repositoryUrl format configured in the semantic-release Configuration (the format will be automatically converted as needed).your_email must be the email associated with your Git hosted account. ssh_passphrase must be a long and hard to guess string. It will be used later.git_deploy_key.pub and a private key in git_deploy_key.git_deploy_key.pub file (public key) and copy the entire content.git_deploy_key.pub file (public key) and click the Add SSH Key button.git_deploy_key.pub file:SSH_PASSPHRASE to Travis with the value set during the SSH keys generation step:git_deploy_key (private key) using a symmetric encryption (AES-256), and store the secret in a secure environment variable in the Travis environment:travis encrypt-file will encrypt the private key into the git_deploy_key.enc file and output in the console the command to add to your .travis.yml file. It should look like openssl aes-256-cbc -K $encrypted_KKKKKKKKKKKK_key -iv $encrypted_VVVVVVVVVVVV_iv -in git_deploy_key.enc -out git_deploy_key -d..travis.yml file in the before_install step. Change the output path to write the unencrypted key in /tmp: -out git_deploy_key => /tmp/git_deploy_key. This will avoid to commit / modify / delete the unencrypted key by mistake on the CI. Then add the commands to decrypt the ssh private key and make it available to git:.travis.yml file to your repository:git_deploy_key (private key) using a symmetric encryption (AES-256). Run the following openssl command and make sure to note the output which we'll need later:REPO_ENC_KEY - the key (KKK) value from the openssl step above.REPO_ENC_IV - the iv (VVV) value from the openssl step above..circleci/config.yml the commands to decrypt the ssh private key and make it available to git:/tmp to avoid to commit / modify / delete the unencrypted key by mistake on the CI environment..circleci/config.yml file to your repository: