[Python-bugs-list] [ python-Bugs-625728 ] sys.executable in applets
SourceForge.net
noreply@sourceforge.net
Wed, 12 Feb 2003 07:50:35 -0800
Bugs item #625728, was opened at 2002-10-19 23:18
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=105470&aid=625728&group_id=5470
Category: Macintosh
Group: None
>Status: Closed
>Resolution: Fixed
Priority: 5
Submitted By: Jack Jansen (jackjansen)
Assigned to: Just van Rossum (jvr)
Summary: sys.executable in applets
Initial Comment:
In applets sys.executable is the interpreter in the applet. Running this will launch a second copy of the applet. As sys.executable is apparently often used to fire up external scripts with system() or popen() this isn't very useful right now (especially within the IDE!).
It would be nice if sys.executable could be set to an interpreter that can be used for starting external scripts.
----------------------------------------------------------------------
>Comment By: Jack Jansen (jackjansen)
Date: 2003-02-12 16:50
Message:
Logged In: YES
user_id=45365
This has been fixed in CVS.
----------------------------------------------------------------------
Comment By: Jack Jansen (jackjansen)
Date: 2003-01-04 22:23
Message:
Logged In: YES
user_id=45365
Agreed. I'm assigning it to you, then you can close the bug report once you've modified BuildApplet to use bundlebuilder in MacPython-OSX. :-)
----------------------------------------------------------------------
Comment By: Just van Rossum (jvr)
Date: 2003-01-04 11:32
Message:
Logged In: YES
user_id=92689
This becomes a non-issue once we build applets with
bundlebuilder.py, as the "executable" in the applet is a
shell script, and sys.executable will actually be the proper
executable. For standalone apps built with bundlebuilder.py
sys.executable points to the (still vanilla) interpreter
that was copied to the bundle, and can be used as a normal
interpreter without invoking bundle magic.
----------------------------------------------------------------------
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=105470&aid=625728&group_id=5470