This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author cdleary
Recipients cdleary, vinay.sajip
Date 2007-09-10.14:26:46
SpamBayes Score 0.26277256
Marked as misclassified No
Message-id <1189434407.21.0.0414417357768.issue1765140@psf.upfronthosting.co.za>
In-reply-to
Content
Ah, I see what the miscommunication is now.

Yes, implementing the feature as you suggested would give the user the
ability to specify the delayed handle-opening /within/ the configuration
file. What I had intended was a way to load/inspect a file configuration
without it having any handle-opening side affects, even if it were a
totally unknown configuration file.

If you want to assume a good trust relationship with the contents of a
file configuration that you're loading (as in, you trust that it won't
clobber any files that you still want), then that works well. I just
assumed it would be useful to open a file configuration in an
"untrusted" way (via delay_fh) in order to inspect/modify it. It seems
to me to put more power in the hands of the loader of the configuration,
rather than leaving the loader subject to the potentially "bad" contents
of the configuration file.

If you think I'm being too paranoid or feel that this is too obscure a
use case, feel free to implement it how you see fit! :)
History
Date User Action Args
2007-09-10 14:26:47cdlearysetspambayes_score: 0.262773 -> 0.26277256
recipients: + cdleary, vinay.sajip
2007-09-10 14:26:47cdlearysetspambayes_score: 0.262773 -> 0.262773
messageid: <1189434407.21.0.0414417357768.issue1765140@psf.upfronthosting.co.za>
2007-09-10 14:26:47cdlearylinkissue1765140 messages
2007-09-10 14:26:46cdlearycreate