Create a GPG key
Install gpg if you don’t already have it. GPGtools is recommended if you are on a Mac.
Mac users note there have been problems experienced by some when using homebrew installed
gnupg2, where gpg can’t connect to the gpg-agent and your passphrase doesn’t get cached. For decrypting one credential that’s ok, but when decrypting the Hiera eYAML file it will ask you for your passphrase for each of the credentials.
Creating a GPG key
Create a gpg key
gpg --gen-key using your
digital.cabinet-office.gov.uk email address. Defaults for the questions
should be fine although it’s possibly worth going for a 4096 bit key.
NOTE: You should also generate a revocation certificate with
gpg --gen-revokeand store it in a safe place (not on your laptop, maybe a USB stick in your locker).
Working out your key id and finger print
gpg --fingerprint firstname.lastname@example.org
Should look something like this.
pub 2048R/90E65803 2013-02-08 Key fingerprint = 37CC 021A C5C2 4E27 C4D9 5735 9B0E 9DD1 90E6 5803 uid my name <email@example.com> sub 2048R/FDD27DBE 2013-02-08
The key id is
90E65803 in this case. The fingerprint is
37CC 021A C5C2
4E27 C4D9 5735 9B0E 9DD1 90E6 5803
Upload your GPG key to a keyserver
Send your key to a keyserver by doing:
gpg --send-keys $KEYID
If you are having problems uploading your key, it’s worth trying another keyserver. Those trying to receive your key may be connecting to a different keyserver than the one you sent your key to. This is fine, as the keyservers synchronise, but this may take some time to happen.
You now should be able to find your key on http://keys.gnupg.net:11371/
It occasionally takes a while for the keyserver to display pushed keys due to caching.
You can find an overview of the GPG keyserver pools hereThis page is owned by #2ndline and needs to be reviewed