[Unison-hackers] File watcher process for BSD

Chris Stankevitz chris at stankevitz.com
Thu Aug 27 12:21:37 EDT 2015


On 8/21/15 9:41 AM, Chris Stankevitz wrote:
> When using '-repeat watch', how does unison discover the PID of the FWP?
>   Or, if unison launches the FWP, how does unison learn the FWP's name?

I think I found the answer in NEWS:  "Unison will now look for 
fsmonitor.py in the same directory where the Unison executable itself 
lives."

So it appears that the file watcher process must be named "fsmonitor.py" 
and it must live in the same directory as the unison binary.

Chris


More information about the Unison-hackers mailing list