2005-12-05 14:11:09 +00:00
|
|
|
source $stdenv/setup
|
2003-11-25 17:38:48 +00:00
|
|
|
|
2004-04-14 11:55:33 +01:00
|
|
|
header "exporting $url (r$rev) into $out"
|
2003-11-25 17:38:48 +00:00
|
|
|
|
2006-07-17 16:22:20 +01:00
|
|
|
if test "$sshSupport"; then
|
|
|
|
export SVN_SSH="$openssh/bin/ssh"
|
|
|
|
fi
|
|
|
|
|
2009-05-19 18:07:20 +01:00
|
|
|
if test -n "$http_proxy"; then
|
|
|
|
# Configure proxy
|
|
|
|
mkdir .subversion
|
|
|
|
proxy="${http_proxy#*://}"
|
|
|
|
|
|
|
|
echo '[global]' > .subversion/servers
|
|
|
|
echo "http-proxy-host = ${proxy%:*}" >> .subversion/servers
|
|
|
|
echo "http-proxy-port = ${proxy##*:}" >> .subversion/servers
|
|
|
|
|
|
|
|
export HOME="$PWD"
|
|
|
|
fi;
|
|
|
|
|
2006-05-30 13:43:45 +01:00
|
|
|
# Pipe the "p" character into Subversion to force it to accept the
|
|
|
|
# server's certificate. This is perfectly safe: we don't care
|
|
|
|
# whether the server is being spoofed --- only the cryptographic
|
|
|
|
# hash of the output matters.
|
|
|
|
echo 'p' | svn export -r "$rev" "$url" $out
|
2003-11-25 17:38:48 +00:00
|
|
|
|
2004-04-14 11:55:33 +01:00
|
|
|
stopNest
|