moonrepo is a repository management, organization, orchestration, and notification tool for the web ecosystem, written in Rust. Many of the concepts within moon are heavily inspired from Bazel and other popular build systems.
Depot Cache provides a remote cache service that works with moonrepo, allowing you to incrementally cache and reuse parts of your builds. This cache is accessible from anywhere, both on your local machine and on CI/CD systems.
Note: You need a Depot API token to authenticate with the cache service.
Set a DEPOT_TOKEN environment variable with an organization or user token and add the following to your .moon/workspace.yml file:
unstable_remote:
host: 'grpcs://cache.depot.dev'
auth:
token: 'DEPOT_TOKEN'If you are using a user token and are a member of more than one organization, you additionally need to set an X-Depot-Org header to your Depot organization ID:
unstable_remote:
host: 'grpcs://cache.depot.dev'
auth:
token: 'DEPOT_TOKEN'
headers:
'X-Depot-Org': '<your-org-id>'See moonrepo's remote cache documentation for more details.
After you configure moonrepo to use Depot Cache, run your builds as you normally would. moonrepo automatically communicates with Depot Cache to fetch and reuse any stored build artifacts from your previous builds.
When building Docker images that contain moonrepo workspaces locally, your build needs access to moonrepo's remote cache credentials to benefit from caching. Containerized builds execute in isolated environments that require explicit configuration.
Configure moonrepo to read the Depot token from an environment variable in .moon/workspace.yml:
unstable_remote:
host: 'grpcs://cache.depot.dev'
auth:
token: 'DEPOT_TOKEN'Update your Dockerfile to copy the workspace configuration and mount the secret:
# syntax=docker/dockerfile:1
# ... other Dockerfile instructions
# Copy moonrepo workspace configuration
COPY .moon/workspace.yml .moon/workspace.yml
# Mount secret as environment variable and run build
RUN --mount=type=secret,id=DEPOT_TOKEN,env=DEPOT_TOKEN \
moon run buildAdding # syntax=docker/dockerfile:1 as the first line of your Dockerfile enables mounting secrets as environment variables.
depot build --secret id=DEPOT_TOKEN,env=DEPOT_TOKEN -t your-image:tag .docker buildx build --secret id=DEPOT_TOKEN,env=DEPOT_TOKEN -t your-image:tag .Define the secret in your docker-bake.hcl file:
target "default" {
context = "."
dockerfile = "Dockerfile"
tags = ["your-image:tag"]
secret = [
{
type = "env"
id = "DEPOT_TOKEN"
}
]
}Then run the build:
DEPOT_TOKEN=your_token depot bakeDepot GitHub Actions runners are pre-configured to use Depot Cache with moonrepo. Each runner launches with the necessary environment variables for accessing Depot Cache.
You don't need additional configuration. Run your moonrepo builds as normal:
jobs:
build:
runs-on: depot-ubuntu-24.04
steps:
- uses: actions/checkout@v4
- run: moon run buildTo disable automatic configuration, turn off Allow Actions jobs to automatically connect to Depot Cache in your organization settings page. You can then manually configure moonrepo as described in the Local workstation section.
When running containerized builds on Depot GitHub Actions runners, your build needs access to moonrepo's remote cache credentials. These credentials aren't automatically available inside your Docker build environment.
Configure moonrepo to read the Depot token from an environment variable in .moon/workspace.yml:
unstable_remote:
host: 'grpcs://cache.depot.dev'
auth:
token: 'DEPOT_TOKEN'Update your Dockerfile to copy the workspace configuration and run the build with mounted secret:
# syntax=docker/dockerfile:1
# ... other Dockerfile instructions
# Copy moonrepo workspace configuration
COPY .moon/workspace.yml .moon/workspace.yml
# Mount secret as environment variable and run build
RUN --mount=type=secret,id=DEPOT_TOKEN,env=DEPOT_TOKEN \
moon run buildAdding # syntax=docker/dockerfile:1 as the first line of your Dockerfile enables mounting secrets as environment variables.
depot/build-push-actionStore the Depot token in a GitHub Secret named DEPOT_TOKEN, then configure your workflow:
- name: Build and push
uses: depot/build-push-action@v1
with:
context: .
file: ./Dockerfile
push: true
tags: your-image:tag
secrets: |
"DEPOT_TOKEN=${{ secrets.DEPOT_TOKEN }}"depot/bake-actionDefine the secret in your docker-bake.hcl file:
target "default" {
context = "."
dockerfile = "Dockerfile"
tags = ["your-image:tag"]
secret = [
{
type = "env"
id = "DEPOT_TOKEN"
}
]
}Then configure your workflow:
- name: Bake
uses: depot/bake-action@v1
with:
files: docker-bake.hcl
env:
DEPOT_TOKEN: ${{ secrets.DEPOT_TOKEN }}Store the Depot token in a GitHub Secret named DEPOT_TOKEN, then configure your workflow:
- name: Build
run: |
docker buildx build \
--secret id=DEPOT_TOKEN,env=DEPOT_TOKEN \
-t your-image:tag .
env:
DEPOT_TOKEN: ${{ secrets.DEPOT_TOKEN }}