Solved

Perl Module

Posted on 2002-04-18
5
303 Views
Last Modified: 2010-03-05
I have big problem with perl module. I have script which uses some perl module, So I'd downloaded that module from cpan.org and trying to install that module but - that new module ask for some ddepandent module -So long chain will start ...

So Any body have idea to insatl complete module - Like If I want to install froniter -XML module will all the dependenent module - What shud I do ???

Help me

0
Comment
Question by:arvind
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 6

Expert Comment

by:andreif
ID: 6950441
How you install modules?

Try

perl -MCPAN -e"install Module::Here"
0
 
LVL 5

Author Comment

by:arvind
ID: 6950469
This I know - But I would like to install module with all the rquire module(require module from new module which I'll installing)...
0
 
LVL 6

Expert Comment

by:andreif
ID: 6950518
it's possible to configure CPAN to follow the cell

1. run CPAN shell
perl -MCPAN -eshell

2. set prerequisites_policy to follow:
o conf prerequisites_policy follow

3. install your module:
install Module::Here
0
 
LVL 6

Accepted Solution

by:
andreif earned 50 total points
ID: 6968675
Please, let me know if you need more help

it's possible to configure CPAN to follow the cell

1. run CPAN shell
perl -MCPAN -eshell

2. set prerequisites_policy to follow:
o conf prerequisites_policy follow

3. install your module:
install Module::Here
0
 
LVL 5

Author Comment

by:arvind
ID: 6970952
I'm accepting ur answer becoz u proposed the answer. But CPAN shell working fine when I'd installed NET:ftp module and so many module to get the Internet access on the system.
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have been pestered over the years to produce and distribute regular data extracts, and often the request have explicitly requested the data be emailed as an Excel attachement; specifically Excel, as it appears: CSV files confuse (no Red or Green h…
A year or so back I was asked to have a play with MongoDB; within half an hour I had downloaded (http://www.mongodb.org/downloads),  installed and started the daemon, and had a console window open. After an hour or two of playing at the command …
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Six Sigma Control Plans

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question