CryptoKey |
## Example Usage
### Kms Crypto Key Basic
```java
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.kms.KeyRing;
import com.pulumi.gcp.kms.KeyRingArgs;
import com.pulumi.gcp.kms.CryptoKey;
import com.pulumi.gcp.kms.CryptoKeyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var keyring = new KeyRing("keyring", KeyRingArgs.builder()
.location("global")
.build());
var example_key = new CryptoKey("example-key", CryptoKeyArgs.builder()
.keyRing(keyring.id())
.rotationPeriod("100000s")
.build());
}
}
```
### Kms Crypto Key Asymmetric Sign
```java
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.kms.KeyRing;
import com.pulumi.gcp.kms.KeyRingArgs;
import com.pulumi.gcp.kms.CryptoKey;
import com.pulumi.gcp.kms.CryptoKeyArgs;
import com.pulumi.gcp.kms.inputs.CryptoKeyVersionTemplateArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var keyring = new KeyRing("keyring", KeyRingArgs.builder()
.location("global")
.build());
var example_asymmetric_sign_key = new CryptoKey("example-asymmetric-sign-key", CryptoKeyArgs.builder()
.keyRing(keyring.id())
.purpose("ASYMMETRIC_SIGN")
.versionTemplate(CryptoKeyVersionTemplateArgs.builder()
.algorithm("EC_SIGN_P384_SHA384")
.build())
.build());
}
}
```
## Import
CryptoKey can be imported using any of these accepted formats* `{{key_ring}}/cryptoKeys/{{name}}` * `{{key_ring}}/{{name}}` In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import CryptoKey using one of the formats above.
|
CryptoKeyArgs |
|
CryptoKeyArgs.Builder |
|
CryptoKeyIAMBinding |
Three different resources help you manage your IAM policy for KMS crypto key.
|
CryptoKeyIAMBindingArgs |
|
CryptoKeyIAMBindingArgs.Builder |
|
CryptoKeyIAMMember |
Three different resources help you manage your IAM policy for KMS crypto key.
|
CryptoKeyIAMMemberArgs |
|
CryptoKeyIAMMemberArgs.Builder |
|
CryptoKeyIAMPolicy |
Three different resources help you manage your IAM policy for KMS crypto key.
|
CryptoKeyIAMPolicyArgs |
|
CryptoKeyIAMPolicyArgs.Builder |
|
CryptoKeyVersion |
A `CryptoKeyVersion` represents an individual cryptographic key, and the associated key material.
|
CryptoKeyVersionArgs |
|
CryptoKeyVersionArgs.Builder |
|
KeyRing |
A `KeyRing` is a toplevel logical grouping of `CryptoKeys`.
|
KeyRingArgs |
|
KeyRingArgs.Builder |
|
KeyRingIAMBinding |
Three different resources help you manage your IAM policy for KMS key ring.
|
KeyRingIAMBindingArgs |
|
KeyRingIAMBindingArgs.Builder |
|
KeyRingIAMMember |
Three different resources help you manage your IAM policy for KMS key ring.
|
KeyRingIAMMemberArgs |
|
KeyRingIAMMemberArgs.Builder |
|
KeyRingIAMPolicy |
Three different resources help you manage your IAM policy for KMS key ring.
|
KeyRingIAMPolicyArgs |
|
KeyRingIAMPolicyArgs.Builder |
|
KeyRingImportJob |
A `KeyRingImportJob` can be used to create `CryptoKeys` and `CryptoKeyVersions` using pre-existing
key material, generated outside of Cloud KMS.
|
KeyRingImportJobArgs |
|
KeyRingImportJobArgs.Builder |
|
KmsFunctions |
|
SecretCiphertext |
Encrypts secret data with Google Cloud KMS and provides access to the ciphertext.
|
SecretCiphertextArgs |
|
SecretCiphertextArgs.Builder |
|