2005-12-05 14:11:09 +00:00
|
|
|
source $stdenv/setup
|
2003-11-25 17:38:48 +00:00
|
|
|
|
2004-04-14 11:55:33 +01:00
|
|
|
header "exporting $url (r$rev) into $out"
|
2003-11-25 17:38:48 +00:00
|
|
|
|
2006-07-17 16:22:20 +01:00
|
|
|
if test "$sshSupport"; then
|
|
|
|
export SVN_SSH="$openssh/bin/ssh"
|
|
|
|
fi
|
|
|
|
|
2009-05-19 18:07:20 +01:00
|
|
|
if test -n "$http_proxy"; then
|
|
|
|
# Configure proxy
|
|
|
|
mkdir .subversion
|
|
|
|
proxy="${http_proxy#*://}"
|
|
|
|
|
|
|
|
echo '[global]' > .subversion/servers
|
|
|
|
echo "http-proxy-host = ${proxy%:*}" >> .subversion/servers
|
|
|
|
echo "http-proxy-port = ${proxy##*:}" >> .subversion/servers
|
|
|
|
|
|
|
|
export HOME="$PWD"
|
|
|
|
fi;
|
|
|
|
|
2017-06-04 13:41:28 +01:00
|
|
|
if test -z "$LC_ALL"; then
|
|
|
|
export LC_ALL="en_US.UTF-8"
|
|
|
|
fi;
|
|
|
|
|
2006-05-30 13:43:45 +01:00
|
|
|
# Pipe the "p" character into Subversion to force it to accept the
|
|
|
|
# server's certificate. This is perfectly safe: we don't care
|
|
|
|
# whether the server is being spoofed --- only the cryptographic
|
2013-11-01 21:41:14 +00:00
|
|
|
# hash of the output matters. Pass in extra p's to handle redirects.
|
2017-03-13 03:02:33 +00:00
|
|
|
printf 'p\np\np\n' | svn export --trust-server-cert --non-interactive \
|
|
|
|
${ignoreExternals:+--ignore-externals} ${ignoreKeywords:+--ignore-keywords} \
|
2013-03-26 18:48:52 +00:00
|
|
|
-r "$rev" "$url" "$out"
|
2003-11-25 17:38:48 +00:00
|
|
|
|
2004-04-14 11:55:33 +01:00
|
|
|
stopNest
|