Skip to content

Commit

Permalink
Merge pull request #338 from chkp-yizhako/master
Browse files Browse the repository at this point in the history
Add maintenance mode password and log server installation type support to AWS CFT and Terraform templates
  • Loading branch information
chkp-romanka authored Feb 8, 2024
2 parents a18f222 + 38b9f41 commit d20ff9b
Show file tree
Hide file tree
Showing 141 changed files with 708 additions and 89 deletions.
14 changes: 12 additions & 2 deletions aws/templates/asg/autoscale.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Create an Auto Scaling group of Check Point gateways (20221226)
Description: Create an Auto Scaling group of Check Point gateways (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -31,6 +31,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- AllowUploadDownload
- CloudWatch
Expand Down Expand Up @@ -80,6 +81,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Gateways Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: Gateways SIC key
AllowUploadDownload:
Expand Down Expand Up @@ -312,6 +315,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections.
between Check Point components. Choose a random string consisting of at least
Expand Down Expand Up @@ -524,9 +533,10 @@ Resources:
- !Sub ' admin_shell=${Shell} ; allow_info=${AllowUploadDownload} ; cw=${CloudWatch} ; eic=${EnableInstanceConnect}'
- !Join ['', [' sic="$(echo ', 'Fn::Base64': !Ref GatewaySICKey, ')"']]
- !Join ['', [' pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayPasswordHash, ')"']]
- !Join ['', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"']]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" sicKey=\"${sic}\" installationType=\"autoscale\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"__VERSION__\" templateName=\"autoscale\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" passwordHash=\"${pwd_hash}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" sicKey=\"${sic}\" installationType=\"autoscale\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"autoscale\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" bootstrapScript64=\"${bootstrap}\"'
VersionDescription: Initial template version
GatewayScaleUpPolicy:
Type: AWS::AutoScaling::ScalingPolicy
Expand Down
12 changes: 11 additions & 1 deletion aws/templates/cluster/cluster-master.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploy a Check Point Cluster in a new VPC (20230830)
Description: Deploy a Check Point Cluster in a new VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -29,6 +29,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- Label:
default: Quick connect to Smart-1 Cloud (Recommended)
Expand Down Expand Up @@ -80,6 +81,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: SIC key
MemberAToken:
Expand Down Expand Up @@ -319,6 +322,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections.
between Check Point components. Choose a random string consisting of at least
Expand Down Expand Up @@ -420,6 +429,7 @@ Resources:
GatewayVersion: !Ref GatewayVersion
Shell: !Ref Shell
GatewayPasswordHash: !Ref GatewayPasswordHash
GatewayMaintenancePasswordHash: !Ref GatewayMaintenancePasswordHash
GatewaySICKey: !Ref GatewaySICKey
MemberAToken: !Ref MemberAToken
MemberBToken: !Ref MemberBToken
Expand Down
14 changes: 12 additions & 2 deletions aws/templates/cluster/cluster.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploys a Check Point Cluster into an existing VPC (20230830)
Description: Deploys a Check Point Cluster into an existing VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -29,6 +29,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- Label:
default: Quick connect to Smart-1 Cloud (Recommended)
Expand Down Expand Up @@ -80,6 +81,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: SIC key
MemberAToken:
Expand Down Expand Up @@ -314,6 +317,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections.
between Check Point components. Choose a random string consisting of at least
Expand Down Expand Up @@ -548,9 +557,10 @@ Resources:
- !Join ['', [' eip="', !If [AllocateAddress, !Ref MemberAPublicAddress, ''], '"']]
- !Join ['', [' sic="$(echo ', 'Fn::Base64': !Ref GatewaySICKey, ')"']]
- !Join ['', [' pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayPasswordHash, ')"']]
- !Join ['', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"']]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20230923\" templateName=\"cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" elasticIp=\"${eip}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" bootstrapScript64=\"${bootstrap}\"'
MemberBInstance:
Type: AWS::EC2::Instance
DependsOn: [MemberBExternalInterface, MemberBInternalInterface]
Expand Down
12 changes: 11 additions & 1 deletion aws/templates/cross-az-cluster/cross-az-cluster-master.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploy a Check Point Cluster in a new VPC (20230503)
Description: Deploy a Check Point Cluster in a new VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -30,6 +30,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- Label:
default: Quick connect to Smart-1 Cloud (Recommended)
Expand Down Expand Up @@ -83,6 +84,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: SIC key
MemberAToken:
Expand Down Expand Up @@ -318,6 +321,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections.
between Check Point components. Choose a random string consisting of at least
Expand Down Expand Up @@ -423,6 +432,7 @@ Resources:
GatewayVersion: !Ref GatewayVersion
Shell: !Ref Shell
GatewayPasswordHash: !Ref GatewayPasswordHash
GatewayMaintenancePasswordHash: !Ref GatewayMaintenancePasswordHash
GatewaySICKey: !Ref GatewaySICKey
MemberAToken: !Ref MemberAToken
MemberBToken: !Ref MemberBToken
Expand Down
17 changes: 14 additions & 3 deletions aws/templates/cross-az-cluster/cross-az-cluster.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploys a Check Point Cluster into an existing VPC (20230830)
Description: Deploys a Check Point Cluster into an existing VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -31,6 +31,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- Label:
default: Quick connect to Smart-1 Cloud (Recommended)
Expand Down Expand Up @@ -86,6 +87,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: SIC key
MemberAToken:
Expand Down Expand Up @@ -323,6 +326,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections
between Check Point components. Choose a random string consisting of at least
Expand Down Expand Up @@ -603,9 +612,10 @@ Resources:
- !Join ['', [' eip="', !If [AllocateAddress, !Ref MemberAPublicAddress, ''], '"']]
- !Join ['', [' sic="$(echo ', 'Fn::Base64': !Ref GatewaySICKey, ')"']]
- !Join ['', [' pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayPasswordHash, ')"']]
- !Join ['', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"']]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20230923\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
MemberBInstance:
Type: AWS::EC2::Instance
DependsOn: [MemberBExternalInterface, MemberBInternalInterface, ClusterPublicAddress, MemberAInternalInterface, MemberAExternalInterface]
Expand Down Expand Up @@ -649,9 +659,10 @@ Resources:
- !Join ['', [' eip="', !If [AllocateAddress, !Ref MemberBPublicAddress, ''], '"']]
- !Join ['', [' sic="$(echo ', 'Fn::Base64': !Ref GatewaySICKey, ')"']]
- !Join ['', [' pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayPasswordHash, ')"']]
- !Join [ '', [ ' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"' ] ]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenB}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20230923\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenB}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
Outputs:
ClusterPublicAddress:
Description: The public address of the cluster.
Expand Down
12 changes: 11 additions & 1 deletion aws/templates/geo-cluster/geo-cluster-master.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploy a Check Point cross AZ Cluster in a new VPC (20230503)
Description: Deploy a Check Point cross AZ Cluster in a new VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -31,6 +31,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- Label:
default: Quick connect to Smart-1 Cloud (Recommended)
Expand Down Expand Up @@ -86,6 +87,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: SIC key
MemberAToken:
Expand Down Expand Up @@ -336,6 +339,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections between
Check Point components. Choose a random string consisting of at least 8
Expand Down Expand Up @@ -441,6 +450,7 @@ Resources:
GatewayVersion: !Ref GatewayVersion
Shell: !Ref Shell
GatewayPasswordHash: !Ref GatewayPasswordHash
GatewayMaintenancePasswordHash: !Ref GatewayMaintenancePasswordHash
GatewaySICKey: !Ref GatewaySICKey
MemberAToken: !Ref MemberAToken
MemberBToken: !Ref MemberBToken
Expand Down
Loading

0 comments on commit d20ff9b

Please sign in to comment.