Message401025
| Author | gvanrossum |
|---|---|
| Recipients | Guido.van.Rossum, Mark.Shannon, gvanrossum, iritkatriel, methane, rhettinger, serhiy.storchaka, terry.reedy |
| Date | 2021-09-04.01:03:48 |
| SpamBayes Score | -1.0 |
| Marked as misclassified | Yes |
| Message-id | <1630717429.05.0.453441880423.issue36521@roundup.psfhosted.org> |
| In-reply-to |
| Content | |
|---|---|
Let's wait until Mark Shannon is back from vacation (another week). Note that class docstrings *are* contained in the class body code object -- there's executable code equivalent to __doc__ = "this is the docstring" But I agree it's not easily found without analyzing the bytecode. Maybe the status quo is best after all? I would like to be able to identify code objects for functions, we could add a bit to co_flags for that. |
|
| History | |||
|---|---|---|---|
| Date | User | Action | Args |
| 2021-09-04 01:03:49 | gvanrossum | set | recipients: + gvanrossum, rhettinger, terry.reedy, methane, Mark.Shannon, serhiy.storchaka, Guido.van.Rossum, iritkatriel |
| 2021-09-04 01:03:49 | gvanrossum | set | messageid: <1630717429.05.0.453441880423.issue36521@roundup.psfhosted.org> |
| 2021-09-04 01:03:49 | gvanrossum | link | issue36521 messages |
| 2021-09-04 01:03:48 | gvanrossum | create | |