Control: CodeBuild GitHub or Bitbucket source repository URLs should use OAuth
Description
Ensure the GitHub or Bitbucket source repository URL does not contain personal access tokens, user name and password within AWS Codebuild project environments.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.codebuild_project_source_repo_oauth_configured
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.codebuild_project_source_repo_oauth_configured --share
SQL
This control uses a named query:
select p.arn as resource, case when p.source ->> 'Type' not in ('GITHUB', 'BITBUCKET') then 'skip' when c.auth_type = 'OAUTH' then 'ok' else 'alarm' end as status, case when p.source ->> 'Type' = 'NO_SOURCE' then p.title || ' doesn''t have input source code.' when p.source ->> 'Type' not in ('GITHUB', 'BITBUCKET') then p.title || ' source code isn''t in GitHub/Bitbucket repository.' when c.auth_type = 'OAUTH' then p.title || ' using OAuth to connect source repository.' else p.title || ' not using OAuth to connect source repository.' end as reason , p.region, p.account_idfrom aws_codebuild_project as p left join aws_codebuild_source_credential as c on (p.region = c.region and p.source ->> 'Type' = c.server_type);