[Unison-hackers] File watcher process for BSD
Chris Stankevitz
chris at stankevitz.com
Thu Aug 27 12:21:37 EDT 2015
On 8/21/15 9:41 AM, Chris Stankevitz wrote:
> When using '-repeat watch', how does unison discover the PID of the FWP?
> Or, if unison launches the FWP, how does unison learn the FWP's name?
I think I found the answer in NEWS: "Unison will now look for
fsmonitor.py in the same directory where the Unison executable itself
lives."
So it appears that the file watcher process must be named "fsmonitor.py"
and it must live in the same directory as the unison binary.
Chris
More information about the Unison-hackers
mailing list