2010-01-14 15:26:35 +01:00
|
|
|
{ stdenv, fetchurl, unzip, ruby, openssl, makeWrapper }:
|
2010-01-13 15:25:45 +01:00
|
|
|
|
2012-07-25 21:35:51 +02:00
|
|
|
stdenv.mkDerivation rec {
|
2012-04-12 15:20:58 +02:00
|
|
|
name = "ec2-ami-tools-1.4.0.7";
|
2010-01-14 15:26:35 +01:00
|
|
|
|
2010-07-13 22:58:58 +02:00
|
|
|
buildInputs = [ unzip makeWrapper ];
|
2010-01-14 15:26:35 +01:00
|
|
|
|
2010-01-13 15:25:45 +01:00
|
|
|
src = fetchurl {
|
2012-07-25 21:35:51 +02:00
|
|
|
url = "http://nixos.org/tarballs/${name}.zip";
|
2012-04-12 15:20:58 +02:00
|
|
|
sha256 = "0l8c623i1w30bh9k622cdjj5f57rlfc1zs0i01ya016ijyr08qip";
|
2010-01-13 15:25:45 +01:00
|
|
|
};
|
|
|
|
|
2010-01-22 17:42:54 +01:00
|
|
|
# Amazon EC2 requires that disk images are writable. If they're
|
|
|
|
# not, the VM immediately terminates with a mysterious
|
|
|
|
# "Server.InternalError" message. Since disk images generated in
|
|
|
|
# the Nix store are read-only, they must be made writable in the
|
|
|
|
# tarball uploaded to Amazon S3. So add a `--mode=0755' flag to the
|
|
|
|
# tar invocation.
|
|
|
|
patches = [ ./writable.patch ];
|
|
|
|
|
2010-01-13 15:25:45 +01:00
|
|
|
installPhase =
|
|
|
|
''
|
2012-01-18 21:16:00 +01:00
|
|
|
mkdir -p $out
|
2010-01-13 15:25:45 +01:00
|
|
|
mv * $out
|
|
|
|
rm $out/*.txt
|
|
|
|
|
|
|
|
for i in $out/bin/*; do
|
|
|
|
wrapProgram $i \
|
|
|
|
--set EC2_HOME $out \
|
2010-01-14 15:26:35 +01:00
|
|
|
--prefix PATH : ${ruby}/bin:${openssl}/bin
|
2010-01-13 15:25:45 +01:00
|
|
|
done
|
|
|
|
|
2010-01-14 15:26:35 +01:00
|
|
|
sed -i 's|/bin/bash|${stdenv.shell}|' $out/lib/ec2/platform/base/pipeline.rb
|
2011-10-21 18:25:27 +02:00
|
|
|
''; # */
|
2010-01-13 15:25:45 +01:00
|
|
|
|
|
|
|
meta = {
|
|
|
|
homepage = http://developer.amazonwebservices.com/connect/entry.jspa?externalID=368&categoryID=88;
|
|
|
|
description = "Command-line tools to create and manage Amazon EC2 virtual machine images";
|
|
|
|
license = "unfree-redistributable";
|
|
|
|
};
|
|
|
|
|
|
|
|
}
|