nixpkgs/pkgs/build-support/fetchsvn/nix-prefetch-svn

70 lines
1.7 KiB
Plaintext
Raw Normal View History

#! /bin/sh -e
url=$1
rev=$2
expHash=$3
hashType=$NIX_HASH_ALGO
if test -z "$hashType"; then
hashType=md5
fi
if test -z "$url"; then
echo "syntax: nix-prefetch-svn URL [REVISION [EXPECTED-HASH]]" >&2
exit 1
fi
test -n "$rev" || rev="HEAD"
# Use a restrictive umask to ensure that the output in the Nix store
# is not group- or world-writable. Nix 0.10 complains about this.
umask 0022
# If the hash was given, a file with that hash may already be in the
# store.
if test -n "$expHash"; then
finalPath=$(nix-store --print-fixed-path --recursive "$hashType" "$expHash" svn-export)
if ! nix-store --check-validity "$finalPath" 2> /dev/null; then
finalPath=
fi
hash=$expHash
fi
# If we don't know the hash or a path with that hash doesn't exist,
# download the file and add it to the store.
if test -z "$finalPath"; then
# !!! race? should be relatively safe, `svn export' barfs if $tmpPath exists.
tmpPath=/tmp/svn-checkout-tmp-$$
tmpFile=$tmpPath/svn-export
mkdir $tmpPath
# Perform the checkout.
# !!! remove 2>/dev/null when we have fixed the certificate hackery.
echo p | svn export -r "$rev" "$url" $tmpFile 2>/dev/null >&2
# Compute the hash.
hash=$(nix-hash --type $hashType $hashFormat $tmpFile)
if ! test -n "$QUIET"; then echo "hash is $hash" >&2; fi
# Add the downloaded file to the Nix store.
finalPath=$(nix-store --add-fixed --recursive "$hashType" $tmpFile)
if test -n "$tmpPath"; then rm -rf $tmpPath || true; fi
if test -n "$expHash" -a "$expHash" != "$hash"; then
echo "hash mismatch for URL \`$url'"
exit 1
fi
fi
if ! test -n "$QUIET"; then echo "path is $finalPath" >&2; fi
echo $hash
if test -n "$PRINT_PATH"; then
echo $finalPath
fi