@@ -9,16 +9,10 @@ locals {
9
9
service_group_ids = [" IAM" ] # List of pseudo services for which service_group_id is required
10
10
11
11
target_service_details_default = {
12
- " iam-groups" : {
13
- " enforcement_mode" : " report"
14
- },
15
- " iam-access-management" : {
16
- " enforcement_mode" : " report"
17
- },
18
- " iam-identity" : {
12
+ " apprapp" : {
19
13
" enforcement_mode" : " report"
20
14
},
21
- " user-management " : {
15
+ " atracker " : {
22
16
" enforcement_mode" : " report"
23
17
},
24
18
" cloud-object-storage" : {
@@ -27,24 +21,36 @@ locals {
27
21
" codeengine" : {
28
22
" enforcement_mode" : " report"
29
23
},
24
+ " codeengine-platform" : {
25
+ " enforcement_mode" : " report"
26
+ },
30
27
" codeengine-service-control-plane" : {
31
28
" enforcement_mode" : " report"
32
29
},
33
- " codeengine-platform " : {
30
+ " compliance " : {
34
31
" enforcement_mode" : " report"
35
32
},
36
33
" container-registry" : {
37
34
" enforcement_mode" : " report"
38
35
},
39
- " databases-for-cassandra " : {
36
+ " containers-kubernetes " : {
40
37
" enforcement_mode" : " disabled"
41
38
},
42
- " databases-for-enterprisedb " : {
39
+ " containers-kubernetes-cluster " : {
43
40
" enforcement_mode" : " disabled"
44
41
},
42
+ " containers-kubernetes-management" : {
43
+ " enforcement_mode" : " disabled"
44
+ },
45
+ " context-based-restrictions" : {
46
+ " enforcement_mode" : " report"
47
+ },
45
48
" databases-for-elasticsearch" : {
46
49
" enforcement_mode" : " disabled"
47
50
},
51
+ " databases-for-enterprisedb" : {
52
+ " enforcement_mode" : " disabled"
53
+ },
48
54
" databases-for-etcd" : {
49
55
" enforcement_mode" : " disabled"
50
56
},
@@ -66,61 +72,49 @@ locals {
66
72
" dns-svcs" : {
67
73
" enforcement_mode" : " report"
68
74
},
69
- " messagehub" : {
75
+ " event-notifications" : {
76
+ " enforcement_mode" : " disabled"
77
+ },
78
+ " ghost-tags" : {
70
79
" enforcement_mode" : " report"
71
80
},
72
- " kms " : {
81
+ " globalcatalog-collection " : {
73
82
" enforcement_mode" : " report"
74
83
},
75
84
" hs-crypto" : {
76
85
" enforcement_mode" : " report"
77
86
},
78
- " containers-kubernetes" : {
79
- " enforcement_mode" : " disabled"
80
- },
81
- " containers-kubernetes-management" : {
82
- " enforcement_mode" : " disabled"
83
- },
84
- " containers-kubernetes-cluster" : {
85
- " enforcement_mode" : " disabled"
86
- },
87
- " messages-for-rabbitmq" : {
88
- " enforcement_mode" : " disabled"
89
- },
90
- " secrets-manager" : {
87
+ " IAM" : {
91
88
" enforcement_mode" : " report"
92
89
},
93
- " transit " : {
90
+ " iam-access-management " : {
94
91
" enforcement_mode" : " report"
95
92
},
96
- " is " : {
93
+ " iam-groups " : {
97
94
" enforcement_mode" : " report"
98
95
},
99
- " schematics " : {
96
+ " iam-identity " : {
100
97
" enforcement_mode" : " report"
101
98
},
102
- " apprapp " : {
99
+ " is " : {
103
100
" enforcement_mode" : " report"
104
101
},
105
- " event-notifications" : {
106
- " enforcement_mode" : " disabled"
107
- },
108
- " compliance" : {
102
+ " kms" : {
109
103
" enforcement_mode" : " report"
110
104
},
111
- " IAM " : {
105
+ " logs " : {
112
106
" enforcement_mode" : " report"
113
107
},
114
- " context-based-restrictions " : {
108
+ " messagehub " : {
115
109
" enforcement_mode" : " report"
116
110
},
117
- " globalcatalog-collection " : {
118
- " enforcement_mode" : " report "
111
+ " messages-for-rabbitmq " : {
112
+ " enforcement_mode" : " disabled "
119
113
},
120
- " logdna " : {
114
+ " schematics " : {
121
115
" enforcement_mode" : " report"
122
116
},
123
- " logdnaat " : {
117
+ " secrets-manager " : {
124
118
" enforcement_mode" : " report"
125
119
},
126
120
" sysdig-monitor" : {
@@ -129,7 +123,10 @@ locals {
129
123
" sysdig-secure" : {
130
124
" enforcement_mode" : " report"
131
125
},
132
- " logs" : {
126
+ " transit" : {
127
+ " enforcement_mode" : " report"
128
+ },
129
+ " user-management" : {
133
130
" enforcement_mode" : " report"
134
131
}
135
132
}
@@ -383,7 +380,6 @@ locals {
383
380
icd_api_types = [" crn:v1:bluemix:public:context-based-restrictions::::api-type:data-plane" ]
384
381
operations_apitype_val = {
385
382
databases-for-enterprisedb = local.icd_api_types,
386
- containers-kubernetes = [" crn:v1:bluemix:public:containers-kubernetes::::api-type:cluster" , " crn:v1:bluemix:public:containers-kubernetes::::api-type:management" ],
387
383
containers-kubernetes-cluster = [" crn:v1:bluemix:public:containers-kubernetes::::api-type:cluster" ],
388
384
containers-kubernetes-management = [" crn:v1:bluemix:public:containers-kubernetes::::api-type:management" ]
389
385
databases-for-cassandra = local.icd_api_types,
0 commit comments