summary refs log tree commit diff
path: root/pkgs/tools/virtualization/ec2-ami-tools/default.nix
diff options
context:
space:
mode:
Diffstat (limited to 'pkgs/tools/virtualization/ec2-ami-tools/default.nix')
-rw-r--r--pkgs/tools/virtualization/ec2-ami-tools/default.nix42
1 files changed, 42 insertions, 0 deletions
diff --git a/pkgs/tools/virtualization/ec2-ami-tools/default.nix b/pkgs/tools/virtualization/ec2-ami-tools/default.nix
new file mode 100644
index 000000000000..1420ab5eeeb0
--- /dev/null
+++ b/pkgs/tools/virtualization/ec2-ami-tools/default.nix
@@ -0,0 +1,42 @@
+{ stdenv, fetchurl, unzip, ruby, openssl, makeWrapper }:
+
+stdenv.mkDerivation rec {
+  name = "ec2-ami-tools-1.4.0.7";
+  
+  buildInputs = [ unzip makeWrapper ];
+  
+  src = fetchurl {
+    url = "http://nixos.org/tarballs/${name}.zip";
+    sha256 = "0l8c623i1w30bh9k622cdjj5f57rlfc1zs0i01ya016ijyr08qip";
+  };
+
+  # Amazon EC2 requires that disk images are writable.  If they're
+  # not, the VM immediately terminates with a mysterious
+  # "Server.InternalError" message.  Since disk images generated in
+  # the Nix store are read-only, they must be made writable in the
+  # tarball uploaded to Amazon S3.  So add a `--mode=0755' flag to the
+  # tar invocation.
+  patches = [ ./writable.patch ];
+
+  installPhase =
+    ''
+      mkdir -p $out
+      mv * $out
+      rm $out/*.txt
+
+      for i in $out/bin/*; do
+          wrapProgram $i \
+            --set EC2_HOME $out \
+            --prefix PATH : ${ruby}/bin:${openssl}/bin
+      done
+      
+      sed -i 's|/bin/bash|${stdenv.shell}|' $out/lib/ec2/platform/base/pipeline.rb
+    '';  # */
+
+  meta = {
+    homepage = http://developer.amazonwebservices.com/connect/entry.jspa?externalID=368&categoryID=88;
+    description = "Command-line tools to create and manage Amazon EC2 virtual machine images";
+    license = "unfree-redistributable";
+  };
+
+}