Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add maintenance mode password and log server installation type support to AWS CFT and Terraform templates #338

Merged
merged 2 commits into from
Feb 8, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 12 additions & 2 deletions aws/templates/asg/autoscale.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Create an Auto Scaling group of Check Point gateways (20221226)
Description: Create an Auto Scaling group of Check Point gateways (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -31,6 +31,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- AllowUploadDownload
- CloudWatch
Expand Down Expand Up @@ -80,6 +81,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Gateways Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: Gateways SIC key
AllowUploadDownload:
Expand Down Expand Up @@ -312,6 +315,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections.
between Check Point components. Choose a random string consisting of at least
Expand Down Expand Up @@ -524,9 +533,10 @@ Resources:
- !Sub ' admin_shell=${Shell} ; allow_info=${AllowUploadDownload} ; cw=${CloudWatch} ; eic=${EnableInstanceConnect}'
- !Join ['', [' sic="$(echo ', 'Fn::Base64': !Ref GatewaySICKey, ')"']]
- !Join ['', [' pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayPasswordHash, ')"']]
- !Join ['', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"']]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" sicKey=\"${sic}\" installationType=\"autoscale\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"__VERSION__\" templateName=\"autoscale\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" passwordHash=\"${pwd_hash}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" sicKey=\"${sic}\" installationType=\"autoscale\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"autoscale\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" bootstrapScript64=\"${bootstrap}\"'
VersionDescription: Initial template version
GatewayScaleUpPolicy:
Type: AWS::AutoScaling::ScalingPolicy
Expand Down
12 changes: 11 additions & 1 deletion aws/templates/cluster/cluster-master.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploy a Check Point Cluster in a new VPC (20230830)
Description: Deploy a Check Point Cluster in a new VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -29,6 +29,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- Label:
default: Quick connect to Smart-1 Cloud (Recommended)
Expand Down Expand Up @@ -80,6 +81,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: SIC key
MemberAToken:
Expand Down Expand Up @@ -319,6 +322,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections.
between Check Point components. Choose a random string consisting of at least
Expand Down Expand Up @@ -420,6 +429,7 @@ Resources:
GatewayVersion: !Ref GatewayVersion
Shell: !Ref Shell
GatewayPasswordHash: !Ref GatewayPasswordHash
GatewayMaintenancePasswordHash: !Ref GatewayMaintenancePasswordHash
GatewaySICKey: !Ref GatewaySICKey
MemberAToken: !Ref MemberAToken
MemberBToken: !Ref MemberBToken
Expand Down
14 changes: 12 additions & 2 deletions aws/templates/cluster/cluster.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploys a Check Point Cluster into an existing VPC (20230830)
Description: Deploys a Check Point Cluster into an existing VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -29,6 +29,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- Label:
default: Quick connect to Smart-1 Cloud (Recommended)
Expand Down Expand Up @@ -80,6 +81,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: SIC key
MemberAToken:
Expand Down Expand Up @@ -314,6 +317,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections.
between Check Point components. Choose a random string consisting of at least
Expand Down Expand Up @@ -548,9 +557,10 @@ Resources:
- !Join ['', [' eip="', !If [AllocateAddress, !Ref MemberAPublicAddress, ''], '"']]
- !Join ['', [' sic="$(echo ', 'Fn::Base64': !Ref GatewaySICKey, ')"']]
- !Join ['', [' pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayPasswordHash, ')"']]
- !Join ['', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"']]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20230923\" templateName=\"cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" elasticIp=\"${eip}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" bootstrapScript64=\"${bootstrap}\"'
MemberBInstance:
Type: AWS::EC2::Instance
DependsOn: [MemberBExternalInterface, MemberBInternalInterface]
Expand Down
12 changes: 11 additions & 1 deletion aws/templates/cross-az-cluster/cross-az-cluster-master.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploy a Check Point Cluster in a new VPC (20230503)
Description: Deploy a Check Point Cluster in a new VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -30,6 +30,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- Label:
default: Quick connect to Smart-1 Cloud (Recommended)
Expand Down Expand Up @@ -83,6 +84,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: SIC key
MemberAToken:
Expand Down Expand Up @@ -318,6 +321,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections.
between Check Point components. Choose a random string consisting of at least
Expand Down Expand Up @@ -423,6 +432,7 @@ Resources:
GatewayVersion: !Ref GatewayVersion
Shell: !Ref Shell
GatewayPasswordHash: !Ref GatewayPasswordHash
GatewayMaintenancePasswordHash: !Ref GatewayMaintenancePasswordHash
GatewaySICKey: !Ref GatewaySICKey
MemberAToken: !Ref MemberAToken
MemberBToken: !Ref MemberBToken
Expand Down
17 changes: 14 additions & 3 deletions aws/templates/cross-az-cluster/cross-az-cluster.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploys a Check Point Cluster into an existing VPC (20230830)
Description: Deploys a Check Point Cluster into an existing VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -31,6 +31,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- Label:
default: Quick connect to Smart-1 Cloud (Recommended)
Expand Down Expand Up @@ -86,6 +87,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: SIC key
MemberAToken:
Expand Down Expand Up @@ -323,6 +326,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections
between Check Point components. Choose a random string consisting of at least
Expand Down Expand Up @@ -603,9 +612,10 @@ Resources:
- !Join ['', [' eip="', !If [AllocateAddress, !Ref MemberAPublicAddress, ''], '"']]
- !Join ['', [' sic="$(echo ', 'Fn::Base64': !Ref GatewaySICKey, ')"']]
- !Join ['', [' pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayPasswordHash, ')"']]
- !Join ['', [' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"']]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20230923\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenA}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
MemberBInstance:
Type: AWS::EC2::Instance
DependsOn: [MemberBExternalInterface, MemberBInternalInterface, ClusterPublicAddress, MemberAInternalInterface, MemberAExternalInterface]
Expand Down Expand Up @@ -649,9 +659,10 @@ Resources:
- !Join ['', [' eip="', !If [AllocateAddress, !Ref MemberBPublicAddress, ''], '"']]
- !Join ['', [' sic="$(echo ', 'Fn::Base64': !Ref GatewaySICKey, ')"']]
- !Join ['', [' pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayPasswordHash, ')"']]
- !Join [ '', [ ' maintenance_pwd_hash="$(echo ', 'Fn::Base64': !Ref GatewayMaintenancePasswordHash, ')"' ] ]
- !Join ['', [' bootstrap="$(echo ', 'Fn::Base64': !Ref GatewayBootstrapScript, ')"']]
- !Sub [' version=${Version}', {Version: !Select [0, !Split ['-', !Ref GatewayVersion]]}]
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenB}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20230923\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
- ' python3 /etc/cloud_config.py enableCloudWatch=\"${cw}\" waitHandle=\"${wait_handle}\" sicKey=\"${sic}\" "smart1CloudToken=\"${tokenB}\"" installationType=\"cross-az-cluster\" osVersion=\"${version}\" allowUploadDownload=\"${allow_info}\" templateVersion=\"20240204\" templateName=\"cross_az_cluster\" shell=\"${admin_shell}\" enableInstanceConnect=\"${eic}\" hostName=\"${hostname}\" ntpPrimary=\"${ntp1}\" ntpSecondary=\"${ntp2}\" passwordHash=\"${pwd_hash}\" MaintenanceModePassword=\"${maintenance_pwd_hash}\" elasticIp=\"${eip}\" otherMemberIp=\"${other_member_ip}\" clusterIp=\"${cluster_ip}\" secondaryIp=\"${secondary_ip}\" otherMemberPrivateClusterIp=\"${remote_secondary_ip}\" bootstrapScript64=\"${bootstrap}\"'
Outputs:
ClusterPublicAddress:
Description: The public address of the cluster.
Expand Down
12 changes: 11 additions & 1 deletion aws/templates/geo-cluster/geo-cluster-master.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
AWSTemplateFormatVersion: 2010-09-09
Description: Deploy a Check Point cross AZ Cluster in a new VPC (20230503)
Description: Deploy a Check Point cross AZ Cluster in a new VPC (20240204)
Metadata:
AWS::CloudFormation::Interface:
ParameterGroups:
Expand Down Expand Up @@ -31,6 +31,7 @@ Metadata:
- GatewayVersion
- Shell
- GatewayPasswordHash
- GatewayMaintenancePasswordHash
- GatewaySICKey
- Label:
default: Quick connect to Smart-1 Cloud (Recommended)
Expand Down Expand Up @@ -86,6 +87,8 @@ Metadata:
default: Admin shell
GatewayPasswordHash:
default: Password hash
GatewayMaintenancePasswordHash:
default: Gateway Maintenance Password hash
GatewaySICKey:
default: SIC key
MemberAToken:
Expand Down Expand Up @@ -336,6 +339,12 @@ Parameters:
Default: ''
AllowedPattern: '^[\$\./a-zA-Z0-9]*$'
NoEcho: true
GatewayMaintenancePasswordHash:
Description: Check Point recommends setting Admin user's password and maintenance-mode password for recovery purposes. For R81.10 and below the Admin user's password is used also as maintenance-mode password. (To generate a password hash use the command "grub2-mkpasswd-pbkdf2" on Linux and paste it here). (optional)
Type: String
Default: ''
AllowedPattern: '[\$\./a-zA-Z0-9]*'
NoEcho: true
GatewaySICKey:
Description: The Secure Internal Communication key creates trusted connections between
Check Point components. Choose a random string consisting of at least 8
Expand Down Expand Up @@ -441,6 +450,7 @@ Resources:
GatewayVersion: !Ref GatewayVersion
Shell: !Ref Shell
GatewayPasswordHash: !Ref GatewayPasswordHash
GatewayMaintenancePasswordHash: !Ref GatewayMaintenancePasswordHash
GatewaySICKey: !Ref GatewaySICKey
MemberAToken: !Ref MemberAToken
MemberBToken: !Ref MemberBToken
Expand Down
Loading
Loading