2005-12-05 15:11:09 +01:00
|
|
|
source $stdenv/setup
|
2003-11-25 18:38:48 +01:00
|
|
|
|
2004-04-14 12:55:33 +02:00
|
|
|
header "exporting $url (r$rev) into $out"
|
2003-11-25 18:38:48 +01:00
|
|
|
|
2006-07-17 17:22:20 +02:00
|
|
|
if test "$sshSupport"; then
|
|
|
|
export SVN_SSH="$openssh/bin/ssh"
|
|
|
|
fi
|
|
|
|
|
2009-05-19 19:07:20 +02:00
|
|
|
if test -n "$http_proxy"; then
|
|
|
|
# Configure proxy
|
|
|
|
mkdir .subversion
|
|
|
|
proxy="${http_proxy#*://}"
|
|
|
|
|
|
|
|
echo '[global]' > .subversion/servers
|
|
|
|
echo "http-proxy-host = ${proxy%:*}" >> .subversion/servers
|
|
|
|
echo "http-proxy-port = ${proxy##*:}" >> .subversion/servers
|
|
|
|
|
|
|
|
export HOME="$PWD"
|
|
|
|
fi;
|
|
|
|
|
2006-05-30 14:43:45 +02:00
|
|
|
# Pipe the "p" character into Subversion to force it to accept the
|
|
|
|
# server's certificate. This is perfectly safe: we don't care
|
|
|
|
# whether the server is being spoofed --- only the cryptographic
|
|
|
|
# hash of the output matters.
|
2013-03-26 19:48:52 +01:00
|
|
|
echo 'p' | svn export ${ignoreExternals:+--ignore-externals} \
|
|
|
|
-r "$rev" "$url" "$out"
|
2003-11-25 18:38:48 +01:00
|
|
|
|
2004-04-14 12:55:33 +02:00
|
|
|
stopNest
|