2010-01-14 15:26:35 +01:00
|
|
|
{ stdenv, fetchurl, unzip, ruby, openssl, makeWrapper }:
|
2010-01-13 15:25:45 +01:00
|
|
|
|
|
|
|
stdenv.mkDerivation {
|
2010-07-13 22:58:58 +02:00
|
|
|
name = "ec2-ami-tools-1.3-53773";
|
2010-01-14 15:26:35 +01:00
|
|
|
|
2010-07-13 22:58:58 +02:00
|
|
|
buildInputs = [ unzip makeWrapper ];
|
2010-01-14 15:26:35 +01:00
|
|
|
|
2010-01-13 15:25:45 +01:00
|
|
|
src = fetchurl {
|
|
|
|
url = http://s3.amazonaws.com/ec2-downloads/ec2-ami-tools.zip;
|
2011-08-19 04:41:23 +02:00
|
|
|
sha256 = "310e3b405c11b979b1cd210c5b4c32e97065d616f6bfa449c4e1e50420ce8002";
|
2010-01-13 15:25:45 +01:00
|
|
|
};
|
|
|
|
|
2010-01-22 17:42:54 +01:00
|
|
|
# Amazon EC2 requires that disk images are writable. If they're
|
|
|
|
# not, the VM immediately terminates with a mysterious
|
|
|
|
# "Server.InternalError" message. Since disk images generated in
|
|
|
|
# the Nix store are read-only, they must be made writable in the
|
|
|
|
# tarball uploaded to Amazon S3. So add a `--mode=0755' flag to the
|
|
|
|
# tar invocation.
|
|
|
|
patches = [ ./writable.patch ];
|
|
|
|
|
2010-01-13 15:25:45 +01:00
|
|
|
installPhase =
|
|
|
|
''
|
|
|
|
ensureDir $out
|
|
|
|
mv * $out
|
|
|
|
rm $out/*.txt
|
|
|
|
|
|
|
|
for i in $out/bin/*; do
|
|
|
|
wrapProgram $i \
|
|
|
|
--set EC2_HOME $out \
|
2010-01-14 15:26:35 +01:00
|
|
|
--prefix PATH : ${ruby}/bin:${openssl}/bin
|
2010-01-13 15:25:45 +01:00
|
|
|
done
|
|
|
|
|
2010-01-14 15:26:35 +01:00
|
|
|
sed -i 's|/bin/bash|${stdenv.shell}|' $out/lib/ec2/platform/base/pipeline.rb
|
2010-01-13 15:25:45 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
meta = {
|
|
|
|
homepage = http://developer.amazonwebservices.com/connect/entry.jspa?externalID=368&categoryID=88;
|
|
|
|
description = "Command-line tools to create and manage Amazon EC2 virtual machine images";
|
|
|
|
license = "unfree-redistributable";
|
|
|
|
};
|
|
|
|
|
|
|
|
}
|