2005-12-05 17:11:09 +03:00
|
|
|
source $stdenv/setup
|
2003-11-25 20:38:48 +03:00
|
|
|
|
2004-04-14 14:55:33 +04:00
|
|
|
header "exporting $url (r$rev) into $out"
|
2003-11-25 20:38:48 +03:00
|
|
|
|
2006-07-17 19:22:20 +04:00
|
|
|
if test "$sshSupport"; then
|
|
|
|
export SVN_SSH="$openssh/bin/ssh"
|
|
|
|
fi
|
|
|
|
|
2009-05-19 21:07:20 +04:00
|
|
|
if test -n "$http_proxy"; then
|
|
|
|
# Configure proxy
|
|
|
|
mkdir .subversion
|
|
|
|
proxy="${http_proxy#*://}"
|
|
|
|
|
|
|
|
echo '[global]' > .subversion/servers
|
|
|
|
echo "http-proxy-host = ${proxy%:*}" >> .subversion/servers
|
|
|
|
echo "http-proxy-port = ${proxy##*:}" >> .subversion/servers
|
|
|
|
|
|
|
|
export HOME="$PWD"
|
|
|
|
fi;
|
|
|
|
|
2006-05-30 16:43:45 +04:00
|
|
|
# Pipe the "p" character into Subversion to force it to accept the
|
|
|
|
# server's certificate. This is perfectly safe: we don't care
|
|
|
|
# whether the server is being spoofed --- only the cryptographic
|
|
|
|
# hash of the output matters.
|
2013-03-26 22:48:52 +04:00
|
|
|
echo 'p' | svn export ${ignoreExternals:+--ignore-externals} \
|
|
|
|
-r "$rev" "$url" "$out"
|
2003-11-25 20:38:48 +03:00
|
|
|
|
2004-04-14 14:55:33 +04:00
|
|
|
stopNest
|