2010-02-23 | Paul Boddie | raw annotate files changeset graph | Simplified the usage tracking by merely recording active users (providers) of names and propagating usage back to them. Accesses retain lists of active users and the name of the object through which an access is performed. To generate specific access instructions, the users are consulted for their usage lists and possible types deduced. Similarly, guards are generated by deducing possible types from such usage lists. |
1 #!/usr/bin/env python 2 3 def f(a, b, c=4): 4 return c 5 6 g = f 7 8 result_3 = g(1, c=3, b=2) # f(c=3) -> 3 9 result_4 = g(1, 2) # f(c=4) -> 4 10 11 def g(a, c, b=5): 12 return b 13 14 result_2 = g(1, c=3, b=2) # g(b=2) -> 2 15 result_5 = g(1, 3) # g(b=5) -> 5 16 17 # vim: tabstop=4 expandtab shiftwidth=4