Author: shlevy
Date: Sat Feb 25 20:52:15 2012
New Revision: 32569
URL: https://nixos.org/websvn/nix/?rev=32569&sc=1

Log:
svn merge ^/nixpkgs/trunk

Modified:
   nixpkgs/branches/stdenv-updates/   (props changed)
   
nixpkgs/branches/stdenv-updates/pkgs/tools/package-management/nix/unstable.nix
   
nixpkgs/branches/stdenv-updates/pkgs/tools/virtualization/amazon-ec2-ami-tools/default.nix
   
nixpkgs/branches/stdenv-updates/pkgs/tools/virtualization/amazon-ec2-ami-tools/writable.patch

Modified: 
nixpkgs/branches/stdenv-updates/pkgs/tools/package-management/nix/unstable.nix
==============================================================================
--- 
nixpkgs/branches/stdenv-updates/pkgs/tools/package-management/nix/unstable.nix  
    Sat Feb 25 20:26:25 2012        (r32568)
+++ 
nixpkgs/branches/stdenv-updates/pkgs/tools/package-management/nix/unstable.nix  
    Sat Feb 25 20:52:15 2012        (r32569)
@@ -4,7 +4,7 @@
 , stateDir ? "/nix/var"
 }:
 
-stdenv.mkDerivation rec {
+stdenv.mkDerivation (rec {
   name = "nix-1.0pre31851";
 
   src = fetchurl {
@@ -51,4 +51,6 @@
     homepage = http://nixos.org/;
     license = "LGPLv2+";
   };
-}
+} // stdenv.lib.optionalAttrs stdenv.isDarwin {
+      phases = "$prePhases unpackPhase patchPhase $preConfigurePhases 
configurePhase $preBuildPhases buildPhase $preInstallPhases installPhase 
checkPhase fixupPhase $preDistPhases distPhase $postPhases";
+})

Modified: 
nixpkgs/branches/stdenv-updates/pkgs/tools/virtualization/amazon-ec2-ami-tools/default.nix
==============================================================================
--- 
nixpkgs/branches/stdenv-updates/pkgs/tools/virtualization/amazon-ec2-ami-tools/default.nix
  Sat Feb 25 20:26:25 2012        (r32568)
+++ 
nixpkgs/branches/stdenv-updates/pkgs/tools/virtualization/amazon-ec2-ami-tools/default.nix
  Sat Feb 25 20:52:15 2012        (r32569)
@@ -1,13 +1,13 @@
 { stdenv, fetchurl, unzip, ruby, openssl, makeWrapper }:
 
 stdenv.mkDerivation {
-  name = "ec2-ami-tools-1.4.0.1";
+  name = "ec2-ami-tools-1.4.0.5";
   
   buildInputs = [ unzip makeWrapper ];
   
   src = fetchurl {
     url = http://s3.amazonaws.com/ec2-downloads/ec2-ami-tools.zip;
-    sha256 = "1fjg3gx5k0z8r4apg5whz3yxc3xnz7z5g6j93hf765lfriz1rccz";
+    sha256 = "0vhdqmi076ipqj05dd7fn0drbhcvzccdcdhy8br9sp684scg9a75";
   };
 
   # Amazon EC2 requires that disk images are writable.  If they're

Modified: 
nixpkgs/branches/stdenv-updates/pkgs/tools/virtualization/amazon-ec2-ami-tools/writable.patch
==============================================================================
--- 
nixpkgs/branches/stdenv-updates/pkgs/tools/virtualization/amazon-ec2-ami-tools/writable.patch
       Sat Feb 25 20:26:25 2012        (r32568)
+++ 
nixpkgs/branches/stdenv-updates/pkgs/tools/virtualization/amazon-ec2-ami-tools/writable.patch
       Sat Feb 25 20:52:15 2012        (r32569)
@@ -1,33 +1,23 @@
-diff -rc --exclude '*~' 
ec2-ami-tools-1.3-45758-orig/lib/ec2/amitools/bundle.rb 
ec2-ami-tools-1.3-45758/lib/ec2/amitools/bundle.rb
-*** ec2-ami-tools-1.3-45758-orig/lib/ec2/amitools/bundle.rb    2009-12-02 
22:28:44.000000000 +0100
---- ec2-ami-tools-1.3-45758/lib/ec2/amitools/bundle.rb 2010-01-22 
16:16:13.000000000 +0100
-***************
-*** 80,86 ****
-        # piped via several processes. The tee is used to allow a
-        # digest of the file to be calculated without having to re-read
-        # it from disk.
-!       tar = 
EC2::Platform::Current::Tar::Command.new.create.dereference.sparse
-        tar.add(File::basename( image_file ), File::dirname( image_file ))
-        openssl = EC2::Platform::Current::Constants::Utility::OPENSSL
-        pipeline = 
EC2::Platform::Current::Pipeline.new('image-bundle-pipeline', debug)
---- 80,86 ----
-        # piped via several processes. The tee is used to allow a
-        # digest of the file to be calculated without having to re-read
-        # it from disk.
-!       tar = 
EC2::Platform::Current::Tar::Command.new.create.dereference.sparse.writable
-        tar.add(File::basename( image_file ), File::dirname( image_file ))
-        openssl = EC2::Platform::Current::Constants::Utility::OPENSSL
-        pipeline = 
EC2::Platform::Current::Pipeline.new('image-bundle-pipeline', debug)
-diff -rc --exclude '*~' 
ec2-ami-tools-1.3-45758-orig/lib/ec2/platform/linux/tar.rb 
ec2-ami-tools-1.3-45758/lib/ec2/platform/linux/tar.rb
-*** ec2-ami-tools-1.3-45758-orig/lib/ec2/platform/linux/tar.rb 2009-12-02 
22:28:44.000000000 +0100
---- ec2-ami-tools-1.3-45758/lib/ec2/platform/linux/tar.rb      2010-01-22 
16:16:11.000000000 +0100
-***************
-*** 31,36 ****
---- 31,37 ----
-            def update;         @options << '-u';          self; end
-            def sparse;         @options << '-S';          self; end
-            def dereference;    @options << '-h';          self; end
-+           def writable;       @options << '--mode=0755'; self; end
-            
-            def archive(filename)
-              filename = '-' if filename.nil? 
+diff -ru ec2-ami-tools-1.4.0.5-orig/lib/ec2/amitools/bundle.rb 
ec2-ami-tools-1.4.0.5/lib/ec2/amitools/bundle.rb
+--- ec2-ami-tools-1.4.0.5-orig/lib/ec2/amitools/bundle.rb      2011-12-06 
14:57:28.000000000 +0100
++++ ec2-ami-tools-1.4.0.5/lib/ec2/amitools/bundle.rb   2012-02-25 
21:24:57.682427268 +0100
+@@ -80,7 +80,7 @@
+       # piped via several processes. The tee is used to allow a
+       # digest of the file to be calculated without having to re-read
+       # it from disk.
+-      tar = EC2::Platform::Current::Tar::Command.new.create.dereference.sparse
++      tar = 
EC2::Platform::Current::Tar::Command.new.create.dereference.sparse.writable
+       tar.owner(0).group(0)
+       tar.add(File::basename( image_file ), File::dirname( image_file ))
+       openssl = EC2::Platform::Current::Constants::Utility::OPENSSL
+diff -ru ec2-ami-tools-1.4.0.5-orig/lib/ec2/platform/linux/tar.rb 
ec2-ami-tools-1.4.0.5/lib/ec2/platform/linux/tar.rb
+--- ec2-ami-tools-1.4.0.5-orig/lib/ec2/platform/linux/tar.rb   2011-12-06 
14:57:28.000000000 +0100
++++ ec2-ami-tools-1.4.0.5/lib/ec2/platform/linux/tar.rb        2012-02-25 
21:23:36.342716403 +0100
+@@ -31,6 +31,7 @@
+           def update;         @options << '-u';          self; end
+           def sparse;         @options << '-S';          self; end
+           def dereference;    @options << '-h';          self; end
++          def writable;       @options << '--mode=0755'; self; end
+           
+           def archive(filename)
+             filename = '-' if filename.nil? 
_______________________________________________
nix-commits mailing list
[email protected]
http://lists.science.uu.nl/mailman/listinfo/nix-commits

Reply via email to