William Pitcock avatar William Pitcock committed ce69caf

ak-interpret-axml: hack into something which allows us to debug the toolstack

Comments (0)

Files changed (1)


 import json, sys
 from pprint import pprint
-data = compile_axml_file(sys.argv[1], phases=['bootstrap', 'packages', 'custom', 'cleanup'])
+data = compile_axml_file(sys.argv[1], phases=sys.argv[3:])
 tree = compile_parsetree(data)
 print "Compiled AST:"
-print "Interpret results (simulation):"
-interpret_parsetree(tree, {'chroot': '/home/nenolod/test', 'simulate': False})
+print "Interpret results:"
+interpret_parsetree(tree, {'chroot': sys.argv[2], 'simulate': 'simulate' in sys.argv})
Tip: Filter by directory path e.g. /media app.js to search for public/media/app.js.
Tip: Use camelCasing e.g. ProjME to search for ProjectModifiedEvent.java.
Tip: Filter by extension type e.g. /repo .js to search for all .js files in the /repo directory.
Tip: Separate your search with spaces e.g. /ssh pom.xml to search for src/ssh/pom.xml.
Tip: Use ↑ and ↓ arrow keys to navigate and return to view the file.
Tip: You can also navigate files with Ctrl+j (next) and Ctrl+k (previous) and view the file with Ctrl+o.
Tip: You can also navigate files with Alt+j (next) and Alt+k (previous) and view the file with Alt+o.