Programming Python, Part I
Having to create an object and then set each of its members is not pleasant. It takes a lot of lines and is very error-prone—did I remember to set the tags? There's a better way to do it—using the initialization method.
This special method is called __init__, and the parameters you define it to take have to be passed in the creation of the object. A possible initialization method would be:
class Post(object): def __init__(self, title, body): self.set_title(title) self.set_body(body)
Simply add the __init__ definition to the file and reload it. We now can, and have to, set the title and body at initialization time:
>>> cool = blog.Post("Cool", "Python is cool") >>> cool.get_title() 'Cool' >>> cool.get_body() 'Python is cool' >>>
Hint: to retrieve previous lines in the REPL inside Emacs use Alt-P.
There are other special methods. Remember how ugly it was to evaluate a Post itself? Let me remind you:
>>> cool <blog.Post object at 0xb7c7e9ac>
We can solve that. There's another special method called __repr__, which is used to retrieve that string. Inside the Post class add:
def __repr__(self): return "Blog Post: %s" % self.get_title()
Reload the file, the same way you loaded it previously, and evaluate a post:
>>> ## working on region in file /usr/tmp/python... >>> cool <blog.Post object at 0xb7c7e9ac> >>>
Oops! That's not what we wanted. The problem here is that the cool object was created with an older version of the Post class, so it doesn't have the new method. That is a very common mistake, and not being prepared for it can cause a lot of headaches. But, simply re-create the object, and you are set:
>>> ## working on region in file /usr/tmp/python... >>> cool = blog.Post("Cool", "Python is cool") >>> cool Blog Post: Cool >>>
Easy—wait for the next issue of Linux Journal for Part II of this tutorial. If you really want something to do now, start learning Emacs.
José P. E. “Pupeno” Fern´ndez has been programming since...at what age is a child capable of siting in a chair and reaching a keyboard? He has experimented with more languages than can be listed on this page. His Web site is at pupeno.com, and he always can be reached, unless you are a spammer, at email@example.com.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- ACI Worldwide's UP Retail Payments
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide