Key Ring Import Job Args
A KeyRingImportJob
can be used to create CryptoKeys
and CryptoKeyVersions
using pre-existing key material, generated outside of Cloud KMS. A KeyRingImportJob
expires 3 days after it is created. Once expired, Cloud KMS will no longer be able to import or unwrap any key material that was wrapped with the KeyRingImportJob
's public key.
Note: KeyRingImportJobs cannot be deleted from Google Cloud Platform. Destroying a provider-managed KeyRingImportJob will remove it from state but will not delete the resource from the project. To get more information about KeyRingImportJob, see:
How-to Guides
Example Usage
Import
KeyRingImportJob can be imported using any of these accepted formats:
{{name}}
When using thepulumi import
command, KeyRingImportJob can be imported using one of the formats above. For example:
$ pulumi import gcp:kms/keyRingImportJob:KeyRingImportJob default {{name}}
Properties
It must be unique within a KeyRing and match the regular expression a-zA-Z0-9_-{1,63}
The wrapping method to be used for incoming key material. Possible values are: RSA_OAEP_3072_SHA1_AES_256
, RSA_OAEP_4096_SHA1_AES_256
.
The protection level of the ImportJob. This must match the protectionLevel of the versionTemplate on the CryptoKey you attempt to import into. Possible values are: SOFTWARE
, HSM
, EXTERNAL
.