On Mon, Aug 22, 2011 at 06:39:25AM +0100, Nicholas Clark wrote:
> Is it? If, at the implementation layer, all accesses to objects are actually
> function calls called via vtables, then surely it's *relatively* simple to
> change the vtable to replace
> * mutator methods with methods which croak (the shallow read-only part)
> * accessor methods for internal storage with methods which return proxy
>   objects which are read-only

At present I don't think we have anything that identifies
mutator methods and/or accessor methods, so perhaps that's where
we would need to start.


Reply via email to