< 76ad4254f1b75165da6785490b6885fefb511792 refs/heads/staff-details
10:14:50.943954 pkt-line.c:80           packet:         push< 62854009a0821e8ee13cc3a2f2c0689e5253acb0 refs/heads/test_push_weirdness
10:14:50.943954 pkt-line.c:80           packet:         push< 55505252f1c65ad0825db4cbda310f792f1d05d6 refs/heads/txt_to_sql_extension
10:14:50.947954 pkt-line.c:80           packet: receive-pack> 0000
10:14:50.947954 pkt-line.c:80           packet:         push< 0000
10:14:50.948955 pkt-line.c:80           packet:         push> 0000000000000000000000000000000000000000 990a307246dbc3a5d3d8072c77e4821a110:14:50.949955 pkt-line.c:80           packet: receive-pack< 0000000000000000000000000000000000000000 990a307246dbc3a5d3d8072c77e4821a1fc8fab4 refs/heads/test\0 report-status side-band-64k agent=git/2.11.0.windows.1
fc8fab4 refs/heads/test\0 report-status side-band-64k agent=git/2.11.0.windows.1
10:14:50.948955 pkt-line.c:80           packet:         push> 0000
10:14:50.949955 pkt-line.c:80           packet: receive-pack< 0000
Counting objects: 2, done.
Delta compression using up to 8 threads.
Compressing objects: 100% (2/2), done.
Writing objects: 100% (2/2), 284 bytes | 0 bytes/s, done.
Total 2 (delta 1), reused 1 (delta 0)
10:14:51.428002 pkt-line.c:80           packet:     sideband< \2error: object directory /ISIS/shares/BIS/BISAppSettings/objects does not exist; check .git/objects/info/alternates.
remote: error: object directory /ISIS/shares/BIS/BISAppSettings/objects does not exist; check .git/objects/info/alternates.
10:14:51.429003 pkt-line.c:80           packet:     sideband< \2fatal: unresolved deltas left after unpacking
remote: fatal: unresolved deltas left after unpacking
10:14:51.436003 pkt-line.c:80           packet: receive-pack> unpack unpack-objects abnormal exit
10:14:51.436003 pkt-line.c:80           packet:     sideband< \10028unpack unpack-objects abnormal exit0026ng refs/heads/test unpacker error0000
10:14:51.436003 pkt-line.c:80           packet: receive-pack> ng refs/heads/test unpacker error
10:14:51.436003 pkt-line.c:80           packet: receive-pack> 0000
10:14:51.437003 pkt-line.c:80           packet:         push< unpack unpack-objects abnormal exit
error: unpack failed: unpack-objects abnormal exit
10:14:51.437003 pkt-line.c:80           packet:         push< ng refs/heads/test unpacker error
10:14:51.437003 pkt-line.c:80           packet:         push< 0000
10:14:51.604020 pkt-line.c:80           packet: receive-pack> 0000
10:14:51.604020 pkt-line.c:80           packet:     sideband< 0000
To //ISIS/shares/BIS/BISAppSettings
 ! [remote rejected] test -> test (unpacker error)
error: failed to push some refs to '//ISIS/shares/BIS/BISAppSettings'

Combined:

10:14 $ GIT_TRACE_SETUP=1 GIT_TRACE=1 GIT_CURL_VERBOSE=1 GIT_TRACE_PACK_ACCESS=1 GIT_TRACE_PACKET=1 git push origin test
10:15:45.819441 trace.c:333             setup: git_dir: .git
10:15:45.820441 trace.c:334             setup: git_common_dir: .git
10:15:45.820441 trace.c:335             setup: worktree: C:/FBS/Apps
10:15:45.820441 trace.c:336             setup: cwd: C:/FBS/Apps
10:15:45.820441 trace.c:337             setup: prefix: (null)
10:15:45.820441 git.c:371               trace: built-in: git 'push' 'origin' 'test'
10:15:45.879447 run-command.c:350       trace: run_command: 'git-receive-pack '\''//ISIS/shares/BIS/BISAppSettings'\'''
10:15:46.000459 git.c:371               trace: built-in: git 'receive-pack' '//ISIS/shares/BIS/BISAppSettings'
10:15:46.671526 pkt-line.c:80           packet: receive-pack> 61d0e5612d56a7b79de794c0ba45d9aaaac55135 refs/heads/1986_Change_Config_Fil10:15:46.671526 pkt-line.c:80           packet:         push< 61d0e5612d56a7b79de794c0ba45d9aaaac55135 refs/heads/1986_Change_Config_Files\0report-status delete-refs side-band-64k quiet atomic ofs-delta agent=git/2.11.0.windows.1
es\0report-status delete-refs side-band-64k quiet atomic ofs-delta agent=git/2.11.0.windows.1
10:15:46.698529 pkt-line.c:80           packet: receive-pack> 304322d06c46edc303ec49ff750d2db13faf95f3 refs/heads/733_new_auth_menu
10:15:46.699529 pkt-line.c:80           packet:         push< 304322d06c46edc303ec49ff750d2db13faf95f3 refs/heads/733_new_auth_menu
10:15:46.698529 pkt-line.c:80           packet: receive-pack> defe80fc9969716896ba2fbcb85607322d732bfd refs/heads/73_add_live_proposal_submissions_
10:15:46.698529 pkt-line.c:80           packet: receive-pack> 7dc3191ea5cf303c8e8843ff35ba7db19d274dcc refs/heads/74_add_live_proposal_s10:15:46.699529 pkt-line.c:80           packet:         push< defe80fc9969716896ba2fbcb85607322d732bfd refs/heads/73_add_live_proposal_saves_
ubmissions_
10:15:46.699529 pkt-line.c:80           packet: receive-pack> 5c7efdc443ec199b8586fa0155b5a47ab578bdfd refs/heads/Add_queries_for_CLF_IS10:15:46.699529 pkt-line.c:80           packet:         push< 7dc3191ea5cf303c8e8843ff35ba7db19d274dcc refs/heads/74_add_live_proposal_sIS_Proposal
aves_
10:15:46.699529 pkt-line.c:80           packet: receive-pack> d0c54a74abb012c0b634afaf2f86015710f803f2 refs/heads/Dutch_Access_Query
10:15:46.699529 pkt-line.c:80           packet:         push< 5c7efdc443ec199b8586fa0155b5a47ab578bdfd refs/heads/Add_queries_for_CLF_ISIS_Proposal
10:15:46.699529 pkt-line.c:80           packet:         push< d0c54a74abb012c0b634afaf2f86015710f803f2 refs/heads/Dutch_Access_Query
10:15:46.717531 pkt-line.c:80           packet: receive-pack> 154fa0c9a394c8410b9f91bf73165b84ca037d73 refs/heads/VisitsBetweenDates_add_user_number_and_join_date_
10:15:46.717531 pkt-line.c:80           packet:         push< 154fa0c9a394c8410b9f91bf73165b84ca037d73 refs/heads/VisitsBetweenDates_add_user_number_and_join_date_
10:15:46.717531 pkt-line.c:80           packet: receive-pack> 19a8f03abfd514fb8b6a2c024d7d033067284f74 refs/heads/add_facility_awareness_links_
10:15:46.717531 pkt-line.c:80           packet:         push< 19a8f03abfd514fb8b6a2c024d7d033067284f74 refs/heads/add_facility_awareness_links_
10:15:46.726532 pkt-line.c:80           packet: receive-pack> 900f0dd190921cd4201e90b86a33589ad14ad8dc refs/heads/add_joined_date_PIsAndCoIsForYear_
10:15:46.726532 pkt-line.c:80           packet:         push< 900f0dd190921cd4201e90b86a33589ad14ad8dc refs/heads/add_joined_date_PIsAndCoIsForYear_
10:15:46.726532 pkt-line.c:80           packet: receive-pack> c3f8bd8294c4fa828cee908631f4ca5d37d6dfdf refs/heads/adding_visits_database_to_user_office_reporting
10:15:46.726532 pkt-line.c:80           packet:         push< c3f8bd8294c4fa828cee908631f4ca5d37d6dfdf refs/heads/adding_visits_database_to_user_office_reporting
10:15:46.734533 pkt-line.c:80           packet: receive-pack> 468fe0d3ee715d57d3b10cf8c469581bdefe01cf refs/heads/master
10:15:46.734533 pkt-line.c:80           packet:         push< 468fe0d3ee715d57d3b10cf8c469581bdefe01cf refs/heads/master
10:15:46.734533 pkt-line.c:80           packet: receive-pack> 76ad4254f1b75165da6785490b6885fefb511792 refs/heads/staff-details
10:15:46.734533 pkt-line.c:80           packet: receive-pack> 62854009a0821e8ee13cc3a2f2c0689e5253acb0 refs/heads/test_push_weirdness
10:15:46.734533 pkt-line.c:80           packet: receive-pack> 55505252f1c65ad0825db4cbda310f792f1d05d6 refs/heads/txt_to_sql_extension
10:15:46.734533 pkt-line.c:80           packet:         push< 76ad4254f1b75165da6785490b6885fefb511792 refs/heads/staff-details
10:15:46.734533 pkt-line.c:80           packet:         push< 62854009a0821e8ee13cc3a2f2c0689e5253acb0 refs/heads/test_push_weirdness
10:15:46.734533 pkt-line.c:80           packet:         push< 55505252f1c65ad0825db4cbda310f792f1d05d6 refs/heads/txt_to_sql_extension
10:15:46.739533 pkt-line.c:80           packet: receive-pack> 0000
10:15:46.739533 pkt-line.c:80           packet:         push< 0000
10:15:46.740533 pkt-line.c:80           packet:         push> 0000000000000000000000000000000000000000 990a307246dbc3a5d3d8072c77e4821a1fc8fab4 refs/heads/test\0 report-status side-band-64k agent=git/2.11.0.windows.1
10:15:46.740533 pkt-line.c:80           packet: receive-pack< 0000000000000000000000000000000000000000 990a307246dbc3a5d3d8072c77e4821a1fc8fab4 refs/heads/test\0 report-status side-band-64k agent=git/2.11.0.windows.1
10:15:46.740533 pkt-line.c:80           packet:         push> 0000
10:15:46.740533 run-command.c:350       trace: run_command: 'pack-objects' '--all-progress-implied' '--revs' '--stdout' '--thin' '--delta-base-offset' '--progress'
10:15:46.740533 pkt-line.c:80           packet: receive-pack< 0000
10:15:46.785538 trace.c:333             setup: git_dir: .git
10:15:46.786538 trace.c:334             setup: git_common_dir: .git
10:15:46.786538 trace.c:335             setup: worktree: C:/FBS/Apps
10:15:46.786538 trace.c:336             setup: cwd: C:/FBS/Apps
10:15:46.786538 trace.c:337             setup: prefix: (null)
10:15:46.786538 git.c:371               trace: built-in: git 'pack-objects' '--all-progress-implied' '--revs' '--stdout' '--thin' '--delta-base-offset' '--progress'
10:15:46.792538 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 3190
10:15:46.793538 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 40822
10:15:46.793538 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 534
10:15:46.794539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 727
10:15:46.794539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 28817
10:15:46.794539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 16123
10:15:46.796539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 3380
10:15:46.797539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 26355
10:15:46.798539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 10469
10:15:46.799539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 374
10:15:46.799539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 11208
10:15:46.799539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 12
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 187
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 915
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 1127
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 1491
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569801
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 561586
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 561695
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 562799
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 562857
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 564633
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 564798
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 565191
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 566131
10:15:46.801539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 566208
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 567782
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 567935
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 568765
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569169
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569217
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569360
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569436
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569582
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569684
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 915
10:15:46.802539 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569801
Counting objects: 2, done.
Delta compression using up to 8 threads.
10:15:46.804540 sha1_file.c:2373        .git/objects/pack/pack-2a6bea07a4172b01501fbf537f0963ee32c46dcc.pack 569801
Compressing objects: 100% (2/2), done.
Writing objects: 100% (2/2), 284 bytes | 0 bytes/s, done.
Total 2 (delta 1), reused 1 (delta 0)
10:15:46.975557 run-command.c:350       trace: run_command: 'unpack-objects' '--pack_header=2,2'
10:15:47.141573 pkt-line.c:80           packet:     sideband< \210:15:47.141573 trace.c:333             setup: git_dir: .
remote: 10:15:47.141573 trace.c:333             setup: git_dir: .
10:15:47.141573 pkt-line.c:80           packet:     sideband< \210:15:47.141573 trace.c:334             setup: git_common_dir: .10:15:47.141573 trace.c:335             setup: worktree: (null)
remote: 10:15:47.141573 trace.c:334             setup: git_common_dir: .
10:15:47.141573 pkt-line.c:80           packet:     sideband< \210:15:47.141573 trace.c:336             setup: cwd: //ISIS/shares/BIS/BISAppSettings10:15:47.141573 trace.c:337             se
remote: 10:15:47.141573 trace.c:335             setup: worktree: (null)
remote: 10:15:47.141573 trace.c:336             setup: cwd: //ISIS/shares/BIS/BISAppSettings
10:15:47.142573 pkt-line.c:80           packet:     sideband< \2tup: prefix: (null)10:15:47.141573 git.c:371               trace: built-in: git 'unpack-objects' '--pack_header=2,2'
remote: 10:15:47.141573 trace.c:337             setup: prefix: (null)
remote: 10:15:47.141573 git.c:371               trace: built-in: git 'unpack-objects' '--pack_header=2,2'
10:15:47.294589 pkt-line.c:80           packet:     sideband< \2error: object directory /ISIS/shares/BIS/BISAppSettings/objects does not exist; check .git/objects/info/alternates.
remote: error: object directory /ISIS/shares/BIS/BISAppSettings/objects does not exist; check .git/objects/info/alternates.
10:15:47.295589 pkt-line.c:80           packet:     sideband< \2fatal: unresolved deltas left after unpacking
remote: fatal: unresolved deltas left after unpacking
10:15:47.307590 pkt-line.c:80           packet: receive-pack> unpack unpack-objects abnormal exit
10:15:47.307590 pkt-line.c:80           packet:     sideband< \10028unpack unpack-objects abnormal exit0026ng refs/heads/test unpacker error0000
10:15:47.307590 pkt-line.c:80           packet: receive-pack> ng refs/heads/test unpacker error
10:15:47.307590 pkt-line.c:80           packet: receive-pack> 0000
10:15:47.307590 run-command.c:350       trace: run_command: 'gc' '--auto' '--quiet'
10:15:47.307590 pkt-line.c:80           packet:         push< unpack unpack-objects abnormal exit
error: unpack failed: unpack-objects abnormal exit
10:15:47.308590 pkt-line.c:80           packet:         push< ng refs/heads/test unpacker error
10:15:47.308590 pkt-line.c:80           packet:         push< 0000
10:15:47.545614 pkt-line.c:80           packet:     sideband< \210:15:47.543613 trace.c:333             setup: git_dir: .10:15:47.544614 trace.c:334             setup: git_common_dir: .10:15
remote: 10:15:47.543613 trace.c:333             setup: git_dir: .
remote: 10:15:47.544614 trace.c:334             setup: git_common_dir: .
10:15:47.545614 pkt-line.c:80           packet:     sideband< \2:47.544614 trace.c:335             setup: worktree: (null)10:15:47.544614 trace.c:336             setup: cwd: //ISIS/shares/BIS
remote: 10:15:47.544614 trace.c:335             setup: worktree: (null)
10:15:47.545614 pkt-line.c:80           packet:     sideband< \2/BISAppSettings10:15:47.544614 trace.c:337             setup: prefix: (null)10:15:47.544614 git.c:371               trace: bui
remote: 10:15:47.544614 trace.c:336             setup: cwd: //ISIS/shares/BIS/BISAppSettings
remote: 10:15:47.544614 trace.c:337             setup: prefix: (null)
10:15:47.545614 pkt-line.c:80           packet:     sideband< \2lt-in: git 'gc' '--auto' '--quiet'
remote: 10:15:47.544614 git.c:371               trace: built-in: git 'gc' '--auto' '--quiet'
10:15:47.613620 pkt-line.c:80           packet:     sideband< 0000
10:15:47.613620 pkt-line.c:80           packet: receive-pack> 0000
To //ISIS/shares/BIS/BISAppSettings
 ! [remote rejected] test -> test (unpacker error)
error: failed to push some refs to '//ISIS/shares/BIS/BISAppSettings'

@koppor
Copy link

koppor commented Dec 5, 2016

Same for me:

My remote is configures as follows

[remote "aslocal"]
	url = //sambaas/as_local/events/2017-btw/web
  • What did you expect to occur after running these commands?
Counting objects: 9, done.
Delta compression using up to 4 threads.
Compressing objects: 100% (8/8), done.
Writing objects: 100% (9/9), 1.66 KiB | 0 bytes/s, done.
Total 9 (delta 5), reused 0 (delta 0)
To //sambaas/as_local/events/2017-btw/web
   b5f3c7b..33da9ac  master -> master

(git version 2.10.2.windows.1)

  • What actually happened instead?
Counting objects: 5, done.
Delta compression using up to 4 threads.
Compressing objects: 100% (5/5), done.
Writing objects: 100% (5/5), 408 bytes | 0 bytes/s, done.
Total 5 (delta 4), reused 0 (delta 0)
remote: error: object directory /sambaas/as_local/events/2017-btw/web/objects does not exist; check .git/objects/info/alternates.
remote: fatal: unresolved deltas left after unpacking
error: unpack failed: unpack-objects abnormal exit
To //sambaas/as_local/events/2017-btw/web
 ! [remote rejected] master -> master (unpacker error)
error: failed to push some refs to '//sambaas/as_local/events/2017-btw/web'

@MrFelna
Copy link

MrFelna commented Dec 5, 2016

Same bug here - unable to push to a Windows UNC share. (2.11.0 on x64 Win7). Push works fine on 2.10.2.

@TheFoggyRoad
Copy link

Same bug here. Downgraded to 2.10.2 and it works now

@modal
Copy link

modal commented Dec 9, 2016

Similar Issue (downgraded to 2.10.2)

I'm running into a odd problem that has only started
after updating Git (Windows 64bit build from git-scm.com) from 2.10.2 to 2.11.0.

I have a Windows network drive with several repositories. One of these
now produces the following error when I push to it using git 2.11.0, but not
2.10.2.

remote: error: object directory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
remote: fatal: unresolved deltas left after unpacking
error: unpack failed: unpack-objects abnormal exit
To ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 ! [remote rejected] master -> master (unpacker error)
error: failed to push some refs to ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The only ways I've found to temporary fix it on 2.11.0 are:

  1. Delete the pack files and manually set the master reference hash on the networked
    drive then push the repo
  2. Delete the repo on the networked drive. Create a new bare repo and push
    to it.

And, after I try pushing new commits back to the network drive, I run into the
same error.

Other posts I checked:
http://stackoverflow.com/questions/4025708/git-cant-push-unpacker-error-related-to-permission-issues

I have Windows write and read permission for everything in the remote repository.

I tried the following commands on local and remote prior to pushing and experienced the same
error.

git fsck
git prune
git repack
git fsck

http://stackoverflow.com/a/18196948/7274513

I also tried removing the following from the home folder's .gitconfig.

[credential]
	helper = !\"C:/Program Files (x86)/GitExtensions/GitCredentialWinStore/git-credential-winstore.exe\"

dscho added a commit to dscho/git that referenced this issue Dec 23, 2016
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: git-for-windows#979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
@dscho dscho closed this as completed in 2174823 Dec 23, 2016
@dscho dscho added this to the v2.11.1 milestone Dec 23, 2016
dscho added a commit to git-for-windows/build-extra that referenced this issue Dec 23, 2016
The regression of v2.11.0 where Git could no
longer push to shared folders via UNC paths [is
fixed](git-for-windows/git#979).

Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho added a commit to dscho/git that referenced this issue Dec 23, 2016
On Windows, there are "UNC paths" to access network (AKA shared)
folders, of the form \\server\sharename\directory. This provides a
convenient way for Windows developers to share their Git repositories
without having to have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said
UNC paths no longer works, although fetching and cloning still does, as
reported here: git-for-windows#979

This regression was fixed in 7814fbe (normalize_path_copy(): fix
pushing to //server/share/dir on Windows, 2016-12-14).

Let's make sure that it does not regress again, by introducing a test
that uses so-called "administrative shares": disk volumes are
automatically shared under certain circumstances, e.g.  the C: drive is
shared as \\localhost\c$. The test needs to be skipped if the current
directory is inaccessible via said administrative share, of course.

Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
fengguang pushed a commit to 0day-ci/git that referenced this issue Dec 23, 2016
On Windows, there are "UNC paths" to access network (AKA shared)
folders, of the form \\server\sharename\directory. This provides a
convenient way for Windows developers to share their Git repositories
without having to have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said
UNC paths no longer works, although fetching and cloning still does, as
reported here: git-for-windows#979

This regression was fixed in 7814fbe (normalize_path_copy(): fix
pushing to //server/share/dir on Windows, 2016-12-14).

Let's make sure that it does not regress again, by introducing a test
that uses so-called "administrative shares": disk volumes are
automatically shared under certain circumstances, e.g.  the C: drive is
shared as \\localhost\c$. The test needs to be skipped if the current
directory is inaccessible via said administrative share, of course.

Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
gitster pushed a commit to git/git that referenced this issue Dec 23, 2016
On Windows, there are "UNC paths" to access network (AKA shared)
folders, of the form \\server\sharename\directory. This provides a
convenient way for Windows developers to share their Git repositories
without having to have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said
UNC paths no longer works, although fetching and cloning still does, as
reported here: git-for-windows#979

This regression was fixed in 7814fbe (normalize_path_copy(): fix
pushing to //server/share/dir on Windows, 2016-12-14).

Let's make sure that it does not regress again, by introducing a test
that uses so-called "administrative shares": disk volumes are
automatically shared under certain circumstances, e.g.  the C: drive is
shared as \\localhost\c$. The test needs to be skipped if the current
directory is inaccessible via said administrative share, of course.

Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
dscho added a commit to dscho/git that referenced this issue Jan 2, 2017
On Windows, there are "UNC paths" to access network (AKA shared)
folders, of the form \\server\sharename\directory. This provides a
convenient way for Windows developers to share their Git repositories
without having to have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said
UNC paths no longer works, although fetching and cloning still does, as
reported here: git-for-windows#979

This regression was fixed in 7814fbe (normalize_path_copy(): fix
pushing to //server/share/dir on Windows, 2016-12-14).

Let's make sure that it does not regress again, by introducing a test
that uses so-called "administrative shares": disk volumes are
automatically shared under certain circumstances, e.g.  the C: drive is
shared as \\localhost\c$. The test needs to be skipped if the current
directory is inaccessible via said administrative share, of course.

Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
@PhilipOakley
Copy link

gitster pushed a commit to git/git that referenced this issue Jan 8, 2017
On Windows, there are "UNC paths" to access network (AKA shared)
folders, of the form \\server\sharename\directory. This provides a
convenient way for Windows developers to share their Git repositories
without having to have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said
UNC paths no longer works, although fetching and cloning still does, as
reported here: git-for-windows#979

This regression was fixed in 7814fbe (normalize_path_copy(): fix
pushing to //server/share/dir on Windows, 2016-12-14).

Let's make sure that it does not regress again, by introducing a test
that uses so-called "administrative shares": disk volumes are
automatically shared under certain circumstances, e.g.  the C: drive is
shared as \\localhost\c$. The test needs to be skipped if the current
directory is inaccessible via said administrative share, of course.

Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
@laurinkeithdavis
Copy link

Tested and confirmed that v2.11.1.windows-prerelease.1 does fix this issue.

dscho added a commit that referenced this issue Jan 11, 2017
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: #979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho pushed a commit that referenced this issue Jan 11, 2017
normalize_path_copy() is not prepared to keep the double-slash of a
//server/share/dir kind of path, but treats it like a regular POSIX
style path and transforms it to /server/share/dir.

The bug manifests when 'git push //server/share/dir master' is run,
because tmp_objdir_add_as_alternate() uses the path in normalized
form when it registers the quarantine object database via
link_alt_odb_entries(). Needless to say that the directory cannot be
accessed using the wrongly normalized path.

Fix it by skipping all of the root part, not just a potential drive
prefix. offset_1st_component takes care of this, see the
implementation in compat/mingw.c::mingw_offset_1st_component().

This fixes #979

Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
@woosungchu
Copy link

woosungchu commented Jan 13, 2017

v2.11.1.windows-prerelease.1 work for me too.
my case was ...
git remote show origin
Push URL: file:////10.86.131.200/company/gitrepo/gittest.git

dscho added a commit that referenced this issue Jan 18, 2017
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: #979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho pushed a commit that referenced this issue Jan 18, 2017
normalize_path_copy() is not prepared to keep the double-slash of a
//server/share/dir kind of path, but treats it like a regular POSIX
style path and transforms it to /server/share/dir.

The bug manifests when 'git push //server/share/dir master' is run,
because tmp_objdir_add_as_alternate() uses the path in normalized
form when it registers the quarantine object database via
link_alt_odb_entries(). Needless to say that the directory cannot be
accessed using the wrongly normalized path.

Fix it by skipping all of the root part, not just a potential drive
prefix. offset_1st_component takes care of this, see the
implementation in compat/mingw.c::mingw_offset_1st_component().

This fixes #979

Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
git-for-windows-ci pushed a commit that referenced this issue Jan 18, 2017
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: #979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
git-for-windows-ci pushed a commit that referenced this issue Jan 18, 2017
normalize_path_copy() is not prepared to keep the double-slash of a
//server/share/dir kind of path, but treats it like a regular POSIX
style path and transforms it to /server/share/dir.

The bug manifests when 'git push //server/share/dir master' is run,
because tmp_objdir_add_as_alternate() uses the path in normalized
form when it registers the quarantine object database via
link_alt_odb_entries(). Needless to say that the directory cannot be
accessed using the wrongly normalized path.

Fix it by skipping all of the root part, not just a potential drive
prefix. offset_1st_component takes care of this, see the
implementation in compat/mingw.c::mingw_offset_1st_component().

This fixes #979

Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
git-for-windows-ci pushed a commit that referenced this issue Jan 18, 2017
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: #979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
git-for-windows-ci pushed a commit that referenced this issue Jan 18, 2017
normalize_path_copy() is not prepared to keep the double-slash of a
//server/share/dir kind of path, but treats it like a regular POSIX
style path and transforms it to /server/share/dir.

The bug manifests when 'git push //server/share/dir master' is run,
because tmp_objdir_add_as_alternate() uses the path in normalized
form when it registers the quarantine object database via
link_alt_odb_entries(). Needless to say that the directory cannot be
accessed using the wrongly normalized path.

Fix it by skipping all of the root part, not just a potential drive
prefix. offset_1st_component takes care of this, see the
implementation in compat/mingw.c::mingw_offset_1st_component().

This fixes #979

Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho added a commit that referenced this issue Jan 25, 2017
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: #979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho pushed a commit that referenced this issue Jan 25, 2017
normalize_path_copy() is not prepared to keep the double-slash of a
//server/share/dir kind of path, but treats it like a regular POSIX
style path and transforms it to /server/share/dir.

The bug manifests when 'git push //server/share/dir master' is run,
because tmp_objdir_add_as_alternate() uses the path in normalized
form when it registers the quarantine object database via
link_alt_odb_entries(). Needless to say that the directory cannot be
accessed using the wrongly normalized path.

Fix it by skipping all of the root part, not just a potential drive
prefix. offset_1st_component takes care of this, see the
implementation in compat/mingw.c::mingw_offset_1st_component().

This fixes #979

Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho added a commit to dscho/git that referenced this issue Feb 1, 2017
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: git-for-windows#979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho pushed a commit to dscho/git that referenced this issue Feb 1, 2017
normalize_path_copy() is not prepared to keep the double-slash of a
//server/share/dir kind of path, but treats it like a regular POSIX
style path and transforms it to /server/share/dir.

The bug manifests when 'git push //server/share/dir master' is run,
because tmp_objdir_add_as_alternate() uses the path in normalized
form when it registers the quarantine object database via
link_alt_odb_entries(). Needless to say that the directory cannot be
accessed using the wrongly normalized path.

Fix it by skipping all of the root part, not just a potential drive
prefix. offset_1st_component takes care of this, see the
implementation in compat/mingw.c::mingw_offset_1st_component().

This fixes git-for-windows#979

Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
git-for-windows-ci pushed a commit that referenced this issue Feb 2, 2017
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: #979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
git-for-windows-ci pushed a commit that referenced this issue Feb 2, 2017
normalize_path_copy() is not prepared to keep the double-slash of a
//server/share/dir kind of path, but treats it like a regular POSIX
style path and transforms it to /server/share/dir.

The bug manifests when 'git push //server/share/dir master' is run,
because tmp_objdir_add_as_alternate() uses the path in normalized
form when it registers the quarantine object database via
link_alt_odb_entries(). Needless to say that the directory cannot be
accessed using the wrongly normalized path.

Fix it by skipping all of the root part, not just a potential drive
prefix. offset_1st_component takes care of this, see the
implementation in compat/mingw.c::mingw_offset_1st_component().

This fixes #979

Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
git-for-windows-ci pushed a commit that referenced this issue Feb 2, 2017
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: #979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
git-for-windows-ci pushed a commit that referenced this issue Feb 2, 2017
normalize_path_copy() is not prepared to keep the double-slash of a
//server/share/dir kind of path, but treats it like a regular POSIX
style path and transforms it to /server/share/dir.

The bug manifests when 'git push //server/share/dir master' is run,
because tmp_objdir_add_as_alternate() uses the path in normalized
form when it registers the quarantine object database via
link_alt_odb_entries(). Needless to say that the directory cannot be
accessed using the wrongly normalized path.

Fix it by skipping all of the root part, not just a potential drive
prefix. offset_1st_component takes care of this, see the
implementation in compat/mingw.c::mingw_offset_1st_component().

This fixes #979

Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho added a commit that referenced this issue Feb 3, 2017
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: #979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho pushed a commit that referenced this issue Feb 3, 2017
normalize_path_copy() is not prepared to keep the double-slash of a
//server/share/dir kind of path, but treats it like a regular POSIX
style path and transforms it to /server/share/dir.

The bug manifests when 'git push //server/share/dir master' is run,
because tmp_objdir_add_as_alternate() uses the path in normalized
form when it registers the quarantine object database via
link_alt_odb_entries(). Needless to say that the directory cannot be
accessed using the wrongly normalized path.

Fix it by skipping all of the root part, not just a potential drive
prefix. offset_1st_component takes care of this, see the
implementation in compat/mingw.c::mingw_offset_1st_component().

This fixes #979

Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho added a commit to dscho/git that referenced this issue Feb 21, 2017
On Windows, there are "UNC paths" to access network (AKA shared) folders,
of the form \\server\sharename\directory. This provides a convenient way
for Windows developers to share their Git repositories without having to
have a dedicated server.

Git for Windows v2.11.0 introduced a regression where pushing to said UNC
paths no longer works, although fetching and cloning still does.

Demonstrate what is the problem, using so-called "administrative shares":
disk volumes are automatically shared under certain circumstances, e.g.
the C: drive is shared as \\localhost\c$. The test needs to be skipped if
the current directory is inaccessible via said administrative share, of
course.

Original-report: git-for-windows#979
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
dscho pushed a commit to dscho/git that referenced this issue Feb 21, 2017
normalize_path_copy() is not prepared to keep the double-slash of a
//server/share/dir kind of path, but treats it like a regular POSIX
style path and transforms it to /server/share/dir.

The bug manifests when 'git push //server/share/dir master' is run,
because tmp_objdir_add_as_alternate() uses the path in normalized
form when it registers the quarantine object database via
link_alt_odb_entries(). Needless to say that the directory cannot be
accessed using the wrongly normalized path.

Fix it by skipping all of the root part, not just a potential drive
prefix. offset_1st_component takes care of this, see the
implementation in compat/mingw.c::mingw_offset_1st_component().

This fixes git-for-windows#979

Signed-off-by: Johannes Sixt <j6t@kdbg.org>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
@LyleZiegelmiller
Copy link

I'm experiencing a similar issue. I have a PC and a Laptop, both running Cygwin on Windows 10. I use Git to keep certain files on them synchronized. They're both using Git version 2.12.2.

lylez@dell-laptop /cygdrive/c/users/lylez/documents/budget
$ git clone //DELLPC/bare-repositories/budget-bare-repository.git .
Cloning into '.'...
done.

lylez@dell-laptop /cygdrive/c/users/lylez/documents/budget
$ git commit -am 'Test commit'
[master 662f6d5] Test commit
1 file changed, 0 insertions(+), 0 deletions(-)
rewrite Budget.xlsx (92%)

lylez@dell-laptop /cygdrive/c/users/lylez/documents/budget
$ git push
Counting objects: 3, done.
Delta compression using up to 4 threads.
Compressing objects: 100% (3/3), done.
Writing objects: 100% (3/3), 65.40 KiB | 83.00 KiB/s, done.
Total 3 (delta 0), reused 0 (delta 0)
remote: error: object directory /DELLPC/bare-repositories/budget-bare-repository.git/objects does not exist; check .git/objects/info/alternates.
remote: error: object directory /DELLPC/bare-repositories/budget-bare-repository.git/objects does not exist; check .git/objects/info/alternates.
remote: error: refs/heads/master does not point to a valid object!
remote: fatal: bad object HEAD
error: object directory /DELLPC/bare-repositories/budget-bare-repository.git/objects does not exist; check .git/objects/info/alternates.
error: refs/heads/master does not point to a valid object!
fatal: bad object HEAD
To //DELLPC/bare-repositories/budget-bare-repository.git
! [remote rejected] master -> master (missing necessary objects)
error: failed to push some refs to '//DELLPC/bare-repositories/budget-bare-repository.git'

lylez@dell-laptop /cygdrive/c/users/lylez/documents/budget
$

This used to work until I upgraded Git.

@dscho
Copy link
Member

dscho commented May 12, 2017

running Cygwin

@lylez00 are you 100% sure that you run Cygwin Git here? I assume you are... in this case, the Git mailing list and/or the Cygwin mailing list is probably a more appropriate venue to report the bug: this is the Git for Windows project, which has little in common with the Cygwin Git project.

@AnrDaemon
Copy link

Did it occured to anyone that "file:////" is an invalid URL?

@tboegi
Copy link

tboegi commented Jun 23, 2017

That's a tricky one:
It seams as if the support for UNC names in cygwin is not maintained actively.
git clone works - but more by accident. Git blindly passes the URL
"//DELLPC/bare-repositories/budget-bare-repository.git" into the file system, and if it succeeds
to fine a valid Git repo here, then the clone succeeds.
However, push and other commands don't - they use a different code path.
What could be done, is to use a function similar to

int mingw_offset_1st_component(const char *path) even in cygwin.

And please, (to repeat Dscho) if you are using cygwin, please send this to the Git mailing list .

@AnrDaemon
Copy link

Since Cygwin strive to provide POSIX-like environment, this comes by no surprize.
If you want to access UNC path, you have to use Cygwin conversion functions explicitly.
Or mount the UNC path to local tree. But this is a userland solution.
What exactly happens under the hood in this specific case, I can't say, sorry.
It just occured to me that nobody noticed the point I raised.

@LyleZiegelmiller
Copy link

It worked on Cygwin for a long time, then suddenly stopped working when I updated Git. I don't think this is Cygwin-specific. I got around it by creating a mount, as someone suggested.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests