mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-23 07:23:20 +00:00
0a355c0073
svn path=/nixpkgs/trunk/; revision=5769
69 lines
1.6 KiB
Bash
Executable File
69 lines
1.6 KiB
Bash
Executable File
#! /bin/sh -e
|
|
|
|
url=$1
|
|
rev=$2
|
|
expHash=$3
|
|
|
|
hashType=$NIX_HASH_ALGO
|
|
if test -z "$hashType"; then
|
|
hashType=md5
|
|
fi
|
|
|
|
if test -z "$url"; then
|
|
echo "syntax: nix-prefetch-svn URL [REVISION [EXPECTED-HASH]]" >&2
|
|
exit 1
|
|
fi
|
|
|
|
test -n "$rev" || rev="HEAD"
|
|
|
|
# Use a restrictive umask to ensure that the output in the Nix store
|
|
# is not group- or world-writable. Nix 0.10 complains about this.
|
|
umask 0022
|
|
|
|
|
|
# If the hash was given, a file with that hash may already be in the
|
|
# store.
|
|
if test -n "$expHash"; then
|
|
finalPath=$(nix-store --print-fixed-path --recursive "$hashType" "$expHash" svn-export)
|
|
if ! nix-store --check-validity "$finalPath" 2> /dev/null; then
|
|
finalPath=
|
|
fi
|
|
hash=$expHash
|
|
fi
|
|
|
|
|
|
# If we don't know the hash or a path with that hash doesn't exist,
|
|
# download the file and add it to the store.
|
|
if test -z "$finalPath"; then
|
|
|
|
tmpPath=/tmp/svn-checkout-tmp-$$
|
|
tmpFile=$tmpPath/svn-export
|
|
mkdir $tmpPath
|
|
|
|
trap "rm -rf $tmpPath" EXIT
|
|
|
|
# Perform the checkout.
|
|
# !!! remove 2>/dev/null when we have fixed the certificate hackery.
|
|
echo p | svn export -r "$rev" "$url" $tmpFile 2>/dev/null >&2
|
|
|
|
# Compute the hash.
|
|
hash=$(nix-hash --type $hashType $hashFormat $tmpFile)
|
|
if ! test -n "$QUIET"; then echo "hash is $hash" >&2; fi
|
|
|
|
# Add the downloaded file to the Nix store.
|
|
finalPath=$(nix-store --add-fixed --recursive "$hashType" $tmpFile)
|
|
|
|
if test -n "$expHash" -a "$expHash" != "$hash"; then
|
|
echo "hash mismatch for URL \`$url'"
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
if ! test -n "$QUIET"; then echo "path is $finalPath" >&2; fi
|
|
|
|
echo $hash
|
|
|
|
if test -n "$PRINT_PATH"; then
|
|
echo $finalPath
|
|
fi
|