Beefy Boxes and Bandwidth Generously Provided by pair Networks
Keep It Simple, Stupid
 
PerlMonks  

Re^6: Windows installation woes

by chafelix (Novice)
on Nov 03, 2021 at 13:12 UTC ( [id://11138375]=note: print w/replies, xml ) Need Help??


in reply to Re^5: Windows installation woes
in thread Windows installation woes

As you predicted cpanm . also failed because...

This program is blocked by group policy. For more information, contact your system administrator. gmake: *** Makefile:524: blibdirs Error 1

Replies are listed 'Best First'.
Re^7: Windows installation woes
by syphilis (Archbishop) on Nov 03, 2021 at 20:13 UTC
    This program is blocked by group policy. For more information, contact your system administrator. gmake: *** [Makefile:524: blibdirs] Error 1

    Presumably, you'll get the same message if you execute gmake -v.
    My take on this is that when you (or cpan or cpanm) execute gmake.exe, it's this gmake.exe that has been doctored by the group Police that gets found.
    But what happens if you set things up so that the correctly functioning gmake.exe that Strawberry provides gets found ?
    You could find out by running something like C:\StrawberryPerl\c\bin\gmake -v, though I don't know if I've guessed the location of your Strawberry Perl installation correctly.

    The .msi edition of Strawberry Perl that you already have *appends* its paths to the end of the PATH environment variable - which means that if there's already another gmake.exe in the PATH, then it's this other gmake.exe that gets loaded.
    The "portable" editions *prepend* their paths to the beginning of the PATH environment variable - which means that if there's already another gmake.exe in the PATH, then it will not be used.
    That's why I suggested using the "portable" edition, though you could also just rearrange the PATH yourself so that your existing Strawberry installation comes first.
    (You can have both an msi and a "portable" edition installed - it doesn't have to be a case of just one or the other. In fact you can have as many portable editions installed as you like. I've got at least 15 of them.)

    Anyway ... that's my take on it. It may not be correct as I don't really know what sort of weaponry your group Police are prepared to deploy. (Is my life in danger ?? ;-)

    And marto's suggestion of trying to get your Police to soften their stance makes good practical sense.
    Good luck.

    Cheers,
    Rob
      Group policy (-y, not -e) can block based on filename, or checksum, or allow running only "certified" (signed) programs. That depends on how the domain is configured. chafelix would have to ask their administrators about "Software Restriction Policies", or use an exempt computer for this.

      An alternative might be to have gmake.exe signed (by someone recognized by chafelix's organization) or explicitly allowed.

        Group policy (-y, not -e) can block based on filename, or checksum, or allow running only "certified" (signed) programs.

        Aaah ... yes, I wondered whether there might be something like this at play.
        It's something that's well and truly outside of my experience.
        Thanks for the info.

        Cheers,
        Rob
Re^7: Windows installation woes
by marto (Cardinal) on Nov 03, 2021 at 13:15 UTC

    You're working in a restrictive environment, engage with the sysadmins to get what you need, or ask for a suitable system upon which you can build the tools you need for distribution on other systems.

Re^7: Windows installation woes
by bliako (Monsignor) on Nov 04, 2021 at 11:04 UTC

    microsoft products being what they are, TIMTOWTHI (There Is More Than One Way To Hack It) applies. I am sure you will find a way to bypass it. My favourite from this extensive list is to run it via rundll32.exe gmake.dll,main. (most likely you don't have gmake.dll but you can create it in another machine). Can windows be that dumb? Computer says maybe (<<-youtube link)

    also running it via cmd.exe may be another loophole: cmd /K "C:\SomeFolder\MyApp.exe"

    bw, bliako

    p.s. TIMTOWTHU (There Is More Than One Way To Hack Undoubtedly) and that's written on stone.

      Such security policy limitations are often in place for very good reason. Circumventing such things may be technically possible however is almost always a bad idea, you could find yourself out of a job, or in legal trouble.

        Sure, your warning is valid. Loosing one's job because of challenging the status quo is one of the ways to keep society backwards and an ace up the sleeve of those who feel threatened by moving forward, i.e. away from the Caves.

        There's a funny story about 5 monkeys in a cage.

        OTOH, I never understood why a worker will risk sanity or health for pleasing (=making profit for) an employer who constraints them in such a way that work is impossible. Many posts in PM are along the motif: my system/sysadmin does not allow X, how to circumvent? . I am a sympathiser what can I say?

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://11138375]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others romping around the Monastery: (4)
As of 2024-03-29 05:19 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found