Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl-Sensitive Sunglasses
 
PerlMonks  

Re^3: Check for root under Cygwin

by syphilis (Chancellor)
on Sep 02, 2013 at 12:29 UTC ( #1051934=note: print w/replies, xml ) Need Help??


in reply to Re^2: Check for root under Cygwin
in thread Check for root under Cygwin

But is there an option to run tests, when possible?

You mean that the tests *should* be run when running as administrator ? Perhaps Win32::IsAdminUser() is useful for determining that.
See the Win32 module's documentation.

Consider posting to the Cygwin mailing list (if you fail to receive a satisfactory answer here).

Cheers,
Rob

Replies are listed 'Best First'.
Re^4: Check for root under Cygwin
by vsespb (Chaplain) on Sep 02, 2013 at 13:17 UTC
    Yes, Win32::IsAdminUser() is working right, seems it's the solution.
    I did not realize that this module available for Cygwin too.
    Thanks!
Re^4: Check for root under Cygwin
by vsespb (Chaplain) on Sep 02, 2013 at 12:45 UTC
    You mean that the tests *should* be run when running as administrator ?
    No, test should be run when *not* running as administrator.

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://1051934]
help
Chatterbox?
[Corion]: I think that ITIL is mostly to prevent people from doing harm to a system that basically runs unattended :)
[Corion]: Maybe you could reduce ITIL to a computer network, a man and a dog. The network runs the computations. The man is there to feed the dog. The dog is there to prevent the man from accessing the computers.
[marto]: from experience of this side of the fence, it's all about proving to people that you are ITIL compliant, then the client ignores logical processes anyway :P
[marto]: when you work on the outside, for a client, you can make them aware of the stupids, but they don' t always listen :/
[Corion]: Yeah, you can lead them to water, but it's illegal to drown them...
[Discipulus]: Here my solution marto: create a win fake machine insied AD. do a micro fake partition foreach remote partition you wont to monit. put a web server that acept from data from remote systems and full fake partition as needed. fake partition are Mb. ;=)
[marto]: Discipulus yeah, the nuclear industry love fake machines sitting around on a controlled domain :P

How do I use this? | Other CB clients
Other Users?
Others contemplating the Monastery: (12)
As of 2017-01-24 10:35 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?
    Do you watch meteor showers?




    Results (203 votes). Check out past polls.