Secure artifact management for your Travis CI pipelines
Connect Cloudsmith to Travis CI and give your pipelines a reliable, secure home for every artifact they produce or consume.
How we support Travis CI
Why teams integrate Cloudsmith with Travis CI
Frequently asked questions
Install the Cloudsmith CLI in your build environment using pip, then set your Cloudsmith API key as an encrypted environment variable in your Travis CI repository settings. From there, add a cloudsmith push command to your .travis.yml to publish artifacts at the end of a successful build. Full setup steps are in the Cloudsmith Travis CI documentation.
Add your API key as an encrypted environment variable through the Travis CI repository settings or using the Travis CLI's encrypt command. This injects the key at runtime without it appearing in your build logs or being committed to source control. Cloudsmith also recommends using a dedicated service account so you can revoke the pipeline credential independently of personal accounts.
Cloudsmith supports over 30 package formats, including Debian, RPM, npm, Python (PyPI), Maven, Docker, Helm, NuGet, Ruby Gems, and more. The Cloudsmith CLI's push command handles all of them, so you can publish any artifact produced by your Travis CI build using the same integration.
Yes. Configure your build environment to authenticate against your Cloudsmith repository using your API key or an entitlement token. You can then use native tooling - such as pip, npm, apt, or docker pull - to resolve packages from Cloudsmith during the install or build phase of your pipeline.
It is strongly recommended. A service account gives your Travis CI pipeline its own scoped identity in Cloudsmith, separate from any individual user. This means you can grant only the permissions the pipeline needs, and revoke or rotate access without affecting other team members or integrations.