On Mon, Aug 22, 2011 at 06:39:25AM +0100, Nicholas Clark wrote: > Is it? If, at the implementation layer, all accesses to objects are actually > function calls called via vtables, then surely it's *relatively* simple to > change the vtable to replace > > * mutator methods with methods which croak (the shallow read-only part) > * accessor methods for internal storage with methods which return proxy > objects which are read-only
At present I don't think we have anything that identifies mutator methods and/or accessor methods, so perhaps that's where we would need to start. Pm