diff options
Diffstat (limited to 'pkgs/tools/virtualization/ec2-ami-tools/default.nix')
-rw-r--r-- | pkgs/tools/virtualization/ec2-ami-tools/default.nix | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/pkgs/tools/virtualization/ec2-ami-tools/default.nix b/pkgs/tools/virtualization/ec2-ami-tools/default.nix new file mode 100644 index 000000000000..1420ab5eeeb0 --- /dev/null +++ b/pkgs/tools/virtualization/ec2-ami-tools/default.nix @@ -0,0 +1,42 @@ +{ stdenv, fetchurl, unzip, ruby, openssl, makeWrapper }: + +stdenv.mkDerivation rec { + name = "ec2-ami-tools-1.4.0.7"; + + buildInputs = [ unzip makeWrapper ]; + + src = fetchurl { + url = "http://nixos.org/tarballs/${name}.zip"; + sha256 = "0l8c623i1w30bh9k622cdjj5f57rlfc1zs0i01ya016ijyr08qip"; + }; + + # Amazon EC2 requires that disk images are writable. If they're + # not, the VM immediately terminates with a mysterious + # "Server.InternalError" message. Since disk images generated in + # the Nix store are read-only, they must be made writable in the + # tarball uploaded to Amazon S3. So add a `--mode=0755' flag to the + # tar invocation. + patches = [ ./writable.patch ]; + + installPhase = + '' + mkdir -p $out + mv * $out + rm $out/*.txt + + for i in $out/bin/*; do + wrapProgram $i \ + --set EC2_HOME $out \ + --prefix PATH : ${ruby}/bin:${openssl}/bin + done + + sed -i 's|/bin/bash|${stdenv.shell}|' $out/lib/ec2/platform/base/pipeline.rb + ''; # */ + + meta = { + homepage = http://developer.amazonwebservices.com/connect/entry.jspa?externalID=368&categoryID=88; + description = "Command-line tools to create and manage Amazon EC2 virtual machine images"; + license = "unfree-redistributable"; + }; + +} |