This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author ac.james
Recipients ac.james, jnoller
Date 2009-06-01.02:43:02
SpamBayes Score 5.1496137e-08
Marked as misclassified No
Message-id <1243824184.67.0.677450408875.issue6147@psf.upfronthosting.co.za>
In-reply-to
Content
Ok Jesse, that did stop the bomb problem.  
Unfortunately the real code belongs in a scientific research
distributable module that is called by another function in the module
where both have been imported into the script that is run.  So it isn't
being called by __main__ in the first place.  So we'll have to make sure
client scripts are encapsulated with the if __name__ == '__main__' by
our collegues running windows.  Aka I expect to recieve this same bug
report.  
I'll go through the docs again, but I didn't find any built-in way to
get the recursion level of an operation (other than the 0 = __main__
level).    

Looking like this just turned into a feature request.
History
Date User Action Args
2009-06-01 02:43:04ac.jamessetrecipients: + ac.james, jnoller
2009-06-01 02:43:04ac.jamessetmessageid: <1243824184.67.0.677450408875.issue6147@psf.upfronthosting.co.za>
2009-06-01 02:43:03ac.jameslinkissue6147 messages
2009-06-01 02:43:02ac.jamescreate