KmsFunctions

Functions

Link copied to clipboard

Retrieves the current IAM policy data for a Google Cloud KMS crypto key.

Link copied to clipboard

Provides access to the latest Google Cloud Platform KMS CryptoKeyVersion in a CryptoKey. For more information see the official documentation and API.

Link copied to clipboard

Provides access to all Google Cloud Platform KMS CryptoKeys in a given KeyRing. For more information see the official documentation and API. A CryptoKey is an interface to key material which can be used to encrypt and decrypt data. A CryptoKey belongs to a Google Cloud KMS KeyRing.

suspend fun getCryptoKeys(filter: String? = null, keyRing: String): GetCryptoKeysResult
Link copied to clipboard

Provides access to Google Cloud Platform KMS CryptoKeyVersions. For more information see the official documentation and API.

suspend fun getCryptoKeyVersions(cryptoKey: String, filter: String? = null): GetCryptoKeyVersionsResult
Link copied to clipboard

Retrieves the current IAM policy data for ekmconnection

suspend fun getEkmConnectionIamPolicy(location: String? = null, name: String, project: String? = null): GetEkmConnectionIamPolicyResult
Link copied to clipboard
suspend fun getKeyHandle(location: String, name: String, project: String? = null): GetKeyHandleResult
Link copied to clipboard
suspend fun getKeyHandles(location: String, project: String? = null, resourceTypeSelector: String): GetKeyHandlesResult
Link copied to clipboard

Retrieves the current IAM policy data for a Google Cloud KMS key ring.

Link copied to clipboard

Provides access to all Google Cloud Platform KMS CryptoKeyRings in a set location. For more information see the official documentation and API. A key ring organizes keys in a specific Google Cloud location and lets you manage access control on groups of keys. A key ring's name does not need to be unique across a Google Cloud project, but must be unique within a given location. After creation, a key ring cannot be deleted. Key rings don't incur any costs.

suspend fun getKeyRings(argument: suspend GetKeyRingsPlainArgsBuilder.() -> Unit): GetKeyRingsResult
suspend fun getKeyRings(filter: String? = null, location: String, project: String? = null): GetKeyRingsResult
Link copied to clipboard

Provides access to a Google Cloud Platform KMS CryptoKey. For more information see the official documentation and API. A CryptoKey is an interface to key material which can be used to encrypt and decrypt data. A CryptoKey belongs to a Google Cloud KMS KeyRing.

suspend fun getKMSCryptoKey(keyRing: String, name: String): GetKMSCryptoKeyResult
Link copied to clipboard

Provides access to a Google Cloud Platform KMS CryptoKeyVersion. For more information see the official documentation and API. A CryptoKeyVersion represents an individual cryptographic key, and the associated key material.

suspend fun getKMSCryptoKeyVersion(cryptoKey: String, version: Int? = null): GetKMSCryptoKeyVersionResult
Link copied to clipboard

Provides access to Google Cloud Platform KMS KeyRing. For more information see the official documentation and API. A KeyRing is a grouping of CryptoKeys for organizational purposes. A KeyRing belongs to a Google Cloud Platform Project and resides in a specific location.

suspend fun getKMSKeyRing(location: String, name: String, project: String? = null): GetKMSKeyRingResult
Link copied to clipboard

This data source allows you to use data encrypted with Google Cloud KMS within your resource definitions. For more information see the official documentation.

suspend fun getKMSSecret(additionalAuthenticatedData: String? = null, ciphertext: String, cryptoKey: String): GetKMSSecretResult
Link copied to clipboard

First, create a KMS KeyRing and CryptoKey using the resource definitions:

suspend fun getKMSSecretAsymmetric(ciphertext: String, crc32: String? = null, cryptoKeyVersion: String): GetKMSSecretAsymmetricResult
Link copied to clipboard

!>Warning: This data source is deprecated. Use the gcp.kms.SecretCiphertext resource instead. This data source allows you to encrypt data with Google Cloud KMS and use the ciphertext within your resource definitions. For more information see the official documentation.