Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The language service could not be started #3034

Closed
J0ska opened this issue Oct 26, 2020 · 7 comments · Fixed by #4883
Closed

The language service could not be started #3034

J0ska opened this issue Oct 26, 2020 · 7 comments · Fixed by #4883
Assignees
Labels

Comments

@J0ska
Copy link

J0ska commented Oct 26, 2020

The language service doesn't start due to "-ExecutionPolicy Bypass" command line option is prohibited by antivirus policy.

vscode-powershell.log

Removing the code below fixed the problem

// Only add ExecutionPolicy param on Windows
if (utils.isWindows) {
powerShellArgs.push("-ExecutionPolicy", "Bypass");
}

vscode-powershell.log

Cheers

@ghost ghost added the Needs: Triage Maintainer attention needed! label Oct 26, 2020
@corbob
Copy link
Contributor

corbob commented Oct 26, 2020

🤔 I wonder if there should be a setting to configure what Execution Policy is sent on startup? Naturally it might be difficult to build and debug locally if you're not locally signing code and you pick an Execution Policy other than Unrestricted or Bypass.

Out of curiosity @J0ska what anti-virus are you running?

@J0ska
Copy link
Author

J0ska commented Oct 26, 2020

Right, softcoding the Execution Policy would be indeed ideal.

We use McAfee Endpoint Security. It is blocked by Exploit Prevention rule ID 6073 "Exection Policy Bypass in Powershell". By default it is disabled but in out set-up it's not :(

@SydneyhSmith SydneyhSmith removed the Needs: Triage Maintainer attention needed! label Oct 27, 2020
@SydneyhSmith
Copy link
Collaborator

SydneyhSmith commented Oct 27, 2020

Thanks @J0ska we may need to introduce a configuration setting for execution policy, it would great to know what you saw before taking that code out? A screenshot or GIF is even better--thanks!

@eskonr
Copy link

eskonr commented Feb 2, 2021

since the bypass is not allowed in the org and is being blocked by McAfee or Symantec or other AV tools, it is hard to get approval from security to byass and use visual studio code app.

Are there any progress made on this to fix the issue?

we have large number of users complaining on this.

@ghost ghost added the Needs: Maintainer Attention Maintainer attention needed! label Feb 2, 2021
@SydneyhSmith
Copy link
Collaborator

Thanks @eskonr we do plan to investigate this issue further in the next 6 months or so, and will have a better idea then, how/if we may be able to work around these AV tools...unfortunately these AV tools can be quite complex and unpredictable...in the meantime if you do have specifics about your environment and what you are seeing that you can share that is helpful.

@SydneyhSmith SydneyhSmith removed the Needs: Maintainer Attention Maintainer attention needed! label Feb 2, 2021
@andyleejordan andyleejordan self-assigned this Jan 6, 2024
@andyleejordan
Copy link
Member

Whoops sorry this took so long to get it, it was a 5 minute fix to give you the option.

@andyleejordan
Copy link
Member

Hi @J0ska @corbob @eskonr v2024.2.0 was just released that has the option powershell.developer.setExecutionPolicy you can use to workaround this! So sorry that this fell off our radar for so long, but we got it fixed!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants