Beefy Boxes and Bandwidth Generously Provided by pair Networks
more useful options
 
PerlMonks  

Re^5: Windows installation woes

by marto (Cardinal)
on Nov 03, 2021 at 12:40 UTC ( #11138373=note: print w/replies, xml ) Need Help??


in reply to Re^4: Windows installation woes
in thread Windows installation woes

cpan . doesn't do what you think it does. You likely want to do cpanm . from within the directory of an untar'd distro. Regardless, you're going to have to configure these tools to deal with your proxy should you wish them to do dependency resolution. CPAN Behind Firewalls, set the appropriate environment variables and these tools will work.

Replies are listed 'Best First'.
Re^6: Windows installation woes
by chafelix (Novice) on Nov 03, 2021 at 13:12 UTC

    As you predicted cpanm . also failed because...

    This program is blocked by group policy. For more information, contact your system administrator. gmake: *** Makefile:524: blibdirs Error 1

      This program is blocked by group policy. For more information, contact your system administrator. gmake: *** [Makefile:524: blibdirs] Error 1

      Presumably, you'll get the same message if you execute gmake -v.
      My take on this is that when you (or cpan or cpanm) execute gmake.exe, it's this gmake.exe that has been doctored by the group Police that gets found.
      But what happens if you set things up so that the correctly functioning gmake.exe that Strawberry provides gets found ?
      You could find out by running something like C:\StrawberryPerl\c\bin\gmake -v, though I don't know if I've guessed the location of your Strawberry Perl installation correctly.

      The .msi edition of Strawberry Perl that you already have *appends* its paths to the end of the PATH environment variable - which means that if there's already another gmake.exe in the PATH, then it's this other gmake.exe that gets loaded.
      The "portable" editions *prepend* their paths to the beginning of the PATH environment variable - which means that if there's already another gmake.exe in the PATH, then it will not be used.
      That's why I suggested using the "portable" edition, though you could also just rearrange the PATH yourself so that your existing Strawberry installation comes first.
      (You can have both an msi and a "portable" edition installed - it doesn't have to be a case of just one or the other. In fact you can have as many portable editions installed as you like. I've got at least 15 of them.)

      Anyway ... that's my take on it. It may not be correct as I don't really know what sort of weaponry your group Police are prepared to deploy. (Is my life in danger ?? ;-)

      And marto's suggestion of trying to get your Police to soften their stance makes good practical sense.
      Good luck.

      Cheers,
      Rob
        Group policy (-y, not -e) can block based on filename, or checksum, or allow running only "certified" (signed) programs. That depends on how the domain is configured. chafelix would have to ask their administrators about "Software Restriction Policies", or use an exempt computer for this.

        An alternative might be to have gmake.exe signed (by someone recognized by chafelix's organization) or explicitly allowed.

      You're working in a restrictive environment, engage with the sysadmins to get what you need, or ask for a suitable system upon which you can build the tools you need for distribution on other systems.

      microsoft products being what they are, TIMTOWTHI (There Is More Than One Way To Hack It) applies. I am sure you will find a way to bypass it. My favourite from this extensive list is to run it via rundll32.exe gmake.dll,main. (most likely you don't have gmake.dll but you can create it in another machine). Can windows be that dumb? Computer says maybe (<<-youtube link)

      also running it via cmd.exe may be another loophole: cmd /K "C:\SomeFolder\MyApp.exe"

      bw, bliako

      p.s. TIMTOWTHU (There Is More Than One Way To Hack Undoubtedly) and that's written on stone.

        Such security policy limitations are often in place for very good reason. Circumventing such things may be technically possible however is almost always a bad idea, you could find yourself out of a job, or in legal trouble.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://11138373]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others perusing the Monastery: (4)
As of 2022-01-24 14:34 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?
    In 2022, my preferred method to securely store passwords is:












    Results (64 votes). Check out past polls.

    Notices?