Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 1 | \section{\module{weakref} --- |
| 2 | Weak references} |
| 3 | |
| 4 | \declaremodule{extension}{weakref} |
Fred Drake | eedf985 | 2001-04-11 19:17:11 +0000 | [diff] [blame] | 5 | \modulesynopsis{Support for weak references and weak dictionaries.} |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 6 | \moduleauthor{Fred L. Drake, Jr.}{fdrake@acm.org} |
Martin v. Löwis | 5e16333 | 2001-02-27 18:36:56 +0000 | [diff] [blame] | 7 | \moduleauthor{Neil Schemenauer}{nas@arctrix.com} |
Fred Drake | 0c20904 | 2001-06-29 16:25:07 +0000 | [diff] [blame] | 8 | \moduleauthor{Martin von L\"owis}{martin@loewis.home.cs.tu-berlin.de} |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 9 | \sectionauthor{Fred L. Drake, Jr.}{fdrake@acm.org} |
| 10 | |
| 11 | \versionadded{2.1} |
| 12 | |
| 13 | |
| 14 | The \module{weakref} module allows the Python programmer to create |
| 15 | \dfn{weak references} to objects. |
| 16 | |
Tim Peters | 5a5b243 | 2003-11-21 22:20:57 +0000 | [diff] [blame] | 17 | In the following, the term \dfn{referent} means the |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 18 | object which is referred to by a weak reference. |
| 19 | |
Tim Peters | 5a5b243 | 2003-11-21 22:20:57 +0000 | [diff] [blame] | 20 | A weak reference to an object is not enough to keep the object alive: |
| 21 | when the only remaining references to a referent are weak references, |
| 22 | garbage collection is free to destroy the referent and reuse its memory |
| 23 | for something else. A primary use for weak references is to implement |
| 24 | caches or mappings holding large objects, where it's desired that a |
| 25 | large object not be kept alive solely because it appears in a cache or |
| 26 | mapping. For example, if you have a number of large binary image objects, |
| 27 | you may wish to associate a name with each. If you used a Python |
| 28 | dictionary to map names to images, or images to names, the image objects |
| 29 | would remain alive just because they appeared as values or keys in the |
| 30 | dictionaries. The \class{WeakKeyDictionary} and |
| 31 | \class{WeakValueDictionary} classes supplied by the \module{weakref} |
| 32 | module are an alternative, using weak references to construct mappings |
| 33 | that don't keep objects alive solely because they appear in the mapping |
| 34 | objects. If, for example, an image object is a value in a |
| 35 | \class{WeakValueDictionary}, then when the last remaining |
| 36 | references to that image object are the weak references held by weak |
| 37 | mappings, garbage collection can reclaim the object, and its corresponding |
| 38 | entries in weak mappings are simply deleted. |
| 39 | |
| 40 | \class{WeakKeyDictionary} and \class{WeakValueDictionary} use weak |
| 41 | references in their implementation, setting up callback functions on |
| 42 | the weak references that notify the weak dictionaries when a key or value |
| 43 | has been reclaimed by garbage collection. Most programs should find that |
| 44 | using one of these weak dictionary types is all they need -- it's |
| 45 | not usually necessary to create your own weak references directly. The |
| 46 | low-level machinery used by the weak dictionary implementations is exposed |
| 47 | by the \module{weakref} module for the benefit of advanced uses. |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 48 | |
Raymond Hettinger | f8020e0 | 2003-07-02 15:10:38 +0000 | [diff] [blame] | 49 | Not all objects can be weakly referenced; those objects which can |
Fred Drake | 5e0dfac | 2001-03-23 04:36:02 +0000 | [diff] [blame] | 50 | include class instances, functions written in Python (but not in C), |
Raymond Hettinger | 027bb63 | 2004-05-31 03:09:25 +0000 | [diff] [blame] | 51 | methods (both bound and unbound), sets, frozensets, file objects, |
| 52 | sockets, arrays, deques, and regular expression pattern objects. |
| 53 | \versionchanged[Added support for files, sockets, arrays, and patterns]{2.4} |
| 54 | |
| 55 | Several builtin types such as \class{list} and \class{dict} do not |
| 56 | directly support weak references but can add support through subclassing: |
| 57 | |
| 58 | \begin{verbatim} |
| 59 | class Dict(dict): |
| 60 | pass |
| 61 | |
| 62 | obj = Dict(red=1, green=2, blue=3) # this object is weak referencable |
| 63 | \end{verbatim} |
| 64 | |
| 65 | Extension types can easily be made to support weak references; see section |
| 66 | \ref{weakref-extension}, ``Weak References in Extension Types,'' for more |
| 67 | information. |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 68 | |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 69 | |
| 70 | \begin{funcdesc}{ref}{object\optional{, callback}} |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 71 | Return a weak reference to \var{object}. The original object can be |
| 72 | retrieved by calling the reference object if the referent is still |
| 73 | alive; if the referent is no longer alive, calling the reference |
Fred Drake | 21ae4f9 | 2004-02-03 20:55:15 +0000 | [diff] [blame] | 74 | object will cause \constant{None} to be returned. If \var{callback} is |
Fred Drake | 4458ece | 2004-02-03 19:44:26 +0000 | [diff] [blame] | 75 | provided and not \constant{None}, |
| 76 | it will be called when the object is about to be |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 77 | finalized; the weak reference object will be passed as the only |
| 78 | parameter to the callback; the referent will no longer be available. |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 79 | |
| 80 | It is allowable for many weak references to be constructed for the |
| 81 | same object. Callbacks registered for each weak reference will be |
| 82 | called from the most recently registered callback to the oldest |
| 83 | registered callback. |
| 84 | |
| 85 | Exceptions raised by the callback will be noted on the standard |
Andrew M. Kuchling | e7d7e6c | 2001-02-14 02:39:11 +0000 | [diff] [blame] | 86 | error output, but cannot be propagated; they are handled in exactly |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 87 | the same way as exceptions raised from an object's |
| 88 | \method{__del__()} method. |
Tim Peters | 5a5b243 | 2003-11-21 22:20:57 +0000 | [diff] [blame] | 89 | |
Martin v. Löwis | 5e16333 | 2001-02-27 18:36:56 +0000 | [diff] [blame] | 90 | Weak references are hashable if the \var{object} is hashable. They |
| 91 | will maintain their hash value even after the \var{object} was |
| 92 | deleted. If \function{hash()} is called the first time only after |
| 93 | the \var{object} was deleted, the call will raise |
| 94 | \exception{TypeError}. |
Tim Peters | 5a5b243 | 2003-11-21 22:20:57 +0000 | [diff] [blame] | 95 | |
Fred Drake | 3a2c462 | 2001-10-26 03:00:39 +0000 | [diff] [blame] | 96 | Weak references support tests for equality, but not ordering. If |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 97 | the referents are still alive, two references have the same |
Fred Drake | b03d0cc | 2001-11-26 21:39:40 +0000 | [diff] [blame] | 98 | equality relationship as their referents (regardless of the |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 99 | \var{callback}). If either referent has been deleted, the |
| 100 | references are equal only if the reference objects are the same |
| 101 | object. |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 102 | \end{funcdesc} |
| 103 | |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 104 | \begin{funcdesc}{proxy}{object\optional{, callback}} |
| 105 | Return a proxy to \var{object} which uses a weak reference. This |
| 106 | supports use of the proxy in most contexts instead of requiring the |
| 107 | explicit dereferencing used with weak reference objects. The |
| 108 | returned object will have a type of either \code{ProxyType} or |
| 109 | \code{CallableProxyType}, depending on whether \var{object} is |
| 110 | callable. Proxy objects are not hashable regardless of the |
| 111 | referent; this avoids a number of problems related to their |
| 112 | fundamentally mutable nature, and prevent their use as dictionary |
Fred Drake | e7ec1ef | 2001-05-10 17:22:17 +0000 | [diff] [blame] | 113 | keys. \var{callback} is the same as the parameter of the same name |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 114 | to the \function{ref()} function. |
| 115 | \end{funcdesc} |
| 116 | |
| 117 | \begin{funcdesc}{getweakrefcount}{object} |
| 118 | Return the number of weak references and proxies which refer to |
| 119 | \var{object}. |
| 120 | \end{funcdesc} |
| 121 | |
| 122 | \begin{funcdesc}{getweakrefs}{object} |
| 123 | Return a list of all weak reference and proxy objects which refer to |
| 124 | \var{object}. |
| 125 | \end{funcdesc} |
| 126 | |
Martin v. Löwis | 5e16333 | 2001-02-27 18:36:56 +0000 | [diff] [blame] | 127 | \begin{classdesc}{WeakKeyDictionary}{\optional{dict}} |
Fred Drake | ac154a1 | 2001-04-10 19:57:58 +0000 | [diff] [blame] | 128 | Mapping class that references keys weakly. Entries in the |
| 129 | dictionary will be discarded when there is no longer a strong |
| 130 | reference to the key. This can be used to associate additional data |
| 131 | with an object owned by other parts of an application without adding |
| 132 | attributes to those objects. This can be especially useful with |
| 133 | objects that override attribute accesses. |
Tim Peters | 5a5b243 | 2003-11-21 22:20:57 +0000 | [diff] [blame] | 134 | |
| 135 | \note{Caution: Because a \class{WeakKeyDictionary} is built on top |
| 136 | of a Python dictionary, it must not change size when iterating |
| 137 | over it. This can be difficult to ensure for a |
| 138 | \class{WeakKeyDictionary} because actions performed by the |
| 139 | program during iteration may cause items in the dictionary |
| 140 | to vanish "by magic" (as a side effect of garbage collection).} |
Martin v. Löwis | 5e16333 | 2001-02-27 18:36:56 +0000 | [diff] [blame] | 141 | \end{classdesc} |
| 142 | |
| 143 | \begin{classdesc}{WeakValueDictionary}{\optional{dict}} |
Fred Drake | ac154a1 | 2001-04-10 19:57:58 +0000 | [diff] [blame] | 144 | Mapping class that references values weakly. Entries in the |
| 145 | dictionary will be discarded when no strong reference to the value |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 146 | exists any more. |
Tim Peters | 5a5b243 | 2003-11-21 22:20:57 +0000 | [diff] [blame] | 147 | |
| 148 | \note{Caution: Because a \class{WeakValueDictionary} is built on top |
| 149 | of a Python dictionary, it must not change size when iterating |
| 150 | over it. This can be difficult to ensure for a |
| 151 | \class{WeakValueDictionary} because actions performed by the |
| 152 | program during iteration may cause items in the dictionary |
| 153 | to vanish "by magic" (as a side effect of garbage collection).} |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 154 | \end{classdesc} |
| 155 | |
| 156 | \begin{datadesc}{ReferenceType} |
| 157 | The type object for weak references objects. |
| 158 | \end{datadesc} |
| 159 | |
| 160 | \begin{datadesc}{ProxyType} |
| 161 | The type object for proxies of objects which are not callable. |
| 162 | \end{datadesc} |
| 163 | |
| 164 | \begin{datadesc}{CallableProxyType} |
| 165 | The type object for proxies of callable objects. |
| 166 | \end{datadesc} |
| 167 | |
| 168 | \begin{datadesc}{ProxyTypes} |
| 169 | Sequence containing all the type objects for proxies. This can make |
| 170 | it simpler to test if an object is a proxy without being dependent |
| 171 | on naming both proxy types. |
| 172 | \end{datadesc} |
| 173 | |
Fred Drake | ac154a1 | 2001-04-10 19:57:58 +0000 | [diff] [blame] | 174 | \begin{excdesc}{ReferenceError} |
| 175 | Exception raised when a proxy object is used but the underlying |
Fred Drake | 8c2c3d3 | 2001-10-06 06:10:54 +0000 | [diff] [blame] | 176 | object has been collected. This is the same as the standard |
| 177 | \exception{ReferenceError} exception. |
Fred Drake | ac154a1 | 2001-04-10 19:57:58 +0000 | [diff] [blame] | 178 | \end{excdesc} |
| 179 | |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 180 | |
| 181 | \begin{seealso} |
| 182 | \seepep{0205}{Weak References}{The proposal and rationale for this |
| 183 | feature, including links to earlier implementations |
| 184 | and information about similar features in other |
| 185 | languages.} |
| 186 | \end{seealso} |
| 187 | |
| 188 | |
| 189 | \subsection{Weak Reference Objects |
| 190 | \label{weakref-objects}} |
| 191 | |
| 192 | Weak reference objects have no attributes or methods, but do allow the |
| 193 | referent to be obtained, if it still exists, by calling it: |
| 194 | |
| 195 | \begin{verbatim} |
| 196 | >>> import weakref |
| 197 | >>> class Object: |
| 198 | ... pass |
| 199 | ... |
| 200 | >>> o = Object() |
| 201 | >>> r = weakref.ref(o) |
| 202 | >>> o2 = r() |
| 203 | >>> o is o2 |
Martin v. Löwis | ccabed3 | 2003-11-27 19:48:03 +0000 | [diff] [blame] | 204 | True |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 205 | \end{verbatim} |
| 206 | |
| 207 | If the referent no longer exists, calling the reference object returns |
Fred Drake | 21ae4f9 | 2004-02-03 20:55:15 +0000 | [diff] [blame] | 208 | \constant{None}: |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 209 | |
| 210 | \begin{verbatim} |
| 211 | >>> del o, o2 |
| 212 | >>> print r() |
| 213 | None |
| 214 | \end{verbatim} |
| 215 | |
| 216 | Testing that a weak reference object is still live should be done |
Fred Drake | 5d54879 | 2001-08-03 03:50:28 +0000 | [diff] [blame] | 217 | using the expression \code{\var{ref}() is not None}. Normally, |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 218 | application code that needs to use a reference object should follow |
| 219 | this pattern: |
| 220 | |
| 221 | \begin{verbatim} |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 222 | # r is a weak reference object |
| 223 | o = r() |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 224 | if o is None: |
| 225 | # referent has been garbage collected |
| 226 | print "Object has been allocated; can't frobnicate." |
| 227 | else: |
| 228 | print "Object is still live!" |
| 229 | o.do_something_useful() |
| 230 | \end{verbatim} |
| 231 | |
| 232 | Using a separate test for ``liveness'' creates race conditions in |
| 233 | threaded applications; another thread can cause a weak reference to |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 234 | become invalidated before the weak reference is called; the |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 235 | idiom shown above is safe in threaded applications as well as |
| 236 | single-threaded applications. |
| 237 | |
| 238 | |
Fred Drake | cb83988 | 2001-03-28 21:15:41 +0000 | [diff] [blame] | 239 | \subsection{Example \label{weakref-example}} |
| 240 | |
| 241 | This simple example shows how an application can use objects IDs to |
| 242 | retrieve objects that it has seen before. The IDs of the objects can |
| 243 | then be used in other data structures without forcing the objects to |
| 244 | remain alive, but the objects can still be retrieved by ID if they |
| 245 | do. |
| 246 | |
Fred Drake | 4271310 | 2003-12-30 16:15:35 +0000 | [diff] [blame] | 247 | % Example contributed by Tim Peters. |
Fred Drake | cb83988 | 2001-03-28 21:15:41 +0000 | [diff] [blame] | 248 | \begin{verbatim} |
| 249 | import weakref |
| 250 | |
Fred Drake | ac154a1 | 2001-04-10 19:57:58 +0000 | [diff] [blame] | 251 | _id2obj_dict = weakref.WeakValueDictionary() |
Fred Drake | cb83988 | 2001-03-28 21:15:41 +0000 | [diff] [blame] | 252 | |
| 253 | def remember(obj): |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 254 | oid = id(obj) |
| 255 | _id2obj_dict[oid] = obj |
| 256 | return oid |
Fred Drake | cb83988 | 2001-03-28 21:15:41 +0000 | [diff] [blame] | 257 | |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 258 | def id2obj(oid): |
| 259 | return _id2obj_dict[oid] |
Fred Drake | cb83988 | 2001-03-28 21:15:41 +0000 | [diff] [blame] | 260 | \end{verbatim} |
| 261 | |
| 262 | |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 263 | \subsection{Weak References in Extension Types |
| 264 | \label{weakref-extension}} |
| 265 | |
| 266 | One of the goals of the implementation is to allow any type to |
| 267 | participate in the weak reference mechanism without incurring the |
| 268 | overhead on those objects which do not benefit by weak referencing |
| 269 | (such as numbers). |
| 270 | |
| 271 | For an object to be weakly referencable, the extension must include a |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 272 | \ctype{PyObject*} field in the instance structure for the use of the |
Fred Drake | 5e0dfac | 2001-03-23 04:36:02 +0000 | [diff] [blame] | 273 | weak reference mechanism; it must be initialized to \NULL{} by the |
| 274 | object's constructor. It must also set the \member{tp_weaklistoffset} |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 275 | field of the corresponding type object to the offset of the field. |
Raymond Hettinger | 22c001b | 2002-08-07 16:18:54 +0000 | [diff] [blame] | 276 | Also, it needs to add \constant{Py_TPFLAGS_HAVE_WEAKREFS} to the |
| 277 | tp_flags slot. For example, the instance type is defined with the |
| 278 | following structure: |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 279 | |
| 280 | \begin{verbatim} |
| 281 | typedef struct { |
| 282 | PyObject_HEAD |
| 283 | PyClassObject *in_class; /* The class object */ |
Martin v. Löwis | 5e16333 | 2001-02-27 18:36:56 +0000 | [diff] [blame] | 284 | PyObject *in_dict; /* A dictionary */ |
| 285 | PyObject *in_weakreflist; /* List of weak references */ |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 286 | } PyInstanceObject; |
| 287 | \end{verbatim} |
| 288 | |
| 289 | The statically-declared type object for instances is defined this way: |
| 290 | |
| 291 | \begin{verbatim} |
| 292 | PyTypeObject PyInstance_Type = { |
| 293 | PyObject_HEAD_INIT(&PyType_Type) |
| 294 | 0, |
Guido van Rossum | 1464839 | 2001-12-08 18:02:58 +0000 | [diff] [blame] | 295 | "module.instance", |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 296 | |
Fred Drake | f66cb5d | 2001-06-22 17:20:29 +0000 | [diff] [blame] | 297 | /* Lots of stuff omitted for brevity... */ |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 298 | |
Raymond Hettinger | 22c001b | 2002-08-07 16:18:54 +0000 | [diff] [blame] | 299 | Py_TPFLAGS_DEFAULT | Py_TPFLAGS_HAVE_WEAKREFS /* tp_flags */ |
| 300 | 0, /* tp_doc */ |
| 301 | 0, /* tp_traverse */ |
| 302 | 0, /* tp_clear */ |
| 303 | 0, /* tp_richcompare */ |
| 304 | offsetof(PyInstanceObject, in_weakreflist), /* tp_weaklistoffset */ |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 305 | }; |
| 306 | \end{verbatim} |
| 307 | |
Raymond Hettinger | 22c001b | 2002-08-07 16:18:54 +0000 | [diff] [blame] | 308 | The type constructor is responsible for initializing the weak reference |
| 309 | list to \NULL: |
| 310 | |
| 311 | \begin{verbatim} |
Tim Peters | 5a5b243 | 2003-11-21 22:20:57 +0000 | [diff] [blame] | 312 | static PyObject * |
| 313 | instance_new() { |
| 314 | /* Other initialization stuff omitted for brevity */ |
Raymond Hettinger | 22c001b | 2002-08-07 16:18:54 +0000 | [diff] [blame] | 315 | |
Tim Peters | 5a5b243 | 2003-11-21 22:20:57 +0000 | [diff] [blame] | 316 | self->in_weakreflist = NULL; |
Raymond Hettinger | 22c001b | 2002-08-07 16:18:54 +0000 | [diff] [blame] | 317 | |
Tim Peters | 5a5b243 | 2003-11-21 22:20:57 +0000 | [diff] [blame] | 318 | return (PyObject *) self; |
| 319 | } |
Raymond Hettinger | 22c001b | 2002-08-07 16:18:54 +0000 | [diff] [blame] | 320 | \end{verbatim} |
| 321 | |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 322 | The only further addition is that the destructor needs to call the |
Fred Drake | f66cb5d | 2001-06-22 17:20:29 +0000 | [diff] [blame] | 323 | weak reference manager to clear any weak references. This should be |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 324 | done before any other parts of the destruction have occurred, but is |
| 325 | only required if the weak reference list is non-\NULL: |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 326 | |
| 327 | \begin{verbatim} |
| 328 | static void |
| 329 | instance_dealloc(PyInstanceObject *inst) |
| 330 | { |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 331 | /* Allocate temporaries if needed, but do not begin |
Fred Drake | f66cb5d | 2001-06-22 17:20:29 +0000 | [diff] [blame] | 332 | destruction just yet. |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 333 | */ |
| 334 | |
Fred Drake | 7408da5 | 2001-10-26 17:40:22 +0000 | [diff] [blame] | 335 | if (inst->in_weakreflist != NULL) |
| 336 | PyObject_ClearWeakRefs((PyObject *) inst); |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 337 | |
Fred Drake | de3d060 | 2001-10-26 11:27:54 +0000 | [diff] [blame] | 338 | /* Proceed with object destruction normally. */ |
Fred Drake | ebcf6a8 | 2001-02-01 05:20:20 +0000 | [diff] [blame] | 339 | } |
| 340 | \end{verbatim} |