2005-12-05 15:11:09 +01:00
|
|
|
source $stdenv/setup
|
2003-11-25 18:38:48 +01:00
|
|
|
|
2004-04-14 12:55:33 +02:00
|
|
|
header "exporting $url (r$rev) into $out"
|
2003-11-25 18:38:48 +01:00
|
|
|
|
2006-07-17 17:22:20 +02:00
|
|
|
if test "$sshSupport"; then
|
|
|
|
export SVN_SSH="$openssh/bin/ssh"
|
|
|
|
fi
|
|
|
|
|
2009-05-19 19:07:20 +02:00
|
|
|
if test -n "$http_proxy"; then
|
|
|
|
# Configure proxy
|
|
|
|
mkdir .subversion
|
|
|
|
proxy="${http_proxy#*://}"
|
|
|
|
|
|
|
|
echo '[global]' > .subversion/servers
|
|
|
|
echo "http-proxy-host = ${proxy%:*}" >> .subversion/servers
|
|
|
|
echo "http-proxy-port = ${proxy##*:}" >> .subversion/servers
|
|
|
|
|
|
|
|
export HOME="$PWD"
|
|
|
|
fi;
|
|
|
|
|
2017-06-04 14:41:28 +02:00
|
|
|
if test -z "$LC_ALL"; then
|
|
|
|
export LC_ALL="en_US.UTF-8"
|
|
|
|
fi;
|
|
|
|
|
2006-05-30 14:43:45 +02:00
|
|
|
# Pipe the "p" character into Subversion to force it to accept the
|
|
|
|
# server's certificate. This is perfectly safe: we don't care
|
|
|
|
# whether the server is being spoofed --- only the cryptographic
|
2013-11-01 22:41:14 +01:00
|
|
|
# hash of the output matters. Pass in extra p's to handle redirects.
|
2017-03-13 04:02:33 +01:00
|
|
|
printf 'p\np\np\n' | svn export --trust-server-cert --non-interactive \
|
|
|
|
${ignoreExternals:+--ignore-externals} ${ignoreKeywords:+--ignore-keywords} \
|
2013-03-26 19:48:52 +01:00
|
|
|
-r "$rev" "$url" "$out"
|
2003-11-25 18:38:48 +01:00
|
|
|
|
2004-04-14 12:55:33 +02:00
|
|
|
stopNest
|