Skip to main content
Table of contents

GovWifi Secrets

All secrets are stored in, and are encrypted using GPG.

All shell commands assume you are running from within the govwifi-terraform repository.


To use these secrets, you will need the Password Store tool installed on your machine.

You will also need an implementation of gpg installed. This will be installable under the name gnupg:

apt/brew/dnf/rpm/yum install gnupg

Getting access

Once you have installed the tools, you will need someone to re-encrypt the secrets with your public key.

Give someone your full key ID:

gpg --list-keys '<name>'

An example of a key ID is: 06D20CF70AC370DE72F49EDC992939FDD5C5144C

Please also ensure your public key is on a well known keyserver:

We suggest and, as they are known to be reliable.

gpg --keyserver --send-keys '<your key ID>'
gpg --keyserver --send-keys '<your key ID>'

Giving Access

Once you have received someone’s GPG Key ID, you must receive it, and trust it:

key_id='<their key ID>'
gpg --keyserver --receive-keys "$key_id"
echo "${key_id}:6" | gpg --import-ownertrust

Append the .private/passwords/.gpg-id file with their key:

echo "$key_id" >> '.private/passwords/.gpg-id'

then re-encrypt the passwords from within the govwifi-terraform repo:

make rencrypt-passwords

Getting a secret

Throughout the documentation, there will be references to specific secrets stored within the password store.

To read individual secrets, run the command:

PASSWORD_STORE_DIR=.private/passwords pass show '<secret name>'

# example, access the Staging Bastion SSH Key PASSWORD_STORE_DIR=.private/passwords pass show keys/govwifi-staging-bastion-key