Skip to content

Commit

Permalink
remove /module
Browse files Browse the repository at this point in the history
  • Loading branch information
chkp-guybarak committed Dec 12, 2024
1 parent dff109d commit 9b448ad
Show file tree
Hide file tree
Showing 67 changed files with 230 additions and 157 deletions.
6 changes: 6 additions & 0 deletions .idea/inspectionProfiles/profiles_settings.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

7 changes: 7 additions & 0 deletions .idea/misc.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

6 changes: 6 additions & 0 deletions .idea/vcs.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

104 changes: 79 additions & 25 deletions .idea/workspace.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion modules/autoscale-gwlb/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ These types of Terraform resources are supported:
See the [CloudGuard Auto Scaling for AWS](https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CloudGuard_Network_for_AWS_AutoScaling_DeploymentGuide/Topics-AWS-AutoScale-DG/Check-Point-CloudGuard-Network-for-AWS.htm) for additional information

This solution uses the following modules:
- /terraform/aws/modules/amis
- /terraform/aws/amis

## Configurations

Expand Down
4 changes: 2 additions & 2 deletions modules/autoscale-gwlb/main.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@

module "amis" {
source = "../modules/amis"
source = "../amis"
version_license = var.gateway_version
amis_url = "https://cgi-cfts-staging.s3.amazonaws.com/utils/amis.yaml"

Expand Down Expand Up @@ -138,7 +138,7 @@ resource "aws_iam_role" "role" {
path = "/"
}
module "attach_cloudwatch_policy" {
source = "../modules/cloudwatch-policy"
source = "../cloudwatch-policy"
count = local.create_iam_role
role = aws_iam_role.role[count.index].name
tag_name = local.asg_name
Expand Down
4 changes: 2 additions & 2 deletions modules/autoscale-gwlb/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ variable "gateway_instance_type" {
default = "c6in.xlarge"
}
module "validate_instance_type" {
source = "../modules/common/instance_type"
source = "../common/instance_type"

chkp_type = "gateway"
instance_type = var.gateway_instance_type
Expand Down Expand Up @@ -122,7 +122,7 @@ variable "gateway_version" {
default = "R81.20-BYOL"
}
module "validate_gateway_version" {
source = "../modules/common/version_license"
source = "../common/version_license"

chkp_type = "gwlb_gw"
version_license = var.gateway_version
Expand Down
2 changes: 1 addition & 1 deletion modules/autoscale/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ These types of Terraform resources are supported:
See the [CloudGuard Auto Scaling for AWS](https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CloudGuard_Network_for_AWS_AutoScaling_DeploymentGuide/Default.htm) for additional information

This solution uses the following modules:
- /terraform/aws/modules/amis
- /terraform/aws/amis

## Configurations

Expand Down
4 changes: 2 additions & 2 deletions modules/autoscale/main.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
module "amis" {
source = "../modules/amis"
source = "../amis"

version_license = var.gateway_version
}
Expand Down Expand Up @@ -125,7 +125,7 @@ resource "aws_iam_role" "role" {
path = "/"
}
module "attach_cloudwatch_policy" {
source = "../modules/cloudwatch-policy"
source = "../cloudwatch-policy"
count = local.create_iam_role
role = aws_iam_role.role[count.index].name
tag_name = local.asg_name
Expand Down
4 changes: 2 additions & 2 deletions modules/autoscale/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ variable "gateway_instance_type" {
default = "c6in.xlarge"
}
module "validate_instance_type" {
source = "../modules/common/instance_type"
source = "../common/instance_type"

chkp_type = "gateway"
instance_type = var.gateway_instance_type
Expand Down Expand Up @@ -110,7 +110,7 @@ variable "gateway_version" {
default = "R81.20-BYOL"
}
module "validate_gateway_version" {
source = "../modules/common/version_license"
source = "../common/version_license"

chkp_type = "gateway"
version_license = var.gateway_version
Expand Down
6 changes: 3 additions & 3 deletions modules/cluster-master/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,9 +15,9 @@ See the [Deploying a Check Point Cluster in AWS (Amazon Web Services)](https://s

This solution uses the following modules:
- /terraform/aws/cluster
- /terraform/aws/modules/amis
- /terraform/aws/modules/vpc
- /terraform/aws/modules/cluster-iam-role
- /terraform/aws/amis
- /terraform/aws/vpc
- /terraform/aws/cluster-iam-role


## Configurations
Expand Down
2 changes: 1 addition & 1 deletion modules/cluster-master/main.tf
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@

// --- VPC ---
module "launch_vpc" {
source = "../modules/vpc"
source = "../vpc"

vpc_cidr = var.vpc_cidr
public_subnets_map = var.public_subnets_map
Expand Down
4 changes: 2 additions & 2 deletions modules/cluster-master/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ variable "gateway_instance_type" {
default = "c6in.xlarge"
}
module "validate_instance_type" {
source = "../modules/common/instance_type"
source = "../common/instance_type"

chkp_type = "gateway"
instance_type = var.gateway_instance_type
Expand Down Expand Up @@ -93,7 +93,7 @@ variable "gateway_version" {
default = "R81.20-BYOL"
}
module "validate_gateway_version" {
source = "../modules/common/version_license"
source = "../common/version_license"

chkp_type = "gateway"
version_license = var.gateway_version
Expand Down
4 changes: 2 additions & 2 deletions modules/cluster/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,8 +13,8 @@ These types of Terraform resources are supported:
See the [Deploying a Check Point Cluster in AWS (Amazon Web Services)](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk104418) for additional information

This solution uses the following modules:
- /terraform/aws/modules/amis
- /terraform/aws/modules/cluster-iam-role
- /terraform/aws/amis
- /terraform/aws/cluster-iam-role


## Configurations
Expand Down
8 changes: 4 additions & 4 deletions modules/cluster/main.tf
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@


module "amis" {
source = "../modules/amis"
source = "../amis"

version_license = var.gateway_version
chkp_type = "gateway"
}

module "common_permissive_sg" {
source = "../modules/common/permissive_sg"
source = "../common/permissive_sg"

vpc_id = var.vpc_id
resources_tag_name = var.resources_tag_name
Expand All @@ -21,12 +21,12 @@ resource "aws_iam_instance_profile" "cluster_instance_profile" {
}

module "cluster_iam_role" {
source = "../modules/cluster-iam-role"
source = "../cluster-iam-role"
count = local.create_iam_role
}

module "attach_cloudwatch_policy" {
source = "../modules/cloudwatch-policy"
source = "../cloudwatch-policy"
count = local.enable_cloudwatch_policy
role = aws_iam_instance_profile.cluster_instance_profile.role
tag_name = var.resources_tag_name != "" ? var.resources_tag_name : var.gateway_name
Expand Down
Loading

0 comments on commit 9b448ad

Please sign in to comment.