On Tue, 2012-07-17 at 17:09 +0100, A. S. Budden wrote:
> Dear all,
> 
> We recently started using Mercurial for version control within our
> company.  Most people use their local hard drive for the working
> directory (and use Microsoft SyncToy to ensure that un-pushed changes
> are backed up on the network drive).  However, our department manager
> prefers to work on the network drive all of the time.  He has been
> having a lot of problems with TortoiseHG: most times he tries to pull
> he gets something like this:
> 
>     % hg --repository F:\Working directory pull --verbose F:\VCS\Project
>     pulling from F:\VCS\Project
>     searching for changes
>     2 changesets found
>     adding changesets
>     adding manifests
>     adding file changes
>     added 2 changesets with 2 changes to 1 files (+1 heads)
>     transaction abort!
>     rollback completed
>     abort: The process cannot access the file because it is being used
> by another process
>     [command returned code 255 Tue Jul 17 16:57:26 2012]
> 
> Hitting Ctrl-Shift-T to open a terminal and typing "hg pull" works
> every time.  I've tried to identify if there are any other processes
> on this or any other computer that might be accessing F:\Working
> directory\.hg, but I'm fairly sure there are none.  The only
> application running on the 'test' computer is TortoiseHG (plus all the
> IT standard virus scanners etc, which we can't do anything about).  It
> seems unlikely, however, that another application is causing the
> issues as I would expect that to result in the command line "hg pull"
> to fail as well as the GUI version.
> 
> Has anyone experienced this?  Are there any known work-arounds?

Yes.  I set tortoisehg to "monitor local repositories only" and, after
getting the same error on that operation, things worked OK.

My virus scanner, Symantec endpoint protection, may have played a role
too; it was definitely the cause of some bizarre file access failures in
SAS.

Ross


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Tortoisehg-discuss mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/tortoisehg-discuss

Reply via email to