Am 14.10.2011 14:31, schrieb Daniel Hyams:
It's a large module that I depend on (mayavi) that is
Is it one of <http://mayavi.sourceforge.net/> or <https://github.com/enthought/mayavi>? Then why not submit a patch there?
looking for its configuration files based its __path__, which means that it's looking in the pyz file and failing. I think that's bad design, to be looking for a config file in the module's path, but I don't have
Does the module load the file using open()? In this case the hack I thought of will not work. So you'll have to hack the source anyway.
Another way would be to COLLECT() the whole mayavi package manually, after excluding it on Analysis(). Thus it will be extracted to the installation- resp. temp.-directory. You'll may have to hack sys.path.
-- Schönen Gruß - Regards Hartmut Goebel Dipl.-Informatiker (univ.), CISSP, CSSLP Goebel Consult Spezialist für IT-Sicherheit in komplexen Umgebungen http://www.goebel-consult.de Monatliche Kolumne: http://www.cissp-gefluester.de/ Goebel Consult ist Mitglied bei http://www.7-it.de -- You received this message because you are subscribed to the Google Groups "PyInstaller" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/pyinstaller?hl=en.
