blob: 3ab6e730a51bf334d3261824b28035bd1d4a5b6e (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
|
source $stdenv/setup
header "exporting $url (r$rev) into $out"
if test "$sshSupport"; then
export SVN_SSH="$openssh/bin/ssh"
fi
if test -n "$http_proxy"; then
# Configure proxy
mkdir .subversion
proxy="${http_proxy#*://}"
echo '[global]' > .subversion/servers
echo "http-proxy-host = ${proxy%:*}" >> .subversion/servers
echo "http-proxy-port = ${proxy##*:}" >> .subversion/servers
export HOME="$PWD"
fi;
# Pipe the "p" character into Subversion to force it to accept the
# server's certificate. This is perfectly safe: we don't care
# whether the server is being spoofed --- only the cryptographic
# hash of the output matters. Pass in extra p's to handle redirects.
printf 'p\np\np\n' | svn export --trust-server-cert --non-interactive ${ignoreExternals:+--ignore-externals} \
-r "$rev" "$url" "$out"
stopNest
|