[Wireshark-bugs] [Bug 15710] extcap: Python scripts are not executed on Windows

2019-04-21 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15710 --- Comment #4 from Gerrit Code Review --- Change 32934 had a related patch set uploaded by Peter Wu: extcap: skip execution of scripts if a wrapper exists on Windows https://code.wireshark.org/review/32934 -- You are receiving this

[Wireshark-bugs] [Bug 15710] extcap: Python scripts are not executed on Windows

2019-04-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15710 --- Comment #3 from Gerrit Code Review --- Change 32901 had a related patch set uploaded by Peter Wu: Add direct support for running Python extcap programs on Windows https://code.wireshark.org/review/32901 -- You are receiving this

[Wireshark-bugs] [Bug 15710] extcap: Python scripts are not executed on Windows

2019-04-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15710 --- Comment #2 from Peter Wu --- Good point about PATHEXT, let's assume if an extension is present, the interpreter should be correctly installed. Here I found "ftype" and "assoc" commands which can be helpful:

[Wireshark-bugs] [Bug 15710] extcap: Python scripts are not executed on Windows

2019-04-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15710 --- Comment #1 from Tomasz Mon --- (In reply to Peter Wu from comment #0) > Use of AssocQueryString to lookup the program associated with an extension > could work, but I am worried that on systems without Python installed (or a >