in reply to (OT) Re^4: Secure deployment of binary perl modules
in thread Secure deployment of binary perl modules

I'm sorry... but that smacks of "we know what's best for you." I beg to differ. If sometihng that is shipped with an OS doesn't meet my needs it is IMHO by definition broken.

I have a table saw in my workshop. Its table is only two feet wide. I regularly cut four foot by eight foot sheets of plywood on it. So I have feed extensions that I've added to the mix to help with that.

Further, that table saw came with a rip blade that is not suited to cutting plywood. Do I leave the rip blade in there assuming the saw manufacturer knows what's best for me and deal with the mess or do I buy a blade more suited to cutting plywood and install it? Geez.. by your definition I'm messing with the design of the table saw. I won't even get into the modifications I've made to the saw itself including the much improved blade guide I added. (Thank you Workbench magazine!)

As a matter of fact the latter. SUNWpl5u is specifically left out of our builds because of the issues I've already outlined.

What part of my comments made you think that things aren't tracked?

You mention Sun's JES Directory server. Not used in my shop since we used OpenLDAP for the same thing. One of the reasons I've already mentioned for doing what I do.

Fiber monitoring tools? Again. Not an issue in our shop. However it was in a previous shop that I worked for and our version of Perl that we packaged worked fine.

Considering that my shop is the only one doing scripting in Perl? That's a safe assumption. Since 2001 when I joined this shop we have yet to run into an issue like you are describing. Our testing is rather thorough so we must be doing something right.

Which is why we test. And test again. In fact we have one system in particular dedicated to that end. It is rebuilt every week automatically and the latest patches (along with the latest versions of our internal packages) applied to it. This is how we detect bad patches (something Sun has excelled at producing lately for Solaris 10) before they are applied to our production environment.


Peter L. Berghold -- Unix Professional
Peter -at- Berghold -dot- Net; AOL IM redcowdawg Yahoo IM: blue_cowdawg
  • Comment on Re^5: Secure deployment of binary perl modules

Replies are listed 'Best First'.
Re^6: Secure deployment of binary perl modules
by djp (Hermit) on Mar 22, 2007 at 02:41 UTC
    Regardless of how well you control it, your practice is not good. /usr/bin is for the manufacturer, /usr/local or similar is for you. 'man filesystem' for details. Your advice to others to blithely poke stuff into /usr/bin is worse, as it does not even mention the detailed controls you practise yourself.
(OT) Re^6: Secure deployment of binary perl modules
by Argel (Prior) on Mar 21, 2007 at 17:21 UTC
    Ever heard of the phrase "the exception that proves the rule"? Looks like you are on top of things but most places will not be and recommending a solution that is more likely to fail for others or create a lot of extra overhead is irresponsible.

    You still did not really address future ramifications. With XML in Solaris 10 I expect to see more use of Perl. And I already pointed out that SUN's directory server uses it in places. What if you need to install something that does require SUN's perl? What if you do find a compatibility issue? Keep in mind that catching these in test makes you aware of the problem in a safe environment but you would still have to resolve the problem before you could move to production.

    The examples I mentioned were just to point out that the vendor supplied perl is used. You may not be using it but again, if you give advice to others you should be considering that they might be.

    I still say the vendor supplied version is not broken. Did it occur to you that it may be included for the vendor to make use of in other parts of the OS? Or that it is there for additional applications that they or other vendors provide (or may provide in the future). And if one of those breaks that you can call in and get support for it?

    If nothing else it seems like a huge waste of time and resources. Why not just install all of your stuff to e.g. /opt/mycompany/. Then there is no need to worry about tracking what uses SUN’s perl, patches that specifically break things, future compatibility issues, and upgrade issues. Granted, what you are doing seems to work for you and you have already invested the time to set the environment up. But it’s not something I would recommend to others except in very rare instances.

    As for Solaris patches, I one million per cent completely agree with you.