Build badges sample with CodeBuild
AWS CodeBuild now supports the use of build badges, which provide an embeddable, dynamically generated image (badge) that displays the status of the latest build for a project. This image is accessible through a publicly available URL generated for your CodeBuild project. This allows anyone to view the status of a CodeBuild project. Build badges do not contain any security information, so they do not require authentication.
Topics
Create a build project with build badges
Use the following one of the following procedures to create a build project with build badges enabled. You can use AWS CLI or the AWS Management Console.
To create a build project with build badges enabled (AWS CLI)
For information about creating a build project, see Create a build project (AWS CLI). To include build badges with your AWS CodeBuild project, you must specify
badgeEnabled
with a value oftrue
.
To create a build project with build badges enabled (console)
Open the AWS CodeBuild console at https://console.aws.amazon.com/codesuite/codebuild/home
. -
If a CodeBuild information page is displayed, choose Create build project. Otherwise, on the navigation pane, expand Build, choose Build projects, and then choose Create build project.
In Project name, enter a name for this build project. Build project names must be unique across each AWS account. You can also include an optional description of the build project to help other users understand what this project is used for.
-
In Source, for Source provider, choose the source code provider type, and then do one of the following:
Note
CodeBuild does not support build badges with the Amazon S3 source provider. Because AWS CodePipeline uses Amazon S3 for artifact transfers, build badges are not supported for build projects that are part of a pipeline created in CodePipeline.
-
If you chose CodeCommit, then for Repository, choose the name of the repository. Select Enable build badge to make your project's build status visible and embeddable.
-
If you chose GitHub, follow the instructions to connect (or reconnect) with GitHub. On the GitHub Authorize application page, for Organization access, choose Request access next to each repository you want AWS CodeBuild to be able to access. After you choose Authorize application, back in the AWS CodeBuild console, for Repository, choose the name of the repository that contains the source code. Select Enable build badge to make your project's build status visible and embeddable.
-
If you chose Bitbucket, follow the instructions to connect (or reconnect) with Bitbucket. On the Bitbucket Confirm access to your account page, for Organization access, choose Grant access. After you choose Grant access, back in the AWS CodeBuild console, for Repository, choose the name of the repository that contains the source code. Select Enable build badge to make your project's build status visible and embeddable.
Important
Updating your project source might affect the accuracy of the project's build badges.
-
-
In Environment:
For Environment image, do one of the following:
-
To use a Docker image managed by AWS CodeBuild, choose Managed image, and then make selections from Operating system, Runtime(s), Image, and Image version. Make a selection from Environment type if it is available.
-
To use another Docker image, choose Custom image. For Environment type, choose ARM, Linux, Linux GPU, or Windows. If you choose Other registry, for External registry URL, enter the name and tag of the Docker image in Docker Hub, using the format
. If you choose Amazon ECR, use Amazon ECR repository and Amazon ECR image to choose the Docker image in your AWS account.docker repository
/docker image name
-
To use a private Docker image, choose Custom image. For Environment type, choose ARM, Linux, Linux GPU, or Windows. For Image registry, choose Other registry, and then enter the ARN of the credentials for your private Docker image. The credentials must be created by Secrets Manager. For more information, see What Is AWS Secrets Manager? in the AWS Secrets Manager User Guide.
-
-
In Service role, do one of the following:
-
If you do not have a CodeBuild service role, choose New service role. In Role name, enter a name for the new role.
-
If you have a CodeBuild service role, choose Existing service role. In Role ARN, choose the service role.
Note
When you use the console to create or update a build project, you can create a CodeBuild service role at the same time. By default, the role works with that build project only. If you use the console to associate this service role with another build project, the role is updated to work with the other build project. A service role can work with up to 10 build projects.
-
-
In Buildspec, do one of the following:
-
Choose Use a buildspec file to use the buildspec.yml file in the source code root directory.
-
Choose Insert build commands to use the console to insert build commands.
For more information, see the Buildspec reference.
-
-
In Artifacts, for Type, do one of the following:
-
If you do not want to create build output artifacts, choose No artifacts.
-
To store the build output in an S3 bucket, choose Amazon S3, and then do the following:
-
If you want to use your project name for the build output ZIP file or folder, leave Name blank. Otherwise, enter the name. By default, the artifact name is the project name. If you want to use a different name, enter it in the artifacts name box. If you want to output a ZIP file, include the zip extension.
-
For Bucket name, choose the name of the output bucket.
-
If you chose Insert build commands earlier in this procedure, for Output files, enter the locations of the files from the build that you want to put into the build output ZIP file or folder. For multiple locations, separate each location with a comma (for example,
appspec.yml, target/my-app.jar
). For more information, see the description offiles
in Buildspec syntax.
-
-
-
Expand Additional configuration and choose options as appropriate.
-
Choose Create build project. On the Review page, choose Start build to run the build.