repositoryUrl
format configured in the semantic-release Configuration (the format will be automatically converted as needed).your_email
must be the email associated with your Git hosted account. ssh_passphrase
must be a long and hard to guess string. It will be used later.git_deploy_key.pub
and a private key in git_deploy_key
.git_deploy_key.pub
file (public key) and copy the entire content.git_deploy_key.pub
file (public key) and click the Add SSH Key button.git_deploy_key.pub
file:SSH_PASSPHRASE
to Travis with the value set during the SSH keys generation step:git_deploy_key
(private key) using a symmetric encryption (AES-256), and store the secret in a secure environment variable in the Travis environment:travis encrypt-file
will encrypt the private key into the git_deploy_key.enc
file and output in the console the command to add to your .travis.yml
file. It should look like openssl aes-256-cbc -K $encrypted_KKKKKKKKKKKK_key -iv $encrypted_VVVVVVVVVVVV_iv -in git_deploy_key.enc -out git_deploy_key -d
..travis.yml
file in the before_install
step. Change the output path to write the unencrypted key in /tmp
: -out git_deploy_key
=> /tmp/git_deploy_key
. This will avoid to commit / modify / delete the unencrypted key by mistake on the CI. Then add the commands to decrypt the ssh private key and make it available to git
:.travis.yml
file to your repository:git_deploy_key
(private key) using a symmetric encryption (AES-256). Run the following openssl
command and make sure to note the output which we'll need later:REPO_ENC_KEY
- the key
(KKK) value from the openssl
step above.REPO_ENC_IV
- the iv
(VVV) value from the openssl
step above..circleci/config.yml
the commands to decrypt the ssh private key and make it available to git
:/tmp
to avoid to commit / modify / delete the unencrypted key by mistake on the CI environment..circleci/config.yml
file to your repository: