Configure an AWS CodeBuild Pipeline

EdgeBit gives developers context about new and modified software dependencies when submitted a pull request or pushing a new commit before it merges into main.

This context is useful for:

This document will walk through setting up an AWS CodeBuild project.

The action uses the Syft open source project to generate the software bill of materials (SBOM).

Create your CodeBuild Project

Follow the prompts to create a new project if you don’t have an existing one. Ensure that the Privileged option is checked under the Environment settings. This is required to build container images in your project.

Create BuildConfig File

This example is a minimal example of a container build. For an existing project, mix these commands in where it makes sense. Here’s what it does:

  1. Installs ebctl and Syft
  2. Generates a software bill of materials (SBOM) from the current directory, detecting most common programming languages with a Syft configuration file
  3. Uses your EdgeBit Access Token to upload the SBOM to EdgeBit and ties it to a component

In your code repo, create ./edgebit/container-syft.yaml with the default config file.

$ mkdir -p .edgebit
$ curl -sL > ./edgebit/container-syft.yaml

In your GitHub repo, create or edit your buildspec.yml:

version: 0.2

  shell: bash
    IMAGE_TAG: "1.2.3"
    IMAGE: ""
    NAME: "projectname"
    GH_REPO: ""

      # Install ebctl
      - curl -sSfL$(uname -m | sed 's/aarch64/arm64/').tar.gz | tar xz
      # Install syft v1.4.0
      - curl -sSfL | sh -s -- -b . v1.4.0
      - LATEST_SHA=$(git rev-parse HEAD)
      - PR_NUMBER=$(cut -d "/" -f2 <<< "$CODEBUILD_SOURCE_VERSION")
      - docker build -t $FULL_IMAGE .
      # Generate SBOM
      - ./syft \
        scan $FULL_IMAGE \
        --config ./edgebit/container-syft.yaml \
        --output spdx-json=$NAME.spdx.json
      # Upload SBOM to component
      - |
        ./ebctl upload-sbom \
          --component $NAME \
          --tag latest \
          --tag $IMAGE_TAG \
          --repo $GH_REPO \
          --commit $LATEST_SHA \
          --image-tag $FULL_IMAGE \
          --image-id $(docker image inspect --format '{{.ID}}' $FULL_IMAGE) \
          --repo-digest $(docker image inspect --format '{{join .RepoDigests ","}}' $FULL_IMAGE) \
          --pull-request $PR_NUMBER \

Customize Project Inputs

Fill in the required inputs at the top of the file under env:

Input Name Description Value
IMAGE Container image to be built, including registry and name Required
IMAGE_TAG Tag of the container image to be built Required
NAME Short name of the project Required
GH_REPO Location of the code repository Required
EDGEBIT_URL EdgeBit organization url Required
EDGEBIT_API_KEY EdgeBit access token Required

For simplicity this example is hardcoded to append the latest tag for SBOM in addition to the tag from the container. This indicates the newest build in the EdgeBit UI. More advanced logic can be substituted and used in the ebctl upload-sbom command.

Configure AWS Secret Manager

In the EdgeBit Console, generate a new Access Token for this project to use. You can find this in the left hand navigation under “Access Tokens”.

Save the new EdgeBit Access Token in the AWS Secret Manager as a plaintext value (not key/value). This value is referenced at the top of our buildspec.yml, so please update it with the name. Note the ARN, since we’ll use that in the IAM policy.

Configure IAM Policy

Next, add an IAM policy to the automatically generated Role used by this CodeBuid project. To do this manually, navigate to the IAM section and search for “codebuild” in the Role list. It should be something like codebuild-<projectname>-service-role.

Here’s an example role that should contain your secret’s ARN. If your organization uses automation to manage your AWS infrastructure, please follow those best practices.

  "Version": "2012-10-17",
  "Statement": [
      "Sid": "ReadEdgeBitKey",
      "Effect": "Allow",
      "Action": [
      "Resource": "arn:aws:secretsmanager:us-east-1:11223344556677:secret:xxxxxxx"

Set Up the GitHub app

Optionally, use the EdgeBit’s GitHub app to allow Developers to see a new EdgeBit check on their PRs:

EdgeBit Bot
  1. Comments on the PR if new dependency changes are detected, highlighting:
    • New vulnerabilities and supply chain risks introduced by the changes
    • Confirming addition, modification or removal of dependency changes without issues
  2. Link to more detail within EdgeBit about the current state of all known vulnerabilities

If a PR makes dependency changes and new issues are found, EdgeBit will comment with more information:

EdgeBit Bot

To set up the GitHub app, an admin should do the following:

  1. In the EdgeBit Console, click on “Integrations” in the left navigation pane.
  2. Click “New Integration” to start the GitHub app installation process.
  3. Grant EdgeBit access to all repos in an organization or a subset.
  4. Choose which project(s) the GitHub integration should be used with.

Test the Integration

Click “Start Build” to run your first build off the latest code. Be sure the repository contains your customized buildspec.yml.

View your Build Artifacts in the EdgeBit Console

Your EdgeBit Console contains reports about each SBOM uploaded and the current state of all vulnerabilities in your software Components.

Next: Install Machine Agent