Skip to main content

GDB-like Python Debugger in the Trepan family

Project description

TravisCI CircleCI Pypi Installs License Supported Python Versions

packagestatus

Abstract

This is a gdb-like debugger for Python. It is a rewrite of pdb from the ground up.

A command-line interface (CLI) is provided as well as an remote access interface over TCP/IP.

See the Tutorial for how to use. See ipython-trepan for using this in ipython or an ipython notebook.

This package is for Python 3.2 and above. See trepan2 for the same code modified to work with Python 2.

Features

Since this debugger is similar to other trepanning debuggers and gdb in general, knowledge gained by learning this is transferable to those debuggers and vice versa.

There’s a lot of cool stuff here that’s not in the stock Python debugger pdb, or in any other Python debugger that I know about.

More Exact location information

Python reports line information on the granularity of a line. To get more precise information, we can (de)parse into Python the byte code around a bytecode offset such as the place you are stopped at.

So far as I know, there is no other debugger that decompile code at runtime.

See the deparse command for details.

We use information in the line number table in byte to understand which lines are breakpointable, and in which module or function the line appears in. Use info line to see this information.

In the future we may allow specifiying an offset to indicate which offset to stop at when there are several choices for a given line number.

Debugging Python bytecode (no source available)

You can pass the debugger the name of Python bytecode and many times, the debugger will merrily proceed. This debugger tries very hard find the source code. Either by using the current executable search path (e.g. PATH) or for some by looking inside the bytecode for a filename in the main code object (co_filename) and applying that with a search path which takes into account directory where the bytecode lives.

Failing to find source code this way, and in other situations where source code can’t be found, the debugger will decompile the bytecode and use that for showing source test. This allows us to debug `eval`’d or `exec’’d code.

But if you happen to know where the source code is located, you can associate a file source code with the current name listed in the bytecode. See the set_substitute command for details here.

Source-code Syntax Colorization

Terminal source code is colorized via pygments . And with that you can set the pygments color style, e.g. “colorful”, “paraiso-dark”. See set_style . Furthermore, we make use of terminal bold and emphasized text in debugger output and help text. Of course, you can also turn this off. Starting with release 0.6.0, you can use your own pygments_style, provided you have a terminal that supports 256 colors. If your terminal supports the basic ANSI color sequences only, we support that too in both dark and light themes.

Command Completion

GNU readline command completion is available. Command completion is not just a simple static list, but varies depending on the context. For example, for frame-changing commands which take optional numbers, on the list of valid numbers is considered.

Terminal Handling

We can adjust debugger output depending on the line width of your terminal. If it changes, or you want to adjust it, see set_width .

Smart Eval

If you want to evaluate the current source line before it is run in the code, use eval. To evaluate text of a common fragment of line, such as the expression part of an if statement, you can do that with eval?. See eval for more information.

More Stepping Control

Sometimes you want small steps, and sometimes large stepping.

This fundamental issue is handled in a couple ways:

Step Granularity

There are now step event and next event commands with aliases to s+, s> and so on. The plus-suffixed commands force a different line on a subsequent stop, the dash-suffixed commands don’t. Suffixes >, <, and ! specify call, return and exception events respectively. And without a suffix you get the default; this is set by the set different command.

Event Filtering and Tracing

By default the debugger stops at every event: call, return, line, exception, c-call, c-exception. If you just want to stop at line events (which is largely what you happens in pdb) you can. If however you just want to stop at calls and returns, that’s possible too. Or pick some combination.

In conjunction with handling all events by default, the event status is shown when stopped. The reason for stopping is also available via info program.

Event Tracing of Calls and Returns

I’m not sure why this was not done before. Probably because of the lack of the ability to set and move by different granularities, tracing calls and returns lead to too many uninteresting stops (such as at the same place you just were at). Also, stopping on function definitions probably also added to this tedium.

Because we’re really handling return events, we can show you the return value. (pdb has an “undocumented” retval command that doesn’t seem to work.)

Debugger Macros via Python Lambda expressions

There are debugger macros. In gdb, there is a macro debugger command to extend debugger commands.

However Python has its own rich programming language so it seems silly to recreate the macro language that is in gdb. Simpler and more powerful is just to use Python here. A debugger macro here is just a lambda expression which returns a string or a list of strings. Each string returned should be a debugger command.

We also have aliases for the extremely simple situation where you want to give an alias to an existing debugger command. But beware: some commands, like step inspect command suffixes and change their behavior accordingly.

We also envision a number of other ways to allow extension of this debugger either through additional modules, or user-supplied debugger command directories.

Byte-code Instruction Introspection

We do more in the way of looking at the byte codes to give better information. Through this we can provide:

  • a skip command. It is like the jump command, but you don’t have to deal with line numbers.

  • disassembly of code fragments. You can now disassemble relative to the stack frames you are currently stopped at.

  • Better interpretation of where you are when inside execfile or exec. (But really though this is probably a Python compiler misfeature.)

  • Check that breakpoints are set only where they make sense.

  • A more accurate determination of if you are at a function-defining def or class statements (because the caller instruction contains MAKE_FUNCTION or BUILD_CLASS.)

Even without “deparsing” mentioned above, the ability to disassemble where the PC is currently located (see info pc), by line number range or byte-offset range lets you tell exactly where you are and code is getting run.

Some Debugger Command Arguments can be Variables and Expressions

Commands that take integer arguments like up, list, or disassemble allow you to use a Python expression which may include local or global variables that evaluates to an integer. This eliminates the need in gdb for special “dollar” debugger variables. (Note however because of shlex parsing, expressions can’t have embedded blanks.)

Out-of-Process Debugging

You can now debug your program in a different process or even a different computer on a different network!

Egg, Wheel, and Tarballs

Can be installed via the usual pip or easy_install. There is a source tarball. How To Install has full instructions and installing from git and by other means.

Modularity

The Debugger plays nice with other trace hooks. You can have several debugger objects.

Many of the things listed below doesn’t directly effect end-users, but it does eventually by way of more robust and featureful code. And keeping developers happy is a good thing.(TM)

  • Commands and subcommands are individual classes now, not methods in a class. This means they now have properties like the context in which they can be run, minimum abbreviation name or alias names. To add a new command you basically add a file in a directory.

  • I/O is it’s own layer. This simplifies interactive readline behavior from reading commands over a TCP socket.

  • An interface is it’s own layer. Local debugging, remote debugging, running debugger commands from a file (source) are different interfaces. This means, for example, that we are able to give better error reporting if a debugger command file has an error.

  • There is an experimental Python-friendly interface for front-ends

  • more testable. Much more unit and functional tests. More of pydb’s integration test will eventually be added.

Documentation

Documentation: http://python3-trepan.readthedocs.org

See Also

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

trepan3k-1.2.5.tar.gz (265.7 kB view details)

Uploaded Source

Built Distributions

trepan3k-1.2.5-py3.9.egg (655.1 kB view details)

Uploaded Source

trepan3k-1.2.5-py3.8.egg (655.5 kB view details)

Uploaded Source

trepan3k-1.2.5-py3.7.egg (654.0 kB view details)

Uploaded Source

trepan3k-1.2.5-py3.6.egg (653.7 kB view details)

Uploaded Source

trepan3k-1.2.5-py3.5.egg (663.8 kB view details)

Uploaded Source

trepan3k-1.2.5-py3.4.egg (665.8 kB view details)

Uploaded Source

trepan3k-1.2.5-py3.3.egg (675.7 kB view details)

Uploaded Source

trepan3k-1.2.5-py3.2.egg (666.0 kB view details)

Uploaded Source

trepan3k-1.2.5-py3-none-any.whl (346.2 kB view details)

Uploaded Python 3

File details

Details for the file trepan3k-1.2.5.tar.gz.

File metadata

  • Download URL: trepan3k-1.2.5.tar.gz
  • Upload date:
  • Size: 265.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.5

File hashes

Hashes for trepan3k-1.2.5.tar.gz
Algorithm Hash digest
SHA256 fd399c6aec8af99a4c4e9984840d4f8c1f190dc24bd9c152bd711d2f39154285
MD5 17a9ff80736fecceb8c45825e1052b41
BLAKE2b-256 e14b3ffa81e4f6882afb35a857e28cc7f771e33dff21bed0a983d3ca998b29ca

See more details on using hashes here.

Provenance

File details

Details for the file trepan3k-1.2.5-py3.9.egg.

File metadata

  • Download URL: trepan3k-1.2.5-py3.9.egg
  • Upload date:
  • Size: 655.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.5

File hashes

Hashes for trepan3k-1.2.5-py3.9.egg
Algorithm Hash digest
SHA256 99082e8643d1cbc1142d0f4b010f1f0323ed9b0b1dba0493c4469158c7fbffd9
MD5 d27f474927d2272dd9a93611a5292929
BLAKE2b-256 446575233326ed37ecd90196d2601c36790116b5606ce35fed7a33987f1e79d0

See more details on using hashes here.

Provenance

File details

Details for the file trepan3k-1.2.5-py3.8.egg.

File metadata

  • Download URL: trepan3k-1.2.5-py3.8.egg
  • Upload date:
  • Size: 655.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.5

File hashes

Hashes for trepan3k-1.2.5-py3.8.egg
Algorithm Hash digest
SHA256 4d6787ae792f2b8146953214575c92e1220d4c901134a7d0f35bbd021bd6fe48
MD5 cbbb13ed48fa9d41377e5a2cc407410b
BLAKE2b-256 d1059c82f51966c3a564f2b6281642b74ab99fceaf03f4a23302b87c039df746

See more details on using hashes here.

Provenance

File details

Details for the file trepan3k-1.2.5-py3.7.egg.

File metadata

  • Download URL: trepan3k-1.2.5-py3.7.egg
  • Upload date:
  • Size: 654.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.5

File hashes

Hashes for trepan3k-1.2.5-py3.7.egg
Algorithm Hash digest
SHA256 84c8bdb48232429006225b8fad7a19938ef500a8f962c703934445942a7beb1c
MD5 362c453e50a7b843e9d50da1a9767829
BLAKE2b-256 7f1903fbf9c12203340dd3e9c86563531c64e9f9072db61ed144fc2d329ab7b7

See more details on using hashes here.

Provenance

File details

Details for the file trepan3k-1.2.5-py3.6.egg.

File metadata

  • Download URL: trepan3k-1.2.5-py3.6.egg
  • Upload date:
  • Size: 653.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.5

File hashes

Hashes for trepan3k-1.2.5-py3.6.egg
Algorithm Hash digest
SHA256 3a35f439a6766a0e534d349a267b01462b5a485f5f4684c6f57a81262c8eee1d
MD5 20a156ad06d775d110cf68c86edd602c
BLAKE2b-256 addc9c7968ea11f377147ff7cdc7eca4a34d9b8041d60ef7823f4d5ad2658740

See more details on using hashes here.

Provenance

File details

Details for the file trepan3k-1.2.5-py3.5.egg.

File metadata

  • Download URL: trepan3k-1.2.5-py3.5.egg
  • Upload date:
  • Size: 663.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.5

File hashes

Hashes for trepan3k-1.2.5-py3.5.egg
Algorithm Hash digest
SHA256 f4f0b8b8afdb8733b386d56c4aa2b0610ef2a8ca98aab1a99b0619faf0782349
MD5 ef36bd28946822c3b961b50b715f26de
BLAKE2b-256 dfcf206af22fbd14449a7a33c46628adbd4b5982281b1e77d8d8d2e77029ee6f

See more details on using hashes here.

Provenance

File details

Details for the file trepan3k-1.2.5-py3.4.egg.

File metadata

  • Download URL: trepan3k-1.2.5-py3.4.egg
  • Upload date:
  • Size: 665.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.5

File hashes

Hashes for trepan3k-1.2.5-py3.4.egg
Algorithm Hash digest
SHA256 e6bd58a637340b6993e5d61fcd80b16d1121e8f226db35baf7e8b2cf4481b512
MD5 0763fab9709216ab4d0f107aac2f2c32
BLAKE2b-256 c2ccd9d35d8321f78ce7a48d159c6dc8e3417ded3c72c36c157e14b44a3fc915

See more details on using hashes here.

Provenance

File details

Details for the file trepan3k-1.2.5-py3.3.egg.

File metadata

  • Download URL: trepan3k-1.2.5-py3.3.egg
  • Upload date:
  • Size: 675.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.5

File hashes

Hashes for trepan3k-1.2.5-py3.3.egg
Algorithm Hash digest
SHA256 98bc5996e6b67e05d0eb40f6554b52c1a0fb2dd0e1e2c65fa60a1569633d0915
MD5 f0d8ef4fa069aaa1979367f0318baa48
BLAKE2b-256 364e030bb87689a944b0b874383df04a24cba17c57c08843a4235c1e10ab6ed4

See more details on using hashes here.

Provenance

File details

Details for the file trepan3k-1.2.5-py3.2.egg.

File metadata

  • Download URL: trepan3k-1.2.5-py3.2.egg
  • Upload date:
  • Size: 666.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.5

File hashes

Hashes for trepan3k-1.2.5-py3.2.egg
Algorithm Hash digest
SHA256 e4b48d4de3935f8aa904fbcc4471faad95bcd85c6a73409d83c3b538f7b941cc
MD5 c50bf1aafa8688ce0752001806925a70
BLAKE2b-256 6eaabb4afe42735520305cd048d2ac0fd6d49721ee0bd86de1c5764c7cd29df5

See more details on using hashes here.

Provenance

File details

Details for the file trepan3k-1.2.5-py3-none-any.whl.

File metadata

  • Download URL: trepan3k-1.2.5-py3-none-any.whl
  • Upload date:
  • Size: 346.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/4.0.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.5

File hashes

Hashes for trepan3k-1.2.5-py3-none-any.whl
Algorithm Hash digest
SHA256 1046b42fe59896ca4b60c56b01ed2d83066135061dc49989a5d040072290dcfa
MD5 05e6d62a18d6e8e64e64db3b61f80901
BLAKE2b-256 1a9435d933fda9709f6494965a0a166c203b40df1b26b556e79aa0efc945ce84

See more details on using hashes here.

Provenance

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page