Adaptive cache action that automatically chooses the appropriate caching backend based on repository visibility and ownership.
- Automatically uses GitHub Actions cache for public repositories
- Uses SonarSource S3 cache for private/internal SonarSource repositories
- Seamless API compatibility with standard GitHub Actions cache
- Supports all standard cache inputs and outputs
- Automatic repository visibility detection
jq(used by the cache key preparation script)id-token: writepermission (required for OIDC authentication with S3 backend)
- Node.js 20+
- npm
npm installnpm test # single run
npm run test:watch # watch modeThe JS sub-actions (credential-setup, credential-guard) are bundled with
@vercel/ncc into self-contained dist files. Rebuild after changing TypeScript source:
npm run build # build all sub-actions
npm run build:setup # build credential-setup only
npm run build:guard-main # build credential-guard main only
npm run build:guard-post # build credential-guard post onlyBundled output goes to credential-setup/dist/ and credential-guard/dist/. These must be committed since GitHub Actions runs them directly.
- uses: SonarSource/gh-action_cache@v1
with:
path: |
~/.cache/pip
~/.cache/maven
key: cache-${{ runner.os }}-${{ hashFiles('**/requirements.txt', '**/pom.xml') }}
restore-keys: cache-${{ runner.os }}-| Input | Description | Required | Default |
|---|---|---|---|
path |
Files, directories, and wildcard patterns to cache | Yes | |
key |
Explicit key for restoring and saving cache | Yes | |
restore-keys |
Ordered list of prefix-matched keys for fallback | No | |
fallback-branch |
Optional maintenance branch for fallback restore keys (pattern: branch-*, S3 backend only). If not set, the repository default branch is used. |
No | |
environment |
Environment to use (dev or prod, S3 backend only) | No | prod |
upload-chunk-size |
Chunk size for large file uploads (bytes) | No | |
enableCrossOsArchive |
Enable cross-OS cache compatibility | No | false |
fail-on-cache-miss |
Fail workflow if cache entry not found | No | false |
lookup-only |
Only check cache existence without downloading | No | false |
backend |
Force specific backend: github or s3. Takes priority over CACHE_BACKEND env var and auto-detection. |
No |
The cache backend is determined in the following priority order:
inputs.backend— explicit input in the action step (githubors3)CACHE_BACKENDenvironment variable — set at the job or workflow level (githubors3)- Repository visibility —
githubfor public repos,s3for private/internal repos
The CACHE_BACKEND env var is useful when the cache action is called indirectly through a composite action and you cannot set the backend
input directly:
jobs:
build:
env:
CACHE_BACKEND: s3 # forces S3 for all cache steps, including those in reusable actions
steps:
- uses: SonarSource/some-other-action@v1 # internally calls gh-action_cache| Output | Description |
|---|---|
cache-hit |
Boolean indicating exact match for primary key |
A GitHub Action that provides branch-specific caching on AWS S3 with intelligent fallback to default branch cache entries.
- Branch-specific caching: Cache entries are prefixed with
GITHUB_HEAD_REFfor granular permissions - Intelligent fallback: Feature branches can fall back to default branch cache when no branch-specific cache exists
- S3 storage: Leverages AWS S3 for reliable, scalable cache storage
- AWS Cognito authentication: Secure authentication using GitHub Actions OIDC tokens
- Compatible with actions/cache: Drop-in replacement with same interface
Important: This action's restore key behavior differs from the standard GitHub cache action.
To enable fallback to default branch caches, you must use the restore-keys property.
When you provide restore-keys, the action searches for cache entries in this order:
- Primary key:
${BRANCH_NAME}/${key} - Branch-specific restore keys:
${BRANCH_NAME}/${restore-key}(for each restore key) - Default branch fallbacks:
refs/heads/${DEFAULT_BRANCH}/${restore-key}(for each restore key, whereDEFAULT_BRANCHis dynamically obtained from the repository)
- uses: SonarSource/gh-action_cache@v1
with:
path: ~/.npm
key: node-${{ runner.os }}-${{ hashFiles('**/package-lock.json') }}
restore-keys: node-${{ runner.os }}-For a feature branch feature/new-ui, this will search for:
feature/new-ui/node-linux-abc123...(exact match)feature/new-ui/node-linux(branch-specific partial match)refs/heads/main/node-linux(default branch fallback, assumingmainis the repository's default branch)
- Fallback requires restore-keys: Without
restore-keys, the action only looks for branch-specific cache entries - Dynamic default branch detection: The action detects your default branch using the GitHub API and uses it for fallback
- Branch isolation: Each branch maintains its own cache namespace, preventing cross-branch cache pollution
The action supports two environments:
- dev: Development environment with development S3 bucket
- prod: Production environment with production S3 bucket (default)
Each environment has its own preconfigured S3 bucket and AWS Cognito pool for isolation and security.
- Uses GitHub Actions OIDC tokens for secure authentication
- No long-lived AWS credentials required
- Branch-specific paths provide isolation between branches
This action uses a JS-based credential guard to ensure cache operations work correctly even when other steps in your workflow configure different AWS credentials.
How it works:
credential-setupobtains temporary AWS credentials via GitHub OIDC + Cognito- Credentials are saved to a protected temp file and passed to the cache step via outputs
- The cache restore step uses step-level
env:from outputs — isolated from GITHUB_ENV credential-guardpost-step re-exports credentials to GITHUB_ENV for cache save (LIFO ordering)
This protects against:
aws-actions/configure-aws-credentialsoverwriting credentials mid-jobaws-actions/configure-aws-credentialscleanup clearing credentials- Any step writing to
GITHUB_ENVwith different AWS credential values - Pre-existing
AWS_PROFILEorAWS_DEFAULT_PROFILEin the environment - Users configuring AWS credentials before or after the cache action
Works regardless of credential ordering — you can configure your AWS credentials before or after the cache action:
jobs:
build:
steps:
# Your own AWS authentication — order does not matter
- uses: aws-actions/configure-aws-credentials@v4
with:
role-to-assume: arn:aws:iam::123456789:role/my-role
aws-region: us-east-1
# Cache action authenticates independently via OIDC + Cognito
- uses: SonarSource/gh-action-cache@v2
with:
path: ~/.cache
key: my-cache-${{ hashFiles('**/lockfile') }}
- run: aws s3 ls # Uses YOUR credentials (cache never touches GITHUB_ENV)
# Post-step: credential-guard restores cache creds, then cache saves!The AWS S3 bucket lifecycle rules apply to delete the old files. The content from default branches expires in 60 days and for feature branches in 30 days.