Skip to content

Commit

Permalink
Align AWS
Browse files Browse the repository at this point in the history
  • Loading branch information
chkp-natanelm authored Sep 30, 2024
1 parent 1cb6f85 commit ec6750e
Show file tree
Hide file tree
Showing 44 changed files with 156 additions and 160 deletions.
9 changes: 4 additions & 5 deletions aws/templates/asg/autoscale.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Create an Auto Scaling group of Check Point gateways (__VERSION__)
Description: Create an Auto Scaling group of Check Point gateways (20240417)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -410,7 +410,7 @@ Resources:
Condition: EnableCloudWatch
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/iam/cloudwatch-policy.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/iam/cloudwatch-policy.yaml
Parameters:
PolicyName: ChkpGatewayPolicy
PolicyRole: !Ref ChkpGatewayRole
Expand All @@ -424,7 +424,7 @@ Resources:
AMI:
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/utils/amis.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/utils/amis.yaml
Parameters:
Version: !Join ['-', [!Ref GatewayVersion, GW]]
NotificationTopic:
Expand Down Expand Up @@ -545,7 +545,7 @@ Resources:
- !Join ['', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"']]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" sicKey=\"${sic}\" installationType=\"autoscale\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"__VERSION__\" templateName=\"autoscale\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" sicKey=\"${sic}\" installationType=\"autoscale\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"autoscale\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" bootstrapScript64=\"${bootstrap}\"'
VersionDescription: Initial template version
GatewayScaleUpPolicy:
Type: AWS::AutoScaling::ScalingPolicy
Expand Down Expand Up @@ -612,4 +612,3 @@ Outputs:
SecurityGroup:
Description: The Security Group of the Auto Scaling group.
Value: !GetAtt PermissiveSecurityGroup.GroupId

10 changes: 5 additions & 5 deletions aws/templates/cluster/cluster-master.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploy a Check Point Cluster in a new VPC (__VERSION__)
Description: Deploy a Check Point Cluster in a new VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -395,7 +395,7 @@ Resources:
VPCStack:
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/utils/vpc.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/utils/vpc.yaml
Parameters:
AvailabilityZones: !Ref AvailabilityZone
NumberOfAZs: 1
Expand All @@ -414,7 +414,7 @@ Resources:
Type: AWS::CloudFormation::Stack
DependsOn: VPCStack
Properties:
TemplateURL: __URL__/cluster/cluster.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/cluster/cluster.yaml
Parameters:
VPC: !GetAtt VPCStack.Outputs.VPCID
PublicSubnet: !GetAtt VPCStack.Outputs.PublicSubnet1ID
Expand Down Expand Up @@ -499,12 +499,12 @@ Rules:
MemberATokenNotProvided:
RuleCondition: !Equals [!Ref MemberAToken, '']
Assertions:
- AssertDescription: "Smart-1 Cloud Token for member A can not be empty"
- AssertDescription: "Smart-1 Cloud Token for member A can not be empty."
Assert: !Equals [!Ref MemberBToken, '']
MemberBTokenNotProvided:
RuleCondition: !Equals [ !Ref MemberBToken, '' ]
Assertions:
- AssertDescription: "Smart-1 Cloud Token for member B can not be empty"
- AssertDescription: "Smart-1 Cloud Token for member B can not be empty."
Assert: !Equals [ !Ref MemberAToken, '' ]
MembersTokenValueEquals:
RuleCondition: !EachMemberEquals [ [ !Ref MemberBToken ], !Ref MemberAToken ]
Expand Down
17 changes: 8 additions & 9 deletions aws/templates/cluster/cluster.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploys a Check Point Cluster into an existing VPC (__VERSION__)
Description: Deploys a Check Point Cluster into an existing VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -412,7 +412,7 @@ Resources:
Condition: CreateRole
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/iam/cluster-iam-role.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/iam/cluster-iam-role.yaml
ClusterInstanceProfile:
Type: AWS::IAM::InstanceProfile
Properties:
Expand All @@ -422,14 +422,14 @@ Resources:
Condition: EnableCloudWatch
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/iam/cloudwatch-policy.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/iam/cloudwatch-policy.yaml
Parameters:
PolicyName: !If [ProvidedResourcesTag, !Ref ResourcesTagName, !Ref 'AWS::StackName']
PolicyRole: !If [CreateRole, !GetAtt ClusterRole.Outputs.ClusterIAMRole, !Ref GatewayPredefinedRole]
AMI:
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/utils/amis.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/utils/amis.yaml
Parameters:
Version: !Join [-, [!Ref GatewayVersion, GW]]
PermissiveSecurityGroup:
Expand Down Expand Up @@ -610,7 +610,7 @@ Resources:
- !Join ['', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"']]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"__VERSION__\" templateName=\"cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" bootstrapScript64=\"${bootstrap}\"'
VersionDescription: Initial template version
MemberBGatewayLaunchTemplate:
Type: AWS::EC2::LaunchTemplate
Expand Down Expand Up @@ -653,7 +653,7 @@ Resources:
- !Join ['', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"']]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenB}\"" installationType=\"cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"__VERSION__\" templateName=\"cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenB}\"" installationType=\"cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20230923\" templateName=\"cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" bootstrapScript64=\"${bootstrap}\"'
VersionDescription: Initial template version
ClusterPublicAddress:
Type: AWS::EC2::EIP
Expand Down Expand Up @@ -747,12 +747,12 @@ Rules:
MemberATokenNotProvided:
RuleCondition: !Equals [!Ref MemberAToken, '']
Assertions:
- AssertDescription: "Smart-1 Cloud Token for member A can not be empty"
- AssertDescription: "Smart-1 Cloud Token for member A can not be empty."
Assert: !Equals [!Ref MemberBToken, '']
MemberBTokenNotProvided:
RuleCondition: !Equals [ !Ref MemberBToken, '' ]
Assertions:
- AssertDescription: "Smart-1 Cloud Token for member B can not be empty"
- AssertDescription: "Smart-1 Cloud Token for member B can not be empty."
Assert: !Equals [ !Ref MemberAToken, '' ]
MembersTokenValueEquals:
RuleCondition: !EachMemberEquals [[!Ref MemberBToken], !Ref MemberAToken]
Expand All @@ -762,4 +762,3 @@ Rules:
- AssertDescription: "The same Smart-1 Cloud token is used for the two Cluster members. Each Cluster member must have a unique token"
Assert: !Equals [ !Ref MemberBToken, '' ]


10 changes: 5 additions & 5 deletions aws/templates/cross-az-cluster/cross-az-cluster-master.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploy a Check Point Cluster in a new VPC (__VERSION__)
Description: Deploy a Check Point Cluster in a new VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -401,7 +401,7 @@ Resources:
VPCStack:
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/utils/vpc.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/utils/vpc.yaml
Parameters:
AvailabilityZones: !Join [',', !Ref AvailabilityZones]
NumberOfAZs: 2
Expand All @@ -422,7 +422,7 @@ Resources:
Type: AWS::CloudFormation::Stack
DependsOn: VPCStack
Properties:
TemplateURL: __URL__/cluster/cross-az-cluster.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/cluster/cross-az-cluster.yaml
Parameters:
VPC: !GetAtt VPCStack.Outputs.VPCID
PublicSubnetA: !GetAtt VPCStack.Outputs.PublicSubnet1ID
Expand Down Expand Up @@ -508,12 +508,12 @@ Rules:
MemberATokenNotProvided:
RuleCondition: !Equals [!Ref MemberAToken, '']
Assertions:
- AssertDescription: "Smart-1 Cloud Token for member A can not be empty"
- AssertDescription: "Smart-1 Cloud Token for member A can not be empty."
Assert: !Equals [!Ref MemberBToken, '']
MemberBTokenNotProvided:
RuleCondition: !Equals [ !Ref MemberBToken, '' ]
Assertions:
- AssertDescription: "Smart-1 Cloud Token for member B can not be empty"
- AssertDescription: "Smart-1 Cloud Token for member B can not be empty."
Assert: !Equals [ !Ref MemberAToken, '' ]
MembersTokenValueEquals:
RuleCondition: !EachMemberEquals [ [ !Ref MemberBToken ], !Ref MemberAToken ]
Expand Down
16 changes: 8 additions & 8 deletions aws/templates/cross-az-cluster/cross-az-cluster.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploys a Check Point Cluster into an existing VPC (__VERSION__)
Description: Deploys a Check Point Cluster into an existing VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -426,7 +426,7 @@ Resources:
Condition: CreateRole
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/iam/cluster-iam-role.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/iam/cluster-iam-role.yaml
ClusterInstanceProfile:
Type: AWS::IAM::InstanceProfile
Properties:
Expand All @@ -436,14 +436,14 @@ Resources:
Condition: EnableCloudWatch
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/iam/cloudwatch-policy.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/iam/cloudwatch-policy.yaml
Parameters:
PolicyName: !If [ ProvidedResourcesTag, !Ref ResourcesTagName, !Ref 'AWS::StackName' ]
PolicyRole: !If [CreateRole, !GetAtt ClusterRole.Outputs.ClusterIAMRole, !Ref GatewayPredefinedRole]
AMI:
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/utils/amis.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/utils/amis.yaml
Parameters:
Version: !Join ['-', [!Ref GatewayVersion, GW]]
PermissiveSecurityGroup:
Expand Down Expand Up @@ -669,7 +669,7 @@ Resources:
- !Join ['', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"']]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"__VERSION__\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
VersionDescription: Initial template version
MemberBGatewayLaunchTemplate:
Type: AWS::EC2::LaunchTemplate
Expand Down Expand Up @@ -716,7 +716,7 @@ Resources:
- !Join [ '', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"' ] ]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenB}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"__VERSION__\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenB}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
VersionDescription: Initial template version
Outputs:
ClusterPublicAddress:
Expand Down Expand Up @@ -772,12 +772,12 @@ Rules:
MemberATokenNotProvided:
RuleCondition: !Equals [!Ref MemberAToken, '']
Assertions:
- AssertDescription: "Smart-1 Cloud Token for member A can not be empty"
- AssertDescription: "Smart-1 Cloud Token for member A can not be empty."
Assert: !Equals [!Ref MemberBToken, '']
MemberBTokenNotProvided:
RuleCondition: !Equals [ !Ref MemberBToken, '' ]
Assertions:
- AssertDescription: "Smart-1 Cloud Token for member B can not be empty"
- AssertDescription: "Smart-1 Cloud Token for member B can not be empty."
Assert: !Equals [ !Ref MemberAToken, '' ]
MembersTokenValueEquals:
RuleCondition: !EachMemberEquals [ [ !Ref MemberBToken ], !Ref MemberAToken ]
Expand Down
10 changes: 5 additions & 5 deletions aws/templates/geo-cluster/geo-cluster-master.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploy a Check Point cross AZ Cluster in a new VPC (__VERSION__)
Description: Deploy a Check Point cross AZ Cluster in a new VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -413,7 +413,7 @@ Resources:
VPCStack:
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/utils/vpc.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/utils/vpc.yaml
Parameters:
AvailabilityZones: !Join [',', !Ref AvailabilityZones]
NumberOfAZs: 2
Expand All @@ -433,7 +433,7 @@ Resources:
ClusterStack:
Type: AWS::CloudFormation::Stack
Properties:
TemplateURL: __URL__/cluster/geo-cluster.yaml
TemplateURL: https://cgi-cfts.s3.amazonaws.com/cluster/geo-cluster.yaml
Parameters:
VPC: !GetAtt VPCStack.Outputs.VPCID
PublicSubnetA: !GetAtt VPCStack.Outputs.PublicSubnet1ID
Expand Down Expand Up @@ -507,12 +507,12 @@ Rules:
MemberATokenNotProvided:
RuleCondition: !Equals [!Ref MemberAToken, '']
Assertions:
- AssertDescription: "Smart-1 Cloud Token for member A can not be empty"
- AssertDescription: "Smart-1 Cloud Token for member A can not be empty."
Assert: !Equals [!Ref MemberBToken, '']
MemberBTokenNotProvided:
RuleCondition: !Equals [ !Ref MemberBToken, '' ]
Assertions:
- AssertDescription: "Smart-1 Cloud Token for member B can not be empty"
- AssertDescription: "Smart-1 Cloud Token for member B can not be empty."
Assert: !Equals [ !Ref MemberAToken, '' ]
MembersTokenValueEquals:
RuleCondition: !EachMemberEquals [ [ !Ref MemberBToken ], !Ref MemberAToken ]
Expand Down
Loading

0 comments on commit ec6750e

Please sign in to comment.