Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hardcode the paths to Windows PowerShell and CMD #6684

Merged
1 commit merged into from
Jun 26, 2020

Commits on Jun 26, 2020

  1. Hardcode the paths to Windows PowerShell and CMD

    Occasionally, we get users with corrupt PATH environment variables: they
    can't lauch PowerShell, because for some reason it's dropped off their
    PATH. We also get users who have stray applications named
    `powershell.exe` just lying around in random system directories.
    
    We can combat both of these issues by simply hardcoding where we expect
    PowerShell and CMD to live. %SystemRoot% was chosen over %WINDIR%
    because apparently (according to Stack Overflow), SystemPath is
    read-only and WINDIR isn't.
    
    Refs #6039, #4390, #4228, #4682 (stray powershell.exe).
    This may impact #6082 (as it might be another "stray file" incident).
    DHowett committed Jun 26, 2020
    Configuration menu
    Copy the full SHA
    9d1bab8 View commit details
    Browse the repository at this point in the history