@@ -9,16 +9,10 @@ locals {
99  service_group_ids  =   [" IAM"  ] #  List of pseudo services for which service_group_id is required
1010
1111  target_service_details_default  =   {
12-     " iam-groups"   :  {
13-       " enforcement_mode"   :  " report" 
14-     },
15-     " iam-access-management"   :  {
16-       " enforcement_mode"   :  " report" 
17-     },
18-     " iam-identity"   :  {
12+     " apprapp"   :  {
1913      " enforcement_mode"   :  " report" 
2014    },
21-     " user-management "   :  {
15+     " atracker "   :  {
2216      " enforcement_mode"   :  " report" 
2317    },
2418    " cloud-object-storage"   :  {
@@ -27,24 +21,36 @@ locals {
2721    " codeengine"   :  {
2822      " enforcement_mode"   :  " report" 
2923    },
24+     " codeengine-platform"   :  {
25+       " enforcement_mode"   :  " report" 
26+     },
3027    " codeengine-service-control-plane"   :  {
3128      " enforcement_mode"   :  " report" 
3229    },
33-     " codeengine-platform "   :  {
30+     " compliance "   :  {
3431      " enforcement_mode"   :  " report" 
3532    },
3633    " container-registry"   :  {
3734      " enforcement_mode"   :  " report" 
3835    },
39-     " databases-for-cassandra "   :  {
36+     " containers-kubernetes "   :  {
4037      " enforcement_mode"   :  " disabled" 
4138    },
42-     " databases-for-enterprisedb "   :  {
39+     " containers-kubernetes-cluster "   :  {
4340      " enforcement_mode"   :  " disabled" 
4441    },
42+     " containers-kubernetes-management"   :  {
43+       " enforcement_mode"   :  " disabled" 
44+     },
45+     " context-based-restrictions"   :  {
46+       " enforcement_mode"   :  " report" 
47+     },
4548    " databases-for-elasticsearch"   :  {
4649      " enforcement_mode"   :  " disabled" 
4750    },
51+     " databases-for-enterprisedb"   :  {
52+       " enforcement_mode"   :  " disabled" 
53+     },
4854    " databases-for-etcd"   :  {
4955      " enforcement_mode"   :  " disabled" 
5056    },
@@ -66,61 +72,49 @@ locals {
6672    " dns-svcs"   :  {
6773      " enforcement_mode"   :  " report" 
6874    },
69-     " messagehub"   :  {
75+     " event-notifications"   :  {
76+       " enforcement_mode"   :  " disabled" 
77+     },
78+     " ghost-tags"   :  {
7079      " enforcement_mode"   :  " report" 
7180    },
72-     " kms "   :  {
81+     " globalcatalog-collection "   :  {
7382      " enforcement_mode"   :  " report" 
7483    },
7584    " hs-crypto"   :  {
7685      " enforcement_mode"   :  " report" 
7786    },
78-     " containers-kubernetes"   :  {
79-       " enforcement_mode"   :  " disabled" 
80-     },
81-     " containers-kubernetes-management"   :  {
82-       " enforcement_mode"   :  " disabled" 
83-     },
84-     " containers-kubernetes-cluster"   :  {
85-       " enforcement_mode"   :  " disabled" 
86-     },
87-     " messages-for-rabbitmq"   :  {
88-       " enforcement_mode"   :  " disabled" 
89-     },
90-     " secrets-manager"   :  {
87+     " IAM"   :  {
9188      " enforcement_mode"   :  " report" 
9289    },
93-     " transit "   :  {
90+     " iam-access-management "   :  {
9491      " enforcement_mode"   :  " report" 
9592    },
96-     " is "   :  {
93+     " iam-groups "   :  {
9794      " enforcement_mode"   :  " report" 
9895    },
99-     " schematics "   :  {
96+     " iam-identity "   :  {
10097      " enforcement_mode"   :  " report" 
10198    },
102-     " apprapp "   :  {
99+     " is "   :  {
103100      " enforcement_mode"   :  " report" 
104101    },
105-     " event-notifications"   :  {
106-       " enforcement_mode"   :  " disabled" 
107-     },
108-     " compliance"   :  {
102+     " kms"   :  {
109103      " enforcement_mode"   :  " report" 
110104    },
111-     " IAM "   :  {
105+     " logs "   :  {
112106      " enforcement_mode"   :  " report" 
113107    },
114-     " context-based-restrictions "   :  {
108+     " messagehub "   :  {
115109      " enforcement_mode"   :  " report" 
116110    },
117-     " globalcatalog-collection "   :  {
118-       " enforcement_mode"   :  " report " 
111+     " messages-for-rabbitmq "   :  {
112+       " enforcement_mode"   :  " disabled " 
119113    },
120-     " logdna "   :  {
114+     " schematics "   :  {
121115      " enforcement_mode"   :  " report" 
122116    },
123-     " logdnaat "   :  {
117+     " secrets-manager "   :  {
124118      " enforcement_mode"   :  " report" 
125119    },
126120    " sysdig-monitor"   :  {
@@ -129,7 +123,10 @@ locals {
129123    " sysdig-secure"   :  {
130124      " enforcement_mode"   :  " report" 
131125    },
132-     " logs"   :  {
126+     " transit"   :  {
127+       " enforcement_mode"   :  " report" 
128+     },
129+     " user-management"   :  {
133130      " enforcement_mode"   :  " report" 
134131    }
135132  }
@@ -383,7 +380,6 @@ locals {
383380  icd_api_types  =   [" crn:v1:bluemix:public:context-based-restrictions::::api-type:data-plane"  ]
384381  operations_apitype_val  =   {
385382    databases-for-enterprisedb       =  local.icd_api_types,
386-     containers-kubernetes            =  [" crn:v1:bluemix:public:containers-kubernetes::::api-type:cluster"  , " crn:v1:bluemix:public:containers-kubernetes::::api-type:management"  ],
387383    containers-kubernetes-cluster    =  [" crn:v1:bluemix:public:containers-kubernetes::::api-type:cluster"  ],
388384    containers-kubernetes-management =  [" crn:v1:bluemix:public:containers-kubernetes::::api-type:management"  ]
389385    databases-for-cassandra          =  local.icd_api_types,
0 commit comments