[Unison-hackers] File watcher process for BSD
Matt McClure
matt at matthewlmcclure.com
Thu Aug 27 14:39:53 EDT 2015
That matches my experience.
--
http://matthewlmcclure.com/
http://cens.io/
> On Aug 27, 2015, at 12:21, Chris Stankevitz <chris at stankevitz.com> wrote:
>
>> On 8/21/15 9:41 AM, Chris Stankevitz wrote:
>> When using '-repeat watch', how does unison discover the PID of the FWP?
>> Or, if unison launches the FWP, how does unison learn the FWP's name?
>
> I think I found the answer in NEWS: "Unison will now look for fsmonitor.py in the same directory where the Unison executable itself lives."
>
> So it appears that the file watcher process must be named "fsmonitor.py" and it must live in the same directory as the unison binary.
>
> Chris
> _______________________________________________
> Unison-hackers mailing list
> Unison-hackers at lists.seas.upenn.edu
> http://lists.seas.upenn.edu/mailman/listinfo/unison-hackers
More information about the Unison-hackers
mailing list