Message88632
Ok Jesse, that did stop the bomb problem.
Unfortunately the real code belongs in a scientific research
distributable module that is called by another function in the module
where both have been imported into the script that is run. So it isn't
being called by __main__ in the first place. So we'll have to make sure
client scripts are encapsulated with the if __name__ == '__main__' by
our collegues running windows. Aka I expect to recieve this same bug
report.
I'll go through the docs again, but I didn't find any built-in way to
get the recursion level of an operation (other than the 0 = __main__
level).
Looking like this just turned into a feature request. |
|
Date |
User |
Action |
Args |
2009-06-01 02:43:04 | ac.james | set | recipients:
+ ac.james, jnoller |
2009-06-01 02:43:04 | ac.james | set | messageid: <1243824184.67.0.677450408875.issue6147@psf.upfronthosting.co.za> |
2009-06-01 02:43:03 | ac.james | link | issue6147 messages |
2009-06-01 02:43:02 | ac.james | create | |
|